At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Secured access to resources using a proxy
A method of authentication and accessing resources is provided. A client device may send a request to a proxy device to access a resource, such as an enterprise...
Secure transfer of web application client persistent state information
into a new domain
A technique to reassign one or more stored elements of web application client state information is provided in an HTTP-based client upon receipt of an HTTP...
Methods and systems for managing network activity using biometrics
The present disclosure describes systems and methods for managing network traffic using biometrics. A server may store a first value N, a primitive root modulo...
Security for cloud systems and virtualization cloud systems, mobile cloud
systems and mobile virtualization...
A computer implemented method and a cloud security system are provided for securing data in a cloud storage environment. The cloud security system receives data...
Providing malicious identity profiles from failed authentication attempts
A technique provides malicious identity profiles. The technique involves storing unsuccessful authentication entries in a database, the unsuccessful...
Communication terminal, communication method, program, and communication
There is provided a communication terminal including a transmission controller configured to allow transmission of, to a verification target device,...
Secure element authentication
Secure element authentication techniques are described. In implementations, a confirmation is received that an identity of a user has been physically verified...
User authentication based on other applications
The present invention includes a system for authenticating a second action based on a first action, wherein the system is configured to: receive a first request...
System and method for resource access with identity impersonation
A gateway device comprising a processor and a memory, the processor is configured to receive a resource request message from an endpoint associated with a user,...
According to some embodiments, a method provides a designated link in a notification to an intended recipient of the message. The designated link includes a...
Obscuring usernames during a login process
In general, the subject matter described in this document can be embodied in methods, systems, and program products. A computing system receives a token that...
Secure instant messaging system
A secure instant messaging (IM) system integrates secure instant messaging into existing instant messaging systems. A certificate authority (CA) issues security...
Information processing system, information processing method and
Provided is a state with which each user is able to use information processing service of each user. A router (2) receives, from a terminal device,...
System and method for non-replayable communication sessions
Systems, methods, and non-transitory computer-readable storage media for a non-replayable communication system are disclosed. A first device associated with a...
Facilitated information exchange to a service provider for a requested
A method, a computer program product and a computer system, for exchanging information to provide services, is provided. A computer processor creates an...
Method, apparatus, and system for sending credentials securely
A software application executing in a first local operating environment may be used to connect to a remote server that requires a credential of a user to...
Efficient startup and logon
Methods and systems for receiving a detection of a physical presence of a user and, in response, initiating a start-up process on an enterprise device according...
Information security and privacy system and method
A programmable management method and system provides mechanism for processing, viewing and transactions of secure and private information allowing user of the...
Automated accounts for media playback
Content stored on a server may be selected using a user device and enabled on a central device. The identity of the central device may be authenticated without...
Providing seamless and automatic access to shared accounts
A method for providing seamless access to a first account using authentication information associated with a second account includes receiving a first account...
3D bot detection
In one embodiment, a computer method of verifying an operator is human includes automatically selecting a pattern and dividing the pattern into a plurality of...
System and method for managing secure communications in an Ad-Hoc network
The present invention provides a system and method for managing secure communications in an ad-hoc network having three or more users including a first user, a...
Efficient routing of streams encrypted using point-to-point authentication
Embodiments relate to routing encrypted data from a source to a sink via a router without decrypting the data in the router. The source authenticates with the...
Content distribution method, content distribution system, source device,
and sink device
Provided is a content distribution method which allows a source device to safely distribute copyrighted content to a sink device in response to a request from...
Method and system for digital rights management of documents
An improved method and system for digital rights management is described.
Migrating authenticated content towards content consumer
Techniques involving migrating authenticated content on a network towards the consumer of the content. One representative technique includes a network node...
Protecting against malicious modification in cryptographic operations
A message and an identifying parameter associated with the message are obtained. The message comprises a plurality of units. A plurality of one-unit message...
Data exchange in the internet of things
A device is configured to store a hash value and an encrypted hash value. The device may broadcast a boot label including the encrypted hash value. The device...
Secure distribution of session credentials from client-side to server-side
traffic management devices
Securely transferring session credentials from a client-side traffic management device (TMD) to a second server-side TMD that replaces a first server-side TMD....
Techniques for providing services to multiple tenants via a shared
A service is provided that supports a plurality of tenants. Server(s) of the service are communicatively coupled with a plurality of gateways of the service....
Method and apparatus for displaying HTTPS block page without SSL
The present disclosure discloses a method and system for displaying an HTTPS block page without SSL inspection. Specifically, a network device snoops a first...
Systems and methods for dynamic network security control and configuration
A computer-implemented method according to one embodiment of the present disclosure includes identifying, by a computer system, an asset associated with a...
Disclosed are a connectivity platform that allows for proprietary connectivity modules to plug into the operating system and also allows the operating system...
Method of restoring a MAC address and recording medium
A method of restoring a MAC address in system, the method includes, first transmitting a first frame, in which a origin of a transmission is a first MAC address...
Information processing apparatus, relay method, and computer-readable
An information processing apparatus includes a receiving unit configured to receive request data to an application via a global network allocated to the...
Broadcast distribution table for BACnet/IP
A system for providing addresses to a broadcast distribution table. A BACnet device may have an internet protocol, be connectable to a name server via a...
Aligning content and social network audience using analytics and/or
Various embodiments provide for the use of analytics to determine a number of key factors prior to a user sending a communication (e.g., an email or instant...
Delivering recall messages via internet or telephony communication paths
A method, system, and medium are provided for delivering recallable messages via Internet or telephony paths. A sender may configure a message as a recallable...
Systems and methods for directing messages to multiple user profiles on a
The disclosed technology covers messaging systems and methods, and computer program products embodying such systems and methods. An example computer-implemented...
Method and system for displaying similar email messages based on message
A method and system for identifying changes to a data set, such as data within a mailbox, and performing actions based on the identified changes is discussed....
Presentation of messages in multi-sectioned views
Systems and methods for presenting electronic messages are provided. In some implementations, a method includes, at a computing device having one or more...
Electronic message management with conversation participation status
Electronic message management with conversation participation status is enabled. Accordingly, time may be saved and lost productivity due to overload of...
Providing centralized message notification
A mechanism for providing centralized message notification for user interface. disclosed. A method includes intercepting a plurality of message notifications....
Associating sentiment with objects presented via social media
An approach for associating a sentiment with a picture posted on a social media account is provided herein. A computing device receives user preferences...
Systems and methods for downloading and viewing images
A system for displaying images associated with a received electronic message concurrently displays the received electronic message, a view-all-images icon and a...
Inter-carrier communications for multimedia-message delivery
A method, system, and medium are provided for causing a first multimedia messaging service center (MMSC) on a home network to communicate a multimedia messaging...
Mobile terminal, message transceiving server and controlling method
A mobile terminal can include a wireless communication unit for transceiving messages with another terminal, and a touchscreen for displaying the messages in an...
System and method for sharing content in an instant messaging application
A method and system for sharing content in an instant messaging application are disclosed. According to one embodiment a computer-implemented method comprises...
Network-based content discovery using messages of a messaging platform
A system, method, and computer-readable medium for identifying relevant content from a messaging platform. The method can include: identifying a context...
Messaging architecture configured to use an execution-enabled element to
initiate an operation in an application
A method, system, and computer-program product for communicating within a messaging architecture using a structured data object are disclosed. The method...