Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,516,039 Behavioral detection of suspicious host activities in an enterprise
Methods, apparatus and articles of manufacture for behavioral detection of suspicious host activities in an enterprise are provided herein. A method includes...
US-9,516,038 Identification of unauthorized disclosure
Systems, methods, computer-readable media, and apparatuses for identifying a source of an unauthorized disclosure of information are provided. For instance, a...
US-9,516,037 Decoding of encrypted file
A method and system for decoding an encrypted file. A recipient computer of a recipient: extracts an encoded address from a filename of the encrypted file,...
US-9,516,036 Methods and systems for content availability based on location
Access to protected content is based on a client device being within a region. The region may be a mobile or movable region, and/or a region that is in motion....
US-9,516,035 Behavioral profiling method and system to authenticate a user
Methods and systems for behavioral profiling, and in particular, utilizing crowd-managed data architectures to store and manage that profile, are described. In...
US-9,516,034 Inheritance based network management
Systems and methods for normalization of physical interfaces having different physical attributes are provided. According to one embodiment, information...
US-9,516,033 Providing restricted access to given devices by constructing abstract devices
Methods, systems, and computer program products for providing restricted access to given devices by constructing abstract devices are provided herein. A method...
US-9,516,032 Methods and systems for using derived user accounts
Methods, systems and articles of manufacture consistent with features of the present invention allow the generation and use of derived user accounts, or DUA, in...
US-9,516,031 Assignment of security contexts to define access permissions for file system objects
A system and method are provided for restricting various operations in a file system based on security contexts. An object security context including...
US-9,516,030 Communications system for residents of secure facility
A system and a method are provide for two-way communications, automated request handling, and push notifications, via SMS, MMS, IM, email, and other electronic...
US-9,516,029 Searching indexed data based on user roles
Embodiments are directed towards a system and method for a cloud-based front end that may abstract and enable access to the underlying cloud-hosted elements and...
US-9,516,028 Hierarchical policy-based shared resource access control
Access control for shared computing resources in a hierarchical system is provided herein. An as-needed, "lazy evaluation" approach to access control is...
US-9,516,027 Apparatus and method for providing media services subject to viewing restrictions
A system that incorporates teachings of the present disclosure may include, for example, determining that a communication device is outside of a restricted...
US-9,516,026 Network services infrastructure systems and methods
Network services infrastructure systems and methods are disclosed. Policies for client access to a services network and network services available in the...
US-9,516,025 Reduced authentication times in constrained computer networks
In one embodiment, a capable node in a low power and lossy network (LLN) may monitor the authentication time for one or more nodes in the LLN. The capable node...
US-9,516,024 Connection authentication
One or more embodiments of techniques or systems for connection authentication are provided herein. A mobile device or device may act as an initiator of a...
US-9,516,023 System and method for transferring electronic information
A system for collecting and transferring electronic information includes one or more servers, having one or more centralized databases for storing or retrieving...
US-9,516,022 Automated meeting room
Methods and systems for automatic setup and initiation of meeting resources are described herein. A meeting room, area, or resource may be equipped with a...
US-9,516,021 Secure management of a smart card
A smart card includes a processing circuit, a memory that contains a protected object, an activity detector that receives a signal that describes a planned...
US-9,516,020 Accessing virtual desktops via image scanning
Image scanning and encoding technologies can be utilized to authenticate devices to virtual desktops and to transfer virtual desktop sessions between devices....
US-9,516,019 Method, system and terminal for encrypting/decrypting application program on communication terminal
A method, system and terminal for encrypting and decrypting an application program on a communication terminal are disclosed, including the communication...
US-9,516,018 Credential technology
In one implementation, a server system receives, from a device of a user, a request to validate a credential of a second user. The server system identifies the...
US-9,516,017 System and device for consolidating SIM, personal token, and associated applications for electronic wallet...
The present invention relates generally to a smart card device that is configured to facilitate wireless network access and credential verification....
US-9,516,016 Storage array password management
A system and method for generating passwords for secure login to a storage array. A randomly generated root secret is utilized along with a compartment ID to...
US-9,516,015 Apparatus and method for cryptographic operations using enhanced knowledge factor credentials
Provided is a process that includes: obtaining a multi-byte character set specifying a plurality of characters; receiving a knowledge factor credential encoded...
US-9,516,014 Intelligent task assignment and authorization systems and methods
The present disclosure relates to computer-implemented methods and systems for intelligent task management. An example method may include identifying one or...
