Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0344733 METHOD FOR ESTABLISHING CONNECTION BETWEEN DEVICES
A method performed by a first network device for communicating over a network, the method includes receiving, at the first network device, a request to connect...
2016/0344732 TERMINAL ROBOT SECURITY SYSTEM AND OPERATING METHOD THEREOF
The present invention provides a terminal robot security system and an operation method thereof. The security system comprises a terminal robot (3), a...
2016/0344731 ADDRESS VALIDATION USING SIGNATURES
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for generating signed addresses. One of the methods includes...
2016/0344730 SYSTEM AND METHOD FOR AUTHENTICATING USERS ACROSS DEVICES
Disclosed are systems and methods for improving interactions with and between computers in an authentication system supported by or configured with personal...
2016/0344729 TECHNOLOGIES FOR GEOLOCATION ATTESTATION OF COMPUTING DEVICES IN A NETWORK PATH
Technologies for geolocation attestation of computing devices in a network path include a verification device to generate a secure trace packet such that the...
2016/0344728 SYSTEM AND METHOD FOR ISSUING OTP APPLICATION IN FACE-TO-FACE CONFIRMATION MANNER
The present invention relates to a system and method for issuing an OTP application in a face-to-face confirmation manner, and the system includes at least one...
2016/0344727 CHARACTERIZING A CLIENT APPARATUS ON AT LEAST ONE SERVER APPARATUS
Systems and methods for characterizing a client apparatus on at least one server apparatus are provided. A first certificate is received in the event of a...
2016/0344726 Techniques for Securely Receiving Critical Communication Content Associated with a Critical Communication Service
Examples may include techniques for securely receiving critical communication content associated with a critical communication service. Examples may include a...
2016/0344725 SIGNAL HAYSTACKS
A method for the exchange between two computer systems, without prior exchange of any material or prior third-party endorsement, of key-pairs and signed...
2016/0344724 ENCRYPTION/DECRYPTION IN A CLOUD STORAGE SOLUTION
The disclosure generally describes computer-implemented methods, software, and systems, including a method for decryption of data stored in the cloud. A record...
2016/0344723 User Authentication in a Mobile Environment
A data channel transmission can be used to authenticate a voice channel transmission. An authentication server can authenticate the identity of one or more...
2016/0344722 SYSTEM AND METHOD FOR PROVIDING LIMITED ACCESS TO DATA
A system and computer-implemented method for providing access to data of a first party including receiving information for identifying the first party,...
2016/0344721 SYSTEM, METHOD, AND DEVICE FOR DELIVERING COMMUNICATIONS AND STORING AND DELIVERING DATA
A system, method, and device includes a platform data storage that stores a wrap that secures an executable controller and executable sensors. The wrap is...
2016/0344720 SECURE AND CONFIDENTIAL SHARING OF DIGITAL CONTENT
A method of sharing confidential digital content among a plurality of participants, each utilizing one or more digital communication devices connected to a...
2016/0344719 INTER-APPLICATION MANAGEMENT OF USER CREDENTIAL DATA
A system and apparatus for enhancing the functionality and utility of an authentication process for web applications is disclosed.
2016/0344718 System and Method for Organizing a Plurality of Local Meeting Groups
A system and method for facilitating supervisory control of localized meeting groups is provided. A method includes the steps of generating a master meeting...
2016/0344717 COMMUNICATING BETWEEN A CLUSTER AND A NODE EXTERNAL TO THE CLUSTER
A technique includes, in response to receiving an inquiry from a first node external to a cluster in a server node of a cluster, communicating server...
2016/0344716 Implicit Challenge Authentication Process
A challenge value is received at a network connected device from a first server. A secure communication channel is established with the first server based on...
2016/0344715 Network Device and Method for Processing a Session Using a Packet Signature
A method processes a session having a first session packet received by a current node in an IP network having a plurality of nodes. The plurality of nodes...
2016/0344714 KEY DISTRIBUTION IN A WIRELESS SYSTEM
Distribution of a key in a wireless system comprising at least one mobile device is disclosed. Data regarding relative rotation between devices in optical data...
2016/0344713 GROUP MEMBER RECOVERY TECHNIQUES
Techniques are presented for optimizing secure communications in a network. As disclosed herein, a key server is configured to provision a plurality of routers...
2016/0344712 Terminal Pairing Method and Pairing Terminal
A terminal pairing method and a pairing terminal includes acquiring, when a terminal detects a preset pairing trigger event, a pairing hidden value that is of...
2016/0344711 POLICY BASED CRYPTOGRAPHIC KEY DISTRIBUTION FOR NETWORK GROUP ENCRYPTION
Various embodiments include a method for managing a group of devices in communication with each other and sharing a set of keys. The method may include opening...
2016/0344710 SECURE PAIRING OF A PROCESSOR AND A SECURE ELEMENT OF AN ELECTRONIC DEVICE
Systems, methods, and computer-readable media for securely pairing a secure element and a processor of an electronic device are provided. In one example...
2016/0344709 SYSTEM AND METHOD FOR AUTHENTICATING AND ENABLING AN ELECTRONIC DEVICE IN AN ELECTRONIC SYSTEM
A system and method for authenticating and enabling an electronic device in an electronic system are disclosed. A particular embodiment includes: an electronic...
2016/0344708 CRYPTOGRAPHIC SYSTEM, RE-ENCRYPTION KEY GENERATION DEVICE, RE-ENCRYPTION DEVICE, AND CRYPTOGRAPHIC COMPUTER...
An encryption device (200) outputs a ciphertext ct.sub.0 in which is set one of attribute information x.sub.0 and attribute information v.sub.0 corresponding...
