Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0288067 System and Method for Automatically Providing Proximity Based Guest Access to a Network of Resource Devices
A method for providing guest access to a guest user for a network resource device based on proximity includes provisioning a plurality of network resource...
2018/0288066 METHOD FOR IDENTIFYING UNAUTHORIZED ACCESS OF AN ACCOUNT OF AN ONLINE SERVICE
The present disclosure relates to a method for identifying unauthorized access of an account of an online service, such as an email or a social network...
2018/0288065 SYSTEM AND METHOD FOR SECURE ACCESS CONTROL
Disclosed is a system and method for providing secure access control to an electronic network or device. By limiting the ability of a single administrator to...
2018/0288064 ANALYSIS AND SELECTION OF INTERACTIVE CONTENT RESOURCES FOR EXECUTION
Techniques described herein relate to analyzing executions of content resources within networks of execution client devices, and selecting sets of interactive...
2018/0288063 MECHANISMS FOR ANOMALY DETECTION AND ACCESS MANAGEMENT
The present disclosure relates generally to threat detection, and more particularly, to techniques for managing user access to resources in an enterprise...
2018/0288062 IDENTIFICATION OF CERTIFICATE PINNED MOBILE APPLICATIONS IN CLOUD BASED SECURITY SYSTEMS
Systems and methods of identifying and processing certificate pinned applications through a cloud based security system include monitoring traffic associated...
2018/0288061 DYNAMICALLY CHANGING ACCESS RULES FOR CONTEXT-SENSITIVE ACCESS CONTROL
A system, method and computer program product obtains user data relating to a plurality of system users, who have previously been granted access to a resource...
2018/0288060 CONSOLIDATED MULTI-FACTOR RISK ANALYSIS
Provided is a process of authenticating a user, the process including: receiving an authentication request sent by a first computing device; receiving an...
2018/0288059 PROVIDING ACCESS TO REMOTE NETWORKS VIA EXTERNAL ENDPOINTS
Systems and methods for providing access to a remote network via an external endpoint are provided. A client establishes a secure connection between an...
2018/0288058 COMMUNICATION DEVICE, COMMUNICATION METHOD, AND COMMUNICATION SYSTEM
A communication device is connected to first and second networks. The communication device includes a processor executing a process including relaying...
2018/0288057 MULTI-PROTOCOL ACCESS CONTROL LISTS
Example implementations relate to multi-protocol access control lists. In an example, a multi-protocol access control list (ACL) is maintained in an extended...
2018/0288056 LEVERAGING A REGULATED NETWORK TO ENABLE DEVICE CONNECTIVITY IN A RESTRICTED ZONE
A component of an environment having available bandwidth for performing a task is located. Authorization to connect a device associated with the task to the...
2018/0288055 DEVICE FOR CONTROLLING POWER DISTIBUTION TO DISTRIBITION LINES
The present invention relates to a device for controlling power distribution to distribution lines in a distribution technology field. More particularly, the...
2018/0288054 ANTI-TAKEOVER SYSTEMS AND METHODS FOR NETWORK ATTACHED PERIPHERALS
Methods, systems, and devices are described for the prevention of network peripheral takeover activity. Peripheral devices may implement an anti-takeover...
2018/0288053 CONTROLLING ACCESSES TO NETWORKS BASED ON IT SYSTEMS HAVING EMBEDDED SYSTEMS OR DISTRIBUTED SYSTEMS
To improve the access control in regard to safety and protection of network operation and network data when controlling accesses to networks based on IT...
2018/0288052 TRUSTED REMOTE CONFIGURATION AND OPERATION
Techniques related to trusted remote configuration and operation using multiple devices are disclosed. The techniques include a machine-readable medium, on...
2018/0288051 ENHANCED DATA LEAKAGE DETECTION IN CLOUD SERVICES
Embodiments describing an approach to receiving user data, and monitoring a user data transaction. Monitoring a user data transaction. Identifying a plurality...
2018/0288050 SMART SECURITY STORAGE
Security functions for a memory corresponding to a smart security storage may be facilitated or executed through operation of utility application corresponding...
2018/0288049 DATA ACCESS INTERFACE FOR CLUSTERED DEVICES
A switching device is implemented in a network-attachable data transfer device to provide data storage access to other such devices. In some embodiments,...
2018/0288048 BULK DELIVERY OF CHANGE OF AUTHORIZATION DATA VIA AAA PROTOCOLS
In general, techniques are described for supporting bulk delivery of change of authorization data in authentication, authorization, and accounting (AAA)...
2018/0288047 SYSTEMS AND METHODS FOR AUTHENTICATING AN ONLINE USER USING A SECURE AUTHORIZATION SERVER
A secure authorization server computer system for verifying an identity of an end-user is provided. The computer system is programmed to receive, from a...
2018/0288046 Enhanced Authentication Method Using Dynamic Geographical Location Information
A system increases security for personal devices. An authenticating authority receives an authentication request from a personal device. The authenticating...
2018/0288045 CORRELATING MOBILE DEVICE AND APP USAGE WITH CLOUD SERVICE USAGE TO PROVIDE SECURITY
Techniques to provide secure access to a cloud service are disclosed. In various embodiments, enterprise mobility management (EMM) data associated with a set...
2018/0288044 METHOD AND SYSTEM FOR NETWORK SECURITY
One embodiment provides a method for facilitating network security, the method comprising: receiving, by a server from an application associated with a user, a...
