Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,590,989 Data access and anonymity management
Techniques described herein provide data access and data anonymity management within various implementations of content distribution networks. In some...
US-9,590,988 Service location based authentication
A computer is configured to receive a request to access an application, the request having a header. The header includes a source address and an encrypted...
US-9,590,987 Dynamic distribution of authentication sessions
This disclosure relates to authenticating and providing transport security over unsecured IP networks to network subscribers. The system includes an...
US-9,590,986 Local user authentication with neuro and neuro-mechanical fingerprints
In accordance with one embodiment, a method for locally verifying the identification of a user with an electronic device is disclosed. The method includes...
US-9,590,985 Authentication frequency and challenge type based on application usage
An apparatus and method are disclosed for determining authentication frequency (i.e., the length of time between authenticating and re-authenticating a user)...
US-9,590,984 Smartphone fingerprint pass-through system
Systems and methods are provided for unlocking remote devices using a biometric input that is associated with a code stored on a mobile electronic device. After...
US-9,590,983 Self-authenticating chips
A self-authenticating chip includes first and second memory regions storing, respectively, first and second authentication codes. The second memory region is...
US-9,590,982 Proximity based dual authentication for a wireless network
A method of accessing a network wirelessly is described. In the method an authentication is provided to access the network from a wireless device to a first...
US-9,590,981 System, method, and device for delivering communications and storing and delivering data
A system, method, and device includes a platform data storage that stores a wrap that secures an executable controller and executable sensors. The wrap is...
US-9,590,980 Mapping specific user credentials to temporary user favorite credentials
A system for automatically completing fields in online forms, such as login forms and new user registration forms, which employs a Master Cookie File containing...
US-9,590,979 Password constraint enforcement used in external site authentication
Techniques for password constraint enforcement used in external site authentication are disclosed. In some embodiments, password constraint enforcement used in...
US-9,590,978 Verification of password using a keyboard with a secure password entry mode
The present invention includes a device and method to authenticate a user to a computer prior to the user having access to the computer or network. As user name...
US-9,590,977 Secure authenticated distance measurement
The invention relates to a method for a first communication device to perform authenticated distance measurement between the first communication device and a...
US-9,590,976 Network-assisted fabric pairing
Systems and methods for joining a device to a fabric using an assisting device include an indication to add a joining device to a fabric. If the joining device...
US-9,590,975 Efficient network layer for IPv6 protocol
An electronic device may include a network interface that may enable the electronic device to wirelessly couple the electronic device to other electronic...
US-9,590,974 Communication apparatus, communication system, and recording medium
A communication apparatus includes a communication unit that connects with an external device in a one-to-one relationship, the external device storing...
US-9,590,973 Methods for fraud detection
Method and systems for validating a client user in a secured network are provided. Upon authentication, a user is supplied a login cookie that includes...
US-9,590,972 Application authentication using network authentication information
In general, in one aspect, embodiments relate to receiving, by a system of one or more network devices from a client device, a request to access one or more...
US-9,590,971 Environment-aware security tokens
The technology described in this document can be embodied in a computer implemented method that includes receiving, at a processing device, information about...
US-9,590,970 Methods, systems, and computer program products for operating a communication network to facilitate the secure...
A method includes performing operations as follows on a processor: initiating an outgoing connection to the communication session, establishing communication...
US-9,590,969 Identity verification services using private data
A method includes receiving a request, from a client, to verify that an operator of the client is a purported individual. The request includes a personal...
US-9,590,968 Methods and apparatus for transacting with multiple domains based on a credential
In one embodiment, a method includes receiving from a credential a credential-owner authentication information associated with an identity of an individual. A...
US-9,590,967 Application authentication policy for a plurality of computing devices
A method, system, and computer accessible medium are disclosed for launching an application authentication policy (AAP) application on a computing device,...
US-9,590,966 Reducing authentication confidence over time based on user history
Technologies are provided in embodiments to manage an authentication confirmation score. Embodiments are configured to identify, in absolute session time, a...
