Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0381007 METHOD, SYSTEM, AND PROGRAM PRODUCT FOR REMOTELY ATTESTING TO A STATE OF A COMPUTER SYSTEM
A method, system, and program product for remotely attesting to a state of computing system is provided. Specifically, the present invention allows a remote...
2016/0381006 DISTRIBUTING AN AUTHENTICATION KEY TO AN APPLICATION INSTALLATION
Disclosed are various examples for facilitating distribution of an authentication code to installation of managed applications. An identity certificate is sent...
2016/0381005 TECHNOLOGIES FOR VIRTUALIZED ACCESS TO SECURITY SERVICES PROVIDED BY A CONVERGED MANAGEABILITY AND SECURITY ENGINE
Technologies for secure access to platform security services include a computing device having a processor and a security engine. The computing device...
2016/0381004 CERTIFICATION MANAGEMENT SYSTEM
A certification management system helps an organization develop and maintain a repository of current certification status of employees. The system may...
2016/0381003 UNIVERSAL ENROLLMENT USING BIOMETRIC PKI
A system may obtain identification information for a user for obtaining a form of access using universal enrollment. The system may obtain a digital...
2016/0381002 SECUREDINTER-APPLICATION COMMUNICATION IN MOBILE DEVICES
This disclosure describes a method for accessing network resources which includes receiving by a first application in a mobile computing device sign-in...
2016/0381001 METHOD AND APPARATUS FOR IDENTITY AUTHENTICATION BETWEEN SYSTEMS
Embodiments of the disclosure provide a method and apparatus for identity authentication between systems. The method includes: determining, by an authorization...
2016/0381000 SESSION ACTIVITY TRACKING FOR SESSION ADOPTION ACROSS MULTIPLE DATA CENTERS
Techniques are disclosed for managing session activity of SSO access across multiple data centers. Session activity of SSO access is managed across multiple...
2016/0380999 User Identifier Based Device, Identity and Activity Management System
The present disclosure generally relates to user and device Authentication. More specifically, the present disclosure relates to a technique of single sign-on...
2016/0380998 TOKENIZATION USING MULTIPLE REVERSIBLE TRANSFORMATIONS
Technologies for tokenizing data including a computing device to extract plaintext data from an input file to be tokenized. The computing device performs data...
2016/0380997 DEVICE AUTHENTICATION
The present invention relates to a computer network that provides secure authentication. The computer network comprises a server operable to generate a token...
2016/0380996 METHOD AND SYSTEM FOR DETERMINING VALUE OF AN ACCOUNT
A method for protecting stored account data from unauthorized access includes receiving data elements corresponding to an account of a user, identifying a...
2016/0380995 ELECTRONIC DEVICE THAT EXECUTES OPERATION CORRESPONDING TO REQUEST FROM REMOTE LOCATION, ELECTRONIC DEVICE...
An electronic device includes an operating device, a communication device, and a control section. The control section includes a login control section and an...
2016/0380994 SYSTEMS AND METHODS FOR AUTHENTICATING USING AIR-BLOW BY USER
The disclosure related generally to systems and methods for authenticating using air-blow by user. At least one input device receives one or more air-blows...
2016/0380993 AUTHENTICATION APPARATUS THAT AUTHENTICATES USER
Provided is an authentication apparatus that performs user authentication, using a wearable terminal worn by a user, whereby allowing a high security to be...
2016/0380992 AUTHENTICATION SPECIFIC DATA
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium for managing authentications and processing authenitcation...
2016/0380991 SERVER CAPABLE OF PERFORMING AUTHENTICATION WITH SIMPLIFIED AND SECURE SCHEME THAT USERS WHO OPERATE TERMINALS...
A server which can communicate with a plurality of terminals includes an information obtaining unit obtaining position information of each terminal and...
2016/0380990 Electronic Discovery Insight Tool
An electronic discovery insight tool is presented. The tool is implemented in an apparatus comprising one or more processors, one or more memories...
2016/0380989 LEARNED ROVING AUTHENTICATION PROFILES
Disclosed herein are systems and methods for determining learned associations between authentication credentials and network contextual data, such as may be...
2016/0380988 System and Method for Centralized Configuration and Authentication
A system and method for efficiently obtaining user configuration information for a given device. Multiple devices are deployed in an environment and may be...
2016/0380987 PROTECTING SENSITIVE DATA IN A SECURITY AREA
Managing data security on a mobile device. Data associated with a mobile device is received; the data includes an identification (ID) of the mobile device and...
2016/0380986 COMMUNICATING PRIVATE DATA AND DATA OBJECTS
In some implementations, a method includes establishing a communication channel with a server via an internet protocol (IP) network interface. The method also...
2016/0380985 BINDING A TRUSTED INPUT SESSION TO A TRUSTED OUTPUT SESSION
According to an embodiment provided herein, there is provided a system that binds a trusted output session to a trusted input session. The system includes a...
2016/0380984 SECURED NETWORKS AND ENDPOINTS APPLYING INTERNET PROTOCOL SECURITY
A method of managing secure communications states in an endpoint within a secure network is disclosed. The method includes, in a disconnected state,...
2016/0380983 SYSTEM, APPARATUS AND METHOD FOR ENCRYPTION AND DECRYPTION OF DATA TRANSMITTED OVER A NETWORK
A method and system for securing data transmitted between a client device and a server by obtaining input text at an intermediate module, processing the input...
