Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0091521 CONTROLLING ACCESS TO COMPUTER ACCOUNTS MANAGED BY A COMPUTER ACCOUNT SERVER TO PROVIDE HANDOFF TO A NOMINEE...
A computer account server receives a nominee identity from an account owner associated with owner access credentials. The nominee identity is stored in a data...
2018/0091520 TRAITOR TRACING FOR OBFUSCATED CREDENTIALS
A method, computer program product, and system for providing verification processes associated with a commitment-based authentication protocol are described. A...
2018/0091519 MODIFYING ACCESS TO A SERVICE BASED ON CONFIGURATION DATA
In one example, a system for accessing services comprises a processor to detect a change in a topology of the system and request configuration data or a...
2018/0091518 METHOD, APPARATUS, AND SYSTEM FOR COLLECTING ACCESS CONTROL LIST
The present disclosure provides a method, an apparatus, and a system for collecting an access control list. A second network device receives a first LSA packet...
2018/0091517 NETWORK ATTACHED STORAGE (NAS) APPARATUS HAVING REVERSIBLE PRIVACY SETTINGS FOR LOGICAL STORAGE AREA SHARES,...
A Network Attached Storage (NAS) apparatus to provide network-based data storage for client computing devices (e.g., in a local area network). One or more...
2018/0091516 NETWORK-ACCESSIBLE RESOURCE MANAGEMENT SYSTEM WITH DISTRIBUTABLE GOVERNANCE
A resource management system comprising a computer-implemented platform running on at least one computing device, said platform for running a plurality of...
2018/0091515 DISTRIBUTION OF CODE TO AN AUTHORIZED TARGET INFRASTRUCTURE
Examples herein disclose a computer-readable medium, system, and method for distribution of code to an authorized target infrastructure within a manufacturing...
2018/0091514 MEDIA ASSET ACCESS CONTROL SYSTEM
An asset storage server is provided herein that assigns related files to an asset name and assigns permissions to the asset name such that related files with...
2018/0091513 SENSOR-BASED HUMAN AUTHORIZATION EVALUATION
A resource-access management system detects whether a user is authorized to access resources. The system may include a user device being configured to include...
2018/0091512 ACCESS CONTROL IN DATA PROCESSING SYSTEMS
A policy data structure defines predetermined authorizations, each relating to authorization of at least one user to access at least one resource as well as to...
2018/0091511 SECURE DATA TRANSMISSION
A system may include a first network in which user device(s) and a HIP server are communicably coupled. The first network may include a secure data...
2018/0091510 DEVICE, SYSTEM AND METHOD FOR PROTECTING NETWORK DEVICES
A unidirectional secured network adapter to receive an at least one communication from an at least one device of plurality of devices of the secure network...
2018/0091509 WORK METHOD FOR SMART KEY DEVICE
A work method for a smart key device. A host machine acquires data from a trusted server via a browser and then transmits the data to a smart key device; the...
2018/0091508 COMPUTERIZED VEHICULAR APPARATUS FOR LOCATION-BASED SERVICE PROVISION
Computerized apparatus useful within vehicles for causing provision of location-based services to users via a portable wireless computerized device. In one...
2018/0091507 Network Authorization System and Method Using Rapidly Changing Network Keys
A system and method for authorizing a client device to access a host device based on timestamps including preferably at least two time units. Both devices...
2018/0091506 AUTOMATIC PROVISIONING OF SERVICES TO NETWORK-CONNECTED DEVICES
The disclosed embodiments include computerized methods and systems that automatically provision one or more services available to an Internet-of-Things (IoT)...
2018/0091505 DISTRIBUTED STORAGE OF AUTHENTICATION DATA
A biometric server receives, a transmission of a biometric sample and an encrypted enrollment template of the user from a client device, wherein the encrypted...
2018/0091504 SYSTEM AND METHOD FOR PROTECTING DATA ITEMS
In accordance with a first aspect of the presently disclosed subject matter, there is provided a data access control server comprising: a data access control...
2018/0091503 NETWORKED STORAGE SYSTEM AND METHOD
A networked storage system and method provides multiple lockers arranged in a modular configuration, and multiple security means for accessing and monitoring...
2018/0091502 METHOD FOR USING AND MAINTAINING USER DATA STORED ON A SMART CARD
In a method for using and maintaining user data stored on a smart card, a smart card receives a user data request for the user data stored on the smart card....
2018/0091501 MIRRORED COMMUNICATION DEVICES IN CARRIER NETWORKS
In some embodiments, an apparatus includes one or more communication sub-systems; and an identity mirror component in communication with the one or more...
2018/0091500 WI-FI ENABLED CREDENTIAL ENROLLMENT READER AND CREDENTIAL MANAGEMENT SYSTEM FOR ACCESS CONTROL
A method according to one embodiment includes reading a unique credential identifier of a passive credential device, transmitting the unique credential...
2018/0091499 GENERATION AND VALIDATION OF DERIVED CREDENTIALS
A CAC/PIV certificate associated with a HSPD-12 identity is used to generate a derived credential for storage on a device, such as a mobile device, that lacks...
2018/0091498 SECURE ELEMENT INSTALLATION AND PROVISIONING
A device binding system includes generating and storing at the device a unique identifier based on device characteristics and a cryptographic function. The...
2018/0091497 Digital certificate for verifying application purpose of data usage
A method of creating an application purpose certificate, comprising: receiving from a software publisher an application code and declared privacy information,...
2018/0091496 NETWORK MAPPING USING A FINGERPRINT
A system for network mapping includes an interface and a processor. The interface is configured to receive an indication to scan a set of addresses using a...
