At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Systems, methods, and other embodiments associated with bidirectional authentication are described herein. According to one embodiment, a method includes a user...
Private simultaneous authentication of equals
A passphrase is assigned to an end user device for use in authenticating the end user device for a network using SAE. An identification of the end user device...
Control device and method for electronic atomization device based on
Disclosed are a control device and a control method for electronic atomization device based on mobile terminal. The device includes a Bluetooth control module,...
Network identity certificate pinning
Systems, methods and apparatuses for ensuring that a computing device is attempting to connect to a network, such as a wireless network, provided by an expected...
Single sign on availability
Methods and computer program products relate to single sign on (SSO) availability including identifying a set of single sign on applications in a system in...
Secure single sign-on for a group of wrapped applications on a computing
device and runtime credential sharing
A mobile device user is able to execute an app in a federation of wrapped apps without having to login to that app provided that the user has already logged...
A technique for network authentication interoperability involves initiating an authentication procedure on a first network, authenticating on a second network,...
Facilitated information exchange to a service provider for a requested
A method, a computer program product and a computer system, for exchanging information to provide services, is provided. A computer processor creates an...
Push-based trust model for public cloud applications
In accordance with the exemplary embodiments of the invention there is at least a method and apparatus to perform operations including deploying, with a device...
Method and system for providing a virtual asset perimeter
A system and method provides a virtual perimeter by maintaining a data structure for identifying a first plurality of assets, according to one embodiment. The...
User access to a protected resource is controlled by: intercepting a request from a client browser (80) directed to a server (50); requesting user credentials...
Automating authentication with multi-channel media distributors
In some embodiments, a processing device extracts a cookie from a first media application that is prevented from providing the cookie to a second media...
Residential gateway based policy
Various exemplary embodiments relate to a method performed by a policy server in a communication network. The method includes receiving an access request...
Program guide data management for media content access systems and methods
An exemplary system includes a data loader and a data slicer. The data loader is configured to receive and process raw program guide data, and to store the...
Low-cost authenticated signing delegation in content centric networking
One embodiment provides a system that delegates signature production in a CCN. During operation, a first content producing device monitors content objects...
Communicating an identity of a group shared secret to a server
An identity is communicated by a client device to a server without requiring the identity to be disclosed to eavesdroppers and without requiring the use of...
Data accessing method and system and memory storage apparatus
A data accessing method and system for a memory storage apparatus are provided. The method includes: performing a near field communication between a memory...
Enterprise cloud security gateway
A security virtual machine is provided in a network including a resource shared among two or more virtual machines. All data traffic from each virtual machine...
Method, apparatus and system for performing proxy transformation
A method for performing proxy transformation between a user and a server includes: selecting a first proxy relationship between a target user and a first user...
Method and system for the supply of data, transactions and electronic
A method for supply of data, including generating an empowerment certificate signed with a signing entity's electronic signature. The empowerment certificate...
Method and system for establishing a communications pipe between a
personal security device and a remote...
A method and a system is provided for establishing a communications path over a communications network between a personal security device (PSD) and a remote...
Methods and systems of data security in browser storage
Mechanisms and methods are provided for managing OAuth access in a database network system, and extending the OAuth flow of authentication to securely store the...
Customer controlled data privacy protection in public cloud
Techniques to protect selected data in a cloud computing environment are disclosed. In various embodiments, an indication is received that a data value to be...
System and method for internet protocol security processing
A decentralized method for IPSec processing in virtual environments includes assigning a unique identifier to each of a set of compute nodes. Each compute node...
Lingual transformation based encryption
For lingual transformation-based encryption, a method parses a secure message into lingual units. The method further generates a validation nonce from the...
Key management for mixed encrypted-unencrypted content
Based on a request for media content from a media client, a device identifies one or more: segments of encrypted media content; encryption keys for decrypting...
Control word and associated entitlement control message caching and reuse
Methods, systems, computer-readable media, and apparatuses for providing control word and associated entitlement control message (ECM) functionalities are...
Method and system for configuring and securing a device or apparatus, a
device or apparatus, and a computer...
A computer-implemented method for configuring and securing a first device, the method including performing a first check of the first device to determine the...
Transparent tunneling architecture for a secured database
A method and associated systems for a transparent tunneling architecture for a secured database. A tunneling driver captures a user's database-access request...
Using hypertext transfer protocol as a transport for bi-directional data
The present invention extends to methods, systems, and computer program products for using HyperText Transfer Protocol communication as a transport for...
Peel ply, method of surface preparation and bonding composite structures
using the same
A resin-rich peel ply that does not leave behind residual fibers after peeling and can work well with different resin-based composite substrates. The resin-rich...
A connection method is provided. The method includes retrieving by a data retrieval device, unique data comprising an identifier associated with a wireless...
Interactive management of web application firewall rules
A computer implemented method, information processing system, and computer program product manage web application firewall rule configuration. A web application...
Incremental application of resources to network traffic flows based on
heuristics and business policies
Disclosed herein are system, method, and computer program product embodiments for increasingly applying network resources to traffic flows based on heuristics...
Data plane packet processing tool chain
This present disclosure relates to systems and methods for providing a data plane processing tool chain for processing packets that can use OSI layers 4 and...
Security gateway communication
A gateway device and methods performed therein to prevent unauthorized client devices from connecting to the host network of the gateway device is described....
Methods, systems, and computer program products for tokenized domain name
A method, system, and computer program product for tokenized domain name resolution are provided. The method includes receiving a tokenized domain name, where...
NAT traversal in VoIP communication system
Methods, systems, and apparatuses are provided for VoIP communication with endpoint devices via a network address translator (NAT). A plurality of proxy servers...
Methods, systems, and computer readable media for providing mapping
information associated with port control...
Methods, systems, and computer readable media for a testing platform involving application traffic are disclosed. According to one method, the method occurs at...
Wireless chat automatic status tracking
A technique and apparatus to provide status tracking of presence and/or location of wireless devices to requesting entities inside and/or outside a particular...
Multi-platform collaboration appliance
The invention contains a private self-aware network. The network will use multi-point Bluetooth technology or Wi-Fi or a direct connection (though not limited...
System for social media tag extraction
A system for extracting and monitoring media tags within video content includes at least one server in communication with a plurality of content sources, the...
Systems and methods for enabling dialog amongst different participant
An electronic communication system, such as a question-and-answer service, is provided in which a user submitting a question specifies one or more recipients of...
Personalized delivery time optimization
Techniques for optimizing a delivery time for the delivery of messages are described. According to various embodiments, a system determines, for each of a...
Comment processing device, comment processing method, and storage medium
The agent server of the present invention includes (i) a conversation monitoring section for monitoring, based on a conversation log saved in a family message...
Content sharing platform playlists and subscriptions based on user history
A method for generating content sharing platform playlists and subscriptions based on user history is disclosed. The method includes identifying one or more...
Methods and systems for sharing email in a multitenant database system
A method for sharing an email in a multi-tenant database system is provided. The method receives, at one or more computer systems associated with the...
On demand email response
An improvement to an electronic mail program is disclosed. In particular, the improved electronic mail program enables a user to mark individual action items...
E-mail with discretionary functionality
An embodiment, by way of non-limiting example, comprises an e-mail method including creating an e-mail having discretionary functionality and sending the...
A method and associated computer system. A composed message portion, of an electronic message, that includes a hyperlink is received and sent to a set of...