Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2017/0104769 Device Time Accumulation
A method, system and computer-usable medium are disclosed for performing a device time accumulation operation. With a device time accumulation operation...
2017/0104768 Passive Encryption Of Organization Data
A data protection policy is implemented on a computing device, the data protection policy indicating how organization data on the computing device is to be...
2017/0104767 MONITORING CLOUD COMPUTING ENVIRONMENTS
An example method of monitoring computing resources in a cloud computing environment may include receiving a request to subscribe to a monitoring service with...
2017/0104766 ANALOG SECURITY FOR DIGITAL DATA
Disclosed are various examples of providing analog security for digital data. Content is split into a plurality of framelets. A first framelet is sent to a...
2017/0104765 SECURE INTERFACE USING NON-SECURE ELEMENT PROCESSORS
A bundle of public counters and a corresponding bundle of private counters are created and transmitted to a user device. The user device receives a request and...
2017/0104764 FRAUD PREVENTION
As provided herein, a user of a client device may navigate to a webpage using a browser. A browser window, populated with a verification image and/or details...
2017/0104763 PRESENTATION DEVICE AND PRESENTATION DEVICE COORDINATION
Presentation devices and establishment of communications sessions by presentation devices. Embodiments include verification that a client device has access to...
2017/0104762 ENCRYPTION POLICIES FOR VARIOUS NODES OF A FILE
A computing device may parse a file into a plurality of nodes. The computing device may associate, based on the parsing, at least a first encryption policy...
2017/0104761 Identity Authentication Using Multiple Devices
A system, method, and computer-readable medium for performing an authentication operation comprising: identifying a plurality of user devices associated with a...
2017/0104760 Span of Responsibility Access Control System
A span of responsibility access control system for use in plant process management and similar applications. The system leverages span-of-responsibility...
2017/0104759 DATA PROTECTION AND SHARING
In an approach to data protection and sharing, a computer retrieves social network data of a first user, and obtains a relationship grade between the first...
2017/0104758 METHOD FOR ESTABLISHING NETWORK CONNECTION, GATEWAY, AND TERMINAL
The present invention pertains to the field of Internet technologies, and discloses a method for establishing a network connection. The method includes:...
2017/0104757 System and Method for Secure Machine-To-Machine Communications
Embodiments of the present invention include a method for providing a secure domain name system (DNS) for machine to machine communications. In one embodiment,...
2017/0104756 Detection, protection and transparent encryption/tokenization/masking/redaction/blocking of sensitive data and ...
A plurality of users connect to an application sending requests over a transport and receiving responses from an application that contain sensitive data. For...
2017/0104755 HYBRID CLOUD SECURITY GROUPS
In one embodiment, a request may be received from a first cloud network of a hybrid cloud environment to transmit data to a second cloud network of the hybrid...
2017/0104754 SYSTEM AND METHOD FOR VERIFYING AND REDIRECTING MOBILE APPLICATIONS
A system for securely providing a mobile device application on a mobile device access to a fleet operator datacenter for the mobile device application to...
2017/0104753 Systems and Methods for Mutual Authentication of Electronic Devices
Embodiments are provided for mutually authenticating a pair of electronic devices. According to certain aspects, the electronic devices may connect to each...
2017/0104752 METHOD OF PROCESSING A CIPHERTEXT, APPARATUS, AND STORAGE MEDIUM
A method of processing a ciphertext, the method includes: acquiring a part of a plurality of encrypted elements included in the ciphertext, each of the...
2017/0104751 SELF-AUTHENTICATING CHIPS
A self-authenticating chip includes first and second memory regions storing, respectively, first and second authentication codes. The second memory region is...
2017/0104750 INSTANTIATION OF MULTIPLE ELECTRONIC SUBSCRIBER IDENTITY MODULE (eSIM) INSTANCES
Methods are provided for instantiating multiple electronic subscriber identity modules (eSIMs) to an electronic universal integrated circuit card (eUICC) using...
2017/0104749 SYSTEM AND METHOD FOR MANAGING CERTIFICATE BASED SECURE NETWORK ACCESS WITH A CERTIFICATE HAVING A BUFFER...
Provided is a system and method for managing certificate based secure network access based on a buffer period prior to the expiration of the Certificate. The...
2017/0104748 SYSTEM AND METHOD FOR MANAGING NETWORK ACCESS WITH A CERTIFICATE HAVING SOFT EXPIRATION
Provided is a system and method for managing network access with a Certificate having Soft Expiration. The system includes an Authentication System structured...
2017/0104747 METHODS AND SYSTEMS FOR SINGLE SIGN-ON WHILE PROTECTING USER PRIVACY
A method of enabling applications to reference user information is provided, including receiving a request for a user identifier that references a user of the...
2017/0104746 SYSTEM AND METHOD FOR DATA SECURITY ON BIG DATA SETS
Systems and methods of securely storing and retrieving data are disclosed. A database may include a table of data with rows and columns and encrypted at rest....
2017/0104745 PASSWORD-BASED AUTHENTICATION IN SERVER SYSTEMS
A system of .lamda..gtoreq.2 servers is provided. The server system comprises an access control server for communication with user computers via a network and...
2017/0104744 METHOD AND APPARATUS FOR PROCESSING AUTHENTICATION REQUEST MESSAGE IN A SOCIAL NETWORK
The present disclosure presents a method and apparatus for processing an authentication request message in a social network. In order to resolve the problems...
