Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0337354 SYSTEM AND METHOD FOR SECURING MACHINE-TO-MACHINE COMMUNICATIONS
This invention concerns the implementation of end-to-end security for the communication between objects in the domain of the Internet of Things (or Internet of...
2016/0337353 SYSTEM AND METHOD FOR MULTI-FACTOR AUTHENTICATION
A system and method are presented for multi-factor authentication comprising the authentication of users, physical locations, and schedules. A combination of...
2016/0337352 SYSTEMS AND METHODS FOR DECRYPTION AS A SERVICE
Systems and methods for decryption of payloads are disclosed herein. In various embodiments, systems and methods herein are configured for decrypting thousands...
2016/0337351 AUTHENTICATION SYSTEM
A system and method for authenticating one or more devices to access a secure resource utilizing device trait characteristics and user identification....
2016/0337350 Online Pseudonym Verification and Identity Validation
Methods, systems, and computer program products for authenticating an online user. Authentication involves sending a code from a server to a user device...
2016/0337349 INTEGRATED VOICE BIOMETRICS CLOUD SECURITY GATEWAY
A triple factor authentication in one step method and system is disclosed. According to one embodiment, an Integrated Voice Biometrics Cloud Security Gateway...
2016/0337348 Security for cloud systems and virtualization cloud systems, mobile cloud systems and mobile virtualization...
A computer implemented method and a cloud security system are provided for securing data in a cloud storage environment. The cloud security system receives...
2016/0337347 SECONDARY DEVICE AS KEY FOR AUTHORIZING ACCESS TO RESOURCES
A secondary device may be used to provide access to resources to a primary device. Upon receiving an authorization indication at a device, a registration key...
2016/0337346 Multifactor Contextual Authentication and Entropy from Device or Device Input or Gesture Authentication
Methods and systems for authenticating a user requesting to access one or more resources via a device are described herein. Authentication may be based on or...
2016/0337345 System and Method for Communicating Credentials
A system and method for conducting transactions involving the communication of credentials connected to an entity or an individual, known as the presenter to a...
2016/0337344 PROVIDING MULTI-FACTOR AUTHENTICATION CREDENTIALS VIA DEVICE NOTIFICATIONS
Disclosed are various embodiments for providing multi-factor authentication credentials. In one embodiment, in response to a request from an application, a...
2016/0337343 SYSTEM AND METHOD FOR SECURING THE LIFE-CYCLE OF USER DOMAIN RIGHTS OBJECTS
In a method for enabling support for backwards compatibility in a User Domain, in one of a Rights Issuer (RI) and a Local Rights Manager (LRM), a Rights Object...
2016/0337342 SYSTEM AND METHOD FOR SECURING THE LIFE-CYCLE OF USER DOMAIN RIGHTS OBJECTS
In a method for enabling support for backwards compatibility in a User Domain, in one of a Rights Issuer (RI) and a Local Rights Manager (LRM), a Rights Object...
2016/0337341 APPLICATION CENTRIC CENTRALIZED CERTIFICATE MANAGEMENT SYSTEM FOR MANAGING CERTIFICATES ACROSS DATA CENTERS
A system for managing one or more certificates on granular object level in one or more datacenters is provided. The system includes a discover module, an...
2016/0337340 NATIVE APPLICATION SINGLE SIGN-ON
In an example embodiment, a virtual private network (VPN) connection is established between a client device and an authentication service. Then a request is...
2016/0337339 ESTABLISHING AND MAINTAINING AN IMPROVED SINGLE SIGN-ON (SSO) FACILITY
A client system associated with a user includes at least one hardware processor configured to initiate the following operations. A modified login page is...
2016/0337338 LATE BINDING AUTHENTICATION
A late-binding token (LBT) is securely generated and provided to a device application. When the LBT is presented and validated, a resource associated with the...
2016/0337337 IDENTIY INFORMATION INCLUDING A SCHEMALESS PORTION
In response to a request of a first user, identity information for users is searched to retrieve a portion of the identity information corresponding to the...
2016/0337336 MANAGEMENT SYSTEM, PROGRAM AND MANAGEMENT METHOD
A management system includes a sorting unit configured to receive an access request to access a protection resource, an access to which is protected,...
2016/0337335 INFORMATION PROCESSING SYSTEM AND USER AUTHENTICATION METHOD
An information processing system includes at least one information processing terminal and a first information processing apparatus. When an instruction for...
2016/0337334 DEVICE, SYSTEM AND METHOD OF MOBILE IDENTITY VERIFICATION
A device, system and method of mobile identity verification is provided. Identifier data is received at the device, from a remote computing device. The device...
2016/0337333 METHOD AND DEVICE FOR CLASSIFYING TCP CONNECTION CARRYING HTTP TRAFFIC
For classifying a TCP connection carrying HTTP traffic as trusted or untrusted, an analyser device performs: detecting an HTTP request message of an HTTP...
2016/0337332 SYSTEMS AND METHODS FOR CONTROLLING ACCESS TO LOCATION BASED DATA
A method for controlling access to data displayed by an information services portal on a user device is provided. The method includes receiving a candidate...
2016/0337331 Method and Apparatus for Processing Authentication Request Message in a Social Network
A method and an apparatus for processing an authentication request message in a social network are provided. To improve the inefficiency of existing technology...
2016/0337330 CONTROL APPARATUS IN SOFTWARE DEFINED NETWORK AND METHOD FOR OPERATING THE SAME
A control apparatus which manages a software defined network including a plurality of switches includes a security management module that authenticates at...
