At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
IN-VEHICLE AUTHORIZATION FOR AUTONOMOUS VEHICLES
Technologies for authorizing a passenger of an autonomous vehicle include determining a passenger authorization policy based on a request for a taxi service...
HANDLING POTENTIAL SERVICE LOAD INTERRUPTIONS BY PRESENTING ACTION ITEMS
FOR SERVICE REQUESTER TO COMPLETE TO...
A method, system and computer program product for handling potential service load interruptions. The utilization of resources, such as servers in a service...
METHOD AND DEVICE FOR PROTECTING ACCESS TO A MESSAGE
A device for reading a message includes a reader to read biometric data of a holder of the medium and a scanner to capture, on a medium, an encoded message...
Machine-to-Machine and Machine to Cloud End-to-End Authentication and
A networked system for authenticating devices that comprise constrained devices connected in a network either directly to cloud based and/or dedicated servers...
SYNCHRONIZING CREDENTIAL HASHES BETWEEN DIRECTORY SERVICES
The subject disclosure is directed towards securely synchronizing passwords that are changed at a source location (e.g., an on-premises directory service) to a...
SYSTEM AND METHOD FOR IDENTIFYING AND PROTECTING SENSITIVE DATA USING
CLIENT FILE DIGITAL FINGERPRINT
Disclosed are a system and method for identifying and protecting sensitive data contained in a network client's file comprising obtaining a plurality of...
INFORMATION PROCESSING APPARATUS
A picked up image displaying unit displays a picked up image on a display unit. A face authentication unit detects a face image of a registered user existing...
LAYERING IN USER AUTHENTICATION
An asset is disclosed having a processing device and hardware with which to capture a biometric. The asset, with optional input from a remote server, may...
ACCESS CONTROL FOR A HARD ASSET
A system and method for granting access to the hard asset. The method can include capturing biometric information associated with a first soft asset. The...
DIGITAL IDENTITY ENROLLMENT SYSTEM
Digital identity enrollment systems are described herein. One device includes a memory, and a processor configured to execute executable instructions stored in...
AUTHENTICATING TO A NETWORK VIA A DEVICE-SPECIFIC ONE TIME PASSWORD
Generally, this disclosure describes a method and system for authenticating to a network via a device-specific one-time password. A method in an embodiment may...
WORKING METHOD OF DYNAMIC TOKEN
Disclosed is a working method of a dynamic token. The present invention relates to the field of communications. The method comprises: when a token is awakened,...
SYSTEM AND METHOD FOR SINGLE SIGN-ON FOR THICK-CLIENT APPLICATIONS
The embodiments herein provide a system and method to enable a single sign-on into a plurality of thick-client applications through an external application....
SYSTEM AND METHOD FOR WEB SINGLE SIGN-ON THROUGH A BROWSER EXTENSION
The embodiments herein disclose a system and method for enabling single sign-on for a user on a plurality of web applications through a browser extension. The...
Single Sign-On without a Broker Application
Facilitating single sign-on on a device having sandboxed applications. A method includes identifying a plurality of associated applications. Criteria are...
BROWSER INTEGRATION WITH CRYPTOGRAM
This disclosure includes utilizing a token cryptogram with a browser to facilitate a transaction. A webpage of a website is configured to accept a token...
DISTRIBUTED PASSCODE VERIFICATION SYSTEM
A distributed passcode verification system includes devices that each have a secret and that are each able to perform a limited number of verifications using...
AUTHENTICATION APPARATUS, AUTHENTICATION METHOD, AND AUTHENTICATION SYSTEM
Provided is an authentication apparatus easily realizing a one-time password system ensuring the security of a password without new equipment. The apparatus...
MANAGED DOMAINS FOR REMOTE CONTENT AND CONFIGURATION CONTROL ON MOBILE
A technique is disclosed for remotely managing isolated domains on mobile devices. A request is received from the mobile device to instantiate a managed...
CUSTOMIZED USER VALIDATION
Mechanisms and techniques for customized user validation. A login attempt is received from a remote electronic device with one or more computing devices that...
METHODS, SYSTEMS, AND MEDIA FOR PROVIDING ACCESS CONTROL FOR A COMPUTING
Methods, systems, and media for providing access control for a computing device are provided. In some implementations, methods for providing access control for...
DOWNLOADABLE SECURITY AND PROTECTION METHODS AND APPARATUS
Methods and apparatus for control of data and content protection mechanisms across a network using a download delivery paradigm. In one embodiment, conditional...
SYSTEMS AND METHODS FOR CONTAINERIZED DATA SECURITY
Provided herein are systems and methods useful in facilitating containerized data security. The system may include a data store, a computer processing unit, a...
SYSTEM FOR AUTHENTICATING MULTIPLE USERS
Disclosed is a method of registering users in a software system for participation in a multi-user activity. The method involves receiving authentication...
IDENTITY CONFIRMATION METHOD AND IDENTITY CONFIRMATION SYSTEM USING LIFE
Provided are an identity confirmation method and an identity confirmation system in which it is not necessary to keep a password in memory and in which a...
