Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0373455 METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR AUTHORIZATION FRAMEWORKS FOR WEB-BASED APPLICATIONS
Methods, systems, and computer readable media for authorization frameworks for web-based applications. In one example, a server executes an application tier of...
2016/0373454 SYSTEMS AND METHODS FOR PROVIDING CONTENT TO VERIFIED ENTITIES
A first set of posts associated with a verified entity can be identified. A second set of posts associated with the verified entity and with one or more...
2016/0373453 STREAMLINED UTILITY PORTALS FOR MANAGING DEMAND-RESPONSE EVENTS
A method for authorizing a smart-home device for enrollment with a demand-response program may include receiving, at a control server of an energy management...
2016/0373452 MANAGING USE OF NETWORK RESOURCES
Some aspects of what is described here relate to managing the use of network resources on a mobile device. User input received at the device indicates whether...
2016/0373451 DEVICE AUTHENTICATION WITHIN DEPLOYABLE COMPUTING ENVIRONMENT
A deployable computing environment may facilitate interaction and data sharing between users and devices. Users, devices, and relationships between the users...
2016/0373450 DYNAMIC EXTENSIBLE APPLICATION SERVER MANAGEMENT
A real-time plugin command-driven administrative control interface is provided that implements direct real-time command-driven control of operational...
2016/0373449 METHOD FOR HANDLING CASE OF DETECTING UNAUTHORIZED FRAME TRANSMITTED OVER ONBOARD NETWORK
An anomaly handling method that suitably handles a case where the possibility of a vehicle being unauthorizedly controlled so as to suppress the effects...
2016/0373448 PROTECTING SENSITIVE INFORMATION FROM A SECURE DATA STORE
In embodiments of the present invention improved capabilities are described for the steps of receiving an indication that a computer facility has access to a...
2016/0373447 UNAUTHORIZED ACCESS DETECTING SYSTEM AND UNAUTHORIZED ACCESS DETECTING METHOD
In an unauthorized access detecting system, authentication information to be leaked outside is generated. In the unauthorized access detecting system, the...
2016/0373446 SYSTEMS AND METHODS FOR PROVIDING CONTENT TO VERIFIED ENTITIES
A first set of posts associated with a verified entity can be identified. A second set of posts associated with the verified entity and with one or more...
2016/0373445 SYSTEMS AND METHODS FOR PROVIDING A SINGLE CLICK ACCESS TO ENTERPRISE, SAAS AND CLOUD HOSTED APPLICATION
The present disclosure is directed to methods and systems of providing a user-selectable list of disparately hosted applications. A device intermediary to a...
2016/0373444 System and Method for Carrying Trusted Network-Provided Access Network Information in Session Initiation Protocol
Methods, computer code products and systems for authenticating user equipment for access to a trusted network can include receiving a user identity uniquely...
2016/0373443 DECRYPTION CIRCUIT, COMMUNICATIONS APPARATUS, AND COMMUNICATIONS SYSTEM
A decryption circuit includes a decryption circuitry configured to decrypt encrypted data in each encrypted unit block to acquire a decryption result, and an...
2016/0373442 USER IDENTITY BASED ON LOCATION PATTERNS OF NON-ASSOCIATED DEVICES
Authentication of users is based at least in part on a comparison of environmental signals of a present location with environmental signals identified earlier...
2016/0373441 PROVIDING SECURE NETWORKS
Implementations generally relate to providing secure networks. In some implementations, a method includes determining one or more nodes in a network system...
2016/0373440 SYSTEM AND METHOD FOR BIOMETRIC PROTOCOL STANDARDS
Secure communications are provided between a user computing device and a server computing device. An enrollment request is received from a user computing...
2016/0373439 NETWORK ACCESS SECURITY SYSTEM AND METHOD
A method of providing for access to a computer resource, the method including the steps of: (a) providing an initial registration process including the...
2016/0373438 USER AUTHENTICATION APPARATUS
Disclosed herein is a user authentication apparatus that captures images of the back and/or the palm of a hand using both a mobile camera, such as a smart...
2016/0373437 METHOD AND SYSTEM FOR AUTHENTICATING LIVENESS FACE, AND COMPUTER PROGRAM PRODUCT THEREOF
Disclosed are a method and a system for authenticating liveness face, and a computer program product thereof, which belong to a field of face recognition...
2016/0373436 SECURED APPLICATION ACCESS SYSTEM AND METHOD WITH FREQUENTLY CHANGING PASSWORDS
A system and method for automatically and frequently changing or updating a user password without manual intervention and without the knowledge of the user...
2016/0373435 SERVER, PROVISION DEVICE, AND ONE-TIME PASSWORD GENERATION DEVICE
Realized is a low-cost provision system capable of providing a provision item or a provision system that requires a smaller number of operation steps to be...
2016/0373434 MANAGEMENT OF CERTIFICATE AUTHORITY (CA) CERTIFICATES
Systems and methods for automatically installing CA certificates received from a network security appliance by a client security manager to make the CA...
2016/0373433 NETWORK SECURITY FOR ENCRYPTED CHANNEL BASED ON REPUTATION
Example embodiments disclosed herein relate to providing network security. A network security device parses an initial handshake or communication to establish...
2016/0373432 SIGNATURE-EFFICIENT REAL TIME CREDENTIALS FOR OCSP AND DISTRIBUTED OCSP
Providing information about digital certificate validity includes ascertaining digital certificate validity status for each of a plurality of digital...
