Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,578,039 OAM security authentication method and OAM transmitting/receiving devices
The present invention provides an operations, administration and maintenance (OAM) security authentication method and OAM packet transmitting/receiving devices....
US-9,578,038 Electronic devices having adaptive security profiles and methods for selecting the same
Adaptive security profiles are supported on an electronic device. One or more security profiles may be automatically or selectively applied to the device based...
US-9,578,037 Allowing varied device access based on different levels of unlocking mechanisms
Systems and methods may provide for receiving runtime input from one or more unlock interfaces of a device and selecting a level of access with regard to the...
US-9,578,036 Access revocation
Systems and apparatuses for revoking access to one or more applications for one or more individuals or users are provided. In some examples, revocation settings...
US-9,578,035 System and method to use a cloud-based platform supported by an API to authenticate remote users and to provide...
A security system for authenticating users and protecting content that provides an application program interface (API) with a Cloud Platform integration...
US-9,578,034 Trusted peripheral device for a host in a shared electronic environment
A trusted peripheral device can be utilized with an electronic resource, such as a host machine, in order to enable the secured performance of security and...
US-9,578,033 Security profile management in a machine-to-machine messaging system
Techniques and systems for managing security profiles in a machine-to-machine messaging system are provided. For example, computing device, a method, and a...
US-9,578,032 Application publishing using memory state sharing
Examples described herein enable memory state sharing among a plurality of virtual machines (VM) including a parent VM and a child VM. A request for memory...
US-9,578,031 Non-invasive method and system for automated administration of diverse security constrained servers
A method of automatically administering servers is disclosed. The method includes automatically transmitting commands to at least one of the servers....
US-9,578,030 Method and system for analyzing security ruleset by generating a logically equivalent security rule-set
There are provided a rule-set analyzer and a method of analyzing an ordered security rule-set comprising a plurality of rules and characterized by at least one...
US-9,578,029 Diameter signaling for mobile IPv4
The invention consists of a new registration and authentication protocol for between a Mobile Node and a Home Agent. The new protocol uses a novel messaging...
US-9,578,028 Subscriber management using a restful interface
A controller provides authentication, authorization, and accounting (AAA) services for a network, the controller comprising a control unit having one or more...
US-9,578,027 Multiple data store authentication
System and methods for authenticating access to multiple data stores are disclosed. The system may include a server coupled to a network, a client device in...
US-9,578,026 Method and system for device dependent encryption and/or decryption of music content
A method and system is disclosed that provides at least one server device; and at least one remote audio playback device, the remote audio playback device...
US-9,578,025 Mobile network-based multi-factor authentication
Verification of a user login to a secure account from a mobile device occurs when the user provides login credentials and a hardware identifier (ID)...
US-9,578,024 Continuous authentic of mobile device users
Technology for performing continuous authentication of a mobile device utilizes user activity context data and biometric signature data related to the user. A...
US-9,578,023 Identity assertion based on biometric information
A method and apparatus for providing a lifetime extension to an identity assertion is provided herein. During operation a user will authenticate to an identity...
US-9,578,022 Multi-factor authentication techniques
An authentication technique with a teaching phase and authentication phase. In the teaching phase, authentication information is collected for a user in at...
US-9,578,021 Methods and systems for distributing cryptographic data to authenticated recipients
A method includes receiving, by an access control management system, from a first client device, information associated with an encrypted data object. The...
US-9,578,020 Module for controlling usability of a device
Module (10) for controlling usability of a processing unit (2) of a device (1), the module comprising a modem (11) for communicating with a cellular network,...
US-9,578,019 Method and system for managing an embedded secure element eSE
A method and system for managing an embedded secure element (50) accessible as a slave of the resident applications (App1-3) of a host device of the eSE. The...
US-9,578,018 Remote sign-out of web based service sessions
Remote sign-out of web based service sessions. As a part of remote sign-out of web based service sessions, a user authentication token is accessed that is used...
US-9,578,017 Secure management of operations on protected virtual machines
Deploying an encrypted entity on a trusted entity is illustrated herein. A method includes, at a trusted entity, wherein the trusted entity is trusted by an...
US-9,578,016 Optimizing secure communications between a client authenticating server and a mobile client
Systems and techniques are described for optimizing secure communications. Specifically, a first intermediary and a second intermediary can split-terminate a...