2018/0091495 CDN-Based Access Control Method and Related Device
A content delivery network based (CDN-based) access control method, includes receiving, by a CDN server, a hypertext transfer protocol (HTTP) request from a...
2018/0091494 SYSTEMS, METHODS AND COMPUTER-READABLE STORAGE MEDIA FACILITATING MOBILE DEVICE GUEST NETWORK ACCESS
Mobile device access to a guest network is facilitated. A method comprises: detecting a home network having an associated access point based on the device...
2018/0091493 SYSTEMS AND METHODS FOR LOCATION-BASED AUTHENTICATION
Systems and methods are disclosed for performing location-based authentication using location-aware devices. One method includes: receiving an access request...
2018/0091492 CHALLENGE-DYNAMIC CREDENTIAL PAIRS FOR CLIENT/SERVER REQUEST VALIDATION
In an embodiment, a computer system configured to: generate a first challenge credential to be sent to a client computer; render one or more first...
2018/0091491 SERVICE OPERATION MANAGEMENT USING NEAR-FIELD COMMUNICATIONS
Various techniques for the management and control of service operations using near-field communication (NFC) technologies are disclosed. In an example, a...
2018/0091490 AUTHENTICATION FRAMEWORK FOR A CLIENT OF A REMOTE DATABASE
Disclosed herein is a technique for authenticating an application operating on a client device with an authentication server device based on user credentials...
2018/0091489 GROUP MEMBERSHIP BLOCK CHAIN
A system and method for achieving authorization in confidential group communications in terms of an ordered list of data blocks representing a tamper-resistant...
2018/0091488 VEHICLE WIRELESS INTERNET SECURITY
Methods, systems, and computer program products for vehicle wireless internet security are provided. A connection request is received from a mobile device. A...
2018/0091487 ELECTRONIC DEVICE, SERVER AND COMMUNICATION SYSTEM FOR SECURELY TRANSMITTING INFORMATION
An electronic device, server, and communication system are disclosed. The electronic device includes a processor and a storage medium. The storage medium is...
2018/0091486 SECURED FILE TRANSFER MANAGEMENT ON AUGMENTED REALITY (AR) AND VIRTUAL REALITY (VR) DEVICES
In one embodiment, a computer program product includes a computer readable storage medium having program instructions embodied therewith. The embodied program...
2018/0091485 ACCESS STRATUM SECURITY FOR EFFICIENT PACKET PROCESSING
Certain aspects of the present disclosure provide techniques for managing security keys for enciphering and deciphering packets transmitted in a wireless...
2018/0091484 LOGIC REPOSITORY SERVICE USING ENCRYPTED CONFIGURATION DATA
The following description is directed to a logic repository service. In one example, a method of a logic repository service can include receiving a first...
2018/0091483 METHOD FOR IN-LINE TLS/SSL CLEARTEXT ENCRYPTION AND AUTHENTICATION
We describe a method, device and system for communicating to a peer via a network. A segment is received formatted according to a first network protocol, the...
2018/0091482 Web Application Perpetually Encrypted Obscured Filesystem
This disclosure relates generally to a computing system and method for data encryption and, more particularly, to methods and apparatus for enhanced protection...
2018/0091481 METHOD AND SYSTEM FOR PROTECTING DATA FLOW BETWEEN PAIRS OF BRANCH NODES IN A SOFTWARE-DEFINED WIDE-AREA NETWORK
A method for protecting data flows between pairs of branch nodes in a software-defined wide-area network (SD-WAN) is disclosed. In an embodiment, the method...
2018/0091480 SYSTEMS AND METHODS FOR ACTIVATING A PRIVATE NETWORK
A copy of a request for content from a content provider is initially received from a client device. The copy of the request indicates a unique identifier of...
2018/0091478 MITIGATING COMMUNICATION RISK BY VERIFYING A SENDER OF A MESSAGE
A first risk analysis of a message is performed. In the event the first risk analysis results in a determination that the message meets a first criteria, at...
2018/0091477 REDUCING DATA CONNECTIONS FOR TRANSMITTING SECURED DATA
A method for reducing data transfer connections is provided. The method may include receiving data requests associated with devices. The method may further...
2018/0091476 MITIGATING COMMUNICATION RISK BY DETECTING SIMILARITY TO A TRUSTED MESSAGE CONTACT
A measure of similarity between an identifier of a sender of the message and each identifier of one or more identifiers of each trusted contact of a plurality...
2018/0091475 REDUCING DATA CONNECTIONS FOR TRANSMITTING SECURED DATA
A method for reducing data transfer connections is provided. The method may include receiving data requests associated with devices. The method may further...
2018/0091474 PREDICTING FIREWALL RULE RANKING VALUE
A device may obtain information regarding firewall rules. The information, for a firewall rule of the firewall rules, may include one or more match condition...
2018/0091473 UNICAST MEDIA REPLICATION FABRIC USING BIT INDEXED EXPLICIT REPLICATION
Methods and network devices are disclosed for replication and switching of Internet Protocol (IP) packets in professional media networks. In one embodiment, a...
2018/0091472 Provisioning tool for a content delivery network (CDN)
A tool that allows a CDN customer, partner, or other authorized entity to create a DNS canonical name (CNAME) on the content delivery network without having to...
2018/0091471 Client Address Based Forwarding of Dynamic Host Configuration Protocol Response Packets
Client address based forwarding of dynamic host configuration protocol response packets may be provided. First, a first relay agent on a first network device...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.