Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0278623 MESSAGE VERIFICATION
According to an example aspect of the present invention, there is provided an apparatus comprising at least one processing core configured to obtain, from a...
2018/0278622 Method and Device for Examining Message Integrity Check
The method includes: an M-UE home domain ProSe function entity receives a monitoring authentication request response message sent by an A-UE home domain ProSe...
2018/0278621 SECURING SERVICES AND INTRA-SERVICE COMMUNICATIONS
A security service enables service providers to register available services. Prospective service consumers may register with the security service to access a...
2018/0278620 SEGREGATION OF PROTECTED RESOURCES FROM NETWORK FRONTEND
A method of performing operations involving accessing a set of protected computing resources of a computing device includes (a) receiving, by a frontend...
2018/0278619 SYSTEMS AND METHODS FOR USER SPECIFIC DATA TRANSMISSION WITH IMPROVED DATA PROTECTION
In systems and computer-implemented methods for personal data transmission from a source computing device to a target computing device with improved data...
2018/0278618 METHODS AND SYSTEMS FOR ESTABLISHING COMMUNICATION WITH USERS BASED ON BIOMETRIC DATA
Methods and systems are disclosed herein for establishing communication with users based on biometric data. For example, in response to determining that a user...
2018/0278617 PREVENTING UNAUTHORIZED OUTGOING COMMUNICATIONS
A system, product and method for preventing unauthorized outgoing communications. The method comprises, in response to an attempt to transmit an outgoing...
2018/0278616 IN-VEHICLE COMMUNICATION SYSTEM, COMMUNICATION MANAGEMENT DEVICE, AND VEHICLE CONTROL DEVICE
An in-vehicle communication system includes vehicle control devices and a communication management device connected to a network. The communication management...
2018/0278615 Cross Access Login Controller
Systems and methods here may be used for authorizing network access including using by a server computer with a processor and memory, for receiving, through...
2018/0278614 Access control of administrative operations within an application
A technique to implement access control from within an application begins by dynamically-generating a "management scope" for a transaction associated with a...
2018/0278613 SELF-DESTRUCTING SMART DATA CONTAINER
According to an embodiment of the present disclosure, a method is disclosed comprising receiving a request to access protected data stored in a smart data...
2018/0278612 TECHNIQUES FOR IMPLEMENTING A DATA STORAGE DEVICE AS A SECURITY DEVICE FOR MANAGING ACCESS TO RESOURCES
Techniques are disclosed for implementation of a data storage device as a security device for managing access to resources. These techniques can be implemented...
2018/0278611 SYSTEM AND METHOD FOR SECURING AN INTER-PROCESS COMMUNICATION VIA A NAMED PIPE
An information handling system operating a local inter-process communication securing system may comprise a memory and a processor executing machine readable...
2018/0278610 Optimizing Data Replication Across Multiple Data Centers
Aspects of the disclosure relate to optimizing data replication across multiple data centers. A computing platform may receive, from an authentication hub...
2018/0278609 INFORMATION PROCESSING APPARATUS AND INFORMATION PROCESSING METHOD
An information processing apparatus includes a memory and a processor coupled to the memory and configured to: store personal identification information...
2018/0278608 TERMINAL MANAGEMENT APPARATUS, TERMINAL MANAGEMENT SYSTEM, AND NON-TRANSITORY COMPUTER READABLE MEDIUM
A terminal management apparatus includes a connection unit that connects, through a network, to a terminal apparatus to be managed, an authentication unit that...
2018/0278607 Device Credentials Management
A technology is described for resolving device credentials for a device. An example method may include receiving device credentials for management by a service...
2018/0278606 BIOMETRIC AUTHENTICATION OF INDIVIDUALS UTILIZING CHARACTERISTICS OF BONE AND BLOOD VESSEL STRUCTURES
Biometric authentication of a subject utilizing bone and/or blood vessel (vein or artery) structures is provided. A vertice profile is generated from a...
2018/0278605 PRIVACY CONTROLS FOR SENSITIVE DISCUSSIONS
Privacy controls may be implemented using a configurable system of risk categorization for resources, physical security, sensitivity of discussion topics,...
2018/0278604 METHODS AND APPARATUS FOR ESTABLISHING A SECURE COMMUNICATION CHANNEL
A method for establishing a secure communication channel between an off-card entity and an embedded Universal Integrated Circuit Card (eUICC) is provided. The...
2018/0278603 CONTROL METHOD FOR AUTHENTICATION/AUTHORIZATION SERVER, RESOURCE SERVER, AND AUTHENTICATION/AUTHORIZATION SYSTEM
A server is provided that, according to an access token issuance request from a client, issues a first access token to be verified by a resource server, or a...
2018/0278602 DESKTOP APPLICATION FULFILLMENT PLATFORM WITH MULTIPLE AUTHENTICATION MECHANISMS
A service provider system may include an application fulfillment platform that delivers desktop applications to desktops on physical computing devices or...
2018/0278601 USING TEMPORARY CREDENTIALS IN GUEST MODE
A method may receive, over a network and at a host's media player that is logged in to a host's media account, a play request from a guest's device. The play...
2018/0278600 MULTI-FACTOR MASKED ACCESS CONTROL SYSTEM
A multi-factor authentication system supports a variety of password entry mechanisms (e.g., alphanumeric, visual, voice, etc.) that can be used to authenticate...
2018/0278599 USING AN IP MULTIMEDIA SUBSYSTEM FOR HTTP SESSION AUTHENTICATION
Disclosed is a method and system for utilizing an Internet Protocol Multimedia Subsystem (IMS) to authenticate an HTTP session between a communication device...