2016/0380982 Tokenization of Structured Data
Structured data, such as email addresses, social security numbers, and the like is accessed for encoding. A set of encoding rules including one or more...
2016/0380981 REMOTE MONITORING AND MANAGEMENT OF AN INSTANT ISSUANCE SYSTEM
A system and method for remote monitoring and management of an instant issuance system is provided. The embodiments provide secure communication between...
2016/0380980 METHOD FOR TRANSMITTING ENCRYPTED DATA, METHOD FOR RECEIVING, CORRESPONDING DEVICES AND COMPUTER PROGRAMS
The invention relates to a method for transmitting data from a first terminal, called a sender terminal (TermE), to a second terminal, called a receiver...
2016/0380979 DISTRIBUTED COMPUTING UTILIZING HOMOMORPHIC ENCRYPTION
A method for determining a compute amount contributed by a device is provided. The method comprises receiving encrypted data from a processor of a customer...
2016/0380978 MENTION IDENTIFICATION FOR UNTRUSTED CONTENT
In some embodiments of the invention a method provides for processing a mention in textual content being input to a content provider. The method can include...
2016/0380977 ENTERPRISE REPUTATIONS FOR UNIFORM RESOURCE LOCATORS
There is disclosed in an example a computing apparatus configured to operate as an enterprise threat intelligence server, and including: a network interface...
2016/0380976 Single Solution for User Asset Control
A system provides a way for a person to control access to digital assets, including financial accounts, through a common gateway that can interact on the...
2016/0380975 Domain Name Service Redirection for a Content Delivery Network with Security as a Service
In one implementation, a cloud connector obtains location information for a proxy server of a security as a service (SecaaS) function. The cloud connector...
2016/0380974 BROADBAND ACCESS FOR VIRTUAL PRIVATE NETWORKS
An apparatus receives an upper layer packet that includes data from a source device, a virtual private network (VPN) identification, a destination address, and...
2016/0380973 VIRTUAL ROUTING AND FORWARDING (VRF) FOR ASYMMETRICAL VIRTUAL SERVICE PROVIDER (VSP) TUNNELS
In one embodiment, a device in a network maintains first and second routing tables associated with a virtual private network (VPN) tunnel. The first and second...
2016/0380972 METHOD AND APPARATUS FOR APPLICATION AWARENESS IN A NETWORK
A method for enforcing a network policy is described herein. In the method, a network socket event request from an application executing in a first context is...
2016/0380971 REAL-TIME AGREEMENT ANALYSIS
Techniques for informing a user about an agreement including agreement terms and trustworthiness of data source are described herein. In some examples, a...
2016/0380970 CONTROLLING THE SPREAD OF INTERESTS AND CONTENT IN A CONTENT CENTRIC NETWORK
One embodiment of the present invention provides a system for controlling the spread of interests and content in a content centric network (CCN). During...
2016/0380969 SYSTEMS AND METHODS FOR DETECTING UNDESIRABLE NETWORK TRAFFIC CONTENT
A method of detecting a content desired to be detected includes receiving electronic data at a first host, determining a checksum value using the received...
2016/0380968 GENERATING NETWORK DEVICE NAMES
A method for naming devices in a network is described herein. The method includes receiving, via a processor, device information associated with a device, a...
2016/0380967 Media Session
A media session is established between a first endpoint and a second endpoint, by transmitting the following messages from the first endpoint in parallel: to...
2016/0380966 Media Relay Server
An input of a media relay server is configured to receive multiple media streams from a network via the same port simultaneously, each stream being directed to...
2016/0380965 System and Method For Logging Communications
A method for logging communication includes determining when a target user is active and identifying an access device and private Internet Protocol (IP)...
2016/0380964 NETWORK TRANSMISSION METHOD AND NETWORK TRANSMISSION SYSTEM FOR A MULTI-LAYER NETWORK ADDRESS TRANSLATOR STRUCTURE
A peer-to-peer server sends a first internal internet protocol (IP) address and a first internal port number of a first node to a second node, and sends a...
2016/0380963 Method and Device for Processing IPv6 Address, and DHCPv6 Relay Equipment
Provided are a method and device for processing an IPv6 address, DHCPv6 relay equipment and a DHCPv6 server. The method includes that: an IPv4 information...
2016/0380962 WIRELESS ACCESS GATEWAY
A wireless network including a wireless access gateway (WAG) and methods are provided for routing traffic between non-cellular and cellular networks. The WAG...
2016/0380961 ENHANCED CACHING OF DOMAIN NAME SYSTEM (DNS) AND REVERSE DNS QUERIES FOR TRAFFIC MANAGEMENT FOR SIGNALING...
Methods, systems, and non-transitory computer readable media for enhanced domain name system (DNS) caching are disclosed. According to one aspect, a method for...
2016/0380960 ENHANCED INTER-NETWORK MONITORING AND ADAPTIVE MANAGEMENT OF DNS TRAFFIC
Systems and methods for enhanced monitoring and adaptive management of inter-network Domain Name System ("DNS") traffic include an information capture device...
2016/0380959 COMMUNICATION MESSAGE CONSOLIDATION WITH CONTENT DIFFERENCE FOMATTING
A set of similar messages addressed to a user is detected. Redundantly similar portions of the set of similar messages and a progressive set of differences...
2016/0380958 Device and Method for Temporal Correlation of Communication Types
A device and method temporally correlates communication types. The method performed by a first electronic device includes receiving a first message in a first...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.