Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2019/0007427 DEVICE AND METHOD FOR DETECTING ATTACK IN NETWORK
An attack detection device includes: a receiver configured to receive messages that are periodically transmitted from a communication device in a network; and...
2019/0007426 DETECTION AND MITIGATION OF TIME-DELAY BASED NETWORK ATTACKS
Systems and methods for mitigation of time-delay based network attacks are provided. According to one embodiment, an email directed to a user of an enterprise...
2019/0007425 THREAT INTELLIGENCE SYSTEM
Systems and methods for providing a threat intelligence system include a system provider device that downloads, through communication over a network and from...
2019/0007424 User Behavior Profile in a Blockchain
A method, system and computer-usable medium are disclosed for generating a cyber behavior profile, comprising: monitoring user interactions between a user and...
2019/0007423 AUTOMATIC ELECTRONIC MAIL (EMAIL) ENCRYPTION BY EMAIL SERVERS
Systems and methods for automated email encryption between email servers are provided. According to one embodiment, an email, originated by a sender using a...
2019/0007422 ACCOUNT SHARING PREVENTION AND DETECTION IN ONLINE EDUCATION
An application delivers educational, entertainment or work-related content including videos and documents to any computing device of a user via an account,...
2019/0007421 EXTENDED OAUTH ARCHITECTURE SUPPORT IN A SCALABLE ENVIRONMENT
An approach is provided for sharing valid token(s) across application instances. If refresh token rotation is used, (i) a token request is received which...
2019/0007420 CREDENTIAL CHANGE MANAGEMENT SYSTEM
A credential change management platform may, from a time period T1 to T2: deny access by remote client devices that submit credentials other than the prior or...
2019/0007419 EXTENDED OAUTH ARCHITECTURE SUPPORT IN A SCALABLE ENVIRONMENT
An approach is provided for sharing valid token(s) across application instances. If refresh token rotation is used, (i) a token request is received which...
2019/0007418 SECURITY POLICY MONITORING SERVICE
Requests of a computing system may be monitored. A request associated with the application of a policy may be identified and a policy verification routine may...
2019/0007417 Method and System for Controlling Access for a User Equipment to a Local Device
The invention relates to a method for controlling access for a user equipment to at least one local device via an intermediary system that is configured to...
2019/0007416 MANAGING A FLEET OF DEVICES
Methods of managing a fleet of devices are provided, as are methods for configuring a standby device for a job in a workflow environment, and methods for...
2019/0007415 ACCESS CONTROL MANAGER
An access configuration for an access control manager is generated. Access data including users, resources, and actions the users performed on the resources is...
2019/0007414 Method of Discovering and Modeling Actor and Asset Relationships Across a Cloud Ecosystem
It can be difficult to manage assets, particularly when determining ownership of assets. Systems and methods for facilitating identification of ownership of an...
2019/0007413 ACCESS PERMISSIONS MANAGEMENT SYSTEM AND METHOD
An access permissions management system including a hierarchical access permissions repository including access permissions relating to data elements arranged...
2019/0007412 CUSTOMIZED DEVICE IDENTIFICATION
Techniques are disclosed relating to an identification computer system using script-based identification techniques to identify a remote computer system. The...
2019/0007411 CONTROLLING ACCESS TO ENTERPRISE SOFTWARE
A system for controlling access to enterprise software on a premised-based server or running as a cloud service for a plurality of end users that includes a...
2019/0007410 QUASI-AGENTLESS CLOUD RESOURCE MANAGEMENT
A system, computer readable medium, and method are provided for a resource management in a cloud architecture. The method includes the steps of collecting a...
2019/0007409 HYBRID AUTHENTICATION SYSTEMS AND METHODS
Disclosed are hybrid authentication systems and methods that enable users to seamlessly sign-on between cloud-based services and on-premises systems. A...
2019/0007408 SECURE PROVISIONING OF DEVICES FOR MANUFACTURING AND MAINTENANCE
Described herein are methods, apparatuses, and systems for secure provisioning of devices for manufacturing and maintenance. A method includes provisioning a...
2019/0007407 DEVICE AND METHOD FOR CONNECTING A PRODUCTION DEVICE TO A NETWORK
An apparatus for connecting a data-processing and/or data-generating production apparatus with a network includes a first network interface to be connected...
2019/0007406 Characteristics Of Security Associations
Authentication of a user or a wireless transmit/receive unit may be based on an obtained measure of authentication strength, which may referred to as an...
2019/0007405 ELECTRONIC DEVICE IDENTIFICATION
A tool for generating an identifier for an electronic device. The tool identifies a target memory segment. The tool accesses the target memory segment...
2019/0007404 INFORMATION PROCESSING APPARATUS, MANAGEMENT SERVER, SERVICE PROVISION SERVER, IMAGE PROCESSING APPARATUS, AND...
An information processing apparatus includes: an instruction unit configured to instruct an image processing apparatus to request a management server to issue...
2019/0007403 PPPOE PACKETS TRANSMITTING METHOD AND PPPOE SERVER THEREOF
The present disclosure provides a PPPoE packets transmitting method and a PPPoE server. The method comprises: registering, by a PPPoE server, a PPPoE protocol...
