At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Geographic location-based policy
In a computing environment a request is received from a computing device associated with a user, requesting access to one or more computing resources. An...
Methods and systems for secure internet access and services
A method and system for providing secure internet access and services are disclosed. The method includes receiving a request for services from a user terminal,...
Social web of objects
According to exemplary embodiments, networked object management software, devices, systems and methods are described which use social mapping principles to...
System, method and computer program product for publicly providing web
content using a multi-tenant system
In accordance with embodiments, there are provided mechanisms and methods for publicly providing web content of a tenant using a multi-tenant on-demand database...
Systems, methods and programs for detecting unauthorized use of text based
Systems, methods, and programs for generating an authorized profile for a text communication device or account, may sample a text communication generated by the...
Identifying a measure of online security
A computer-implemented method includes retrieving, by one or more processing devices and from one or more data repositories, user information; generating, based...
Granting permissions to an object when adding people to a conversation
A user generates a message by adding a recipient in order to send the message to the recipient. The message has a link to an attached object which is...
Monitoring content consumption by restricted account
A content server stores digital content including video, audio, image, animation, or text content. The content server receives account permissions governing...
System and method for proxying federated authentication protocols
A system and method that include receiving a service provider identity request through a federated authentication protocol; transmitting a proxy identity...
System and method for authenticating a user
A method for authenticating a user having a first enrollment step including: receiving by a first server an identifier and a password, and sending this...
Alternative techniques for processing wireless communication backhaul
A method, system, and computer-readable media are provided for transmitting wireless data across a coaxial cable. In one aspect, a set of computer-readable...
System and method for vascular mapping authentication
A biometric authentication system includes a biometric device and a security authentication device, wherein the biometric device includes a digital image sensor...
Authenticating customers and managing authenticated sessions
Methods, systems, and computer-readable media for authenticating customers of an organization and managing authenticated sessions of various customers are...
Generation and authentication of biometric information using watermark
An apparatus for generating biometric information, the apparatus includes a biometric scanning module configured to scan a body of a user to generate biometric...
Methods, systems, devices, and products for authenticating users
Enhanced biometric authentication combines a user's inherent biometric data with the user's password, code, or other secret glyph. For example, the user's...
Voice authentication system and method
A method for maintaining a voiceprint utilizable to authenticate a user comprises associating a trainable universal background model with the user. A voiceprint...
Apparatus and method for authenticating smart card
The disclosure discloses an apparatus and a method for authenticating a smart card. The apparatus for authenticating a smart card comprises a smart card...
Providing a service based on time and location based passwords
A first device may receive a first password from a second device. The first password may be generated based on first time information and first location...
System and method for importing heterogeneous hashed passwords
A method is disclosed for migrating a client domain involving identifying a user account entry in a client domain's password table, where the entry includes a...
Object delivery authentication
A method and system for authenticating delivery including the steps of receiving by a receiver a delivery information package from a deliverer over a network...
Technique for controlling loss and theft of remote radio equipment in a
cellular ad hoc network
The present disclosure relates to systems and methods for controlling loss and theft of a radio equipment of a base station in a cellular communications...
Systems and methods for performing single sign-on by an intermediary
device for a remote desktop session of a...
The present disclosure is directed to systems and methods for performing single sign on by an intermediary device for a remote desktop session of a client. A...
Method and apparatus for remote identity proofing service issuing trusted
Illustrative methods, processes, and software are disclosed herein that remotely prove the identity of individuals fully compliant with identity proofing...
Secure challenge system for verifying access rights to media content
Described is a technique for securely verifying access rights to a media file stored on a user device. By verifying the access rights to the media file, a...
Authentication system, authentication method, information processing
An authentication system includes a device; and an information processing apparatus connected to the device. The device includes a state management unit that...
SSL secured NTLM acceleration
Embodiments are directed towards managing network traffic that includes SSL secured NTLM acceleration. A Packet Traffic Management Computer (PTMC) may receive a...
Connection management method and system for relaying client and backend of
server on server side
Provided is a connection management method and system for relaying a client and a backend module of a server on a server side. A connection management method...
Account generation based on external credentials
Techniques are described for using a credential, such as a user identifier associated with an account on a first service, to create a reusable account on a...
Document, method for authenticating a user, in particular for releasing a
chip card function, and computer system
A document having a non-volatile memory area for storing a secret identifier that has a first n-digit character sequence from a predefined character set; a...
WiFi opportunistic key caching over non-WiFi access
This disclosure describes systems, methods, and computer-readable media related to WiFi opportunistic key caching over non-WiFi access. In some embodiments,...
Data transmission apparatus, data transmission method, and non-transitory
computer readable medium
A data transmission apparatus having an authentication mode in which user authentication is required in order to transmit data and a non-authentication mode in...
Memory apparatus, charge pump circuit and voltage pumping method thereof
The invention provides a memory apparatus, a charge pump circuit, and a voltage pumping method thereof. The charge pump circuit including a plurality of delay...
Document-authorized access to a shared workspace
Various embodiments described herein each provide one or more of systems, methods, software, and data structures that facilitate document-authorized access to a...
Computer product, recording medium, communications apparatus, and
Improvement of the security of communication is facilitated. A server receives from an on-vehicle device, encrypted data obtained by encrypting ECU information...
Establishing a direct connection between two devices
In one embodiment, a method includes, by a first computing device associated with a first user, receiving a connection request from a second computing device...
DRM content stream transmission apparatus, method, and transmission and
A content stream transmission apparatus with reverse traceability comprises a pattern insertion unit dividing the original content in units of segments and...
Computational systems and methods for encrypting data for anonymous
Methods, apparatuses, computer program products, devices and systems are described that carry out accepting from a user identifier encryption entity at least...
Secure application delivery system with dial out and associated method
A system is provided to deliver an application, hosted by a private application provider system, over a network to a user device, comprising: an application...
Methods and apparatus for denial of service resistant policing of packets
Methods and apparatus for supporting secure packet communications, e.g., sRTP/sRTCP, which are resistant to denial of service attacks are described. A received...
Context-aware pattern matching accelerator
Methods and systems for improving accuracy, speed, and efficiency of context-aware pattern matching are provided. According to one embodiment, a packet stream...
Malware analysis system
In some embodiments, a malware analysis system includes receiving a potential malware sample from a firewall; analyzing the potential malware sample using a...
Incoming redirection mechanism on a reverse proxy
A system is provided for filtering packets. The system includes: a filter for determining, by applying a set of at least one filtering rule, whether a packet is...
Method for switching gateways, and apparatus therefor
The present invention relates to a converged personal network service (CPNS). More particularly, the present invention relates to a method for switching a...
System and method to use common addresses on different interfaces in a
management controller without conflict
A management controller includes a first data communication interface for communicating with a first network interface, a second data communication interface...
Internet protocol (IP) address translation
Translation of Internet Protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6) addresses is contemplated, such as for use in allowing IPv4 devices to...
Methods of using beacon messages to discover devices across subnets
A method of discovering a device to be discovered in a communication network having multiple interconnected nodes includes transmitting, by a discoverer, at...
Systems and methods for network address translation
An intelligent network address translation system and methods for intelligent network address translation. In one embodiment, a network packet is received from...
Sub class C reverse domain name system zone compilation
A subnetted class C internet protocol (IP) address domain name system (DNS) reverse zone file compiling server. The server comprises a memory, a processor, and...
Messaging system and method
A method of cross-platform messaging including receiving, by a messaging system, at least one initial message having a message format, an initial message layout...
Sharing television and video programming through social networking
In particular embodiments, one or more computer systems of a social-networking system determine information associated with a product displayed on a display...