Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,002,1110 Dynamic adjustment of authentication mechanism
According to one aspect of the present disclosure, a method and technique for dynamic adjustment of authentication mechanism is disclosed. The method includes:...
US-1,002,1109 System and method for automatically providing proximity based guest access to a network of resource devices
A method for providing guest access to a guest user for a network resource device based on proximity includes provisioning a plurality of network resource...
US-1,002,1108 Anomaly detection for access control events
Methods for managing access to protected resources within a computing environment and detecting anomalies related to access control events are described. An...
US-1,002,1107 Methods and systems for managing directory information
Methods and systems for managing directory information, such as onboarding a LDAP server, employing a processor coupled to memory and other computer hardware...
US-1,002,1106 Logging location and time data associated with a credential
Location information of a client device associated with a credential is determined to be tracked. The credential has been granted to a user of the client device...
US-1,002,1105 Mobile device enabled tiered data exchange via a vehicle
A mobile device enabled tiered data exchange via a vehicle is disclosed. A mobile device can access profile information related to a tiered-data sharing...
US-1,002,1104 Method for operating a security element
A method for operating a security element, preferably in the form of a chip card, having a processor, and a memory. stores an operating system comprising an...
US-1,002,1103 Service authorization methods and apparatuses
An apparatus and method to authorize Application Programming Interface (API) or method level access in system and application services are provided. The method...
US-1,002,1102 Leak-proof classification for an application session
The present disclosure discloses a system and method for classifying an application session for forwarding or refrain from forwarding to a client. Generally,...
US-1,002,1101 Embedding security posture in network traffic
Embedding security posture in network traffic is disclosed. Security posture information is received. The security posture information is embedded into a...
US-1,002,1100 Systems and methods for device authentication
Embodiments include methods, and systems and computing devices configured to implement the methods of authenticating a computing device. A processor of a first...
US-1,002,1099 Methods and systems for persistent cross-application mobile device identification
Systems and methods are provided for persistent cross-application mobile device identification. A mobile device may have a plurality of sandboxes in memory...
US-1,002,1098 Account login method, device, and system
An account login method detects whether an account login request carries an indicator for keeping a logged-in state to determine whether a user decides to keep...
US-1,002,1097 Systems and methods for upgrading authentication systems
Methods and systems for authenticating a user are described. In some embodiments, an authentication request including biometric information collected from a...
US-1,002,1096 Biometric information management method and biometric information management apparatus
In a biometric information management method, a first comparison result is acquired by comparing first biometric input information with registered first...
US-1,002,1095 System, method, and computer program for two layer user authentication associated with connected home devices
A system, method, and computer program product are provided for two layer user authentication associated with connected home devices. In use, it is determined...
US-1,002,1094 System and method for providing wearable authentication and management
A system for wearable authentication and management is disclosed. In particular, the system may include identifying and authenticating a user through biometric...
US-1,002,1093 System and method for communicating credentials
A system and method for conducting transactions involving the communication of credentials connected to an entity or an individual, known as the presenter to a...
US-1,002,1092 Systems and methods for device authentication
Systems and methods for providing access to secure information are disclosed. In one aspect, a computer-implemented method for providing access to secure...
US-1,002,1091 Secure authorization systems and methods
Systems and methods for secure user authentication are described. In certain embodiments, a client device such as a smartphone may be provisioned with a secure...
US-1,002,1090 Managing online shop using instant messaging system
A method and a system for managing an online shop use an instant messaging system to allow an auxiliary account to log in and manage an online shop of a primary...
US-1,002,1089 Customized user validation
Mechanisms and techniques for customized user validation. A login attempt is received from a remote electronic device with one or more computing devices that...
US-1,002,1088 Fast smart card logon
Methods and systems for faster and more efficient smart card logon and for giving a client device full domain access in a remote computing environment are...
US-1,002,1087 Method and system for providing a secure communication channel to portable privatized data
A system and method for communicating secure, privatized data stored on a first user device with a second user device requesting access thereto includes...
US-1,002,1086 Delegation of authority for users of sign-on service
Techniques are described for providing customizable sign-on functionality, such as via an access manager system that provides single sign-on functionality and...
US-1,002,1085 Encryption and decryption techniques using shuffle function
Encryption and decryption techniques based on one or more transposition vectors. A secret key is used to generate vectors that describe permutation (or...
