Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,002,1114 Determining the legitimacy of messages using a message verification process
A server computer receives an indication of an interaction between a first user device of a first user and a second user device of a second user, where the...
US-1,002,1113 System and method for an integrity focused authentication service
Systems and methods for authentication. At an authentication service, key synchronization information is stored for an enrolled authentication device for a user...
US-1,002,1112 System, method and computer program product for performing one or more maintenance tasks on a remotely located...
A method and computer executable program code are disclosed for performing one or more maintenance tasks on a remotely located computer connected to a server...
US-1,002,1111 Location based authentication of users to a virtual machine in a computer system
An apparatus and method uses location based authentication of a user accessing a virtual machine (VM) by using the physical location of the virtual machine as a...
US-1,002,1110 Dynamic adjustment of authentication mechanism
According to one aspect of the present disclosure, a method and technique for dynamic adjustment of authentication mechanism is disclosed. The method includes:...
US-1,002,1109 System and method for automatically providing proximity based guest access to a network of resource devices
A method for providing guest access to a guest user for a network resource device based on proximity includes provisioning a plurality of network resource...
US-1,002,1108 Anomaly detection for access control events
Methods for managing access to protected resources within a computing environment and detecting anomalies related to access control events are described. An...
US-1,002,1107 Methods and systems for managing directory information
Methods and systems for managing directory information, such as onboarding a LDAP server, employing a processor coupled to memory and other computer hardware...
US-1,002,1106 Logging location and time data associated with a credential
Location information of a client device associated with a credential is determined to be tracked. The credential has been granted to a user of the client device...
US-1,002,1105 Mobile device enabled tiered data exchange via a vehicle
A mobile device enabled tiered data exchange via a vehicle is disclosed. A mobile device can access profile information related to a tiered-data sharing...
US-1,002,1104 Method for operating a security element
A method for operating a security element, preferably in the form of a chip card, having a processor, and a memory. stores an operating system comprising an...
US-1,002,1103 Service authorization methods and apparatuses
An apparatus and method to authorize Application Programming Interface (API) or method level access in system and application services are provided. The method...
US-1,002,1102 Leak-proof classification for an application session
The present disclosure discloses a system and method for classifying an application session for forwarding or refrain from forwarding to a client. Generally,...
US-1,002,1101 Embedding security posture in network traffic
Embedding security posture in network traffic is disclosed. Security posture information is received. The security posture information is embedded into a...
US-1,002,1100 Systems and methods for device authentication
Embodiments include methods, and systems and computing devices configured to implement the methods of authenticating a computing device. A processor of a first...
US-1,002,1099 Methods and systems for persistent cross-application mobile device identification
Systems and methods are provided for persistent cross-application mobile device identification. A mobile device may have a plurality of sandboxes in memory...
US-1,002,1098 Account login method, device, and system
An account login method detects whether an account login request carries an indicator for keeping a logged-in state to determine whether a user decides to keep...
US-1,002,1097 Systems and methods for upgrading authentication systems
Methods and systems for authenticating a user are described. In some embodiments, an authentication request including biometric information collected from a...
US-1,002,1096 Biometric information management method and biometric information management apparatus
In a biometric information management method, a first comparison result is acquired by comparing first biometric input information with registered first...
US-1,002,1095 System, method, and computer program for two layer user authentication associated with connected home devices
A system, method, and computer program product are provided for two layer user authentication associated with connected home devices. In use, it is determined...
US-1,002,1094 System and method for providing wearable authentication and management
A system for wearable authentication and management is disclosed. In particular, the system may include identifying and authenticating a user through biometric...
US-1,002,1093 System and method for communicating credentials
A system and method for conducting transactions involving the communication of credentials connected to an entity or an individual, known as the presenter to a...
US-1,002,1092 Systems and methods for device authentication
Systems and methods for providing access to secure information are disclosed. In one aspect, a computer-implemented method for providing access to secure...
US-1,002,1091 Secure authorization systems and methods
Systems and methods for secure user authentication are described. In certain embodiments, a client device such as a smartphone may be provisioned with a secure...
US-1,002,1090 Managing online shop using instant messaging system
A method and a system for managing an online shop use an instant messaging system to allow an auxiliary account to log in and manage an online shop of a primary...