2018/0288043 Internal Footprint Repository
Aspects of the disclosure relate to a system to monitor devices for unauthorized access of an external account. A computing platform may receive, via a...
2018/0288042 A BIOMETRIC FACE RECOGNITION BASED CONTINUOUS AUTHENTICATION AND AUTHORIZATION SYSTEM
A method and system for continuously authenticating a user working from a remote location is provided. The method includes providing user an interface to login...
2018/0288041 Seamless Authentication Device
According to one embodiment, an authentication system includes an authentication device. The authentication device includes a biometric scanner, a processor,...
2018/0288040 System and Method for Biometric Authentication-Based Electronic Notary Public
Systems and methods for biometric authentication-based electronic notary public are disclosed. A method for biometric authentication-based electronic notary...
2018/0288039 METHOD FOR OPERATING A FIELD DEVICE OF AUTOMATION TECHNOLOGY AND AN OPERATING UNIT FOR CARRYING OUT THE METHOD
The disclosure relates to a method for operating a field device of automation technology, comprising: establishing a wireless and/or wired communications link...
2018/0288038 SYSTEM FOR TRANSMITTING AUDIO AND/OR VIDEO DATA AND METHOD FOR GRANTING SECURED ACCESS
A system for transmitting audio and/or video data is described that comprises a functional unit configured to process the audio and/or video data and an error...
2018/0288037 IDENTITY AUTHENTICATION USING A BARCODE
In a method for identity authentication, a portable electronic device displays a barcode encoding verification information for verifying authorization of...
2018/0288036 METHODS AND APPARATUS FOR USE IN ENABLING A MOBILE COMMUNICATION DEVICE WITH A DIGITAL CERTIFICATE
A mobile communication device causes a communication session to be established with a host server of a communication network. The mobile device performs...
2018/0288034 TOKEN ARCHITECTURE FOR DETERMINING CONTENT ITEM VALUES
An online system provides content item values for content items to be displayed via publisher servers on client devices of users. For example, the content...
2018/0288033 SYSTEMS AND METHODS FOR PROVIDING DIGITAL IDENTITY RECORDS TO VERIFY IDENTITIES OF USERS
Systems and methods are provided for verifying identities of users. One exemplary method includes generating a unique identifier (ID) for a user, generating a...
2018/0288032 Account Take Over Prevention
A method for monitoring access of users to Internet SaaS applications includes the CISO (company Internet security office) in the configuration and operation...
2018/0288031 COLLECTION POINT ANCHORED MULTI-PROPERTY IDENTITY BASED APPLICATION SPECIFIC TOKEN ORIGINATION
A secure identity framework has been designed that leverages a host device as a data collection point for four properties of a digital identity profile...
2018/0288030 SECURE IDENTITY SHARING USING A WEARABLE DEVICE
Aspects of the embodiments include performing, by a personal computing device, a secure handshake with a secure server accessible through an identity provider...
2018/0288029 LIMITED USER AUTHENTICATION FOR CONTROLLING PERSONAL INFORMATION PRIVACY
The longstanding problem of providing efficient and rapid online user services while maintaining user privacy is addressed. Disclosed is a system and method...
2018/0288028 Methods and Systems for Providing Wake-On-Demand Access to Session Servers
A method for selectively providing, to a subset of authorized user accounts, wake-on-demand access to session servers during a period of scheduled...
2018/0288027 NETWORK ARCHITECTURE FOR CONTROLLING DATA SIGNALLING
A method and system are disclosed in a network for controlling data signalling therein. A core network includes at least a first node storing a contents...
2018/0288026 PASSWORD STATE MACHINE FOR ACCESSING PROTECTED RESOURCES
A user authentication technique that allows a user to access a protected resource such as an account on a web site or secure files on a computing device such...
2018/0288025 METHODS AND APPARATUSES FOR UTILIZING A GATEWAY INTEGRATION SERVER TO ENHANCE APPLICATION SECURITY
Embodiments are disclosed for managing interactions between a server application and an external environment while limiting an attack surface of the server...
2018/0288024 SECURE MANNER FOR SHARING CONFIDENTIAL INFORMATION
Sharing patient health information by performing at least the following: generating a temporal access key based on a detection of an event and one or more...
2018/0288023 SERVER-ASSISTED SECURE EXPONENTIATION
In one embodiment, a method for secure computation, includes receiving in a server, over a communication channel from a device external to the server a request...
2018/0288022 Method and System for Identity and Access Management for Blockchain Interoperability
A method of generating wallets for discrete blockchain networks comprising receiving a primary and a first secondary seeds, generating an enhanced hierarchical...
2018/0288021 Systems and Methods for Smartkey Information Management
A system and method are provided for the secure sharing of information across and open network and for performing management of keys used for encrypting and...
2018/0288020 DATA OPERATIONS USING A PROXY ENCRYPTION KEY
Operating upon encrypted data with a particular data scope. A base encryption key is established and associated with the particular data scope, and then stored...
2018/0288019 GENERATING A PASSWORD
User input is received from a user for identifying a particular account from among multiple accounts. A set of questions specific for the particular account is...
2018/0288018 EMAIL ATTACHMENT SECURITY SYSTEM AND METHOD USING OUT-OF-BAND AUTHENTICATION
The email attachment security system and method using out-of-band authentication allows a recipient to receive a secure digital file from a sender. The system...
2018/0288017 DELEGATING INTERMEDIATION ON AN EXCHANGE OF ENCRYPTED DATA
A method, a device and a program are provided for processing data. The method is implemented within an intermediary module. The data is transmitted between a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.