At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Patent # | Description |
---|---|
2018/0183811 |
EMAIL BASED SLAs MANAGEMENT FOR EFFECTIVE BUSINESS A method includes determining that a message sent using a sender account to a first user account of an email application is unopened for a first predetermined... |
2018/0183810 |
Data Collaboration A method and system are provided for enabling collaborative access to a data object. The method comprises establishing an access control policy, the access... |
2018/0183809 |
UNIVERSAL LOGIN AUTHENTICATION SERVICE A system and method enables secure login at linked sites with a universal ID (UID) and possibly different or same password to linked identities. In such... |
2018/0183808 |
MEDICAL DEVICE WITH INPUT UNIT A medical device has a device component with an operating state controllable by predefining a predefined value for an operating parameter. A data network... |
2018/0183807 |
METHOD FOR AUDITING CLOUD ACCESS IN REAL TIME A method for auditing cloud access in real time includes steps of Step 1: client obtains necessary information from a synchronization server (SYS), by... |
2018/0183806 |
GUEST ACCESS PROVISIONING Example implementations may relate to a policy management system that may receive, from a scheduling application, a request to provision access for a guest.... |
2018/0183805 |
SYSTEM AND METHOD OF AUTHORIZATION OF SIMPLE, SEQUENTIAL AND PARALLEL
REQUESTS WITH MEANS OF AUTHORIZATION... This invention provides a system and a method for the authorization of simple, sequential and parallel requests, such transactions are preferably of the... |
2018/0183804 |
SYSTEMS AND METHODS FOR MANAGING ELECTRONIC TOKENS FOR DEVICE INTERACTIONS Systems and methods are provided for managing electronic tokens for device interactions. In some embodiments, a unified graphical user interface is provided... |
2018/0183803 |
SECURE COMPUTING SYSTEM RECORD ACCESS CONTROL A computing system record security architecture comprises, in one example, a record generation component configured to generate a record in a computing system,... |
2018/0183802 |
RESOURCE-DRIVEN DYNAMIC AUTHORIZATION FRAMEWORK Embodiments concern a dynamic authorization framework. Security Classification Process (SCP) is the process of classifying raw data, information extracted from... |
2018/0183801 |
METHOD, APPARATUS, AND COMPUTER PROGRAM PRODUCT FOR MANAGING ACCESS
PERMISSIONS FOR A SEARCHABLE ENTERPRISE... Embodiments of the present invention provide methods, systems, apparatuses, and computer program products for managing access permissions for a searchable... |
2018/0183800 |
CHOOSING OBJECT NAMES BASED ON STORAGE UNIT (SU) AND/OR MEMORY DEVICE
AVAILABILITY A computing device includes an interface configured to interface and communicate with a dispersed storage network (DSN), a memory that stores operational... |
2018/0183799 |
METHOD AND SYSTEM FOR DEFENDING AGAINST MALICIOUS WEBSITE A system for defending against malicious website includes an intelligent module and a deploying module. The intelligent module collects and stores information... |
2018/0183798 |
METHOD AND SYSTEM FOR CLASSIFYING NETWORK REQUESTS Methods, systems and programming for classifying network requests. In one example, a network request for content to be fetched by a content server is received... |
2018/0183797 |
SYSTEMATIC ENHANCEMENT OF CONTACT INFORMATION A system for systematically enhancing consumer and business contact information is disclosed. A server located "in the cloud" systematically controls a... |
2018/0183796 |
ONBOARDING AND ACCOUNTING OF DEVICES INTO AN HPC FABRIC A method to onboard a slave node to a high performance computing system that includes a fabric switch network that includes a fabric switch master and a group... |
2018/0183795 |
PROVIDING AUTHENTICATION INFORMATION FROM AN ONLINE SYSTEM TO A CLIENT
DEVICE TO ALLOW THE CLIENT DEVICE TO... A client device including an application associated with an online system transmits information identifying the client device to the online system when the... |
2018/0183794 |
SYSTEMS AND METHODS FOR CLOUD BASED UNIFIED SERVICE DISCOVERY AND SECURE
AVAILABILITY Systems and methods implemented by an application executed on a user device for service discovery and connectivity include discovering one or more cloud... |
2018/0183793 |
CROSS-REGION REQUESTS A request is received by a user in a second region. The request, which is digitally signed with credential associated with the user in the second region causes... |
2018/0183792 |
EXPANDED iOS.RTM. DEVICE CAPABILITY A method includes receiving a request from a host device to authenticate a device. The method further includes transmitting authenticating data to the host... |
2018/0183791 |
REMOTE COMMUNICATION SYSTEM, REMOTE COMMUNICATION METHOD, AND RECORDING
MEDIUM A remote communication system authenticates each of a plurality of first communication terminals by using first authentication information of each of the... |
2018/0183790 |
CLOUD-BASED ONBOARDING OF CLOUD-CONTROLLED WI-FI NETWORK DEVICES A cloud-based onboarding server receives first identification information associated with a network device, from a wireless station authenticated to the... |
2018/0183789 |
FABRIC ASSISTED IDENTITY AND AUTHENTICATION Context-based authentication in a secure network comprised of multiple interconnected programmable devices is described. One technique includes receiving, from... |
2018/0183788 |
ELECTRONIC APPARATUS, CONTROL AUTHORITY AUTHENTICATION METHOD THEREOF AND
USER TERMINAL APPARATUS An electronic apparatus is provided. The electronic apparatus includes a communicator configured to communicate with a guest terminal apparatus requesting... |
2018/0183787 |
METHODS AND SYSTEMS FOR VALIDATING AN INTERACTION Methods and systems for validating an interaction between a user and a service provider system are disclosed. Electronically-stored credential data for the... |
2018/0183786 |