2017/0104743 AUTHENTICATED SERVER VIEWS
An example computer implemented method to create an authenticated server view includes sending a client secret to an online-synchronized content management...
2017/0104742 SYSTEM AND METHOD FOR COMMUNICATING BETWEEN DISTRIBUTED APPLICATIONS AND DATABASES
A JBoss application may allow for a distributed application hosted on a JBoss application server to connect to a hierarchical type database. Additionally, the...
2017/0104741 APPARATUS, METHOD AND SYSTEM PROVIDING REMOTE USER AUTHENTICATION
The present disclosure relates to a method, apparatus and system for providing and for performing remote authentication of a user. The apparatus may include a...
2017/0104740 MOBILE-OPTIMIZED CAPTCHA SYSTEM BASED ON MULTI-MODAL GESTURE CHALLENGE AND MOBILE ORIENTATION
In an approach to user authorization by mobile-optimized CAPTCHA, a computing device detects information suggesting a risk level. The computing device displays...
2017/0104739 METHOD TO MANAGE A ONE TIME PASSWORD KEY
The present invention relates to a method to manage a One Time Password key, referenced OTP key, used in an OTP algorithm in a user device having access to an...
2017/0104738 METHOD AND APPARATUS FOR AUTOMATED PASSWORD ENTRY
A method and apparatus are provided for protecting security credentials (e.g., username/password combinations) and/or other sensitive data in a "password...
2017/0104737 USER ACCOUNT MANAGEMENT FLOW IN SERVICE ENVIRONMENT
Management of user profiles in a cloud-based service environment is provided. Upon completion of a profile change such as password change, password creation,...
2017/0104736 SECURE DATA STORAGE ON A CLOUD ENVIRONMENT
A method for secure data storage in a cloud storage infrastructure comprises providing a set of first upload files to be stored in the cloud storage...
2017/0104735 METHODS AND SYSTEMS FOR MANAGEMENT OF KEY EXCHANGES
Methods and systems for facilitating exchanges of keys between individuals across multiple locations are provided. Each key set is assigned a unique key...
2017/0104734 Method for Communication between Femto Access Points and Femto Access Point
A method for communication between femto access points (Aps) and a femto AP is presented. The method includes creating, by a first femto AP with a key server...
2017/0104733 DEVICE, SYSTEM AND METHOD FOR LOW SPEED COMMUNICATION OF SENSOR INFORMATION
Techniques and mechanisms to exchange sensor information between devices. In one embodiment, sensor data and corresponding metadata are stored, respectively,...
2017/0104732 SECURITY PROCESSING ENGINES, CIRCUITS AND SYSTEMS AND ADAPTIVE PROCESSES AND OTHER PROCESSES
An electronic circuit (200) includes one or more programmable control-plane engines (410, 460) operable to process packet header information and form at least...
2017/0104731 STORING DECRYPTED BODY OF MESSAGE AND KEY USED TO ENCRYPT AND DECRYPT BODY OF MESSAGE
A non-transitory computer-readable storage medium comprising instructions stored thereon. When executed by at least one processor, the instructions may be...
2017/0104730 SYSTEMS AND METHODS FOR DECRYPTION AS A SERVICE VIA A MESSAGE QUEUING PROTOCOL
Systems and methods for decryption of payloads are disclosed herein. In various embodiments, systems and methods herein are configured for decrypting thousands...
2017/0104729 PROCESS AND SYSTEM FOR SELECTABLE DATA TRANSMISSION
Methods and systems are provided for selectable data transmissions. An electronic key may be assigned to authenticated data associated with a particular user,...
2017/0104728 WIRELESS NETWORK IDENTIFIER WITH ENCRYPTED NETWORK ACCESS INFORMATION
A data acquisition platform in which self-configuring devices communicate with a database through an intermediate wireless access point. The database may store...
2017/0104727 ENHANCED NETWORK SECURITY
A method of a mesh network is disclosed. The method comprises generating by a source node a random token to be comprised in a query packet comprising a query...
2017/0104726 MANAGING UNLINKABLE IDENTIFIERS FOR CONTROLLED PRIVACY-FRIENDLY DATA EXCHANGE
A method for managing unlinkable database user identifiers includes distributing to a first database a first encrypted user identifier, a first database...
2017/0104725 ANONYMIZATION OF TRAFFIC PATTERNS OVER COMMUNICATION NETWORKS
A computer-implemented method of obfuscating communication traffic patterns may include detecting, at a first communications device, data communication...
2017/0104724 Secure Network Matchmaking
There is provided a method for use by a client device having a client address in a network for communication with a host device having a host address in the...
2017/0104723 Selective Encryption Delineation
Decoding a partially encrypted data stream may include receiving and scanning the partially encrypted data stream. Scanning the partially encrypted data stream...
2017/0104722 CONTEXT SHARING BETWEEN ENDPOINT DEVICE AND NETWORK SECURITY DEVICE USING IN-BAND COMMUNICATIONS
A network security device (NSD) is connected between a network and an endpoint device configured to host a client application. The client application...
2017/0104721 PROXY SERVER-BASED MALWARE DETECTION
Disclosed are various embodiments for malware detection by way of proxy servers. In one embodiment, a proxied request for a network resource from a network...
2017/0104720 GLOBAL OBJECT DEFINITION AND MANAGEMENT FOR DISTRIBUTED FIREWALLS
A method of defining distributed firewall rules in a group of datacenters is provided. Each datacenter includes a group of data compute nodes (DCNs). The...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.