Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,432,379 Dynamic authorization in a multi-tenancy environment via tenant policy profiles
In one example, a method for managing user access includes creating a set of user characteristics for authorization of a user. The user characteristics are...
US-9,432,378 Internet of things security
Apparati, methods, and computer-readable media for improving the security of communications networks. An embodiment of the present invention is a system for...
US-9,432,377 Enhanced communication platform and related communication method using the platform
Pre-authorized communication services and/or transactions are provided via a plurality of networks in response to a request received from a user to provide at...
US-9,432,376 Method and system for determining and sharing a user's web presence
A method and system for determining and sharing a user's web presence have been disclosed. According to one embodiment, a computer implemented method comprises...
US-9,432,375 Trust/value/risk-based access control policy
Generating a resource access control decision is provided. A user trust value associated with a user identifier of a user requesting access to a protected...
US-9,432,374 Disabling administrative access to computing resources
Disclosed are various embodiments for disabling administrative access to computing resources. A customer request is obtained to disable administrative access of...
US-9,432,373 One step security system in a network storage system
This is directed to providing access to content stored on a local cloud. In particular, a device can direct a librarian service overseeing the operation of a...
US-9,432,372 Access policy based on collaboration participation
According to example configurations as described herein, an on-line conference management application receives an indication of multiple participants that...
US-9,432,371 Hybrid cloud identity mapping infrastructure
In various exemplary embodiments, a system and associated method for providing a hybrid cloud computing environment are disclosed. For example, a system may...
US-9,432,370 Secured transmission of a sequence of data to be transmitted
A method for transmitting a sequence of data blocks to be transmitted includes: one first piece of authentication data and one second piece of authentication...
US-9,432,369 Secure data containers
Embodiments for providing secure data containers and allowing selective access to files stored in the containers include systems and methods that receive a...
US-9,432,368 Document distribution and interaction
A document originator establishes rules for authenticating an electronic signature. Such rules may require that any user who wishes to assent to the document...
US-9,432,367 Processing method for piecing together fingerprint based on mobile terminal and mobile terminal
A processing method for piecing together a fingerprint based on a mobile terminal and a mobile terminal are disclosed. The method includes: acquiring...
US-9,432,366 Fingerprint based smartphone user verification
A touch screen, now incorporated in most smart phones, presents an effective and transparent method to incorporate continuous active user verification schemes....
US-9,432,365 Streaming music using authentication information
Techniques provided herein may facilitate set-up of an audio system with audio content services that have been previously registered on a second system. An...
US-9,432,364 System and method for providing a service to end terminal that uses authentication information of another...
The present invention relates to an end-point terminal that uses authentication information of another mobile communication terminal comprising a communication...
US-9,432,363 System and method for using credentials of a first client station to authenticate a second client station
Described are methods that allow credentials of a first client station to authenticate a second client station. An exemplary method includes associating a first...
US-9,432,362 Secure time functionality for a wireless device
The present invention is related to a wireless transmit/receive unit (WTRU) for providing advanced security functions. The WTRU includes trusted platform module...
US-9,432,361 System and method for changing security behavior of a device based on proximity to another device
The security and convenience of a mobile communication device is enhanced based on a separate key device. If the key device is near the mobile communication...
US-9,432,360 Security-aware split-server passcode verification for one-time authentication tokens
Techniques are provided for security-aware split-server passcode verification for one-time authentication tokens. An exemplary method comprises receiving an...
US-9,432,359 Registration and network access control
In embodiments of registration and network access control, an initially unconfigured network interface device can be registered and configured as an interface...
US-9,432,358 System and method of authenticating user account login request messages
A computer server receives a login request message sent by a remote terminal to access a user account. If the message includes a first login key, the server...
US-9,432,357 Computer network security management system and method
A computer network security management system is provided, in which a corporate computer network can be substantially separated from an external network because...
US-9,432,356 Host identity bootstrapping
Automated provisioning of hosts on a network with reasonable levels of security is described in this application. A certificate management service (CMS) on a...
US-9,432,355 Single sign-on method in multi-application framework
A method for permitting single sign-on to multiple independent applications in a single framework.