2019/0007402 SYSTEMS AND METHODS FOR PROVIDING BLOCK CHAIN-BASED MULTlFACTOR PERSONAL IDENTITY VERIFICATION
Block chain-based multifactor personal identity verification may be provided. Verification addresses may be established on a block chain by: associating...
2019/0007401 SYSTEMS AND METHODS FOR PROVIDING BLOCK CHAIN-BASED MULTlFACTOR PERSONAL IDENTITY VERIFICATION
Block chain-based multifactor personal identity verification may be provided. Verification addresses may be established on a block chain by: associating...
2019/0007400 METHOD FOR AUTHENTICATION VIA A COMBINATION OF BIOMETRIC PARAMETERS
The invention relates to a method for verifying the identity of a user who is carrying out a transaction, based on a combination of biometric parameters, in...
2019/0007399 SYSTEM AND METHOD OF INTER-ACCOUNT RESOURCE ACCESS MANAGEMENT
An improved method and system of enabling the owner of an account associated with a resource to allow a second user to gain access to the resource or a...
2019/0007398 SYSTEM AND METHOD FOR IMPLEMENTING HACKER TRAFFIC BARRIERS
Aspects of the present disclosure involve a system and method for implementing hacker traffic barriers. The current disclosure presents a system and method...
2019/0007397 PRESSURE-BASED AUTHENTICATION
In an approach to securing data using alternative value identification schemes, one or more computer processors receive user registration data, wherein the...
2019/0007396 METHOD AND ARRANGEMENT FOR AUTHORISING AN ACTION ON A SELF-SERVICE SYSTEM
A method for authorizing an action on a self-service system, in which a user is authorized, by using an authorization server, to carry out an action on a...
2019/0007395 ONE TIME PASSCODE
A one-time passcode authentication system includes an application server, an authentication server, and an access device, wherein the access includes an...
2019/0007394 CLOUD APPLICATION FINGERPRINT
In one example, a security application that interfaces one or more cloud application clients in an enterprise network and one or more cloud applications...
2019/0007393 VERIFIABLE RECORD STORAGE SERVICE
A record storage system maintains an interdependent series of hash values for records submitted to the record storage service by one or more clients. The...
2019/0007392 SINGLE SIGN-ON MECHANISM ON A RICH CLIENT
Methods and systems are provided that enable single sign-on (SSO) mechanisms on rich clients running hosting applications that include documents with one or...
2019/0007391 INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND RECORDING MEDIUM
An information processing apparatus includes a synchronization unit performing a process of time-of-day synchronization with a time-of-day synchronization...
2019/0007390 ENCRYPTION AND DECRYPTION TECHNIQUES USING SHUFFLE FUNCTION
Encryption and decryption techniques based on one or more transposition vectors. A secret key is used to generate vectors that describe permutation (or...
2019/0007389 GENERATING CODE FOR A MULTIMEDIA ITEM
A system, method, and computer-readable medium for challenge-response authentication are provided. A plurality of codes is received over a communication...
2019/0007388 APPARATUS AND METHOD FOR SECURE AUTHENTICATION OF A COMMUNICATION DEVICE
A system that incorporates the subject disclosure may perform, for example, receiving a baseline credential and an external credential, mapping the external...
2019/0007387 SECURE DETECTION AND MANAGEMENT OF COMPROMISED CREDENTIALS
Techniques are provided for secure detection and management of compromised credentials. A first candidate credential is received, comprising a first username...
2019/0007386 DISPLAYING VERIFICATION PASSWORD PROXIMATE EXPECTED SERVICE TIME
A method includes detecting a service reservation in a mobile device. The service reservation has an associated expected service time and a verification...
2019/0007385 SENDING VERIFICATION PASSWORD RESPONSIVE TO MOBILE DEVICE PROXIMITY
A method includes detecting proximity between a mobile device and a remote device associated with a transaction reserved by a user of the mobile device. A...
2019/0007384 TERMINAL AUTHENTICATION
Methods, systems, and computer program products for authenticating a terminal with a server based on multiple environmental factors. Each of the multiple...
2019/0007383 METHOD OF RECEIVING DATA WITHIN AN ELECTRONIC ENTITY AND ASSOCIATED ELECTRONIC ENTITY
A method for receiving data (DATASEND) within an electronic entity (2) includes the following steps: establishment, between the electronic entity (2) and an...
2019/0007382 SSH KEY VALIDATION IN A HYPER-CONVERGED COMPUTING ENVIRONMENT
Disclosed are various examples for validating a public SSH host key. The examples can be implemented in a hyper-converged computing environment to detect...
2019/0007381 SYSTEM AND METHOD FOR PROVIDING A SEARCH ENTITY-BASED PAYMENT PROCESS
Disclosed is a method including presenting an input field on a user interface of a generalized search entity, wherein the generalized search entity processes...
2019/0007380 DE-DUPLICATION OF DATA STREAMS
A data segment is encrypted to produce an encrypted data segment, and a data tag associated with the data segment is generated. The encrypted data segment is...
2019/0007378 SHIELDED NETWORKS FOR VIRTUAL MACHINES
Embodiments relate to a host encrypting network communications of virtual machines (VMs) in ways that minimize exposure of the network communications in...
2019/0007377 METHOD AND APPLICATION FOR COMMUNICATING SENSITIVE INFORMATION
Method and application for communicating sensitive information, incident reporting, and for acceleration of urgent situation responses and supervision allowing...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.