Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0332047 SYSTEM AND METHODS FOR ACHIEVING END-TO-END SECURITY FOR HOP-BY-HOP SERVICES
An IoT E2E Service Layer Security Management system supports methods/procedures to allow an application to establish, use, and teardown an IoT SL communication...
2018/0332046 PERMISSION MANAGEMENT AND RESOURCE CONTROL
A server receives an association request initiated by a user of a first account. Based on the association request, an account identifier of a second account is...
2018/0332045 Method and device for MPLS intermediate node to perform multicast forwarding, and node thereof
Provided is a method for a Multiple Protocol Label Switching (MPLS) intermediate node to perform multicast forwarding, which includes that: a Provider (P) node...
2018/0332044 COMPUTER NETWORK CROSS-BOUNDARY PROTECTION
A computer security method including preventing access by a computer in a first computer network to a resource at a location within the first computer network...
2018/0332043 INTEGRATED HOSTED DIRECTORY
Methods, systems, and devices for enterprise-wide management of disparate devices, applications, and users are described, A cloud-based central server may...
2018/0332042 SECURELY AUTHENTICATING A BOT USER
Systems and methods are provided that securely authenticate a user of a web application. For example, the user may utilize a bot from within a first...
2018/0332041 NETWORK CONNECTION METHOD, APPARATUS, STORAGE MEDIUM AND TERMINAL
A method for providing network connection to a smart device via a social networking application that is operating on a computing device different from the...
2018/0332040 METHOD OF LOGIN CONTROL
A method of login control is to be implemented by an authentication server terminal. The method includes steps of: after receiving a request for connection...
2018/0332039 DEVICE AUTHENTICATION WITH MAC ADDRESS AND TIME PERIOD
In an approach to device authentication, one or more processors receive a security policy comprising at least a first media access control ("mac") address and...
2018/0332038 INTELLIGENT ELECTRONIC DEVICE HAVING IMAGE CAPTURE CAPABILITIES
An intelligent electronic device (IED) includes an image capture module configured for capturing images or video in a location of the IED. The IED may also...
2018/0332037 MOBILE USER INTERFACE SYSTEM AND METHODS THEREFOR
At least some embodiments are a method including connecting a mobile computer system to a vehicle computer system, wherein the vehicle computer system does not...
2018/0332036 SECURE AUTHENTICATION USING BIOMETRIC INPUT
A method is disclosed. The method includes receiving, by a computing device, one or more inputs caused by at least one left-eye wink by a user or at least one...
2018/0332035 MOBILE DEVICE WITH CONTINUOUS USER AUTHENTICATION
A method of operating a secure input/output system or a mobile device is provided. The method includes determining, from refresh rate analysis of facial...
2018/0332034 METHODS, SYSTEMS, AND MEDIA FOR AUTHENTICATING USERS USING BIOMETRIC SIGNATURES
Methods, systems, and media for authenticating users using biometric signatures are provided. In some embodiments, the method comprises: receiving, from a user...
2018/0332033 SECURITY SYSTEMS AND METHODS FOR CONTINUOUS AUTHORIZED ACCESS TO RESTRICTED ACCESS LOCATIONS
Systems and methods for authorized access to restricted access locations. A first and/or second device includes a secure storage storing security credentials...
2018/0332032 Preventing Unauthorized Access to Secured Information Systems Using Authentication Tokens and Multi-Device...
Aspects of the disclosure relate to preventing unauthorized access to secured information systems. A computing platform may receive, from an end user desktop...
2018/0332031 SERVER, CONTROL METHOD OF SERVER, AND STORAGE MEDIUM
The object of the present invention is to reduce the storage capacity necessary to save server certificates while enabling encrypted communication, such as SSL...
2018/0332030 METHODS FOR BLOCKING UNAUTHORIZED APPLICATIONS AND APPARATUSES USING THE SAME
The invention introduces a method for blocking unauthorized applications, at least containing: receiving an input parameter from an application; determining...
2018/0332029 METHOD AND SYSTEM FOR USER AUTHENTICATION
The present disclosure relates to a method for user authentication. In particular, the present disclosure relates to a computer implemented method for session...
2018/0332028 Method For Detecting Unauthorized Copies Of Digital Security Tokens
A method for operating a digital security token in a data network terminal (12) includes provisioning the digital security token in the data network terminal...
2018/0332026 PROTECTION FROM UNFAMILIAR LOGIN LOCATIONS
In one embodiment, a user authentication server may use geo-location tracking to determine whether to present an enhanced identity challenge. A communication...
2018/0332025 CACHED CREDENTIALS FOR OFFLINE DOMAIN JOIN AND LOGIN WITHOUT LOCAL ACCESS TO THE DOMAIN CONTROLLER
Techniques are described for performing an offline domain join and login on behalf of a computing device in order to enable the device to access corporate...
2018/0332024 Systems and Methods for Controlling a Local Application Through a Web Page
A system, computer-readable storage medium storing at least one program, and a computer-implemented method for controlling a local utility are disclosed. A...
2018/0332023 Two-Level Sequence Learning for Analyzing, Metering, Generating, and Cracking Passwords
Managing passwords is provided. A machine training process is performed using a set of existing passwords to train a machine learning component. Members of a...
2018/0332022 NON-REPEATABLE CHALLENGE-RESPONSE AUTHENTICATION
User data is aggregated across a plurality of electronic communication channels and domains. An online system initially authenticates a user for access to the...
