Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,756,059 Token based automated agent detection
Service providers may operate one or more services configured to detect requests generated by automated agents. A CAPTCHA may be transmitted in response to...
US-9,756,058 Detecting network attacks based on network requests
Techniques for analyzing access to a network-based document may be provided. For example, the network-based document may be configured for direct access from...
US-9,756,057 System and method for enhanced display-screen security and privacy
A security method that includes assigning a sensitivity value for a communication with a sensitivity determining module including at least one hardware...
US-9,756,056 Apparatus and method for authenticating a user via multiple user devices
A method includes forming, during access to a site, an association between a user and a first device. Contact information for a second device associated with...
US-9,756,055 Method and apparatus for controlling resources access
Controlling resource access, a first device responsive to a request for access to a resource, determines whether to grant the access to the resource, based on...
US-9,756,054 Establishing and using a trust level in mobile phones
Automatically establishing and/or modifying a trust relationship between devices, including mobile devices, in communication, and customizing a user interface...
US-9,756,053 Facilitating security enforcement for shared content
Systems and methods that relate to security enforcement for shared content are described. A system includes an interface component that facilitates a display of...
US-9,756,052 Method and apparatus for dual stack access
The present invention discloses a method of dual stack access, wherein a network device authenticates the first protocol address of a requesting client, stores...
US-9,756,051 Targeted user access control system
A system includes a network interface, at least one processing device, and at least one memory device. The at least one memory device stores instructions that...
US-9,756,050 Using transient processing containers for security authorization
Authorization decisions can be made in a resource environment using authorization functions which can be provided by customers, third parties, or other such...
US-9,756,049 System and method for managing several mobile devices simultaneously
A learning management system and method. Controllable devices, generally intended for students of a smart classroom, are each operable in a locked configuration...
US-9,756,048 System and methods for executing encrypted managed programs
The present disclosure relates to systems and methods for enabling execution of encrypted managed programs in common managed execution environments. In...
US-9,756,047 Embedding security posture in network traffic
Embedding security posture in network traffic is disclosed. Security posture information is received. The security posture information is embedded into a...
US-9,756,046 Network system and communication device therein
A network system includes first nodes and a second node. Each first node is directly communicatively connected to the second node, or each first node is...
US-9,756,045 Method, device and computer-readable medium for enabling virtual subscriber identity module card
Method, device and computer-readable medium for enabling a virtual Subscriber Identity Module (SIM) card are provided in the disclosure, which belongs to a...
US-9,756,044 Establishment of communication connection between mobile device and secure element
The invention relates to communication technology, and in particular, to a method of establishing communication connection between a mobile device and a secure...
US-9,756,043 Terminal apparatus, program, and communication system
Authentication information comprising mobile subscriber information of a mobile communication terminal may be communicated to a server, and one or more devices...
US-9,756,042 Systems and methods for authentication and verification
Computer systems and methods are provided for authenticating a user seeking to conduct at least one interaction with a secured capability provided by a...
US-9,756,041 Offline access control for an application
Techniques to facilitate offline access control for an application associated with an industrial automation environment are disclosed herein. In at least one...
US-9,756,040 User authentication method with enhanced security
A user authentication method with enhanced security is provided. The method includes generating a first common authentication key if a user of the user terminal...
US-9,756,039 Document rendering service
Disclosed are some examples of systems, methods and storage media for generating a platform-independent document. In some implementations, a system is capable...
US-9,756,038 Information processing apparatus, information providing server, program, communication system, and login...
In one example embodiment, the communication system disclosed herein includes an information processing apparatus that acquires address information from a...
US-9,756,037 Layered certification
A certification provenance tree (CPT) structure may provide information concerning a layered certification of a device that comprises a hierarchy of components....
US-9,756,036 Mechanisms for certificate revocation status verification on constrained devices
A process is provided for communication security certificate revocation status verification by using the client device as a proxy in online status verification...
US-9,756,035 Device fingerprint registration for single sign on authentication
A device fingerprinting system provides an additional factor of authentication. A user device may be redirected, along with user ID parameters, to...
US-9,756,034 Law enforcement agency portal
Implementations of the present disclosure involve a system and/or method for providing account information for a telephone number. All users are authenticated...
