At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Login to a computing device based on facial recognition
An image of a second user is captured by a camera of a computing device currently providing access to a first set of resources to a first user. In response to...
Methods, media, and systems for securing communications between a first
node and a second node
Methods, media, and systems for securing communications between a first node and a second node are provided. In some embodiments, methods for securing...
Location-based security system for portable electronic device
A location-dependent security method and system for a portable electronic device is disclosed. Without requiring that the user enter any location information,...
Increased communication security
A method of increasing communication security may include receiving a first message associated with communication between a first computer system and a second...
Personal video channels
Systems and methods provide personal channels from a network-capable user terminal. A first user terminal may receive a request from a second user terminal for...
Method and apparatus for providing value-based resource management and
An approach for providing value-based resource management and admission control is described. A value-based platform may receive a request from a user or a...
Method and apparatus to using storage devices to implement digital rights
Embodiments of systems, apparatuses, and methods to securely download digital rights managed content with a client are described. In some embodiments, a system...
Bi-directional communication over a one-way link
Apparatus for communication includes a single one-way link, which is physically capable of carrying the communication signals in one direction and incapable of...
Apparatus and method for performing user authentication by proxy in
wireless communication system
A method of performing user authentication of a mobile station by proxy in a communication system is provided. The method includes receiving an authentication...
Content URL authentication for dash
Technology for content uniform resource locator (URL) authentication for dynamic adaptive streaming over hypertext transfer protocol (HTTP) (DASH) is disclosed....
Two dimensional direct memory access scheme for enhanced network protocol
Systems and methods are directed to a memory device that includes a plurality of memory buffers and a direct memory access (DMA) descriptor structure. The DMA...
Securely unlocking a device using a combination of hold placement and
A computer program product includes a computer readable storage medium having program instructions embodied therewith, where the program instructions are...
Electronic access client distribution apparatus and methods
Apparatus and methods for distributing access control clients. In one exemplary embodiment, a network infrastructure is disclosed that enables delivery of...
Method and system for granting access to a secured website
A method and system are provided for granting access to a secured website of a content provider. The method includes: detection of a user's request for...
Mobile push user authentication for native client based logon
Mobile push user authentication for native client based logon is described. In one method, an authentication server receives from a user interface at a native...
Confidential information access via social networking web site
A server computing device for a social networking web site receives from a user, via access of the web site, confidential information regarding the user,...
Method for producing dynamic data structures for authentication and/or
A method for generating a changing authentication input or password generation and input for a user is provided for allowing access to a computing device such...
Digital certification analyzer
A digital certification analyzer (or "analyzer") provides protection for digital content stored on servers, file sharing systems, hard drives and USB enabled...
Sharing between CPE and companion device
In one embodiment, a method and system for a companion device to share an application context and authorization context with a consumer premises equipment (CPE)...
System and method for controlling access
Systems and methods for controlling access to multiple applications on a computing device are provided. One embodiment of a system includes an access device...
Method and apparatus for sharing server resources using a local group
A computer implemented method and apparatus for sharing server resources. One or more applications are registered to a first local group on a device, and one or...
Apparatus and method for managing use of secure tokens
A system that incorporates the subject disclosure may perform, for example, operations including receiving an encrypted secure token from a secure token...
Secure user authentication in a dynamic network
A method, apparatus and/or computer program provides secure user authentication in a network having a dynamic set of services. The method comprises a client...
Dynamically mapping users to groups
Methods and systems for authenticating users and assigning authenticated users to groups are provided. A method receives a user credential and email address....
Multi-tenancy support in a cloud based data grid
A system with a tenant aware in-memory data grid includes a data grid configured to store data in memory. A request manager is configured to receive a data grid...
A programmed computer assigns an authentication requirement rating to an activity and an authentication capability rating to each of one or more authentication...
Systems and methods for authenticating a user for accessing account
information using a web-enabled device
Systems, methods, and computer program products are provided for authenticating and efficiently re-authenticating a user with a financial institution in order...
System and method for carrying trusted network provided access network
information in session initiation protocol
Methods, computer code products and systems for authenticating user equipment for access to a trusted network can include receiving a user identity uniquely...
Storing and transmitting sensitive data
A system for secure key management including a secondary device comprising a programmable hardware component and an associated secure data storage, wherein the...
A secure identifier is derived, using a secured microcontroller of a computing device, that is unique to a pairing of the computing device and a particular...
Memory encryption method compatible with a memory interleaved system and
A method for managing an operation of an encrypted global interleaved memory space physically implemented according to an interleaving addressing scheme in...
System and method for secure three-party communications
A system and method for communicating information between a first party and a second party, comprising the steps of receiving, by an intermediary, an identifier...
Secure message forwarding system detecting user's preferences including
A system and method for providing secure message services. The system includes a forwarding service to receive message for delivery to a recipient. The system...
Increased communication security
A method of increasing communication security may include determining whether a first computer system is authorized to communicate with a second computer...
Method and apparatus for avoiding license storming during an unplanned
A computer implemented method and apparatus for avoiding license storming during an unplanned regional blackout. The method comprises generating a leaf license...
Media storage and playback of encrypted content
A content distribution system is disclosed that supports verification of transmission. In some embodiments, a remote probe device captures content and sends the...
Method and apparatus for anonymously acquiring service information
An approach for enabling a user to anonymously access customized service information from a plurality of providers is described. A secure estimation platform...
Systems and methods for providing and operating a secure communication
A communication network comprises a first control node (101) and at least one second control node (103), wherein the first control node and the second control...
Methods and systems for establishing VPN connections at a VPN management
The present invention discloses methods for establishing Virtual Private Network (VPN) connections among a plurality of VPN gateways at a VPN management server....
Method and apparatus for processing of finite automata
A method, and corresponding apparatus and system are provided for optimizing matching at least one regular expression pattern in an input stream by walking at...
Destination domain extraction for secure protocols
Techniques for destination domain extraction for secure protocols are disclosed. In some embodiments, destination domain extraction for secure protocols...
Distributed computer network zone based security architecture
A method and apparatus is disclosed herein for distributed zone-based security. In one embodiment, the method comprises: determining an ingress security zone...
IPv4 data center support for IPv4 and IPv6 visitors
A network element (NE) comprising a processor configured to transmit a message to a domain names system (DNS) server, wherein the message comprises a virtual...
Multiple subscriber videoconferencing system
A system, method, and device for use in videoconferencing. The method typically includes installing a videoconferencing services switch at an access point to an...
Interactive educational system and method
A system for associating an action of a user with a message corresponding to the action, where the message is visually displayed on a series of sequentially...
System and method for dynamically configuring a DNS server in a virtual
Techniques for dynamic configuration of a domain name system (DNS) server in a virtual network environment are described. In one example embodiment, DNS rules...
Method and apparatus for recovering interruption of network connection
caused by IP address change of universal...
Provided are a method and apparatus for rapidly recovering a network connection interrupted by a change in an Internet Protocol (IP) address of a Universal Plug...
Voice communications with real-time status notifications
A system, apparatus, graphical user interface and methods are provided for conducting electronic voice communications with status notifications. A user of a...
Method and system for message pacing
A system for managing message volume and timing, which permits first and second messages to be spaced apart over time, with the pacing controlled in part by a...
Maximizing circle of trust in online social networks
Methods are provided for constructing an on-the-fly circle of trust for a user of an online social network to enable the user to reduce the likelihood that...