At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
A biometric authentication system is disclosed that provides a trusted third party biometric authentication capability for independent confirmation of identity...
NETWORK AUTHENTICATION OF A GEO-FENCED VOLUME
Provided is a method for managing a software defined network using a software control layer to regulate a geo-fenced volume. The software control layer can use...
METHOD FOR ACCESSING A SERVICE AND A CORRESPONDING SERVER
To a method for accessing a service, at least one first user device executes a first application that communicates with a second user device application. The...
SYSTEM AND METHOD FOR SECURING OFFLINE USAGE OF A CERTIFICATE BY OTP
The present invention relates to a system and method for securing offline usage of a certificate by authenticating a user by a One Time Password (OTP) system...
METHOD FOR EXCLUDING A PARTICIPANT FROM A GROUP HAVING AUTHORIZED
A method for excluding a participant from a group of multiple participants, in which certificates are used for an authorized communication of the participants...
Using Trusted Platform Module To Build Real Time Indicators of Attack
Managed devices containing a Trusted Platform Module (TPM) to provide a trusted environment generate a device certificate at initialization of the TPM and send...
INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING APPARATUS AND
An information processing apparatus includes circuitry that retains firmware and performs processing based on the firmware, receives a command from an external...
Electronic Appliance, Network Unit of Electronic Appliances, Network of
Electronic Appliances, and Chip...
An aim of the present disclosure is to provide the technology for preventing the peripheral devices from being taken over, so as to suppress the remote-attack...
USER SECURITY AUTHENTICATION SYSTEM IN INTERNET AND METHOD THEREOF
The present invention relates to a user security authentication system in an Internet environment and a method therefor, which generate encrypted member...
INCREASED COMMUNICATION SECURITY
An apparatus may include a communication interface and a security component. The communication interface may be configured to receive a Constrained Application...
SECURING COMMUNICATIONS WITH ENHANCED MEDIA PLATFORMS
Various methods and systems for securing communications with enhanced media platforms, are provided. In particular, an enhanced media platform is authenticated...
SYSTEMS AND METHODS FOR SECURE OPERATION OF AN INDUSTRIAL CONTROLLER
A method of securing an industrial control system includes operating the industrial control system in an open mode, wherein communications between a plurality...
WIRELESS SENSOR FIELD ENUMERATION
A system for authenticating data acquired by multiple sensors prior to storing the data in a database is described. The system also authenticates users...
Generating an NSEC Record
A DNS server receives, from a client device, a DNS query for a resource record type at a domain name. The DNS server determines that the resource record type...
SYSTEM AND METHOD OF PROVIDING PERSONAL CONTENT
Provided is a personal content providing system for providing customized content according to a personalization context. The personal content providing system...
CONDITIONAL LOGIN PROMOTION
The present disclosure relates to a system and method for providing conditional login promotion. An example system includes at least one processor and at least...
METHOD OF SHARING KEY BETWEEN DEVICES USING PHYSICAL ACCESS RESTRICTION
A method of operating a hub used in an internet of things (IoT) network system which includes a first controller and an IoT device is provided. The method...
SECURING DATA IN A DISPERSED STORAGE NETWORK
A method for execution by a dispersed storage and task (DST) processing unit includes transforming a counter seed into a set of counter values; obtaining an...
Provided is a process of operating a zero-knowledge encrypted database, the process including: obtaining a request for data in a database stored by an...
SYSTEM AND METHOD FOR KEY EXCHANGE BASED ON AUTHENTICATION INFORMATION
Disclosed are a system and method for key exchange based on user authentication information. The system for key exchange based on user authentication...
Device Identification Scoring
Device identification scoring systems and methods may be provided that can increase the reliability and security of communications between devices and service...
Password Encryption for Hybrid Cloud Services
Methods, systems, computer-readable media, and apparatuses may provide password encryption for hybrid cloud services. A workspace cloud connector internally...
SEMANTICALLY AWARE NETWORK SERVICES AND METHOD
A method and apparatus where network-layer devices use host-provided, detailed, per-packet, semantic information (DPPS information), which describes the...
SECURE ELEMENT ACTIVITIES
Activities involving a secure element (SE) in a mobile device include a background operation. When the SE initiates the background operation, it informs the...
Transparent DNSSEC-signing proxy
A first DNS server receives, from a client device, a DNS query for a domain name and transmits, to a second DNS server, the DNS query for the domain name The...
Automatic Placeholder Finder-Filler
Methods and processes are disclosed for iOS based systems and mobile devices that permit a user to securely inject passwords and related information into...
SECURE PROXY TO PROTECT PRIVATE DATA
Technologies are provided in embodiments to protect private data. Embodiments are configured to intercept a network flow en route from a server to a client...