US-1,002,1084 Systems and methods for credentialing of non-local requestors in decoupled systems utilizing a domain local...
Embodiments as disclosed provide systems and methods that use a local authenticator within a domain to provide a credential to access a resource of the domain...
US-1,002,1083 Providing credential information
A server system maintains data indicative of credentials held by multiple different users. Each of the credentials has been issued by a credential granting...
US-1,002,1082 Integration of form and file services
A system includes at least one forms service computing device, the forms service computing device executing code to produce a user interface allowing access to...
US-1,002,1081 Method and apparatus for trust-based, fine-grained rate limiting of network requests
A method and apparatus for fine-grained, trust-based rate limiting of network requests distinguishes trusted network traffic from untrusted network traffic at...
US-1,002,1080 Group membership block chain
A system and method for achieving authorization in confidential group communications in terms of an ordered list of data blocks representing a tamper-resistant...
US-1,002,1079 Security system, method, and apparatus
Systems, apparatuses and methods are described for creating security information using sensors. The security information may be collected independently between...
US-1,002,1078 System, apparatus and method for encryption and decryption of data transmitted over a network
A method and system for securing data transmitted between a client device and a server by obtaining input text at an intermediate module, processing the input...
US-1,002,1077 System and method for distributing and using signed send tokens
The disclosed system allows a user to have access to a protected network through the distribution of signed send tokens. In particular, a device associated with...
US-1,002,1076 Method and system for the supply of data, transactions and electronic voting
A method and system for supply of data, including generating a first digital certificate referred (empowerment certificate) signed with a first signing entity's...
US-1,002,1075 Multiple data center data security
Securely replicating backup data in a network having a production site and a plurality of remote sites by generating in the production site a data encryption...
US-1,002,1074 Encrypting method and decrypting method of security short message and receiving apparatus for receiving...
An encrypting method of a security short message includes performing a first encryption computation according to a short message content and a deadline code to...
US-1,002,1073 Systems and methods for delivering messages over a network
Systems and methods are described for delivering messages from one or more service hosts to clients via a network. A first request identifying the client is...
US-1,002,1072 Security system and communication control method
A security system comprising: a first gateway device; a second gateway device; and a duplex communication line, wherein a first proxy part of the first gateway...
US-1,002,1071 Detector tree for detecting rule anomalies in a firewall policy
A device may receive rule information, associated with a firewall policy, that includes a set of N rules. The device may add a rule, of the set of N rules, to a...
US-1,002,1070 Method and apparatus for federated firewall security
In one embodiment, a method includes receiving capability information from an end host at a centralized security matrix in communication with a firewall and a...
US-1,002,1069 Real time dynamic client access control
A system and method for facilitating controlled access by a client device to one or more services provided by a server are disclosed. The client device's access...
US-1,002,1068 Method, system and apparatus for keeping session table alive in net address translation apparatus
Embodiments of the disclosure provide a method for keeping a session table alive in a Network Address Translation, NAT, apparatus, including: creating a hello...
US-1,002,1067 Internet protocol address distribution for wireless network
Some embodiments provide a system that includes an Internet Protocol (IP) address distribution device and an access point. The IP address distribution device...
US-1,002,1066 Clustered server sharing
A method and a system environment allowing installation of an application into excess capacity of an existing server and that allows the application to coexist...
US-1,002,1065 System and method for suppressing DNS requests
A virtual private router (VPR) intercepts DNS requests and returns a pseudo IP address to the requesting application and the pseudo IP address is mapped to a...
US-1,002,1064 Apparatus and method for translating industrial process control and automation system events into mobile...
A method includes receiving information identifying multiple events in an industrial process control and automation system and routing the events to one or more...
US-1,002,1063 Apparatus and method for protecting proprietary information over public notification infrastructure
A method includes generating an obfuscation of a notification and transmitting the obfuscation to an end-user device via an unsecure notification...
US-1,002,1062 Secure electronic mail system
An e-mail system is disclosed that overcomes many deficiencies of, but is backward compatible with, existing e-mail systems. Embodiments of the system may...
US-1,002,1061 Message presentation management in a social networking environment
Disclosed aspects relate to message presentation management in a social networking environment. A message from a source may be detected in the social networking...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.