Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0352749 CREDENTIAL DRIVING AN AUTOMATIC LOCK UPDATE
An access control system including a data storage device configured to store a master credential database having a plurality of master identifiers and master...
2016/0352748 METHOD FOR BLOCKING UNAUTHORIZED DATA ACCESS AND COMPUTING DEVICE WITH FEATURE OF BLOCKING UNAUTHORIZED DATA ACCESS
Methods and apparatuses for blocking unauthorized data access are provided, one of methods comprises, monitoring whether there is an access to an object by an...
2016/0352747 SYSTEM AND METHOD PROVIDING AUTOMATIC PUSHDOWN HIERARCHICAL FILTERS
Systems, methods, and other embodiments are disclosed that are configured to generate a hierarchy of access rules in a protocol stack. Access rules ...
2016/0352746 DYNAMIC PERMISSION ROLES FOR CLOUD BASED APPLICATIONS
During development of an application, an association between a view of the application and a data service, and rules applicable to the view, can be received....
2016/0352745 EXTENSIBLE MULTI-TENANT CLOUD-MANAGEMENT SYSTEM AND METHODS FOR EXTENDING FUNCTIONALITIES AND SERVICES PROVIDED...
The current document is directed to an interface and authorization service that allows users of a cloud-director management subsystem of distributed,...
2016/0352744 AUTHORIZATION IN A DISTRIBUTED SYSTEM USING ACCESS CONTROL LISTS AND GROUPS
In a method of controlling sharing of an object between entities in a distributed system, a processor will identify an object and generate an access control...
2016/0352743 ACCESS CONTROL FOR ENTERPRISE KNOWLEDGE
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium for access control for enterprise information. In one aspect,...
2016/0352742 METHOD AND SYSTEM FOR UTILIZING A LOCATION-BASED INTERNETWORK GATEWAY
A system for utilizing a location-based application across a plurality of networks. A target mobile device operates within a target network of the plurality of...
2016/0352741 Environment-Aware Security Tokens
The technology described in this document can be embodied in a computer implemented method that includes receiving, at a processing device, information about...
2016/0352740 POINT-OF-CYBER-ACCESS CYBER SYSTEM
The system and system components of the present disclosure may be configured to provide individuals with both a safe and a secure cyber environment. Within...
2016/0352739 AUTHORIZATION SERVER ACCESS SYSTEM
Systems and techniques are provided for authorizing restricted action (e.g., data access) requests using a tiered arrangement. A rule set is generated based on...
2016/0352738 TECHNIQUES FOR SHARING VIRTUAL MACHINE (VM) RESOURCES
Techniques for sharing virtual machine (VM) resources are provided. A relative location for a resource within a VM is created; the relative location...
2016/0352737 HEART RATE DATA BASED ACCESS
Heart rate data based access can include restricting access to functionality of an electronic apparatus via a restrictive component, receiving heart rate data...
2016/0352736 Service-based message access layer frame and implementation method thereof
A service-based message access layer frame and an implementation method thereof are provided, relating to a technical field of software. After initiating a...
2016/0352735 STATEFUL USER DEVICE IDENTIFICATION AND BINDING FOR CLOUD APPLICATION SECURITY
At least one embodiment relates to a method and a system for cloud application visibility of network traffic. The method includes: receiving, from a network...
2016/0352734 Admission of an Individual Session in a Network
An aspect of the disclosure provides a method for session admission at a node in an infrastructure provider network. The method includes receiving a connection...
2016/0352733 DISTRIBUTED AND HIERARCHICAL DEVICE ACTIVATION MECHANISMS
Embodiments of systems and methods disclosed herein include a distributed device activation mechanism involving a group of external entities without using...
2016/0352732 System and Method for Continuous Authentication in Internet of Things
A system for continuous authentication of internet of things (IoT) devices in a communication network utilizes lightweight authentication for a sequence of...
2016/0352731 NETWORK ACCESS CONTROL AT CONTROLLER
An example system may include a controller to receive traffic of a host from a network device. The controller may include a network access control (NAC) unit...
2016/0352730 DATA ACCESS AND ANONYMITY MANAGEMENT
Techniques described herein provide data access and data anonymity management within various implementations of content distribution networks. In some...
2016/0352729 CENTRALIZED AUTHENTICATION FOR GRANTING ACCESS TO ONLINE SERVICES
Methods, apparatus, systems and articles of manufacture (e.g., physical storage media) to implement centralized authentication for granting access to online...
2016/0352728 Identity Challenges
A biometric authentication system is disclosed that provides authentication capability using biometric data in connection with a challenge for parties engaging...
2016/0352727 SYSTEM AND METHOD FOR ASSET AUTHENTICATION AND MANAGEMENT
An asset management system and biometric security method is disclosed. The asset management system monitors the operational status of living and non-living...
2016/0352726 LOCATION-TIME EVENT LOGGING SYSTEMS AND METHODS
Systems and methods for generating and storing location-time data relating to a tracked user are described. The system includes a logging device including a...
2016/0352725 Authenticating access to confidential information by unregistered requestor
An unregistered requestor requests access to confidential information of an individual stored at a computer. In one embodiment, the requestor is authenticated...