2016/0344707 ENCRYPTED QUERY-BASED ACCESS TO DATA
A query-based system for sharing encrypted data, comprising at least one hardware processor; and at least one non-transitory memory device having embodied...
2016/0344706 Low-Latency Secure Segment Encryption and Authentication Interface
An apparatus comprising a memory, a processor coupled to the memory and configured to obtain a Dynamic Adaptive Streaming over Hypertext Transfer Protocol...
2016/0344705 METHOD AND UPDATE GATEWAY FOR UPDATING AN EMBEDDED CONTROL UNIT
A method for updating an embedded electronic control unit, including an update gateway requests from a hardware security module an update request destined for...
2016/0344704 METHOD AND DECISION GATEWAY FOR AUTHORIZING A FUNCTION OF AN EMBEDDED CONTROL UNIT
A method for authorizing a function of an embedded electronic control unit, including: a decision gateway requests from a hardware security module a function...
2016/0344703 CONTROLLER AREA NETWORK (CAN) DEVICE AND METHOD FOR OPERATING A CAN DEVICE
Embodiments of a device and method are disclosed. In an embodiment, a Controller Area Network (CAN) device includes a security module connected between a CAN...
2016/0344702 METHOD FOR ANONYMISATION BY TRANSMITTING DATA SET BETWEEN DIFFERENT ENTITIES
The present invention refers to a method for anonymisation by transmitting an event data set from at least one data supplying entity supplying the event data...
2016/0344701 SYSTEMS AND METHODS FOR A TWO-WAY COMMON POOL PROXY TO OBSCURE COMMUNICATION ROUTING
Method and system is disclosed for obscuring a message origin. The method includes provisioning a first alias address of the finite plurality of alias...
2016/0344700 SYSTEM AND METHOD FOR RECEPTION AND TRANSMISSION OPTIMIZATION OF SECURED VIDEO, IMAGE, AUDIO, AND OTHER MEDIA...
A proxy server may receive from a user endpoint, a secure connection request to a second server. The secure connection request may be matched to a globally...
2016/0344699 Secure Auto-Provisioning Device Network
A system comprising a gateway capable of connecting to an Internet router, and at least one Internet-connected device, said Internet-connected device...
2016/0344698 DATA LEAK PROTECTION IN UPPER LAYER PROTOCOLS
Methods and systems for Data Leak Prevention (DLP) in a private network are provided. According to one embodiment, a packet is received by a network security...
2016/0344697 INTRA-TERM LOGICAL OR OPERATION IN A NETWORK FILTER
A network filter is implemented so that filter terms that include intra-term OR conditions and converted to sub-terms that include only logical AND conditions....
2016/0344696 FIREWALL POLICY MANAGEMENT
Methods and systems are provided for creation and implementation of firewall policies. According to one embodiment, a firewall maintains a log of observed...
2016/0344695 Device for Interconnecting Communication Networks with Controlled Security
The invention relates to a device for interconnecting at least two data-communication networks, connecting a first network qualified as a high-security network...
2016/0344694 INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, AND COMPUTER PROGRAM PRODUCT
An information processing system includes a receiving unit and a determining unit. The receiving unit receives an application request to request an application...
2016/0344693 ENDPOINT DEVICE IDENTIFICATION BASED ON DETERMINED NETWORK BEHAVIOR
In one embodiment, a method comprises detecting, by a network device, an endpoint device attempting to access a data network via a data link; and generating,...
2016/0344692 SYSTEMS AND METHODS FOR RESOLUTION OF UNIFORM RESOURCE LOCATORS IN A LOCAL NETWORK
In accordance with embodiments of the present disclosure, a method for resolving a uniform resource locator may include receiving, at a router, a uniform...
2016/0344691 PACKET TRANSMISSION SYSTEM, PACKET TRANSMISSION APPARATUS, AND PACKET TRANSMISSION METHOD
Disclosed are a packet transmission apparatus and so on that can suppress transmission delays caused by packet integrations and that can perform the...
2016/0344690 CLUSTERED SERVER SHARING
A method and a system environment are disclosed that allow for installation of an application into excess capacity of an existing server and that allows the...
2016/0344689 Network Management of Devices Residing Behind a Network Device
Network device management may be provided. By utilizing a network ID tag (i.e., a switch identifier) corresponding to a network switch, a network management...
2016/0344688 Communicating via IPv6-only Networks Using IPv4 Literal Identifiers
Techniques are disclosed relating to communicating, via IPv6-only networks, with devices on IPv4 networks. In some embodiments, a mobile device stores program...
2016/0344687 MULTI-TENANT AWARE DYNAMIC HOST CONFIGURATION PROTOCOL (DHCP) MECHANISM FOR CLOUD NETWORKING
An approach includes providing support multi-tenancy support on a DHCP protocol. The approach includes receiving a dynamic host configuration protocol (DHCP)...
2016/0344686 Method for Initiating Local Routing Communication, Base Station Apparatus, and Terminal Apparatus
A method includes initiating, by a base station, a local routing service start notification. The local routing service start notification is used for notifying...
2016/0344685 IP-BASED SATELLITE COMMAND, CONTROL, AND DATA TRANSFER
A method and system for satellite control in space using an IP-based satellite bus and all-IP compliant subsystems and payload(s) and a corresponding T&C...
2016/0344684 SYSTEM AND METHOD FOR MAINTAINING COHERENCE OF ASSOCATION ACROSS A NETWORK ADDRESS CHANGE OR REASSIGNMENT
Network address date groups are defined that are associated with a group of electronic objects. Where network address date groups appear to relate to the same...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.