Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2017/0223024 CLIENT APPLICATION BASED ACCESS CONTROL IN CLOUD SECURITY SYSTEMS FOR MOBILE DEVICES
Systems and methods, implemented by one or more nodes in a cloud-based security system, for enforcing application-based control of network resources include...
2017/0223023 SCALABLE CONFIGURABLE UNIVERSAL OPERATING SYSTEM
A scalable configurable universal operating system, and associated processes and procedures, which, together, are configurable to provide at least one...
2017/0223022 CLOUD-BASED COORDINATION OF REMOTE SERVICE APPLIANCES
Systems, and methods are provided to provide cloud-based coordination of customer premise service appliances. A system can include a cloud-based service...
2017/0223021 SECURE CONFIRMATION EXCHANGE FOR OFFLINE INDUSTRIAL MACHINE
In one embodiment, a system and method are disclosed for receiving a request for authorization to commission a target device based, at least in part, on a...
2017/0223020 PROXY AUTHENTICATION
In one embodiment, receiving, by an operating system of the first computing device and from a client application executing on the first computing device, a...
2017/0223019 Inter-Application Delegated Authentication
Disclosed is a system for delegating authentication of an untrusted application executing on a client device. For delegated authentication, an untrusted...
2017/0223018 SELECTIVELY PERMITTING A RECEIVER DEVICE TO ACCESS A MESSAGE BASED ON AUTHENTICATING THE RECEIVER DEVICE
A device may receive an indication to generate a link associated with accessing a message. The message may be intended for a shared device identifier of a...
2017/0223017 INTERPRETING USER EXPRESSION BASED ON CAPTURED BIOMETRIC DATA AND PROVIDING SERVICES BASED THEREON
Methods and systems for authenticating a user based on user expression. In some embodiments, an authentication service computer receives a user authentication...
2017/0223016 Service Authorization Using Auxiliary Device
Implementations of the present disclosure relate to systems and methods for service authorization. A server terminal device may receive user authentication...
2017/0223015 METHOD AND APPARATUS FOR PROVIDING SECURITIES TO ELECTRONIC DEVICES
A secured device including a security hardware module and a method thereof are provided. The secured device generates first user authentication information...
2017/0223014 PROVISIONING A DEVICE TO BE AN AUTHENTICATION DEVICE
In certain embodiments, a web services system receives a request to provision a device, such as a telephone, as an authentication device. The web services...
2017/0223013 SYSTEMS AND METHODS FOR SECURE AUTOMATED NETWORK ATTACHMENT
A method for automatically attaching a purpose-built electronic device to a provider network includes steps of discovering, by a Wi-Fi module of the...
2017/0223012 SYSTEM AND METHOD FOR TRANSFERRING DEVICE IDENTIFYING INFORMATION
Disclosed are various examples for determining whether a client device complies with compliance rules while authenticating a user account. A client certificate...
2017/0223011 SECURE AUTOMATED DEVICE CONFIGURATION AND MANAGEMENT
A method may include performing secure device configuration, via a configuration service manager device, for a SIP user device. The method includes monitoring,...
2017/0223010 SINGLE SIGN ON FOR A REMOTE USER SESSION
A user accesses a remote session, the connection to which is managed by a connection broker, according to a single sign-on (SSO) process. The SSO process...
2017/0223009 LATE BINDING AUTHENTICATION
A late-binding token (LBT) is securely generated and provided to a device application. When the LBT is presented and validated, a resource associated with the...
2017/0223008 SYSTEM AND METHOD FOR GENERATING A SERVER-ASSISTED STRONG PASSWORD FROM A WEAK SECRET
Disclosed herein is a method for generating a high entropy password using a low entropy password and low-entropy login data comprising supplying the low...
2017/0223007 PROVIDING DATA SECURITY WITH A TOKEN DEVICE
A computer-implemented method for providing security to access and store data may include transferring first information for display from a token device having...
2017/0223006 POLICY ENFORCEMENT OF CLIENT DEVICES
A method may include sending, by a client device, an access request to an authentication server device. The access request may include a request to access an...
2017/0223005 LOCAL DEVICE AUTHENTICATION
The disclosed embodiments include computerized methods, systems, and devices, including computer programs encoded on a computer storage medium, for device...
2017/0223004 LOGIN INFORMATION TRANSMISSION METHOD, CODE SCANNING METHOD AND APPARATUS, AND SERVER
Described are a login information transmission method, a code scanning method and apparatus, and a server. The login information transmission method includes:...
2017/0223003 INTEGRATED DATA EXTRACTION AND RETRIEVAL SYSTEM
A first computing device connected to an internal network de-anonymizes data. A record including a surrogate key is received from a second computing device...
2017/0223002 TECHNIQUES FOR AUTHENTICATION VIA A MOBILE DEVICE
Techniques for authentication via a mobile device are provided. A mobile device is pre-registered for website authentication services. A user encounters a...
2017/0223001 ELECTRONIC CREDENTIALS MANAGEMENT
A method electronically validates credentials information pertaining to applicants. The method collects credentials information pertaining to applicants in one...
2017/0223000 LOGIN CONTROL METHOD, APPARATUS, AND COMPUTER-READABLE RECORDING MEDIUM
A login control method is executed by a computer. The login control method includes inputting a serial signal that corresponds to ON-operations and...