US-9,432,354 Role-based access tool
The tool to provide a role-based access tool is configured to receive a single sign-on login from a user; determine an identity of the user based on the single...
US-9,432,353 Serialized authentication and authorization services
Requests for User Services on networked computers running on different platforms with different Authentication, Authorization and Auditing (AAA) Security...
US-9,432,352 Method and apparatus for processing authentication request message in a social network
A method and an apparatus for processing an authentication request message in a social network are provided. To improve the inefficiency of existing technology...
US-9,432,351 Authorization and authentication based on an individual's social network
In particular embodiments, a method includes receiving a request for a first user to access a loan from a lender, the request identifying a user identifier (ID)...
US-9,432,350 System and method for intelligent workload management
The system and method for intelligent workload management described herein may include a computing environment having a model-driven, service-oriented...
US-9,432,349 Service access authentication method and system
An access authentication system for authenticating a subscriber of a service, the access authentication system comprising an operator access authentication...
US-9,432,348 Secure zone for secure purchases
An apparatus according to the present disclosure may comprise a secure zone configured to execute a task having a subtask. The task and subtask may have...
US-9,432,347 Secure desktop interface
An apparatus and system for providing a secure user interface restricting the access of users to selected functions, files, and communications by implementing a...
US-9,432,346 Protocol for controlling access to encryption keys
A secure remote-data-storage system stores encrypted data and both plaintext and encrypted keys at a server, where data at the server is inadequate to recover...
US-9,432,345 Authentication engine and stream cipher engine sharing in digital content protection architectures
A system for receiving and decrypting media content encrypted according to the HDCP protocol is described herein. A receiving device coupled to a plurality of...
US-9,432,344 Secure storage and sharing of user objects
Information objects model real-world objects or concepts that may be associated with users, such as vehicles, homes, people, animals, accounts, places, and the...
US-9,432,342 System and method to anonymize data transmitted to a destination computing device
A method and system for anonymizing data is disclosed. Data to be anonymized is received by an anonymization system. A request for a data encryption key is...
US-9,432,341 Securing data in a dispersed storage network
A method begins by a source processing module securing data based on a key stream to produce secured data, where the key stream is derived from a unilateral...
US-9,432,340 System and method for secure end-to-end chat system
The present invention provides an efficient secure end-to-end messaging system utilizing encrypted ephemeral messages. The method comprises the steps of using a...
US-9,432,339 Automated token renewal using OTP-based authentication codes
One embodiment is described of a method performed by a computing device for renewing a remote token. The method includes (a) receiving an activation code from...
US-9,432,338 Secure communications using adaptive data compression
Aspects of the subject technology relate to systems, methods, and machine-readable media for communicating using adaptive data compression. A system is...
US-9,432,337 System and method for generating and managing product authentication codes
A method for generating product authentication codes comprises allocating a lot identification value and a total lot size for an order of a plurality of product...
US-9,432,336 Secure electronic device application connection to an application server
The present disclosure presents a system, method and apparatus for creating a secure tunnel between a mobile device and a server. The server can be configured...
US-9,432,335 Cloud-based multi-layer security architecture with firewalled virtual network portions
A virtual network may include a web application firewall (WAF) portion to receive network traffic for one or more other portions of the virtual network; a first...
US-9,432,334 Native application single sign-on
In an example embodiment, a virtual private network (VPN) connection is established between a client device and an authentication service. Then a request is...
US-9,432,333 Trusted content distribution system
A trusted content distribution system is described comprising a trustworthy enduser device and a network management infrastructure, the enduser device being...
US-9,432,332 Proxy device for a network of devices
A proxy device for a network of devices may include memory, a device status module, a data intercept module, a network interface, and an emulation module. The...
US-9,432,331 Mechanism for distributed rate limiting
A method for distributed rate limiting is provided. The method includes detecting, in a first communication received by an application, a suspicious behavior,...
US-9,432,330 Data interaction method, apparatus, and system
A data interaction method is provided, which includes: sending simultaneously an address detection request for a UDP channel and an address detection request...
US-9,432,329 Network address assignment with duplication detection
Network storage system configuration via a network is disclosed. A network address assignment component is configured to listen for network discovery requests...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.