US-9,590,965 Determining that a gaming device is communicating with a gaming server
A gaming server provides activities and/or services to a player through a gaming device. To verify whether the gaming device is communicating with the gaming...
US-9,590,964 GPS-enabled cross-domain guard
A method for routing of information between networks of differing security levels may include, but is not limited to: receiving a data packet from a first...
US-9,590,963 System and method for key management for issuer security domain using global platform specifications
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for key management for Issuer Security Domain (ISD) using...
US-9,590,962 Using cookies to identify security contexts for connectionless service
A mobility management entity (MME) receives a request for a key to establish a security context for communication between a base station and a user equipment in...
US-9,590,961 Automated security provisioning protocol for wide area network communication devices in open device environment
An automated security provisioning protocol is provided for wide area network communication devices in an open device environment, such as cellular...
US-9,590,960 Method and apparatus for controlling transmission of content data
Provided are a method and apparatus for controlling transmission of content data. In the method, a communication channel is initially established to transmit...
US-9,590,959 Data security service
A distributed computing environment utilizes a cryptography service. The cryptography service manages keys securely on behalf of one or more entities. The...
US-9,590,958 Secure file transfer
The present disclosure describes techniques for storing encrypted files in a secure file repository and transferring those encrypted files to one or more...
US-9,590,957 Bluesalt security
Embodiments of the present invention disclose a method, system, and computer program product for bluesalt security. A computer receives a confidential data...
US-9,590,956 Decentralized authoritative messaging
A secure chat client is described that allows users to exchange encrypted communications via secure chat rooms, as well as one-to-one communications. In...
US-9,590,955 Methods and systems for providing information relating to an event
An organizer may send information relating to an event to participants via text messaging without having participants' texting numbers. Particularly, organizer...
US-9,590,954 Transferring encrypted and unencrypted data between processing devices
Methods, apparatus and computer readable media for transferring encrypted and unencrypted data between processing devices are disclosed. Example data...
US-9,590,953 Information processing device, information processing method, and program
Provided is an information processing device including: a data processing unit that performs a content playback process; and a communication unit that...
US-9,590,952 Lossy data stream decoder
Lossy data stream decoder techniques are described herein. In response to a request for decoded content from a consuming application, a decoder may validate...
US-9,590,951 One-time pad communications network
A system and method for providing secure and anonymous communication between a plurality of individuals relying on the cryptographic method of the one-time pad...
US-9,590,950 Source based anonymity and segmentation for visitors
A method and system for the anonymization and segmentation of the media access control (MAC) addresses reported by visitors' 802.11 enabled devices at a venue...
US-9,590,949 Confidential message exchange using benign, context-aware cover message generation
Systems and methods are disclosed permitting a sender to send a secret and secure message to a recipient. An application on a sender device interfaces with...
US-9,590,948 CCN routing using hardware-assisted hash tables
One embodiment provides a system that facilitates forwarding of packets with variable length names. During operation, the system receives a packet with a...
US-9,590,947 IP management method, client and server
An IP management method, a client and a server. The method comprises: searching, by a client, a first correlation table, and determining an IP address of a...
US-9,590,946 Managing content delivery network service providers
A system, method, and computer readable medium for managing CDN service providers are provided. A network storage provider storing one or more resources on...
US-9,590,945 Systems and methods for event stream management
A system for managing event streams is provided that includes a volatile memory, a non-volatile memory, and a processor. The volatile memory is configured to...
US-9,590,944 Organizing messages in a messaging system using social network information
A messaging system receives a message that is intended for a recipient, who is a user of a social networking system. An object associated with the message is...
US-9,590,943 Offline prompts of online social network mentions
A system, method and apparatus for creating scripts to provide offline prompts in a social networking application operating on a client device are provided....
US-9,590,942 Context and content in notifications
A system and method is disclosed for informing a user of recent activities in an online social network. A notification list, displayed in the online social...
US-9,590,941 Message handling
A sender of a message may be alerted that the message he is sending contains content that may be culturally sensitive to the recipient of the message. The...
US-9,590,940 End to end email monitor
A disclosed example method to monitor an email system involves sending a first test email from a first email system to a second email system. The first test...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.