2016/0373431 METHOD TO ENROLL A CERTIFICATE TO A DEVICE USING SCEP AND RESPECTIVE MANAGEMENT APPLICATION
The method to enroll a certificate to a device comprises the steps of providing a management application on a management device, the management application...
2016/0373430 DISTRIBUTING SECURITY CODES THROUGH A RESTRICTED COMMUNICATIONS CHANNEL
Disclosed are various examples for facilitating distribution of security codes for a two-factor authentication scheme or one-time passwords. Security codes can...
2016/0373429 AUTOMATICALLY ALTERING AND ENCRYPTING PASSWORDS IN SYSTEMS
In an approach for changing a password. Aspects of an embodiment of the present invention include an approach for changing a password, wherein the approach...
2016/0373428 SMART PHONE LOGIN USING QR CODE
Systems and methods are disclosed for a user to use a mobile device such as a smart phone to scan a QR (Quick Response) code displayed on a login webpage of a...
2016/0373427 PASSPORTING CREDENTIALS BETWEEN A MOBILE APP AND A WEB BROWSER
Systems and methods for passporting credentials provide a mechanism by which a native app on a client device can invoke a service provider's core web site web...
2016/0373426 INFORMATION PROCESSING APPARATUS, COMMUNICATION SYSTEM AND CONTROL METHOD FOR PROVIDING COMMUNICATION SERVICES...
Provided an information processing apparatus including a determination unit which determines whether a predetermined condition for performing communication...
2016/0373425 COMPUTERIZED METHOD AND SYSTEM FOR MANAGING A COMMUNITY FACILITY IN A NETWORKED SECURE COLLABORATIVE EXCHANGE...
In embodiments of the present invention improved capabilities are described for managing a community facility in a networked secure collaborative computer data...
2016/0373424 PROVIDING DOMAIN-JOINED REMOTE APPLICATIONS IN A CLOUD ENVIRONMENT
Embodiments are directed to provisioning private virtual machines in a public cloud and to managing private virtual machines hosted on a public cloud. In one...
2016/0373423 CONTEXTUAL NAVIGATION FACETS PANEL
A computer-implemented method for generating a contextual panel interface with a first interactive display portion for depicting a plurality of selectable...
2016/0373422 USER IDENTITY BASED ON LOCATION PATTERNS OF NON-ASSOCIATED DEVICES
Authentication of users is based at least in part on a comparison of environmental signals of a present location with environmental signals identified earlier...
2016/0373421 VIRTUAL CONTENT REPOSITORY
Disclosed are various examples for facilitating a virtual content repository on behalf of a user, in a virtual content repository, files are stored in content...
2016/0373420 INJECTING CREDENTIALS INTO WEB BROWSER REQUESTS
A password manager injects credentials into a web browser request. A user can browse to a form provided by a server that includes a password field. A plug-in...
2016/0373419 USER-MANAGED SECURITY FOR DISPERSED NETWORK DATA STORAGE
A system and method for a user-managed network security architecture that securely stores individual data files in a uniquely encrypted and dispersed manner,...
2016/0373418 Method for Enabling a Secure Provisioning of a Credential, and Related Wireless Devices and Servers
This disclosure provides a method, performed in a wireless device 60, for enabling a secure provisioning of a credential from a server 70. The wireless device...
2016/0373417 BIOMETRIC BASED AUTHENTICATED KEY EXCHANGE
A method includes receiving a first biometric data set representative of a first biometric sample provided by a user and public parameters. The method includes...
2016/0373416 PROTECTING COMMUNICATIONS WITH HARDWARE ACCELERATORS FOR INCREASED WORKFLOW SECURITY
To protect customer data and provide increased workflow security for processing requested by a customer, a secure communicational channel can be established...
2016/0373415 SYSTEMS AND METHODS FOR DECRYPTION AS A SERVICE
Systems and methods for decryption of payloads are disclosed herein. In various embodiments, systems and methods herein are configured for decrypting thousands...
2016/0373414 HANDSHAKE OFFLOAD
Cryptographically protected communications sessions are established using a distributed process. A server proxies handshake messages to another computer system...
2016/0373413 ENCRYPTED TRANSIT INFORMATION FOR SHIPMENTS
A computer-implemented method includes receiving transit information from a first data logger, wherein the first data logger is associated with a first...
2016/0373412 LOAD BALANCING WITH HANDSHAKE OFFLOAD
Cryptographically protected communications sessions are established using a distributed process. A load balancer proxies handshake messages to a first computer...
2016/0373411 Cloud based firewell system and service
A cloud-based firewall system and service is provided to protect customer sites from attacks, leakage of confidential information, and other security threats....
2016/0373410 Network Security Module For Ethernet-Receiving Industrial Control Devices
A high-speed security device for network connected industrial controls provides hybrid processing in tandem hardware and software security components. The...
2016/0373409 DNS SNOOPING TO CREATE IP ADDRESS-BASED TRUST DATABASE USED TO SELECT DEEP PACKET INSPECTION AND STORAGE OF IP...
At a network device through which client devices communicate with a network, a database is created that maps Internet Protocol (IP) addresses each to a...
2016/0373408 USB FIREWALL DEVICES
USB firewall devices are disclosed that prevent unauthorized or unwanted access or communications from being passed between a host and a peripheral device that...
2016/0373407 REGIONAL FIREWALL CLUSTERING IN A NETWORKED COMPUTING ENVIRONMENT
An approach for regional firewall clustering for optimal state-sharing of different sites in a virtualized/networked (e.g., cloud) computing environment is...
2016/0373406 Tunnelling of Information
This invention provides a method for providing network security services, such as those provided by the IPSEC protocol, through network address translation...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.