US-1,002,1089 Customized user validation
Mechanisms and techniques for customized user validation. A login attempt is received from a remote electronic device with one or more computing devices that...
US-1,002,1088 Fast smart card logon
Methods and systems for faster and more efficient smart card logon and for giving a client device full domain access in a remote computing environment are...
US-1,002,1087 Method and system for providing a secure communication channel to portable privatized data
A system and method for communicating secure, privatized data stored on a first user device with a second user device requesting access thereto includes...
US-1,002,1086 Delegation of authority for users of sign-on service
Techniques are described for providing customizable sign-on functionality, such as via an access manager system that provides single sign-on functionality and...
US-1,002,1085 Encryption and decryption techniques using shuffle function
Encryption and decryption techniques based on one or more transposition vectors. A secret key is used to generate vectors that describe permutation (or...
US-1,002,1084 Systems and methods for credentialing of non-local requestors in decoupled systems utilizing a domain local...
Embodiments as disclosed provide systems and methods that use a local authenticator within a domain to provide a credential to access a resource of the domain...
US-1,002,1083 Providing credential information
A server system maintains data indicative of credentials held by multiple different users. Each of the credentials has been issued by a credential granting...
US-1,002,1082 Integration of form and file services
A system includes at least one forms service computing device, the forms service computing device executing code to produce a user interface allowing access to...
US-1,002,1081 Method and apparatus for trust-based, fine-grained rate limiting of network requests
A method and apparatus for fine-grained, trust-based rate limiting of network requests distinguishes trusted network traffic from untrusted network traffic at...
US-1,002,1080 Group membership block chain
A system and method for achieving authorization in confidential group communications in terms of an ordered list of data blocks representing a tamper-resistant...
US-1,002,1079 Security system, method, and apparatus
Systems, apparatuses and methods are described for creating security information using sensors. The security information may be collected independently between...
US-1,002,1078 System, apparatus and method for encryption and decryption of data transmitted over a network
A method and system for securing data transmitted between a client device and a server by obtaining input text at an intermediate module, processing the input...
US-1,002,1077 System and method for distributing and using signed send tokens
The disclosed system allows a user to have access to a protected network through the distribution of signed send tokens. In particular, a device associated with...
US-1,002,1076 Method and system for the supply of data, transactions and electronic voting
A method and system for supply of data, including generating a first digital certificate referred (empowerment certificate) signed with a first signing entity's...
US-1,002,1075 Multiple data center data security
Securely replicating backup data in a network having a production site and a plurality of remote sites by generating in the production site a data encryption...
US-1,002,1074 Encrypting method and decrypting method of security short message and receiving apparatus for receiving...
An encrypting method of a security short message includes performing a first encryption computation according to a short message content and a deadline code to...
US-1,002,1073 Systems and methods for delivering messages over a network
Systems and methods are described for delivering messages from one or more service hosts to clients via a network. A first request identifying the client is...
US-1,002,1072 Security system and communication control method
A security system comprising: a first gateway device; a second gateway device; and a duplex communication line, wherein a first proxy part of the first gateway...
US-1,002,1071 Detector tree for detecting rule anomalies in a firewall policy
A device may receive rule information, associated with a firewall policy, that includes a set of N rules. The device may add a rule, of the set of N rules, to a...
US-1,002,1070 Method and apparatus for federated firewall security
In one embodiment, a method includes receiving capability information from an end host at a centralized security matrix in communication with a firewall and a...
US-1,002,1069 Real time dynamic client access control
A system and method for facilitating controlled access by a client device to one or more services provided by a server are disclosed. The client device's access...
US-1,002,1068 Method, system and apparatus for keeping session table alive in net address translation apparatus
Embodiments of the disclosure provide a method for keeping a session table alive in a Network Address Translation, NAT, apparatus, including: creating a hello...
US-1,002,1067 Internet protocol address distribution for wireless network
Some embodiments provide a system that includes an Internet Protocol (IP) address distribution device and an access point. The IP address distribution device...
US-1,002,1066 Clustered server sharing
A method and a system environment allowing installation of an application into excess capacity of an existing server and that allows the application to coexist...
US-1,002,1065 System and method for suppressing DNS requests
A virtual private router (VPR) intercepts DNS requests and returns a pseudo IP address to the requesting application and the pseudo IP address is mapped to a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.