Dual Authentication using a Password Card A method and apparatus for providing and processing two-factor authentication using a Password Card. There is a need to increase security during the... |
2018/0183785 |
SYSTEMS AND METHODS FOR MANAGING SECURE SHARING OF ONLINE ADVERTISING DATA Systems and methods are disclosed for managing online advertising data secure sharing. One method includes receiving, at a server, a request for proprietary... |
2018/0183784 |
AUTOMATED PRODUCTION OF CERTIFICATION CONTROLS BY TRANSLATING FRAMEWORK
CONTROLS A compliance application automatically produces certification controls by translating framework controls. The framework controls are common certification... |
2018/0183783 |
PUSH NOTIFICATION ACTIVATION A mobile computing device is operated to receive a trigger at a first instance. The trigger may be associated with a predefined condition or event or action.... |
2018/0183782 |
Single Sign-On for Interconnected Computer Systems Methods, systems, and computer-readable media support provisioning a computer application that is executed on an associated computing component through a... |
2018/0183781 |
RELAY APPARATUS, COMMUNICATION APPARATUS AND RELAY METHOD A relay apparatus is connected to a communication apparatus, a service providing apparatus and a browser-equipped apparatus. The relay apparatus includes: a... |
2018/0183780 |
METHOD FOR ESTABLISHING PROTECTED ELECTRONIC COMMUNICATION, SECURE
TRANSFER AND PROCESSING OF INFORMATION AMONG... A method of establishing protected electronic communication, secure transfer and processing of information among three or more subjects in which, at first, a... |
2018/0183779 |
Multi-Level User Device Authentication System for Internet of Things (IOT) The present invention describes the user authentication system comprising of multiple levels of security which is used to authorize the user. The system uses... |
2018/0183778 |
METHOD AND SYSTEM FOR ESTABLISHING TRUSTED COMMUNICATION USING A SECURITY
DEVICE Method and system for secure access from a security device at a local network location to a remote network location are disclosed. At the security device... |
2018/0183777 |
METHODS AND SYSTEMS FOR USER AUTHENTICATION Methods and systems for passwordless authenticating of a user are provided. A first request to access a first content is received from a first user of a first... |
2018/0183776 |
DIGITAL COMMUNITY SYSTEM A method includes receiving, via a network, a join request from a client device for a user to access a digital community. The join request includes a... |
2018/0183775 |
METHOD AND SYSTEM FOR PROVIDING A PRE-LAUNCHED VIRTUAL DESKTOP SESSION The present disclosure relates to a method and system for providing a pre-launched virtual desktop session by a smart scheduling server. The smart scheduling... |
2018/0183774 |
KEY DISTRIBUTION IN A DISTRIBUTED COMPUTING ENVIRONMENT A key distribution service operated by a signature authority distributes one-time-use cryptographic keys to one or more delegates that generate digital... |
2018/0183773 |
ENCRYPTED COMMUNICATION SYSTEM AND METHOD FOR CONTROLLING ENCRYPTED
COMMUNICATION SYSTEM An encrypted communication system includes on-board devices configured to perform encrypted communication with a server located outside a vehicle. Each of the... |
2018/0183772 |
METHOD OF PERFORMING SECURE COMMUNICATION AND SECURE COMMUNICATION SYSTEM In a method of performing secure communication between at least two devices, a first security session is formed between a first device and a second device... |
2018/0183771 |
KEY REVOCATION A signature authority generates revocable one-time-use keys that are able to generate digital signatures. The signature authority generates a set of... |
2018/0183770 |
Device and Method of Handling Mobile Data Transmissions in a Wireless
Communication System A first communication device for transmitting data to a second communication device comprises a storage device for storing instructions and a processing... |
2018/0183769 |
CONTROL SYSTEM AND CONTROL METHOD A control system comprises a server and a gateway. The server is configured to encrypt a control signal according to a public key for generating a first... |
2018/0183768 |
SYSTEMS AND METHODS FOR PRIVACY IN DISTRIBUTED LEDGER TRANSACTIONS Systems and methods for privacy in distributed ledger transactions are disclosed. In one embodiment, in an information processing apparatus comprising at least... |
2018/0183767 |
SECURITY KEY GENERATION AND MANAGEMENT METHOD OF PDCP DISTRIBUTED
STRUCTURE FOR SUPPORTING DUAL CONNECTIVITY The present disclosure relates to a pre-5.sup.th-Generation (5G) or 5G communication system to be provided for supporting higher data rates Beyond... |
2018/0183766 |
DETECTING AND MITIGATING FORGED AUTHENTICATION OBJECT ATTACKS USING AN
ADVANCED CYBER DECISION PLATFORM A system for detecting and mitigating forged authentication object attacks is provided, comprising an authentication object inspector configured to observe a... |
2018/0183765 |
METHOD OF SECURING AUTHENTICATION IN ELECTRONIC COMMUNICATION A method of securing authentication in electronic communication between at least one user authentication mechanism and at least one server authentication... |
2018/0183764 |
COLLECTING AND PROCESSING CONTEXTUAL ATTRIBUTES ON A HOST Some embodiments of the invention provide a novel architecture for capturing contextual attributes on host computers that execute one or more machines, and for... |
2018/0183763 |
Multi-Tunneling Virtual Network Adapter Multiple virtual private network connections to be created without the need for administrative privileges, and network traffic to be routed using a single... |
2018/0183762 |
SECURE EXECUTION AND TRACKING OF WORKFLOWS IN A PRIVATE DATA CENTER BY
COMPONENTS IN THE CLOUD One or more embodiments provide techniques for executing a workflow in a private data center. The cloud data center receives a request from a user. The cloud... |