2018/0332021 COMMUNICATION BETWEEN A COMMUNICATION DEVICE AND A NETWORK DEVICE
A communication device of a communication network receives, via a network, a challenge, generates a first Diffie Hellman, DH, parameter, a first verification...
2018/0332020 AUTHENTICATION APPARATUS, AUTHENTICATION SYSTEM, AUTHENTICATION METHOD AND STORAGE MEDIUM
The first authentication unit of an authentication apparatus decides whether first authentication data exists in a received message, and performs, if it is...
2018/0332019 PASSWORD-LESS AUTHENTICATION SYSTEM AND METHOD
A processor-implemented method for authenticating a login without a password. The method includes: receiving a request to authenticate a login, the request...
2018/0332018 SYSTEMS AND METHODS FOR CREDENTIALING OF NON-LOCAL REQUESTORS IN DECOUPLED SYSTEMS UTILIZING A DOMAIN LOCAL...
Embodiments as disclosed provide systems and methods that use a local authenticator within a domain to provide a credential to access a resource of the domain...
2018/0332017 AUTHENTICATING A DEVICE BASED ON COMMUNICATION PATTERNS IN A GROUP OF DEVICES
Provided are techniques for authenticating a device. Accepted communication patterns representing accepted modes of communication between devices in an...
2018/0332016 TOKEN AND DEVICE LOCATION-BASED AUTOMATIC CLIENT DEVICE AUTHENTICATION
A network device receives credentials of a user of a client device, and receives an enrollment request from the client device, wherein the enrollment request...
2018/0332015 METHOD FOR KEY ROTATION
A method for key rotation includes initiating key rotation for a user account of a multi-factor authentication platform enabling one-time password...
2018/0332014 SYSTEM AND METHOD TO ENABLE PKI- AND PMI-BASED DISTRIBUTED LOCKING OF CONTENT AND DISTRIBUTED UNLOCKING OF...
A central server configured with an Attribute Authority ("AA") acting as a Trusted Third Party mediating service provider and using X.509-compatible PKI and...
2018/0332013 DYNAMIC OBJECT PASSWORDS
A construction of a dynamic object password (DOP) is initiated by selecting an object from a set of objects in a step of the construction. A transformation is...
2018/0332012 POST-COMPILATION CONFIGURATION MANAGEMENT
Disclosed aspects relate to post-compilation configuration management in a stream computing environment to process a stream of tuples. An escalation request...
2018/0332011 SECURE CRYPTLET TUNNEL
The disclosed technology is generally directed to secure transactions. In one example of the technology, a secure encrypted communication tunnel between the...
2018/0332010 NETWORK SECURITY DEVICES AND METHOD
A data communication encrypted system including a first module coupled to a first network member and a second module coupled to a second network member. The...
2018/0332009 Multimodal Cryptographic Data Communications in a Remote Patient Monitoring Environment
A system provides cryptographic means for securing the transmission of health data from devices of varying processing power and over various network protocols....
2018/0332008 SYSTEMS AND METHODS FOR REGIONAL DATA STORAGE AND DATA ANONYMIZATION
Systems and methods for data localization and anonymization are provided herein. In some embodiments, systems and methods for data localization and...
2018/0332007 System and Method for Data and Communications Security
A system and method is provided for secure data and communications. The system including a processor, a data storage device and a first component configured to...
2018/0332006 APPLICATION ATTACHMENT BASED FIREWALL MANAGEMENT
Described herein are systems, methods, and software to enhance network traffic management for virtual machines. In one implementation, a network policy...
2018/0332005 INTEGRATING A HONEY NETWORK WITH A TARGET NETWORK TO COUNTER IP AND PEER-CHECKING EVASION TECHNIQUES
Techniques for integrating a honey network with a target network environment (e.g., an enterprise network) to counter IP and peer-checking evasion techniques...
2018/0332004 Camera and instrument double firewall apparatus and method of operation
A cyber firewall for electronic instruments e.g. cameras isolates embedded controllers from hacking and hijacking. Positioned between a public wide area...
2018/0332003 CERTIFICATE PINNING BY A TUNNEL ENDPOINT
Disclosed are various approaches for implementing certificate pinning in a tunnel client on a client device. A tunnel client receives a connection request from...
2018/0332002 MANUFACTURING LINE COMPUTER SYSTEM AND NETWORK SETUP METHOD OF THE SAME
Disclosed herein is a manufacturing line computer system including: first and second computers. The first computer includes a storage section adapted to store...
2018/0332001 FEDERATED VIRTUAL DATACENTER APPARATUS
Examples of federated virtual datacenter apparatus are described. In an example, at least two virtual datacenter instances are provided in respective different...
2018/0332000 INFORMATION PROCESSING APPARATUS AND ROUTE CONTROLLING METHOD
An information processing apparatus includes a memory and one processor configured to allocate a virtual Internet Protocol address to an application, transmit...
2018/0331999 DIRECT TRANSMISSION OF DATA BETWEEN APPLICATIONS IN A MULTI-TENANT ENVIRONMENT
Overhead of sending data from one application to another by doing input and output processing can be costly. The present invention provides a method of...
2018/0331998 CONTROL APPARATUS, COMMUNICATION SYSTEM, COMMUNICATION METHOD, AND PROGRAM
A control apparatus includes: a first control information setting unit configured to set first control information for forwarding packets between predetermined...
2018/0331997 302 JUMPING METHOD, URL GENERATING METHOD AND SYSTEM, AND DOMAIN-NAME RESOLVING METHOD AND SYSTEM
The present disclosure provides a jumping URL generating method, a jumping URL system, and a jumping server; a resolving method and a system for resolving a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.