Firewall Security for Computers with Internet Access and Method
A firewall security platform is provided for enhancing security of a network. The firewall security platform includes at least one interface to communicate the...
REGISTRATION AND USE OF PATTERNS DEFINED BY EXPRESSIONS AS DOMAIN NAMES
A domain name registration service permits registrants to register names that are defined by a regular expression that may include one or more wildcard values...
BASE STATION FOR IP COMMUNICATIONS WITH MOBILE TERMINAL, AND METHOD FOR
ACQUIRING IP OF BASE STATION
A base station and a method of acquiring an IP of a base station by a mobile terminal. According to one exemplary embodiment, a base station includes: an...
Communication Device and Method for Providing a Name Service Within an
Industrial Automation System
A method for providing a name service within an industrial automation system, wherein communication devices of the industrial automation system each check via...
Arp Implementation Method, Switch Device, and Control Device
An ARP implementation method, a switch device, and a control device are disclosed. The method includes: receiving, by a switch device, an ARP packet; sending,...
Address Acquiring Method and Network Virtualization Edge Device
An address acquiring method includes receiving an address resolution request packet sent by a source host, where the address resolution request packet includes...
METHOD FOR ALLOCATING INTERNET PROTOCOL ADDRESSES TO CLIENTS OF A NETWORK
AND CORRESPONDING APPARATUS
An access device and an extender access device, forming a network for network client devices. A single IP address attribution server in the network attributes...
System and Method of Federating a Cloud-Based Communications Service with
a Unified Communications System
A system and method of federating a cloud-based communications service with a unified communications system is disclosed. According to one embodiment, a system...
METHOD AND SERVER ENABLING A FIRST USER TO AUTOMATICALLY DISCOVER THE
SOCIAL NETWORK IDENTIFIERS OF A SECOND...
An embodiment of the method enabling a first user (A) to automatically discover the social network identifiers of a second user (B) and the respective statuses...
MANAGING FOR-SALE GROUP POSTINGS
The present disclosure is directed toward systems and method for managing social networking system for-sale groups. For example, systems and method described...
METHODS AND SYSTEMS OF APPLICATION MESSAGE ADDRESSING
In one aspect, a computerized method for implementing an application messaging service includes the step of providing a messaging application that enables a...
METHOD AND SYSTEM FOR PROVIDING NOTIFICATIONS FOR GROUP MESSAGES
A method and system for providing notifications to users for group messages transmitted over a social networking platform are disclosed. A server with one or...
CONNECTION ARCHITECTURE FOR A MOBILE NETWORK
A mobile device for accessing content stored on a remote server over a mobile network includes a processor configured to direct the mobile device to send a...
Messaging Sharing System and Method of Use
An apparatus, comprising at least one memory including a computer program code. at least one processor. Wherein the at least one memory and the computer...
METHOD AND APPARATUS FOR PROVIDING USER INTENTION EXPRESSION SERVICE IN
The present invention relates to a method and an apparatus for proving a user expression service in a communication system. The method in a server may comprise...
CLOUD BASED CHAT GOVERNANCE SYSTEM BASED ON BEHAVIORAL PATTERNS AND
A computer-implemented method for intelligent chat governance, is provided. The computer-implemented method includes analyzing an incoming message based on...
MODIFYING RICH MEDIA COMPONENTS FOR AN INTERACTIVE EMAIL
An interactive email experience is customized to the recipient's interests by modifying rich media components provided by the email based on the recipient's...
MESSAGING SYSTEM AND METHOD
A method of cross-platform messaging including receiving, by a messaging system, at least one initial message having a message format, an initial message...
AUTOMATIC TRANSFORMATION OF MESSAGES BETWEEN SERVICE VERSIONS
A method and system are provided for automatic transformation of messages between service versions. The method includes collecting message data of messages...
SMART POSITIONING OF CHAT HEADS
In particular embodiments, a client computing device of a user provides for presentation a user interface that includes one or more components. The client...
METHOD AND SYSTEM FOR MANAGING AN INFORMATIONAL SITE USING A SOCIAL
A computer server supporting a social networking application that has multiple users, each user having a unique social networking application account...
MESSAGE SERVICE PROVIDING METHOD FOR MESSAGE SERVICE LINKED TO SEARCH
SERVICE AND MESSAGE SERVER AND USER...
A message service providing method for a message service linked to a search service and a message server and a user terminal for performing the method are...
METHOD FOR PROVIDING POINT OF CONVERGENCE IN REAL TIME
The present invention relates to a method for participants or group of participants that facilitates scheduling and arriving at a pre-determined point of...