Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0270244 UNMANNED AERIAL VEHICLE DATA MANAGEMENT
A secure chain of data blocks is maintained at a given computing node, wherein the given computing node is part of a set of computing nodes in a distributed...
2018/0270243 PREVENTING WIDESPREAD TAKEOVER OF ACCOUNTS
Embodiments of the invention include a method for determining that a change has occurred to a first account. The first account is a linked account that is...
2018/0270242 AUTOMATED VERIFICATION OF CHAINS OF CREDENTIALS
A method, a computing system and a computer program product are provided. A computing device identifies a credential of a first entity and determines one or...
2018/0270241 Authenticating Drivers
One or more devices in a data analysis computing system may be configured to receive and analyze movement data and determine driving trips based on the...
2018/0270240 INSTALLMENT CONFIGURATIONS WITHIN A VEHICLE AND INTEROPERABILITY OF DEVICES CONFIGURED TO IMPLEMENT SECURE...
In some embodiments, the present invention provides for a hardware component that includes at least the following: a logic cell; where the logic cell is...
2018/0270239 SOCIALLY RESPONSIBLE CONTENT ACCESS
Socially responsible content access may include receiving, by a server device from a customer device, message data including a request to access content...
2018/0270238 HOUSEHOLD APPLIANCE AND RELATED CONTROL METHODS
A method of operating an appliance includes receiving a request to activate the appliance, providing a prompt for authorization via a remote user interface on...
2018/0270237 SYSTEM AND METHOD FOR PROVIDING LEAST PRIVILEGE ACCESS IN A MICROSERVICES ARCHITECTURE
System and method of providing administrative access to an endpoint server. In one example, the method includes receiving, at an admin server, a request for...
2018/0270236 METHOD FOR PROTECTING MACHINE TYPE COMMUNICATION DEVICE, NETWORK ENTITY AND MTC DEVICE
Disclosed are a method for protecting a machine type communication device, a network entity, and a machine type communication (MTC) device service capability...
2018/0270235 SYSTEMS AND METHODS FOR ENDPOINT MANAGEMENT CLASSIFICATION
A system and method for mitigating security vulnerabilities of a computer network by detecting a management status of an endpoint computing device attempting...
2018/0270234 INFORMATION TERMINAL, INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING SYSTEM, AND INFORMATION...
An information terminal includes circuitry to: obtain authentication data from a first information processing apparatus; receive a discovery request broadcast...
2018/0270233 INFORMATION TERMINAL, INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING SYSTEM, AND INFORMATION...
Example embodiments of the present invention include an information terminal comprising circuitry to: read, from a medium possessed by a user, first...
2018/0270232 WIRELESS FIRMWARE UPDATES
A method includes transmitting, by a user device, an encrypted user profile to a locking device, the encrypted user profile including a user key and encrypted...
2018/0270231 CONNECTING DEVICES TO A NETWORK
Embodiments of the invention is directed to a method for connecting a device to a network. An example method comprises providing a device assigned with a...
2018/0270230 MOTOR VEHICLE COMMUNICATION NETWORK WITH SWITCH DEVICE
At a first port of a switch device of a motor vehicle, a device identifier of a device of the motor vehicle is received. An authenticity test on the basis of...
2018/0270229 DEVICE IDENTIFICATION
Systems, methods, and related technologies for device identification are described. In certain aspects, packet data associated with a device can be analyzed...
2018/0270228 CONNECTING DEVICES TO A NETWORK
Embodiments of the invention is directed to a method for connecting a device to a network. An example method comprises providing a device assigned with a...
2018/0270227 DEVICE AND METHOD OF SETTING OR REMOVING SECURITY ON CONTENT
A device for removing security on content using biometric information includes a memory configured to store content on which security has been set based on...
2018/0270226 Secure Transfer of User Information Between Devices Based on User Credentials
Some embodiments provide secure transfer of user information between devices. To facilitate an online transaction, a first computing device queries a second...
2018/0270225 REMOTE KEYCHAIN FOR MOBILE DEVICES
An app of a mobile device registers the mobile device for a remote credential server (RCS) and receives a device token. When a credential for a remote asset is...
2018/0270224 ELECTRONIC CROWD-BASED AUTHENTICATION
Methods and systems for electronic crowd-based authentication. An example embodiment includes operations or steps for selecting authentication criteria with...
2018/0270223 SYSTEM AND METHOD FOR ONE TIME PASSWORD AUTHENTICATION
A method for authenticating an online service site in an authentication system includes: receiving, by the authentication server, from the service server, a...
2018/0270222 UNIFIED MOBILE SECURITY SYSTEM AND METHOD OF OPERATION
A mobile secure agent on a wireless device executes one or more authenticated data collection profiles provisioned by a private profile producer. Each data...
2018/0270221 AGGREGATOR TECHNOLOGY WITHOUT USERNAMES AND PASSWORDS
Techniques are described in which to access a user's web applications, the user registers and signs on to an aggregator system using any supported login...
2018/0270220 Medical Environment Single Sign-On System
A medical facility environment includes medical devices, single-sign on system devices, and an identity access management system (IAMS). A clinician logs into...
2018/0270219 SYSTEM AND METHOD FOR CENTRALIZED AUTHENTICATION AND AUTHORIZATION FOR CLOUD PLATFORM WITH MULTIPLE DEPLOYMENTS
Techniques described herein may be used to centralize authentication and authorization for accessing cloud services provided by different cloud platform...