Method for Realizing Secure Communications among Machine Type
Communication Devices and Network Entity
A method for realizing secure communication between machine type communication devices and a network entity, the method includes: creating, by a network...
METHOD AND SYSTEM FOR AUTHENTICATION OVER A PUBLIC NETWORK USING MULTIPLE
OUT-OF-BAND COMMUNICATIONS CHANNELS...
A method includes sending an open request to a directory server for a first key, the first key being a trusted key wrapped in a public key. The open request...
SYSTEM-ON-CHIP DATA SECURITY APPLIANCE AND METHODS OF OPERATING THE SAME
System-on-chip data security appliance ("SoC-DSA") and methods of operating the same. In one embodiment, the SoC-DSA includes data security mechanisms enclosed...
System and Method for Signaling Segment Encryption and Key Derivation for
An apparatus for decoding a media stream includes a memory module, a processor module coupled to the memory module, wherein the memory module contains...
METHOD AND SYSTEM FOR ENCRYPTING/DECRYPTING PAYLOAD CONTENT OF AN OTN
The present disclosure relates to a system and method of encrypting and decrypting Optical Transport Network (OTN) payload content. A transmitter of the system...
BORDER GATEWAY PROTOCOL (BGP) COMMUNICATIONS OVER TRUSTED NETWORK FUNCTION
VIRTUALIZATION (NFV) HARDWARE
A data communication system uses Border Gateway Protocol (BGP) and Network Function Virtualization (NFV). A first BGP Virtual Machine (VM) in a first NFV...
SYSTEM FOR DIVIDING NETWORK USING VIRTUAL PRIVATE NETWORK AND METHOD
The present invention relates to a technology for enabling each user's PC to transmit a packet separately through an internal network or external network by...
Providing Virtualized Private Network Tunnels
Various aspects of the disclosure relate to providing a per-application policy-controlled virtual private network (VPN) tunnel. In some embodiments, tickets...
FIREWALL WITH TWO-PHASE FILTERING
Two-phase filtering for a firewall is disclosed. In the first, general phase, a request is filtered to verify one or more of: that the request is pursuant to a...
METHOD AND SERVER FOR SECURING COMMUNICATION NUMBER
An interaction method includes receiving an order request sent by a first communication terminal, and acquiring a first communication number according to the...
COMMUNICATION METHOD AND SERVER
A communication method includes receiving a query request sent by a basic communication server, the query request including at least one of a current calling...
SYSTEMS AND METHODS FOR TELEPHONE NUMBER PROVISIONING AND TELEPHONY
Systems, methods, and computer-readable media are provided for telephone number provisioning. A user interface configured to provide access to telephony...
CLOUD BASED CUSTOMER PREMISES EQUIPMENT
Network (cloud) based customer premises equipment may receive, over a broadband access circuit, layer 2 traffic from an access device at a customer premises;...
COMMUNICATION SYSTEM, TERMINAL APPARATUS AND SERVER
A communication system allows terminals PC1 and PC2 located behind NAT routers to communicate with each other by using source address, source port number,...
METHOD FOR ADDRESSING MESSAGES IN A COMPUTER NETWORK
In a method for addressing messages in a computer network in which two different types of address are used, wherein at least one first network element (4, 5,...
METHOD, APPARATUS, AND COMPUTER-READABLE MEDIUM FOR EFFICIENT SUBNET
An apparatus, computer-readable medium, and computer-implemented method for efficiently identifying a subnet including sorting a plurality of Internet Protocol...
PROVISION OF PUBLIC SERVICE IDENTITIES
A mechanism to handle Public Service Identities identifying services in a network when a given Public Service Identity (PSI) belongs to a range of Public...
REMOTE PURGE OF DNS CACHE
Various techniques for purging resource records stored in a cache of domain name system servers are disclosed herein. In one embodiment, a method includes...
ADDRESS RESOLUTION PROTOCOL SUPPRESSION USING A FLOW-BASED FORWARDING
A method of suppressing ARP packets in a logical network comprising a set of data compute nodes (DCNs). The DCNs are hosted on a set of physical hosts. Each...
E-MAIL INTEGRATED INSTANT MESSAGING
A system and method supporting instant messaging which removes many of the problems and barriers to the use of instant messaging through the use of universally...
METHODS AND APPARATUS FOR PROVIDING EXPANDED TELECOMMUNICATIONS SERVICE
The present invention provides flexible call processing. For example, a call processor system can receive an inbound call intended for a called party and place...
ELECTRONIC MESSAGE ORGANIZATION VIA SOCIAL GROUPS
A mechanism for automatically organizing electronic messages is described herein. Social groups of a particular user that may be representative of topics,...
SOCIAL CONVERSATION MANAGEMENT
A method for managing conversations in social media and networks may include selecting, by a processor, a message posted to a social medium for management and...
METHODS, SYSTEMS, AND MEDIA FOR PRESENTING COMMENTS BASED ON CORRELATION
Methods, systems, and media for presenting comments based on correlation with content are provided. In some implementations, a method for presenting ranked...
PREDICTIVE FORWARDING OF NOTIFICATION DATA
A computing system is described that receives notification data associated with a user, and responsive to determining that the user is interacting with a first...