At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
METHOD AND SYSTEM FOR SECURE COMMUNICATIONS
An operator of a first device is verified using biometric data detected by the first device. Responsive to successfully completing the verification, the first...
CONTENT CONTROL AT GATEWAY BASED ON AUDIENCE
A gateway device may control access to content based, at least in part, on an audience that will consume the content. In relation to a request for content to...
DOCUMENT DISTRIBUTION AND INTERACTION
A document originator establishes rules for authenticating an electronic signature. Such rules may require that any user who wishes to assent to the document...
SYSTEMS AND METHODS FOR CREDENTIAL MANAGEMENT BETWEEN ELECTRONIC DEVICES
Embodiments are provided for managing user credentials that enable access to secure websites. According to certain aspects, a browser device connects (230) to...
CAPTCHA CHALLENGE INCORPORATING OBFUSCATED CHARACTERS
A method for determining if a user of a computer system is a human. A processor receives an indication that a computer security program is needed and acquires...
WIRELESS COMMUNICATION SYSTEM, AND ONE-TIME PASSWORD GENERATING AND
A wireless communication system includes a mobile terminal that performs a one-time password generating function, a fixed terminal capable of activating a...
TOKEN-BASED SECURITY FOR REMOTE RESOURCES
Systems and methods of token-based protection for remote resources are disclosed. For example, a method may include receiving, at a second computing device, a...
System and Method to Enable PKI- and PMI- Based Distributed Locking of
Content and Distributed Unlocking of...
A central server configured with an Attribute Authority ("AA") acting as a Trusted Third Party mediating service provider and using X.509-compatible PKI and...
AUTHENTICATION SYSTEM, METHOD AND STORAGE MEDIUM
An authentication system according to an embodiment is provided with a service providing apparatus, an IDaaS corporation apparatus, and an authentication...
SINGLE SIGN-ON BETWEEN MULTIPLE DATA CENTERS
Techniques are disclosed for a single sign-on (SSO) enterprise system with multiple data centers that can use a lightweight cookie on a user's client device....
METHOD AND APPARATUS FOR MULTI-DOMAIN AUTHENTICATION
A method and apparatus for multi-domain authentication is described. In one example, credentials are received for a user accessing a first domain. User access...
AGGREGATOR TECHNOLOGY WITHOUT USERNAMES AND PASSWORDS
Techniques are described in which to access a user's web applications, the user registers and signs on to an aggregator system using any supported login...
DATA COMMUNICATION IN A CLUSTERED DATA PROCESSING ENVIRONMENT
Data can be communicated across a clustered data processing environment. A server can receive a request and a token from a web user interface component and...
PASSWORD CONSTRAINT ENFORCEMENT USED IN EXTERNAL SITE AUTHENTICATION
Techniques for password constraint enforcement used in external site authentication are disclosed. In some embodiments, password constraint enforcement used in...
METHOD AND APPARATUS FOR CLIENT TO CONTENT APPLIANCE (CA) SYNCHRONIZATION
A new approach is proposed that contemplates systems and methods to support file synchronization between a local host and a cloud storage via one or more local...
MULTI FACTOR USER AUTHENTICATION ON MULTIPLE DEVICES
Systems and methods of the present invention provide for a first and second client computer configured to receive and transmit an authentication credential and...
CM REGISTRATION METHOD AND APPARATUS
The present invention provides a cable modem (CM) registration method and apparatus, where the method includes: after obtaining a media access control (MAC)...
METHOD OF USING SERVER, SERVER RESERVATION CONTROL APPARATUS AND PROGRAM
In a content supply system, in order to use a streaming server to perform a live distribution, a user PC used makes a reservation for a time zone, etc. to a...
SYSTEMS AND METHODS FOR PATH MAXIMUM TRANSMISSION UNIT DISCOVERY
An information handling system is provided. The information handling system includes a plurality of network devices. One of the plurality of network devices is...
METHOD AND APPARATUS FOR MAKING A DECISION ON A CARD
Method and devices for making access decisions in a secure access network are provided. The access decisions are made by one or more portable credentials using...
METHOD, TERMINAL AND SYSTEM FOR ASSOCIATING USER RESOURCE INFORMATION
A method for associating user resource information includes: acquiring user resource information, associated with a first user identifier of a user, in a first...
AUTOMATING INTERNET OF THINGS SECURITY PROVISIONING
In one embodiment, a security provisioning service automatically establishes trust in a device. Upon receiving a provisioning request, a security provisioning...
Stateless Server-Based Encryption Associated with a Distribution List
An example method of decrypting electronic messages includes receiving, by an authentication module of a decryptor device, authentication requests from a...
System and Method for Sharing Access to a Service Within a Home Network
A home network router and method of operation are provided for seamlessly sharing access to a network service by multiple devices in a home network by...
CODE ANALYSIS FOR PROVIDING DATA PRIVACY IN ETL SYSTEMS
In an approach for providing data privacy in information integration systems, a method performed during compilation of an information integration job receives...
