At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Enterprise platform verification
Systems and methods for enterprise platform verification are provided. In some aspects, a computing device includes a trusted platform module (TPM). The TPM...
Managing secure connections at a proxy server
A content distribution network includes a proxy server in communication with one or more content distribution servers. The proxy server services connections to...
Multiple access authentication
Apparatus, systems, and methods may operate to receive, at a generating identity provider (IDP), original user credentials sufficient to authenticate a user...
Providing authentication using previously-validated authentication
Embodiments of the invention are directed to systems, methods and computer program products for providing authentication using previously-validated...
User authentication based on self-selected preferences
Embodiments of the invention are directed to a system, method, and a computer program product for a user authentication based on self-selected preferences. The...
Computer-implemented method for improving a social network site computer
network, and terminal, system and...
A method, at a terminal in a digital communications network, comprising: establishing direct or indirect communication access and linkage between the...
System and method for verifying user supplied items asserted about the
A system and method validates user supplied photographs and/or characteristics using a video, audio or series of images of the user responding to instructions.
Integration of centralized and local authorizations for multi-dimensional
The present disclosure describes methods, systems, and computer program products for integrating authorizations. One computer-implemented method includes:...
Multi-tenant application using hierarchical bean factory container
Various embodiments provide on premise and cloud deployment support for components that may not be multi-tenant enabled. A single application in a highly...
Authorization and authentication based on an individual's social network
In particular embodiments, a method includes receiving a request to transmit content related to a first user to a second user, determining whether transmission...
Methods, systems, and computer program products for providing media
Providing media management services includes creating an account record for a first user of the media management services, allocating a first storage space to...
A system includes a remote authentication dial in user service (RADIUS) server in communication with a network access server. The network access server provides...
Scored factor-based authentication
Concepts and technologies are disclosed herein for scored factor-based authentication. A verification service can receive an authentication request from a...
Authentication for network access related applications
In one embodiment a controller comprises logic to receive, via a near field communication link, an identification packet generated by a remote authentication...
Devices for providing secure remote access
A method for providing secure remote access by a controller is described. The method includes sending one or more endpoint requests. The method also includes...
Data search device, data search method, data search program, data
registration device, data registration...
A data search server stores a system ciphertext including a data ciphertext and a keyword ciphertext in each category-specific DB unit for each data category,...
Tunnel interface for securing traffic over a network
Methods and systems for a flexible, scalable hardware and software platform that allows a managed security service provider to easily provide security services...
Differential client-side encryption of information originating from a
A method may include allocating a number of public keys, where each respective public key is allocated to a respective entity of a number of entities; storing a...
For multi-node encryption, a method generates an upstream node nonce from communication data exchanged with an upstream node. In addition, the method generates...
Information operating device, information output device, and information
An information operating device has a first connection unit, a second connection unit, a machine operating command for operating the information output device...
Systems and methods for controlling email access
Embodiments of the disclosure relate to proxying at least one email resource in transit to at least one client device from at least one email service, removing...
Automated control plane for limited user destruction
To avoid user error and breaking operations, administration and management (OAM), the control plane for implementing OAM is automatically generated by network...
Hardware implementation of complex firewalls using chaining technique
A firewall device may include a forwarding component that includes a filter block. The filter block may obtain a first hardware-implemented filter, where a...
System and method for secure communication between domains
A system and method of executing secure communications between first and second domains includes a first logical unit and a second logical unit. The first...
System and method for providing network and computer firewall protection
with dynamic address isolation to a device
A computer performs dynamic address isolation. The computer comprises an application associated with an application address, a network interface coupled to...
Firewall policy converter
Methods, computer-readable media, systems and apparatuses for firewall policy system are described. The firewall policy system may include a unified format...
Security processing in active security devices
Methods, systems, and apparatus, including computer program products, featuring receiving at a first security device a packet. The first security device...
Method, device, and system for notifying mobile stations participating in
a non-LLE call of new LLE call
A method of interoperating link layer encrypted (LLE) and non-LLE communications in a radio network include receiving, at a radio controller (RC), a new call...
Methods and systems for dynamically switching between communications
A method for dynamically switching between communications protocols used in communicating with each of a plurality of physical computing devices includes...
Communication network with distributed network address translation
In one embodiment, a first network device is configured for communication with at least a second network device, and implements a gateway. The gateway may...
IP address distribution system and IP address distribution method
An IP address distribution system includes a network containing a plurality of switch apparatuses, IP address distribution apparatuses that assign an IP address...
Request routing processing
Generally described, the present disclosure is directed to managing request routing functionality corresponding to resource requests for one or more resources...
Methods of detecting and assigning IP addresses to devices with ARP
A method of discovering and assigning an IP address to a device to be discovered in a communication network having multiple interconnected nodes includes...
Automatic delivery channel determination for notifications
A system and method for delivering a message to one or more users from a sender disclosed. The channel application includes a habit engine, a context engine and...
System and method for enabling identification of network users having
similar interests and facilitating...
A system and method is provided for enabling identification of network users having similar interests and for facilitating communication between them. An...
System and method of posting coded messages on social networks
The present invention relates generally to a system and method of posting coded messages using a software application program comprising computer executable...
Suggesting opt-out of notifications to users of a social networking system
A social networking system notifies its users of different events and actions taking place inside the social networking system. To present notifications that...
Method, apparatus, and computer program product for reducing session
related message size
An apparatus for reducing session related message size includes a processing element. The processing element may be configured to determine a domain-wide unique...
Symbolic variables within email addresses
Embodiments of the disclosure relate to processing email having symbolic variables in the address. Aspects include receiving, by an email server, an email...
Enhanced buddy list interface
A graphical user interface between a user of a computer service and the computer service includes a list of other users of the computer service selected by the...
Typing indicator for IMAP messaging
A message server may establish an internet message access protocol ("IMAP") IDLE session with a first client device. The IMAP IDLE session may be used to...
Method and apparatus for storing email messages
A method for saving an email to an electronic storage location is disclosed. A topic identifier located in the email is used to locate a storage location on the...
Indicating in an electronic message whether a user has previously accessed
content provided by a resource
Arrangements described herein relate to indicating in an electronic message whether a user has previously accessed content provided by a resource. An electronic...
System and method for controlling electronic communications
The approved email generation system described is capable of producing email communications between user and customer by using approved email templates and...
System and method for spam filtering using insignificant shingles
Disclosed system and methods for detecting spam using shingles. An example system identifies in a received message one or more insignificant text portions based...
Techniques for file classification information retention
Techniques for file classification information retention are disclosed. In one particular exemplary embodiment, the techniques may be realized as a method for...
Capturing and sending multimedia as electronic messages
One or more embodiments described herein include methods and systems of capturing and sending multimedia content items as electronic message. More specifically,...
Composing messages within a communication thread
One or more embodiments described herein include methods and systems of organizing a user interface of a communication system. More specifically, systems and...
Including a plurality of users in a conversation over a communication
Methods and devices are disclosed for including a plurality of users in a conversation over a communication network. A conversation is initiated when a text...
Communication system and method
A method for communicating between an operator at an operator device and a user recipient includes enabling an operator of the operator device to enter a...