Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0277421 Secure Service for Receiving Sensitive Information Through Nested iframes
Methods and systems for receiving sensitive information include receiving a request for entering sensitive information, the request received from a user...
2016/0277420 FILE AND BIT LOCATION AUTHENTICATION
An approach for authentication is provided. The approach performs identifying, by one or more computer processors, an account attempting to access content. The...
2016/0277419 GEO-FENCE AUTHORIZATION PROVISIONING
A system includes a communication module that receives a request to post content to an event gallery associated with an event. The request in turn includes...
2016/0277418 SECURITY MANAGEMENT ACCORDING TO LOCATION CHANGE IN PROXIMITY BASED SERVICES
In order for effectively managing security of ProSe (Proximity based Services) communication, a server forming a communication system monitors locations of a...
2016/0277417 METHOD AND APPARATUS FOR COMMUNICATION NUMBER UPDATE
A communication number updating method is provided. The method includes obtaining an old communication number and a new communication number used by a same...
2016/0277416 FIREWALL METHOD AND APPARATUS FOR INDUSTRIAL SYSTEMS
Selectively enabling communication of dual protocol packets from a source device directed to a service of an object class at target devices is provided. Steps...
2016/0277415 Method and Apparatus For Information exchange Over a Web Based Environment
Exchange information through the World Wide Web is a way of life in modern society. The innovated dynamic workspace technology of this invention that...
2016/0277414 MANAGEMENT DEVICE, MANAGEMENT SYSTEM, AND MANAGEMENT METHOD
A management device manages information of a task having been executed by users cooperatively. An electronic data access unit accesses electronic data by using...
2016/0277413 Access Permission Device, Access Permission Method, Program, and Communicating System
According to one embodiment of the present invention, an access permission device includes a communicator, a state evaluator, an access proxy, and a...
2016/0277412 Methodology for identifying local/mobile client computing devices using a network based database containing...
The present invention consists of methods whereby local/mobile computing devices are registered by collecting a set of hardware and/or software distinctive...
2016/0277411 TENANT LOCKBOX
Tenant approval for operator access to tenant data is provided. In order to grant service personnel operators access to a tenant's data for performing a...
2016/0277410 METHOD AND APPARATUS FOR TRANSMISSION AND RECEPTION OF SECURE EPHEMERAL MEDIA
The system provides a method and apparatus for providing a dynamic link to ephemeral content. The system and method receives a content from a first device. The...
2016/0277409 Method and System to Capture and Find Information and Relationships
A method and system to improve the computer in light of the global information network with numerous computer devices services, and apps, so that a user can...
2016/0277408 GENOME SHARING
Sharing data is disclosed. In some cases, sharing data includes receiving a request to share data from a first account to a second account, receiving an...
2016/0277407 APPARATUS, SYSTEM, AND METHOD FOR AUTHORIZING A SERVICE
Systems include a service-provider device; and a browser loaded on a first device. To connect the service-provider device with the first device, the browser...
2016/0277406 IDENTITY MANAGEMENT
There are provided apparatuses and methods for providing user information stored at an access network to a content provider, the access network for providing a...
2016/0277405 COMPUTER SYSTEM AND METHOD FOR DYNAMIC WEBSITE INSTANTIATION
A computer system, a computer-implemented method, and a computer program product for dynamic website instantiation. The system includes an interface component...
2016/0277404 Method and System for Updating Security Information
A method for updating security information is applied to a system including an information service provider and mobile devices. The information service...
2016/0277403 AUTOMATED PROVISIONING OF A NETWORK APPLIANCE
Network communication and provisioning systems and methods are provided to enable automatic provisioning of an appliance to provide encryption services for...
2016/0277402 Methods, Systems, and Products for Authentication
Multiple authentication procedures enhance security of Internet transactions. For example, a request is received from a customer to access a service. A first...
2016/0277401 DATA PROCESS APPARATUS, DATA SHARING METHOD, AND DATA PROCESS SYSTEM
A data process apparatus includes a management unit that receives a creation request for creating a sharable data storage space from an unauthenticated data...
2016/0277400 AUTHENTICATION SYSTEM
Embodiments provide methods, devices and computer program arranged to facilitate authenticated communication between a user device and a service associated...
2016/0277399 SECURITY VERIFICATION METHOD, APPARATUS, AND SYSTEM
A security verification method, apparatus, and system relate to the field of computer security technologies, and are used to improve reliability of the...
2016/0277398 METHOD FOR MANAGING ACCESS TO PROTECTED COMPUTER RESOURCES
A system for securing and tracking usage of transaction services or computer resources by a client computer from a first server computer, which includes...
2016/0277397 INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND INFORMATION PROCESSING SYSTEM
An information processing apparatus for authenticating a user includes a wireless communication unit configured to obtain predetermined information from a...
2016/0277396 SYSTEM AND METHOD FOR SELECTIVELY INITIATING BIOMETRIC AUTHENTICATION FOR ENHANCED SECURITY OF ACCESS CONTROL...
A method and system of selectively initiation biometric security based on thresholds is described. The method includes retrieving an access security level...
2016/0277395 A COMPUTER IMPLEMENTED METHOD, COMMUNICATIONS SYSTEM AND COMPUTER PROGRAMS PRODUCTS FOR SECURING OPERATIONS IN...
