At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Single sign-on (SSO) for mobile applications
A framework, which conforms to the OAuth standard, involves a generic OAuth authorization server that can be used by multiple resource servers in order to...
Establishing and maintaining an improved single Sign-on (SSO) facility
A login page is sent, by a backend server system, to a browser executing on a client associated with a user; and an authentication process is performed by the...
Security token management service hosting in application server
Systems and methods for a security token management service hosted in an application server. A set of services and/or associated applications can be served from...
Non-transitory computer readable medium, server and system
A server may store one or more accounts. Each account may be associated with an authentication code and a total number of information devices that are allowed...
User-selectable security modes for interconnected devices
Systems, methods, and devices for forming networks of interconnected devices are provided. Individual devices of the network are configured to utilize multiple...
System integrating an identity selector and user-portable device and
method of use in a user-centric identity...
A combination includes a user-portable computing device, and an identity selector adapted for interoperable use with the user device. The user computing device...
Methods and apparatus for delegated authentication token retrieval
In some embodiments, a non-transitory processor-readable medium includes code to cause a processor to send, from an authorization client on a device to a client...
Participant authentication and authorization for joining a private
Concepts and technologies are described herein for a mechanism by which participants who have been invited to attend a conference event can provide...
System and method for identity management
Some implementations may provide a machine-assisted method that includes: receiving, from a relying party, a request to determine a trustworthiness of a...
Un-password.TM.: risk aware end-to-end multi-factor authentication via
A method for determining an authentication score for use in exchanging information between a first and a second device. The method comprises at the first...
Systems and methods for device and data authentication
Embodiments relate to systems and methods for authenticating devices and securing data. In embodiments, a session key for securing data between two devices can...
Pass-thru for client authentication
This disclosure pertains generally to client authentication. One aspect of the disclosure relates to a first server for presenting evidence to a Domain...
Authenticating a device in a network
There is disclosed a system for authentication of a device in a network by establishing a second security context between the device and a serving network node...
Single set of credentials for accessing multiple computing resource
A user may utilize a set of credentials to access, through a managed directory service, one or more services provided by a computing resource service provider....
Systems and methods for determining an authentication attempt threshold
Systems and methods are provided for determining an authentication attempt threshold. Authentication systems often have predetermined authentication attempt...
Media acceleration for virtual computing services
Streaming media is problematic for thin clients using remoting protocols like RDP that were never designed to handle the volume of data associated with...
Technologies for secure inter-virtual network function communication
Technologies for secure inter-virtual network function communication include a computing device to determine a cryptographic key for secure communication over...
Network system, management server system, control method, and storage
medium for tenant transition
Provided is a management server system that accepts a transition instruction for transition between tenants of an agent device, generates symmetric keys...
Method and system for securing communication
A method for generating one or more secrets for use by members. The method includes sending a first request for connection with a second member, and sending a...
Lighting system, a light source, a device and a method of authorizing the
device by the light source
A lighting system (100), a light source (110), a device (150), and a method of authorizing the device (150) by the light source (110) are provided. The lighting...
Systems and methods for enhanced client side policy
An appliance and method for authorizing a level of access of a client to a virtual private network connection, based on a client-side attribute includes the...
Method for virtual private cloud to access network, network side device
and data center device
The present invention provides a method for a virtual private cloud to access a network, a network side device and a data center device. When receiving a VPC...
Methods and systems for context-based application firewalls
Context-based application firewall functionality. A user session is initiated with a client device. The user session allows access a remote resource on a server...
Routing a packet by a device
Methods and apparatus for transferring packets in a packet switched communication system. A system is provided that includes an L2 device including a controller...
Method and apparatus for best effort propagation of security group
A method and system for best effort propagation of security group information is disclosed. The method includes determining if a reserved group identifier is...
Methods and systems for providing context-based outbound processing
Outbound processing with application firewalls. An outbound message is generated with an application. The outbound message includes at least a trustworthiness...
Methods and apparatus for redirecting attacks on a network
A system is disclosed for protecting a network against malicious attacks or attempts for unauthorized access. A network is connected to an external network by a...
Reliable client transport over fibre channel using a block device access
A system and method executed by a client for reliably communicating between the client and a server over a Fiber Channel (FC) network. The method creating a...
Service access method and device for conducting the same
For service access, a physical address of a specified application service corresponding to a specified IP segment is acquired by a user mode component in...
Handling NAT migration in logical L3 routing
For a network controller for managing managed forwarding elements running in hosts in a network, a method for configuring a host to facilitate migration of a...
Ad-hoc micro-blogging groups
Systems and methods are disclosed for distributing micro-blog posts to ad-hoc micro-blogging groups. In one embodiment, a micro-blog post of a user is obtained....
Telephony web event system and method
An embodiment of the system for publishing events of a telephony application to a client includes a call router that generates events from the telephony...
Interactive splitting of entries in social collaboration environments
A method for interactive splitting of a post of a social collaborative environment is provided. The method comprises, in response to a selection of a portion of...
Method of notification by an inviter of an information on a page of an
The invention concerns a method of notification by an inviter of information on a page of an advertising server to at least one contact of the inviter. A...
Systems and methods to facilitate real time communications and commerce
via a social network
Methods and systems to facilitate real time communications and commerce via a social network. In one embodiment, a social network is used to provide information...
Systems and methods for storing and transferring message data
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for storing and transferring messages. An example method...
Enabling mapping identification of online identities between different
A method and system for populating identities in a message service involves registering a user of a first messaging service with a second messaging service....
Predictive forwarding of notification data
A computing system is described that receives notification data associated with a user, and responsive to determining that the user is interacting with a first...
Monitoring hashtags in micro-blog posts to provide one or more crowd-based
Systems and methods are disclosed for monitoring hashtags in micro-blog posts, or status updates, from users to provide one or more crowd-based features. In one...
System and method for following topics in an electronic textual
A method for following a topic in an electronic textual conversation, the method includes selecting, by a computing device, one or more primary terms related to...
Message processing system
A message processing system is disclosed herein. A client computing device may receive an electronic message from a server via a network and via a forwarding...
Method and system for directly targeting and blasting messages to
automatically identified entities on social media
Some embodiments provide a communication tool that directly sends messages to accounts of different entities across different social media sites by...
Method and system for cross device notification
Method and system for cross device notification (CDN) are provided. An incoming event is received at a first device associated with a user. The first device...
Scalable, real-time messaging system
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for receiving from a plurality of publisher clients a...
Instant messaging terminal and method for displaying session message in
The present disclosure discloses an Instant Messaging (IM) terminal and a method for displaying a session message in real time. The method includes: obtaining...
Handling unavailable destinations in a messaging network
The subject matter of this specification can be implemented in, among other things, a method that includes establishing first federation links between a message...
Redundantly operable industrial communication system and method for
A redundantly operated industrial communication system includes communication devices that are redundantly linked to an industrial communication network and...
Distributed processing of data frames by multiple adapters using time
stamping and a central controller
An apparatus and a method where a plurality of physically separate data receiving/analyzing elements receive data packets and time stamp these. A controlling...
Maintaining data stored with a packet
Some embodiments provide a method for a managed forwarding element that operates on a host machine to process packets for at least one logical network. The...
Software defined networking pipe for network traffic inspection
A software defined networking (SDN) computer network includes an SDN controller and an SDN switch. The SDN controller inserts flow rules in a flow table of the...