2016/0337329 TECHNOLOGIES FOR SECURE BOOTSTRAPPING OF VIRTUAL NETWORK FUNCTIONS
Technologies for bootstrapping virtual network functions in a network functions virtualization (NFV) network architecture include a virtual network function...
2016/0337328 ENTERPRISE COMPUTING ENVIRONMENT WITH CONTINUOUS USER AUTHENTICATION
Continuous user authentication includes receiving authentication event information including (1) transaction information describing authentication...
2016/0337327 METHOD FOR MANAGING A NODE ASSOCIATION IN A WIRELESS PERSONAL AREA COMMUNICATION NETWORK
It is disclosed a method for associating a new node with a wireless personal area communication network, said communication network comprising a number of...
2016/0337326 SYSTEMS AND METHODS FOR MANAGING CRYPTOGRAPHIC KEYS
A common interface for managing cryptographic keys is provided. A request to manage a cryptographic key may be received in a first interface format, translated...
2016/0337325 KEY MANAGEMENT
According to an example embodiment of the present invention there is provided an apparatus comprising a receiver configured to receive a pair of cryptographic...
2016/0337324 WEB FORM PROTECTION
A request for a web page is received and the requested web page is retrieved. The web page is modified to obfuscate a set of form attribute values into a...
2016/0337323 ENCRYPTION, DECRYPTION, AND TRIGGERED DELIVERY OF FILES
Encrypting information includes receiving a question/answer pair, generating a file pass phrase, encrypting the file with the file pass phrase, normalizing the...
2016/0337322 SEMICONDUCTOR DEVICE FOR MANAGING USER DATA ACCORDING TO SECURITY LEVEL AND METHOD OF OPERATING THE SAME
A method of operating a hub which manages user data communicated between a server and a plurality of internet of things (IoT) devices includes storing a user...
2016/0337321 SECURE COMMUNICATION METHOD AND APPARATUS
The present invention provides a secure communication method and apparatus. A security proxy device is arranged between a client and a server. The method...
2016/0337320 Obfuscation of References to Network Resources
Techniques are disclosed relating to protecting sensitive data in references to network resources. In some embodiments, a host system receives a request for a...
2016/0337319 METHODS AND SYSTEMS FOR IDENTIFYING TARGETED CONTENT ITEM FOR USER
The disclosed embodiments illustrate methods and systems for identifying a targeted content item for a user. The method includes receiving one or more...
2016/0337318 ANTI-TAMPERING SYSTEM
A method for preventing tampering with the accessibility of resources specified by Universal Resource Locators (URLs) comprising receiving a primary URL from a...
2016/0337317 Automated Migration Planning for Moving into a Setting of Multiple Firewalls
A method, a computer program product, and a computer system for automatically migrating servers into an environment of multiple firewalls. A computer creates a...
2016/0337316 FILTERING HIDDEN DATA EMBEDDED IN MEDIA FILES
Systems and methods for filtering unsafe content at a network security appliance are provided. According to one embodiment, a network security appliance...
2016/0337315 INTERNET PROTOCOL THREAT PREVENTION
Blocking high-risk IP connections in real-time while allowing tailoring of an acceptable risk profile to match the security requirements of network resources....
2016/0337314 Firewall Authentication Of Controller-Generated Internet Control Message Protocol (ICMP) Echo Requests
A method implemented by a network firewall, comprising obtaining a first authentication token for a network test, receiving a test request message for...
2016/0337313 TRANSPARENT TRAFFIC CONTROL DEVICE AND METHOD FOR SECURING INTERNET-CONNECTED DEVICES
A firewall security platform is provided for enhancing security of a network. The firewall security platform includes at least one interface to communicate the...
2016/0337312 Stateful Connection Processing in a Security Device Cluster
A method operable in a security device cluster having a plurality of security devices each configured to receive respective data flows. The method includes...
2016/0337311 METHOD OF DYNAMIC UPDATING OF INFORMATION OBTAINED FROM A DNS SERVER
A method of dynamically updating DNS information in an IP network. A first entity of the IP network, distinct from DNS servers of the IP network, receives a...
2016/0337310 DYNAMIC EVOLVED PACKET GATEWAY SELECTION
In aspects of the disclosure, a method, an apparatus, and a computer program product for wireless communication are provided. In one aspect, the apparatus...
2016/0337309 SYSTEMS AND METHODS FOR PERFORMING DUAL DNS LOOKUP TO DETECT PUBLIC VERSUS INTRANET
The present disclosure is directed towards systems and methods for performing dual domain name system (DNS) lookups to detect whether a request is for a public...
2016/0337308 ELECTRONIC MAIL PROMPTING METHOD AND SERVER
An electronic mail prompting method is disclosed. The method includes receiving an electronic mail, and obtaining a first identity identifier that identifies a...
2016/0337307 FACILITATING INTERACTION AMONG USERS OF A SOCIAL NETWORK
In one embodiment, a computing device receives an indication of a first user action by a first user. The computing device determines a topic of the first user...
2016/0337306 Athlete-Centric Method for Organizing Sporting Events
Aspects of the present invention relate to a system for enabling athletes to challenge other athletes to competitive events and organize these athletic events...
2016/0337305 SYSTEM, METHOD, AND APPARATUS FOR PUBLISHING SOCIAL NETWORK POSTS
A method for publishing social network posts is disclosed. The method may be implemented by a server. The method may comprise storing user preferences of...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.