2016/0352724 Live Tiles Without Application-Code Execution
This document describes techniques enabling live tiles without application-code execution. These techniques permit live content to be presented in tiles...
2016/0352723 METHOD, AND APPARATUS FOR AUTHENTICATING ACCESS
The present disclosure relates to a method, apparatus and system for authenticating access of a first device with a first user account to a second device with...
2016/0352722 Authentication Based On Visual Memory
Passwords are used in various system access applications in order to ascertain that the user seeking access to a system resource is indeed the person with said...
2016/0352721 UPLOAD MANAGEMENT SYSTEM, METHOD FOR CONTROLLING UPLOAD MANAGEMENT SYSTEM, AND STORAGE MEDIUM
An upload management system for managing data upload from a client to a storage system includes an acquisition unit, a determination unit, and a control unit....
2016/0352720 MANAGING A STORAGE ARRAY USING CLIENT-SIDE SERVICES
Managing a storage array includes: receiving, by a client-side array services module from a cloud-based security module through data communications on a wide...
2016/0352719 MANAGING TRANSMISSION AND STORAGE OF SENSITIVE DATA
Systems and methods for injecting sensitive data into outgoing traffic on behalf of a user of a private network are provided. According to one embodiment, a...
2016/0352718 Environment-Aware Security Tokens
The technology described in this document can be embodied in a computer implemented method that includes receiving, at a processing device, information about...
2016/0352717 REMOTE ACCESS OF DIGITAL IDENTITIES
A system and method for controlling distribution and use of digital identity representations ("DIRs") increases security, usability, and oversight of DIR use....
2016/0352716 AUTHENTICATION SYSTEM, AUTHENTICATION METHOD, SERVER DEVICE, AND CLIENT DEVICE
A server device of an authentication system includes: an optical signal communication unit that causes optical signal transmitters to repeatedly transmit...
2016/0352715 SYSTEM AND METHOD FOR AUTHENTICATING A DRIVER
The present disclosure relates to system(s) and method(s) for driver authentication based on his driving style. Initially, the system is configured to generate...
2016/0352714 Third Party Paywall Authentication System
The present technology provides a less burdensome mechanism to bring media items owned or licensed in the physical world into an account hosted by an...
2016/0352713 METHODS AND SYSTEMS FOR ENSURING THAT AN INDIVIDUAL IS AUTHORIZED TO CONDUCT AN ACTIVITY
A method for ensuring that an individual is authorized to conduct an activity is provided. The method includes conducting, using a processor, an authentication...
2016/0352712 IN-VEHICLE SHARED-SCREEN SYSTEM WITH WRITE BACK TO MULTIPLE USER ACCOUNTS
In some examples, a vehicle head unit of a vehicle includes at least one processor; and at least one module operable to: responsive to authenticating a first...
2016/0352711 RECEPTION DEVICE AND RECEPTION METHOD
A reception device includes: a receiver unit which receives a program that is encrypted, handles confidential information and includes identification...
2016/0352710 SERVER-ASSISTED SECURE EXPONENTIATION
In one embodiment, a method for secure computation, includes receiving in a server, over a communication channel from a device external to the server a request...
2016/0352709 SECURITY SYSTEM, METHOD, AND APPARATUS
Systems, apparatuses and methods are described for creating security information using sensors. The security information may be collected independently between...
2016/0352708 SYSTEMS AND METHODS FOR CONDUCTING SECURE VOIP MULTI-PARTY CALLS
System and method for establish secure conference calls. In one example system, a central conference call server establishes point-to-point connections with...
2016/0352707 Content Protection for Extract, Transform, Load (ETL) Scripts
Embodiments encrypt Extract, Transform, Load (ETL) scripts created by a developer for an initial customer, against unauthorized access and copying. Such...
2016/0352706 EFFICIENT KEY DERIVATION WITH FORWARD SECRECY
Various embodiments relate to a method, device, and non-transitory medium including: determining a master key value for use in secure communications with a...
2016/0352705 UPDATING STORED ENCRYPTED DATA WITH ENHANCED SECURITY
Technologies described herein provide enhanced security for storing and updating secret data, such as a password. Based on one or more conditions, an existing...
2016/0352704 PROTECTING SENSITIVE INFORMATION USING A TRUSTED DEVICE
The invention relates to information processing field, and discloses a method for protecting sensitive information, comprising: receiving first information...
2016/0352703 SERVER SYSTEM, METHOD OF CONTROLLING SERVER SYSTEM, AND STORAGE MEDIUM
In a case in which information about authorization that is identified based on an authorization token issued in an old authentication system satisfies a...
2016/0352702 System and Method for Resetting Passwords on Electronic Devices
A system and method are provided for enabling a password reset mechanism for a secured device that verifies a digital signature on a password reset message....
2016/0352701 PROXIMITY BASED COMMUNICATION WITH EMBEDDED SYSTEM
A hardware module for an embedded system comprises a network adapter, a memory and a processing device. The memory stores a shared key and a key identifier...
2016/0352700 DATABASE PROCESSING SYSTEM FOR MULTIPLE DESTINATION PAYLOADS
Aspects of the present disclosure are directed to electronic data transfer methods and systems for multiple recipient destination processing. A plurality of...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.