US-9,516,013 Communication apparatus, method of controlling the same and storage medium for transmitting image file to a...
Disclosed are a communication apparatus and a method of controlling the same. The communication apparatus sets, if it is designated to perform encrypted...
US-9,516,012 Method and server of electronic safes with information sharing
A method of managing electronic safes implemented by a server on behalf of at least one user possessing at least a first electronic safe, said method comprising...
US-9,516,011 MRCP resource access control mechanism for mobile devices
A system and method for Media Resource Control Protocol (MRCP) access control for a mobile device. An entity requesting to utilize MRCP resources establishes a...
US-9,516,010 Authenticating a user while the user operates a client apparatus and possesses an electronic card
A technique perform authentication. The technique involves receiving an authentication request from a user operating a client apparatus (e.g., the user's smart...
US-9,516,009 Authenticating redirection service
A redirection service may receive a destination URI plus a set of conditions for reaching the URI. The conditions may include authentication conditions. The...
US-9,516,008 Generating challenge response sets utilizing semantic web technology
Embodiments of the present invention relate to generating challenge response sets utilizing semantic web technology. In response to detecting an authentication...
US-9,516,007 Verifier and prover have an authentication protocol with challenge-response with the challenge from prover...
An information processing apparatus including a memory and one or more processors coupled to the memory and configured to transmit commitment information,...
US-9,516,006 Re-programmable secure cryptographic device
A re-programmable wireless cryptographic device can store data securely and use near field communication (NFC) to exchange functionality data and/or program...
US-9,516,005 Individual-specific content management
A method, system, apparatus, and computer program product are provided for facilitating individual-specific content management. For example, a method is...
US-9,516,004 Detecting horizontal attacks
Horizontal attacks may be detected in an authentication system by comparing entered credentials to a list of common credentials, increasing a score if the...
US-9,516,003 Unified cloud computing network interface
A cloud computing network device is disclosed. The device is configured to receive a request from a joining device for access to the cloud computing network,...
US-9,516,002 Systems and methods for securing data in motion
Two approaches are provided for distributing trust among certificate authorities. Each approach may be used to secure data in motion. One approach provides...
US-9,516,001 Methods and apparatus to identify media distributed via a network
Methods, apparatus, systems and articles of manufacture to monitor media presentations are disclosed. An example method includes extracting first network packet...
US-9,516,000 Runtime instantiation of broadcast encryption schemes
Embodiments of the present invention relate to runtime instantiation of broadcast encryption schemes. In one embodiment, a method of and computer program...
US-9,515,999 Automated access, key, certificate, and credential management
Certain embodiments provide means for managing automated access to computers, e.g., using SSH user keys and other kinds of trust relationships. Certain...
US-9,515,998 Secure and scalable detection of preselected data embedded in electronically transmitted messages
A method and apparatus for detecting preselected data embedded in electronically transmitted messages is described. In one embodiment, the method comprises...
US-9,515,997 Inline data encryption
Organizations maintain and generate large amount of sensitive information that needs to be saved electronically and there is a need to store that data remotely...
US-9,515,996 Distributed password-based authentication in a public key cryptography authentication system
An authentication system comprises a plurality of servers storing respective shares of a private key, and a controller associated with the servers. The...
US-9,515,995 Method and apparatus for network address translation and firewall traversal
Various disclosed embodiments include methods and systems for network address translation traversal. The method comprises receiving, at a Voice over Internet...
US-9,515,994 Keyword ordered storage, search and retrieval on encrypted data for multiuser scenario
A method and system for a multi-user searchable encryption system over ordered keywords is disclosed. The system includes a key generation server which issues a...
US-9,515,993 Automated migration planning for moving into a setting of multiple firewalls
A method, a computer program product, and a computer system for automatically migrating servers into an environment of multiple firewalls. A computer creates a...
US-9,515,992 Network environment separation
The presently disclosed subject matter includes, inter alia, a separation module being operatively connectible to a network device operable to facilitate data...
US-9,515,991 Managing authentication requests when accessing networks
Techniques for managing authentication requests. At a gateway device to a network, packets of a message intended for said network are received. Fields within...
US-9,515,990 Communicating reregistration information based on the lifetime of a communication session
Methods are described for communicating a reregistration timer to a mobile device. A request is received from a mobile device to establish an IP communication...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.