At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Secure randomized input
A user inserts a received random sequence into the user's password or PIN. The user enters and transmits this randomized password to a service provider. The...
Establishing a secure channel with a human user
A method of establishing a secure channel between a human user and a computer application is described. A secret unique identifier ("PIN") is shared between a...
Mechanisms to use network session identifiers for software-as-a-service
Techniques are provided for authenticating a subject of a client device to access a software-as-a-service (SaaS) server. A network access device receives a...
Enabling digital signatures in mobile apps
A computer implemented method and apparatus for provisioning certificates for use in applying digital signatures to electronic content are described. A method...
A security system includes an interface, a main computer, and an application server. The interface enables a user to access a remote document related to a...
Apparatus and method for providing location based security for
communication with a remote device
A method for providing location based security for communication between a remote device and a mobile device having a global positioning system receiver for...
Systems, methods, and computer readable media for single sign-on (SSO)
using optical codes
Automated systems, methods, and computer readable media for single sign-on (SSO) to a plurality of websites using optical codes. A login server communicates...
Verification that a user attempting to access content is a human user
An easier and less frustrating way of verifying that a user attempting to access content is a human user is provided. For example, data indicative of a request...
Operation of mobile device as trusted mobile web client or trusted mobile
A method of operating a mobile device comprises executing a trusted service application in a trusted operating system through secure access, executing a trusted...
Different authentication profiles
A mobile device may include an authenticator and a processor. The authenticator may store one or more profiles associated with one or more keys to access one or...
Differentiating between good and bad content in a user-provided content
A system differentiates good content from bad content in a user-provided content system. Messages are analyzed for features that characterize messages. A...
Automated discovery of knowledge-based authentication components
Methods, apparatus and articles of manufacture for automated discovery of knowledge-based authentication components are provided herein. A method includes...
Identification delegation for devices
A first communication session is conducted between a media device and a mobile device. The first communication session includes requesting an authorization code...
System and method for end-to-end encryption and security indication at an
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for implementing real-time transport control protocol to obtain an...
System and method to use a cloud-based platform supported by an API to
authenticate remote users and to provide...
A security system for authenticating users and protecting content that provides an application program interface (API) with a Cloud Platform integration...
Enhancing privacy by obscuring traversal using relays around network
address translator (TURN) connections, and...
Enhancing privacy by obscuring Traversal Using Relays around Network Address Translator (TURN) connections, and related methods, systems, and computer-readable...
Content-based association of device to user
Example methods and systems for content-based association of a device to a user are presented. In an example method, data corresponding to each of a plurality...
Authorization of joining of transformation chain instances
The authorizing of transformation chain instances of different transformation chain classes to join so as to act as a compound transformation chain instance....
Method for load-balancing IPsec traffic
Systems, methods and apparatus for distributing IPsec traffic across multiple IPsec processing units (PUs) by controllably allocating a specific range of one or...
Serving gateway policy enforcement
Examples disclosed herein provide systems, methods, and software for managing service modification requests in a serving gateway. In one example, a method of...
Applying a packet routing policy to an application session
A security gateway includes packet routing policies, each including a host network address, an application network address, and a forwarding interface. In...
System and method for redirected firewall discovery in a network
A method is provided in one example embodiment that includes receiving metadata from a host over a metadata channel. The metadata may be correlated with a...
Method and system for causing a client device to renew a dynamic IP
A method includes terminating a connection between (a) a wireless network supported by a network device and (b) a client device. The method further includes...
Messaging system having multiple number, dual mode phone support
A social messaging hub provides communication services for a data enabled device having Internet network access capabilities. The social messaging hub...
Logical L3 routing with DHCP
For a network controller for managing a set of hosts, a method for configuring a host to provide a Dynamic Host Configuration Protocol (DHCP) service is...
Organizing messages in a messaging system using social network information
A messaging system receives a message that is intended for a recipient, who is a user of a social networking system. An object associated with the message is...
Event invitations having cinemagraphs
A system and method for sending a message with a graphical theme that includes a cinemagraph to a member of a social network system are described. In one...
Dynamically managing social networking groups
Methods, apparatuses, and computer program products for dynamically managing social networking groups according to embodiments of the present invention are...
Structuring notifications of events to users in a social networking system
A social networking system identifies an event based on a thread including messages from users of the social networking system and communicates invitations to...
Determining message prominence
In general, the subject matter described in this specification can be embodied in methods, systems, and program products. A request that a server system deliver...
Scalable message fidelity
Message content is scaled to support rich messaging. Devices and associated messaging systems can support various levels of content richness or fidelity....
System and method for transmission of data
A system and method for data communication connecting on-line networks with on-line and off-line computers. The present system provides for broadcast of up to...
Transmission filtering processor architecture
A processor for filtering message traffic between communication systems may include an input buffer and an output buffer. The processor may also include a...
Systems and methods for a provider initialized real-time chat based on
detection of a pattern
In one example, a method provides at least one service to a web-enabled user by detecting a stalled web session related to the user accessing the at least one...
Automated announcement-and-bulletins system
The current application is related to communications and, in particular, to an announcement-and-bulletins system that allows for flexible and efficient...
Message transmission system and method for a structure of a plurality of
A message transmission system and method for a structure of a plurality of organizations are disclosed, where the system includes: a database, a server, a push...
Enabled and disabled menu choices based on presence state
A computer implemented method for intelligently enabling menu choices includes rendering, on a client system, an address book user interface comprising...
A computing device may receive first message data associated with a messaging group. The computing device may associate the first message data with a messaging...
Management of access to entry points on a communication device
A system and method for managing access to entry points in a graphical user interface on a communication device are provided. The entry points are associated...
Voice messaging interface
Systems and techniques for transferring electronic data include enabling instant messaging communication between a sender an at least one recipient through an...
Enhanced buddy list using mobile device identifiers
A graphical user interface on a display device of a computer enables communications using a computer service. The graphical user interface includes a list of...
Automatically generating email subject lines
Systems and methods for automatically generating e-mail subject lines are provided. A method for automatic generation of subject lines for electronic mail...
System and method for distributing meaningful clinical alerts
A messaging system (100) for routing clinical messages includes an event handler and a standardized protocol (105). The event handler (106) receives one or more...
Controlling shared memory
In view of the characteristics of distributed applications, the present invention proposes a technical solution for applying a shared memory on an NIC...
Techniques for scalable and foolproof virtual machine move handling with
virtual port channels
Techniques are provided for managing movements of virtual machines in a network. At a first switch, a virtual machine (VM) is detected. The VM is hosted by a...
Methods and apparatus related to a distributed switch fabric
A method of sending data to a switch fabric includes assigning a destination port of an output module to a data packet based on at least one field in a first...
MSDC scaling through on-demand path update
In one embodiment, a copy of an original packet of a traffic flow is created at an ingress leaf node of a cloud switch. The ingress leaf node forwards the...
Allocating cloud-hosted application resources using end-user metrics
At least one workflow comprising end-user interactions with an application implemented using provider network resources is identified by a resource allocation...
Streamlined system for the transmission of network resource data
A client system of a network resource service, the network resource service administering a plurality of distributed network resources, the client system...
Traffic scheduling device
The disclosure relates to a traffic scheduling device for scheduling a transmission sequence of data packets, stored in a plurality of traffic flow queues, an...