US-9,756,032 Identity data based on aggregating input data
A computing device, a system, and a method are provided to receive a number of inputs associated with one or more sensors of the computing device. One or more...
US-9,756,031 Portable access to auditing information
Systems and methods provide a storage media on a portable physical object associated with a set of credentials that enables access to a set of computing...
US-9,756,030 Secure cloud based multi-tier provisioning
Systems, methods, and other embodiments associated with secure cloud based multi-tier provisioning are described. In one embodiment, a method includes storing,...
US-9,756,029 Method and system for authenticating at least one terminal requesting access to at least one resource
For authenticating at least one terminal requesting access to at least one resource, an authentication server performs: obtaining for each terminal at least one...
US-9,756,028 Methods, systems and computer program products for secure access to information
Methods for secure communications are provided. The methods include creating a safe user account on a secure access system, wherein creating an account includes...
US-9,756,027 Protected information sharing
A request for sharing information of a first user to a second user is received. Responsive to the request, information of the first user is obtained. The...
US-9,756,026 Reconfigurable access network encryption architecture
An access platform or other network elements can include multiple line cards configured to encrypt data. The platform and/or each of the line cards may receive...
US-9,756,025 System and method for secured content delivery
A content delivery platform is provided that includes generating a first content package of content that is encrypted with a unique symmetric key, and a second...
US-9,756,024 Computer-implemented cryptographic method for improving a computer network, and terminal, system and...
A method at a terminal in a multiple-node digital communications network, comprising any one or more of: generating at least one symmetric first key(s), across...
US-9,756,023 Token-based secure data management
In some implementations, tokens that are representative of sensitive data may be used in place of the sensitive data to maintain the security of the sensitive...
US-9,756,022 Enhanced remote key management for an enterprise in a cloud-based environment
Systems and methods are disclosed for facilitating remote key management services in a collaborative cloud-based environment. In one embodiment, the remote key...
US-9,756,021 Secure messaging
A method for transmitting an encrypted message from a messaging server (106) to a handset (104) comprising the steps of receiving, at the messaging server (106)...
US-9,756,020 Persistent uniform resource locators (URLs) for client applications acting as web services
Techniques to provide persistent uniform resource locators (URLs) for client applications acting as web services are described herein. In one or more...
US-9,756,019 DNS-based captive portal with integrated transparent proxy to protect against user device caching incorrect IP...
A captive portal system includes a login database, a web server, and a name server. The name server receives a DNS request from a user device, queries the login...
US-9,756,018 Establishing secure remote access to private computer networks
Techniques are described for providing users with access to computer networks, such as to enable users to interact with a remote configurable network service to...
US-9,756,017 Data leak protection in upper layer protocols
Methods and systems for Data Leak Prevention (DLP) in a private network are provided. According to one embodiment, a packet is received by a network security...
US-9,756,016 Security services for end users that utilize service chaining
Embodiments described herein provide security for end users of User Equipment (UE) that utilize service chaining for Service Data Flows (SDFs). One embodiment...
US-9,756,015 Creating network isolation between virtual machines
A method, system, and program product for creating network isolation between virtual machines is provided, including receiving, by a security virtual machine...
US-9,756,014 System and method for responding to aggressive behavior associated with wireless devices
An embodiment of the invention describes a wireless device comprising a Subscriber Identity Module (SIM) further comprising a memory for storing program code...
US-9,756,013 Distributed mapping of address and port (MAP) between a provider edge device and customer premise equipment devices
In one embodiment, a provider edge (PE) device in a computer network determines an IPv4 address and link-layer address for each adjacent customer premise...
US-9,756,012 Domain name service information propagation
A computing resource service receives a request from a customer to assign a domain name to a computing resource. The computing resource service may submit a...
US-9,756,011 System and method for logging communications
A method for logging communication includes determining when a target user is active and identifying an access device and private Internet Protocol (IP) address...
US-9,756,010 Resolving network address conflicts
Exemplary systems and methods resolve an IP address conflict in a network system, including network systems in a virtual computing environment. An IP address...
US-9,756,009 Message forwarding among disparate communication networks
A method and system for forwarding information to a device in a communication network are disclosed. According to one aspect, a method includes selecting a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.