2018/0278598 SECURE DOMAIN NAME SYSTEM
A method and system for authenticating answers to Domain Name System (DNS) queries originating from recursive DNS servers provided. A verification component...
2018/0278597 DOWNLOADABLE SECURITY AND PROTECTION METHODS AND APPARATUS
Methods and apparatus for control of data and content protection mechanisms across a network using a download delivery paradigm. In one embodiment, conditional...
2018/0278596 Distributed Key Secret For Rewritable Blockchain
A system includes circuitry for rewriting blockchains in a non-tamper-evident or tamper-evident operation using a key secret held in portions by multiple...
2018/0278595 KEY CONFIGURATION METHOD, KEY MANAGEMENT CENTER, AND NETWORK ELEMENT
This application provides a key configuration method and an apparatus. A key management center obtains a service key, and performs encryption and/or integrity...
2018/0278594 DISTRIBUTED AUTHENTICATION
Examples associated with distributed authentication are described. One example includes generating a paired public key and private key associated with a user....
2018/0278593 SYSTEMS AND METHODS FOR REDUCING CYBER SECURITY INCIDENTS WITH INTELLIGENT PASSWORD MANAGEMENT
Systems and methods for reducing cyber security incidents in video surveillance and security systems with intelligent password management are provided. Some...
2018/0278592 METHOD AND DEVICE FOR GENERATING ACCESS STRATUM KEY IN COMMUNICATIONS SYSTEM
In the communications system, a user equipment UE accesses a core network via a first network-side device by using a first air interface and connects to the...
2018/0278591 SYSTEMS AND METHODS FOR PROTECTING COMMUNICATIONS BETWEEN NODES
Systems and methods for protecting communications between at least two nodes protect the identity of a node requesting information, provide content of...
2018/0278590 SECURITY SELF-AWARE SPECTROMETER
A security self-aware system for multi-bus spectrometers that ensures that only one `open` or non-encrypted connection can be established, and that all other...
2018/0278589 Sending a Cryptogram to a POS While Disconnected From a Network
A system is configured for detecting a point of sale, receiving a personal identification number (PIN), generating a PIN based key using a message digest of...
2018/0278588 HARDWARE-ACCELERATED SECURE COMMUNICATION MANAGEMENT
Computing systems, devices, and associated methods of managing secure communication using hardware accelerators are disclosed herein. In one embodiment, a...
2018/0278587 SYSTEM AND METHOD FOR CONTROLLING FEATURES ON A DEVICE
Trust between entities participating in an upgrade or enablement/disablement process is established and, to facilitate this remotely and securely, a highly...
2018/0278586 KEYED HASH CONTACT TABLE
In an example, a method includes receiving a data package, the data package including a contact identification and a message payload; in response to...
2018/0278585 SYSTEM AND METHOD FOR CHAT MESSAGING IN A ZERO-KNOWLEDGE VAULT ARCHITECTURE
A system and/or method includes facilitating secured chat messaging. An application module can derive a master password-based encryption key from a master...
2018/0278584 Authenticating Access Configuration for Application Programming Interfaces
A system is configured to authorize client access to an application programming interface (API) of a host device. A proxy is configured to handle network...
2018/0278583 HARDWARE-ACCELERATED PAYLOAD FILTERING IN SECURE COMMUNICATION
Computing systems, devices, and associated methods of managing secure communication using hardware accelerators are disclosed herein. In one embodiment, a...
2018/0278582 DIGITAL MEDIA CONTENT DISTRIBUTION BLOCKING
A method and system for improving a digital media content transfer blocking process is provided. The method includes detecting a request for access to digital...
2018/0278581 Wireless Internet Product System
Low resource internet devices such as consumer electronics products connect to web service by means of a proxy method where the connected device does not need...
2018/0278580 DYNAMIC BYPASS OF TLS CONNECTIONS MATCHING EXCLUSION LIST IN DPI-SSL IN A NAT DEPLOYMENT
The present invention provides the initiation of a transport layer security (TLS) session between a client device and a server using a firewall without...
2018/0278579 METHOD AND SYSTEM FOR IMPLEMENTING A CLUSTER-WIDE COMMUNICATION OVER A SINGLE PORT
A method and a system for implanting a handshake between a source cluster having files replicated to a destination cluster, the system comprising: a source...
2018/0278578 SYSTEM AND METHOD TO PROVIDE DUAL MULTICAST LID ALLOCATION PER MULTICAST GROUP TO FACILITATE BOTH FULL AND...
Systems and methods for providing dual multicast local identifiers (MLIDs) per multicast group to facilitate both full and limited partition members in a high...
2018/0278577 HIGH AVAILABILITY BRIDGING BETWEEN LAYER 2 NETWORKS
The technology disclosed herein enables high availability bridging between Layer 2 (L2) networks. In a particular embodiment, a method includes high...
2018/0278576 COMMUNICATION APPARATUS AND RECORDING MEDIUM
A communication apparatus includes: a transmitting unit that is capable of transmitting data to a designated destination through any of plural communication...
2018/0278575 PERSISTENT WWN-FCID ASSIGNMENT SYSTEM
A persistent WWN-FCID assignment system includes a Fibre Channel (FC) networking device and a server device that sets a persistent WWN-FCID bit in a second...
2018/0278574 DEVICE AND METHOD FOR FORWARDING CONNECTIONS
A method for forwarding a connection at an interconnecting device is described. The method includes receiving from an originating device an incoming connection...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.