SYSTEM AND METHOD FOR IMPLEMENTING A HOSTED AUTHENTICATION SERVICE
A system, apparatus, method, and machine readable medium are described for a hosted authentication service. For example, one embodiment of a system comprises:...
INFORMATION PROCESSING APPARATUS AND METHOD, RECORDING MEDIUM AND PROGRAM
The present invention relates to an information processing apparatus allowing proper communication with a communication partner in accordance with a...
CONNECTION KEY DISTRIBUTION
A system and method for securely providing a mobile device with a cryptographic key in a vehicle. The method includes generating a cryptographic key pair that...
SYSTEM AND METHOD FOR RULE MATCHING IN A PROCESSOR
In one embodiment, a system includes a format block configured to receive a key, at least one rule, and rule formatting information. The rule can have one or...
METHOD AND SYSTEM FOR FACILITATING NETWORK JOINING
A method for facilitating network joining is disclosed, wherein, while a communication session is active between a network gateway and an NFC device comprised...
METHODS AND SYSTEMS FOR FILTERING ENCRYPTED TRAFFIC
Application programming interface (API) hooks are injected into an application program executing at a client during run-time. Responsive to these hooks, data...
Encapsulation of Secure Encrypted Data in a Deployable, Secure
Communication System Allowing Benign, Secure...
Sensitive, Type 1 KIV-encrypted data is encapsulated into IP packets in a remotely deployed, secure communication system. The IP packets are addressed to a...
METHOD AND APPARATUS FOR VERIFIABLE GENERATION OF PUBLIC KEYS
The invention provides a method of verifiable generation of public keys. According to the method, a self-signed signature is first generated and then used as...
Multi-Wrapped Virtual Private Network
The invention includes a system for transmitting multi-wrapped VPN enabled-data across a communication network from a device to another destination device...
Private Application Platform
Methods and systems disclosed provide for creating private networks for secured communication between devices. The devices can communicate with each other over...
MANGEMENT OF NETWORK ADDRESS POOLS
Systems and methods for storing and managing pools of network addresses. An example method may comprise: identifying, in a data structure representing a pool...
INTERNET CONNECTED HOUSEHOLD IDENTIFICATION FOR ONLINE MEASUREMENT &
DYNAMIC CONTENT DELIVERY
A method, apparatus, system, and computer readable storage medium provide the ability to identify an internet connected household (ICH). An Internet Protocol...
CLIENT AWARE DHCP LEASE MANAGMENT
Managing DHCP address leases based on client properties. A DHCP server may allocate a short DHCP lease to a client device based on client properties. These...
A MOVABLE GATEWAY, A DHCP SERVER AND RESPECTIVE METHODS PERFORMED THEREBY
FOR ENABLING THE GATEWAY TO MOVE FROM...
A gateway, a method performed by the gateway for connecting to an access point of a communication network, a DHCP server and a method performed by the DHCP...
Measures, including methods, systems and non-transitory computer-readable storage mediums, for providing a Domain Name Service (DNS) configuration service for...
DELIVERY CONTROL DEVICE, DATA DELIVERY SYSTEM, DELIVERY CONTROL METHOD,
AND NON-TRANSITORY COMPUTER READABLE...
Provided is a delivery control device, a data delivery system, and a delivery control method that enable a simultaneous data delivery to a number of reception...
SCOPED NETWORK ADDRESS POOL MANGEMENT
Systems and methods for storing and managing pools of network addresses. An example method may comprise: receiving, by a processing device, a request for a...
In some embodiments, security and/or automation systems, collectively referred to as automation systems, may facilitate communications between a remote user...
Social Message Monitoring Method and Apparatus
A social message monitoring method is implemented by receiving, from a social network server, a social message, and obtaining a theme probability vector of the...
SOCIAL NETWORKING RESPONSE MANAGEMENT SYSTEM
A system and method for managing electronic social networking includes defining content from a first user for communication to other users on an electronic...
ESTIMATION OF INFORMATION DIFFUSION ROUTE ON COMPUTER MEDIATED
A method for estimation of information diffusion route on computer mediated communication network. The method includes: generating, by a computing device, a...
BLINDER AVOIDANCE IN SOCIAL NETWORK INTERACTIONS
A method, system and computer program product for blinder avoidance in social networking interactions includes executing a social networking data processing...
SOCIAL MEDIA THREAT MONITOR
Technologies are generally described for systems, devices and methods effective to generate a report related to an entity. An identifier may be received from a...
DYNAMIC ANALYTICS CONTROLLED INFORMATION DISSEMINATION IN SOCIAL MEDIA
A method, system, and computer program product for selectively disseminating content in social media are provided in the illustrative embodiments. Prior to a...
METHOD AND SYSTEM FOR FACILITATING PUBLICATION OF A MEDIA FILE AT A
Methods, systems, and techniques for facilitating publication of a media file at a scheduled time. A media aggregation client sends media and a scheduling...