2018/0270218 ALGORITHM HARDENING IN BACKGROUND CONTEXT AND EXTERNAL FROM THE BROWSER TO PREVENT MALICIOUS INTERVENTION WITH...
A disclosed example to batch replace credentials for multiple websites includes accessing mappings between first encrypted credentials and corresponding ones...
2018/0270217 MESSAGE RIGHT MANAGEMENT METHOD, DEVICE AND STORAGE MEDIUM
A message right management method, and a device and storage medium for implementing the method, are provided. The message right management method includes...
2018/0270216 ELECTRONIC DEVICE SYSTEM, COMMUNICATION METHOD AND RECORDING MEDIUM
An electronic device system includes a terminal device and an electronic device. The terminal device includes a memory and a sender. The memory stores user...
2018/0270215 PERSONAL ASSURANCE MESSAGE OVER SMS AND EMAIL TO PREVENT PHISHING ATTACKS
A method includes, in response to receiving a request to authenticate a user, and retrieving a predefined security message created by the user and an...
2018/0270214 METHOD AND APPARATUS FOR MAKING A DECISION ON A CARD
Method and devices for making access decisions in a secure access network are provided. The access decisions are made by one or more portable credentials using...
2018/0270213 AUTHENTICATION APPARATUS, AUTHENTICATION METHOD, AND NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM
An authentication apparatus according to the present application includes an acquiring unit, a first specifying unit, a second specifying unit, and an...
2018/0270212 CONTROL APPARATUS, IMAGE FORMING APPARATUS, AND NON-TRANSITORY COMPUTER READABLE MEDIUM
A control apparatus includes a storage unit, a reception unit, and a restriction unit. The storage unit stores, for each of categories of processes classified...
2018/0270211 EXTENSIBLE KEY MANAGEMENT SYSTEM FOR APPLICATION PROGRAM INTERFACES
An extensible key management system includes a developer services portal for accessing an application. The system may identify initiation via the developer...
2018/0270210 KEY DISTRIBUTION METHOD, KEY RECEIVING METHOD, FIRST KEY MANAGEMENT SYSTEM, AND FIRST NETWORK ELEMENT
An embodiment method includes: obtaining, by a first key management system, a shared key of a first network element, where the shared key of the first network...
2018/0270209 COORDINATED PACKET DELIVERY OF ENCRYPTED SESSION
Various communication systems may benefit from appropriate handling of secure data. More specifically, certain packet-based communication systems may benefit...
2018/0270208 IMAGE PROCESSING APPARATUS AND IMAGE PROCESSING METHOD
The present disclosure relates to an image processing apparatus and an image processing method which enable reproduction of content data to be more reliably...
2018/0270207 METHOD FOR TRANSMITTING INFORMATION FROM A FIRST INFORMATION PROVIDER TO A SECOND INFORMATION PROVIDER VIA AN...
Various method for transmitting information from a first information provider to a second information provider via an information intermediary are disclosed....
2018/0270206 CONTENT MANAGEMENT SYSTEM
Disclosed is a content management system comprising: a server; a content database, configured within the server, within which are stored one or more channels,...
2018/0270205 FINGERPRINT-SENSING INTEGRATED CIRCUIT AND SCRAMBLING ENCRYPTION METHOD THEREOF
A fingerprint-sensing integrated circuit encrypts fingerprint image data before transmitting the fingerprint image data to a remote system host through a Tx/Rx...
2018/0270204 SYSTEM AND METHOD FOR ROUTING-BASED INTERNET SECURITY
Method and system for improving the security of storing digital data in a memory or its delivery as a message over the Internet from a sender to a receiver...
2018/0270203 CONTAINER DEPLOYMENT FOR A NETWORK
A device can determine that a container is deployed in a front-end of a private network. The container can include a self-contained execution environment. The...
2018/0270202 DYNAMIC FIREWALL CONFIGURATION BASED ON PROXY CONTAINER DEPLOYMENT
A first container of a first device can receive information that identifies a configuration of a first interface and a second interface of a second container...
2018/0270201 Clientless connection setup for cloud-based virtual private access systems and methods
Virtual private access systems and methods implemented in a clientless manner on a user device include receiving a request to access resources from a Web...
2018/0270200 Active Inventory Discovery for Network Security
Systems, devices, and techniques described herein are directed to active inventory discovery for network security. For example, a firewall can apply security...
2018/0270199 METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR ADVERTISING NETWORK SECURITY CAPABILITIES
Methods, systems, and computer readable media for advertising network security capabilities are disclosed. According to one method, the method occurs at a...
2018/0270198 Enhanced Firewall and Method for Securing Internet Communications
A system and method are described for securing a network-connected device from a hacker having access to a network to which the network-connected device is...
2018/0270197 INTRUSION PREVENTION
A given packet of the packetized data flow of packets is received. The given packet (145) is selectively discarded depending on at least one of the flow...
2018/0270196 Communications Bus Signal Fingerprinting
Methods are provided herein for communications bus signal fingerprinting. A security module monitors a plurality of voltage lines of at least one electronic...
2018/0270195 Electronic Control Unit Protection Framework Using Security Zones
Systems are provided herein for a hardware protection framework. A security module monitors a plurality of voltage lines of at least one electronic control...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.