At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Detection of an unauthorized wireless communication device
A technique for the detection of an unauthorized wireless communication device includes monitoring of Bluetooth.RTM. communications activity by a Bluetooth.RTM....
Electronic support allowing access to remote audio/video assets
A physical device, the possession of which may provide access to digital media content in a fashion similar to the possession of a DVD providing access to the...
Template for customer attributes
The present disclosure extends to methods, systems, and computer program products for establishing an attribute template for a customer for distribution to...
Captcha challenge incorporating obfuscated characters
A method for determining if a user of a computer system is a human. A processor receives an indication that a computer security program is needed and acquires...
User authentication based on other applications
The present invention includes a system for authenticating a second action based on a first action, wherein the system is configured to: receive a first request...
Device-specific tokens for authentication
A user who is authenticated to a system or service across a network can receive a token that includes a device fingerprint. The fingerprint can include...
Secret supplemental username
Methods for a secret supplemental username are provided. In one example, a method includes the steps of detecting a threat to an account with a primary username...
Communication between authentication plug-ins of a single-point
authentication manager and client systems
Various arrangements for providing authentication information to a user are presented. A single-point authentication manager executed by a computer system may...
Terminal authentication system and method for vehicle network connection
A terminal authentication method for vehicle network connection is disclosed. The terminal authentication method includes acquiring unique identification...
Splitting an SSL connection between gateways
A system for secure communication, including a first security computer communicatively coupled with a client computer via an SSL connection, including a...
Sending session tokens through passive clients
A session token can be requested to be sent to a first computing service from a second computing service, and a first computing service can receive the...
Non-transitory computer readable medium, server and system
A server may store one or more accounts. Each account may be associated with an authentication code and a total number of information devices that are allowed...
Methods, systems, and computer program products for managing media content
by capturing media content at a...
Media content is managed by defining a list of authorized recipients in a network accessible security information repository, recording media content at a...
Message content adjudication based on security token
A computer program product for processing a message is provided. The computer program product comprises a computer readable storage medium having program...
Encryption key retrieval
Particular embodiments described herein provide for an electronic device that can be configured to include an authentication module. The authentication module...
Method for the encryption of data
To improve known encryption methods for communication in non-secured wireless networks, the invention proposes using an active key for encryption, in each...
Content protection for extract, transform, load (ETL) scripts
Embodiments encrypt Extract, Transform, Load (ETL) scripts created by a developer for an initial customer, against unauthorized access and copying. Such...
Multi-faceted compute instance identity
A compute instance of a virtual computing service (VCS) is assigned first and second cryptographically verifiable identities (CVIs) within respective...
Secure address resolution protocol
This disclosure describes, in part, systems, devices, and techniques to encrypt address resolution protocol (ARP) messages to prevent a rogue device from...
Computer product, recording medium, communications apparatus, and
Improvement of the security of communication is facilitated. A server receives from an on-vehicle device, encrypted data obtained by encrypting ECU information...
Method and opportunistic sensing
A method in a first device for anonymously delivering data to a part that has initiated a task is provided. The first device and the part initiating a task are...
Face based secure messaging
In an embodiment, a system includes at least one core and a trusted execution environment (TEE) to conduct an identity authentication that includes a comparison...
Method and system for roaming website account and password
A method and system for roaming website accounts and passwords are provided. The method is operational on a first client and includes: authenticating website...
Methods and systems for managing concurrent unsecured and
cryptographically secure communications across...
An endpoint, method, and authorization server are disclosed which can be used to allow concurrent secure and clear text communication. An endpoint includes a...
Systems and methods for obscuring network services
A computer-implemented method for obscuring network services may include (1) identifying a local network comprising at least one client and at least one host,...
Systems and methods for providing secure access to local network devices
A computer-implemented method for providing secure access to local network devices may include (1) identifying a local area network that provides Internet...
Multiple CPU architecture platform network firewall
A system includes a communication processor and an application processor communicatively coupled to the communication processor. The communication processor is...
Automatic assignment of internet protocol addresses in a ring network
In one embodiment, a negotiation is performed between each adjacent pair of a plurality of packet switching devices in a ring network to determine an Internet...
Efficient method of NAT without reassemling IPV4 fragments
A method, apparatus, and machine readable storage medium is disclosed for performing network address translation (NAT) on fragments of a Internet Protocol (IP)...
Manage encrypted network traffic using DNS responses
Managing encrypted network traffic using Domain Name System responses includes requesting an address associated with a domain name from a resolution server, the...
Request routing utilizing point of presence load information
A system, method and computer-readable medium for request routing based on prioritization and load information are provided. A client request processing a...
Synchronous communication system and method
A method, computer program product, and computing system for providing a plurality of users of a social network with the ability to indicate affinity with an...
System for automatic blogging and social group interactions
A system that supports automatic blogging as well as social group interactions comprises a mobile device with a client application that is communicatively...
Offender message delivery system
A correctional facility communication system for sending an external message to an offender of a correctional facility is disclosed. The correctional facility...
Reserving space in a mail queue
A mail handler is provided. The mail handler manages a source queue for incoming messages. The source queue has a first count of slots in memory and is...
Method of and system for reformatting an e-mail message based on a
There is disclosed a method of reformatting an e-mail message having a header and a body having content in a received format, the method comprising: receiving,...
Enhanced wireless short message service
A wireless device for processing an SMS message stores the message on a local first storage device, and sends the message to a wireless carrier SMS facility....
Selecting subsets of participants in electronic message threads
Embodiments of the present invention provide methods, computer program products, and systems for selecting subsets of participants in electronic message...
Method and system for improving establishing of a multimedia session
Multimedia communication systems and methods are disclosed. An exemplary system comprises a server adapted to communicate with two or more multimedia endpoints;...
Method and system for updating reorder depth in robust header compression
The present document provides a method and system for updating a reorder depth in robust header compression. The method comprises: when determining a reorder...
Method for acquiring physical address of virtual machine
A method for acquiring a physical address of a virtual machine includes acquiring, by a first switching endpoint, an address list of N switching endpoints from...
Network control apparatus and method for creating and modifying logical
A network controller for managing several managed switching elements that forward data in a network that includes the managed switching elements. The network...
Method, device and computer program for selecting a router node in an LLN
A method for selecting a router node in a LLN (Low power and Lossy Network) type telecommunication network wherein, upon receipt by a router node of a data...
Connecting stack member devices in stacked switches systems
A stacked switches system may include multiple stack member devices, which belong to more than two stack groups. Number of the stack groups is less than number...
Method and system for managing resources among different clients for an
A method and a system share resources of a server among different clients. The system has a server which contains a maximum number m of resources among which a...
Using templates to configure cloud resources
The present invention extends to methods, systems, and computer program products for using templates to configure cloud resources. Embodiments of the invention...
Ordering traffic captured on a data connection
Ordering partial network traffic. In an embodiment, data packets are received from a network tap and separated into two queues. For each queue, a push-sequence...
Facilitating buffer wait time determination based on device- or
Systems and methods that relate to determination of buffer wait time based on defined parameters are described. A method includes: determining, by a first...
System and method for controlling lifespan of interaction requests
An apparatus for controlling lifespan of interaction requests includes a processor and a memory, the memory storing instructions that when executed by the...
2.5 GBPS/5GBPS ethernet communications over a full duplex communication
Transceiver architecture includes circuitry and a method to transmit and receive high speed WAP data over lower speed cabling such as Cat5e. The method begins...