US-9,578,015 Step-up authentication for single sign-on
A method for authenticating a user seeking access to first and second resources that have different authentication levels. The method includes receiving a...
US-9,578,014 Service profile-specific token attributes and resource server token attribute overriding
A framework, which conforms to the OAuth standard, involves a generic OAuth authorization server that can be used by multiple resource servers in order to...
US-9,578,013 System and method for secure content sharing and synchronization
A flexible content sharing system may comprise a network based application built on a client device using information from dissociated user experience component...
US-9,578,012 Restricted content publishing with search engine registry
A processor-implemented method is provided. The method may include providing a content registry with at least one application program interface (API) to manage...
US-9,578,011 Proxy bypass login for applications on mobile devices
In one embodiment, an intermediate server receives a request with a secure ID to authorize a software application, transmits the secure ID to a system, receives...
US-9,578,010 Mobile handset extension to a device
Mobile operation is extended to a device. An extension interface comprises a client component within a mobile that is linked to a client component within the...
US-9,578,009 System and method for supporting security in a multitenant application server environment
In accordance with an embodiment, described herein is a system and method for providing security in a multitenant application server environment. In accordance...
US-9,578,008 Technologies for secure bootstrapping of virtual network functions
Technologies for bootstrapping virtual network functions in a network functions virtualization (NFV) network architecture include a virtual network function...
US-9,578,007 Secure transmission of a session identifier during service authentication
In an embodiment a method is performed by a network access device (NAD). The NAD transfers a first HTTPS request from a client computer (UE) to an identity...
US-9,578,006 Restricted content publishing with search engine registry
A processor-implemented method is provided. The method may include providing a content registry with at least one application program interface (API) to manage...
US-9,578,005 Authentication server enhancements
A set of authentication server configuration rules are implemented. The authentication server configuration rules utilize regular-expression based commands. A...
US-9,578,004 Authentication of API-based endpoints
A method includes detecting an incoming request from a first application to a second application. The method further includes performing an authentication that...
US-9,578,003 Determining whether to use a local authentication server
The present disclosure discloses a method and a system for determining whether to use a local authentication server. Specifically, a first network device...
US-9,578,002 Authentication device and method for electronic atomization device based on mobile terminal
Disclosed are an authentication device and an authentication method for electronic atomization device based on mobile terminal. The device includes a Bluetooth...
US-9,578,001 Method and network node device for running push-button configuration sessions within heterogeneous network and...
A heterogeneous home network (with possibly multiple hops between devices) uses a push button configuration mechanism that ensures only one single new network...
US-9,578,000 Content level navigation systems and methods
An exemplary system includes a media content processing subsystem configured to provide a first interactive graphical user interface to a display for...
US-9,577,999 Enhanced security for registration of authentication devices
A system, apparatus, method, and machine readable medium are described for enhanced security during registration. For example, one embodiment of a method...
US-9,577,998 Dynamic file access to files of unmapped remote computers
Dynamically providing access to files of presently unmapped remote computers, including, responsive to receiving a file access request from a user, displaying a...
US-9,577,997 Authentication system and authentication method
On-vehicle control units include an attaching section for attaching a message code used to check the validity of the transmission source of communication data,...
US-9,577,996 Computer system and method for encrypted remote storage
A method for remotely storing data is provided. The method comprises providing a first data file on a client computer; splitting, on the client computer, the...
US-9,577,995 Systems and methods for enabling secure communication between endpoints in a distributed computerized...
A computer-implemented method performed in a system comprising a first endpoint, the first endpoint comprising at least one central processing unit, a memory, a...
US-9,577,994 Off-host authentication system
An off-host authentication system includes a network. An off-host processing system is coupled to the network and sends an encrypted authentication item through...
US-9,577,993 System and method for authenticating users
A security application for a computing device, e.g., a mobile phone, allows generation of a secret according to a unique user input (e.g., user credentials)....
US-9,577,992 Data encryption/decryption using neuro and neuro-mechanical fingerprints
In accordance with one embodiment, a method for securing data is disclosed. The method includes sensing multi-dimensional motion of a body part of a user to...
US-9,577,991 System and method for processing transactions
Embodiments of the invention include methods, systems, and computer-readable media for processing transactions involving sensitive information, such as a credit...
US-9,577,990 Control of access to a secondary system
A method for controlling access of a user to a secondary system. A primary system receives, from a user system connected to the secondary system, first...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.