2017/0222999 METHOD, SYSTEM, AND PROGRAM STORAGE DEVICE FOR MANAGING TENANTS IN AN INDUSTRIAL INTERNET OF THINGS
In an example embodiment, a method, system, and program storage device for binding an industrial application to a plurality of services in an Industrial...
2017/0222998 NETWORK SERVICE HEADER USED TO RELAY AUTHENTICATED SESSION INFORMATION
In one embodiment, a system, method, and computer program product are disclosed for authenticating a packet received from a client node, storing the results of...
2017/0222997 Multi-Tenant Enterprise Application Management
A method performed by a computing system includes receiving from a client component of an enterprise application, a request destined for a service component of...
2017/0222996 TWO-FACTOR USER AUTHENTICATION USING CARD MATRIX
A system receives a request to authenticate a user and determines a first set of cell identifiers of a card matrix to associate with the user. The system...
2017/0222995 MANAGING AUTHENTICATORS IN A COMPUTER SYSTEM
Certain embodiments provide means for managing automated access to computers, e.g., using SSH user keys and other kinds of trust relationships. Certain...
2017/0222994 APPARATUS AND METHOD TO SECURELY CONTROL A REMOTE OPERATION
Disclosed is a device that obtains and stores a secret key. The device may comprise a transceiver configured to: transmit a command for a secret key to a...
2017/0222993 IMPROVEMENTS IN AND RELATING TO SECRET COMMUNICATIONS
A method of establishing a network by sharing a secret between a first entity (A) and a second entity (B), comprising the steps of: the first entity (A)...
2017/0222992 Method for Securing User Data with DRM Keys
Some embodiments provide convenient auto-authentication for user data on a primary device, while still providing a significant level of security, by taking...
2017/0222991 MANAGEMENT OF PROFILES IN AN EMBEDDED UNIVERSAL INTEGRATED CIRCUIT CARD (eUICC)
Consumer/enterprise and machine-to-machine functions in wireless devices have led to a need for end user consent, security of profile data while permitting...
2017/0222990 System and Method for Certificate Selection in Vehicle-to-Vehicle Applications to Enhance Privacy
A system and method are provided for certificate selection in infrastructures such as those planned to be used for V2V messaging, wherein the vehicle (or other...
2017/0222989 MESSAGE ENCRYPTION SYSTEM
A system includes a plurality of mail encryption gateways and a router. Each mail encryption gateway encrypts email according to an encryption policy of a...
2017/0222988 DEVICE, SYSTEM, AND METHOD FOR PROCESSOR-BASED DATA PROTECTION
A device, system, and method for providing processor-based data protection on a mobile computing device includes accessing data stored in memory with a central...
2017/0222987 UPLOADING AND TRANSCODING MEDIA FILES
In one embodiment, a method includes by a host computing server, receiving from a client computing device, a request to upload a multimedia file from the...
2017/0222986 Systems and Methods for Decrypting Digital Art and Imaging for Display of the Same
System and method for displaying digital content on a display device, comprising a display screen, a structural assembly, secured to the rear face of the...
2017/0222985 Systems and Methods for Distributing, Displaying, Viewing, and Controlling Digital Art and Imaging
System and method for displaying digital content on a display device, comprising a display screen, a structural assembly, secured to the rear face of the...
2017/0222984 SYSTEMS AND METHODS FOR ENCODING THE CORE IDENTIFIER IN THE SESSION IDENTIFIER
The present invention is directed towards systems and methods for managing SSL session persistence and reuse in a multi-core system. A first core may indicate...
2017/0222983 Providing Communications Security to an End-to-End Communication Connection
A network device provides communications security, like privacy and confidentiality, to an end-to-end communication connection. The network device includes: a...
2017/0222982 Keyless Access to Laptop
A method including transmitting, by a mobile device, a first encrypted gadget token over a wireless link to an Information Handling System (IHS). The method...
2017/0222981 KEY DISTRIBUTION IN A DISTRIBUTED NETWORK ENVIRONMENT
A system including a controller and a pool of computing resources to run virtual machines are configured to automatically provision each virtual machine with...
2017/0222980 Beacon Cloud Reputation Service
A technique for determining the safety of the content of beacon transmissions. A user device extracts beacon identification information from a beacon...
2017/0222979 Qualifying Client Behavior to Mitigate Attacks on a Host
A system (and method, and computer readable storage medium storing computer program instructions) is configured to determine a fingerprint of a client and...
2017/0222978 SYSTEMS, DEVICES, AND METHODS FOR IMPROVED DOMAIN NAME SYSTEM FIREWALL PROTECTION
Embodiments relate to systems, devices, and computing-implemented methods for resolving DNS requests by sending, from a device, a first DNS request for a...
2017/0222977 CONFIGURING NETWORK SECURITY BASED ON DEVICE MANAGEMENT CHARACTERISTICS
Disclosed are various examples for configuring network security based on device management characteristics. In one example, a specification of a set of network...
2017/0222976 INTER-ARRIVAL TIME INTRUSION-DETECTION TECHNIQUE TO PROVIDE ENHANCED CYBERSECURITY
The disclosed embodiments relate to a system that performs an intrusion-detection technique to differentiate between packets received from malicious remote...
2017/0222975 BLOCKING INTRUSION ATTACKS AT AN OFFENDING HOST
A method, apparatus, and program product are provided for protecting a network from intrusions. An offending packet communicated by an offending host coupled...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.