The computer implemented method comprising controlling the access to different resources and actions defined for a user by a first server, reducing the...
2016/0277394 MODULE FOR CONTROLLING USABILITY OF A DEVICE
Module (10) for controlling usability of a processing unit (2) of a device (1), the module comprising a modem (11) for communicating with a cellular network,...
2016/0277393 CLOCK SYNCHRONIZED DYNAMIC PASSWORD SECURITY LABEL VALIDITY REAL-TIME AUTHENTICATION SYSTEM AND METHOD THEREOF
This invention discloses a clock synchronized dynamic password security label validity real-time authentication system and method thereof, which comprises, the...
2016/0277392 SYSTEMS AND METHODS FOR COMBINED OTP AND KBA IDENTITY AUTHENTICATION
Certain implementations include systems and methods for combined one-time- passcode (OTP) and knowledge-based-authentication (KBA) identity authentication. A...
2016/0277391 END-TO-END AUTHENTICATION AT THE SERVICE LAYER USING PUBLIC KEYING MECHANISMS
In a machine-to-machine/Internet-of-things environment, end-to-end authentication of devices separated by multiple hops is achieved via direct or...
2016/0277390 MULTI-DOMAIN APPLICATIONS WITH AUTHORIZATION AND AUTHENTICATION IN CLOUD ENVIRONMENT
A multi-domain application requiring SSO and SLO operations in cloud environment is presented. The computing system of the multi-domain application includes a...
2016/0277389 ROLE-BASED ACCESS TOOL
The tool to provide a role-based access tool is configured to receive a single sign-on login from a user; determine an identity of the user based on the single...
2016/0277388 ENHANCED AUTHORIZATION
Confirming user consent includes prompting the user to tap a card a card reader or a computing device and confirming consent in response to the user taping the...
2016/0277387 MULTI-PERSONA MANAGEMENT AND DEVICES
Disclosed are various examples for multi-persona management on a client device. In one example, a client device can be configured to maintain multiple personas...
2016/0277386 Mapping Specific User Credentials to Temporary User Favorite Credentials
A system for automatically completing fields in online forms, such as login forms and new user registration forms, which employs a Master Cookie File...
2016/0277385 ESTABLISHING A SECURE CHANNEL WITH A HUMAN USER
A method of establishing a secure channel between a human user and a computer application is described. A secret unique identifier ("PIN") is shared between a...
2016/0277384 INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND INFORMATION PROCESSING SYSTEM
An information processing apparatus includes a storage that stores access-limited identification information and access-unlimited identification information,...
2016/0277383 BINDING TO A USER DEVICE
Providing access to a protected resource includes obtaining a first authentication factor for a user that is accessing the resource using a computing device,...
2016/0277382 Validation database resident on a network server and containing specified distinctive identifiers of...
The present invention consists of methods whereby local/mobile computing devices are registered by collecting a set of hardware and/or software distinctive...
2016/0277381 SECURITY CHECK METHOD AND SYSTEM, TERMINAL, VERIFICATION SERVER
Described are a security check method and system, a terminal, and a verification server. The method includes: receiving a selection operation on one of service...
2016/0277380 MULTI-DEVICE TRANSACTION VERIFICATION
When a user enters a resource provider location with a portable communication device, the portable communication device provides an indication to a transaction...
2016/0277379 IMAGE PROCESSING SYSTEM, IMAGE PROCESSING DEVICE, AND AUTHENTICATION METHOD
An image processing system includes: a first image processing device including: an input unit that receives an input of first authentication information for...
2016/0277378 RESTRICTED CONTENT PUBLISHING WITH SEARCH ENGINE REGISTRY
A processor-implemented method is provided. The method may include providing a content registry with at least one application program interface (API) to manage...
2016/0277377 Privacy and Performance Tuning Apparatus for a Versioned File Block Access Method
File blocks of version-controlled files are individually provisioned, tracked, load-balanced, and secured by an interposer apparatus. A combination of...
2016/0277376 RESTRICTED CONTENT PUBLISHING WITH SEARCH ENGINE REGISTRY
A processor-implemented method is provided. The method may include providing a content registry with at least one application program interface (API) to manage...
2016/0277375 RESTRICTING BROADCAST AND MULTICAST TRAFFIC IN A WIRELESS NETWORK TO A VLAN
Traffic broadcast to a VLAN is restricted. To do so, a plurality of stations are associated with a BSSID (basic service set identifier). A first VLAN is...
2016/0277374 SYSTEM AND METHOD FOR SECURELY STORING AND SHARING INFORMATION
The present application generally relates to systems, devices, and methods to conduct the secure exchange of encrypted data using a three-element-core...
2016/0277373 Securing files under the semi-trusted user threat model using per-file key encryption
A computer system and methods for securing files in a file system with storage resources accessible to an authenticable user using an untrusted client device...
2016/0277372 OPTIMIZATION OF A SECURE CONNECTION WITH ENHANCED SECURITY FOR PRIVATE CRYPTOGRAPHIC KEYS
A system, method, and apparatus are provided for establishing a secure, split-terminated, communication connection between a client and a server (or two other...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.