Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,006,3567 System for cross-host, multi-thread session alignment
A method of detecting aberrant behavior in a software application is described. The method includes instantiating replicated applications on computing devices...
US-1,006,3566 Intelligent network access control
A method for managing a private wireless network includes a processor that generates the private wireless network within a part of a coverage area of a local...
US-1,006,3565 Method and system for geolocation verification of resources
A method of geolocation verification, including obtaining the geolocation of an operating system, generating a unique system ID for an installed operating...
US-1,006,3564 Identity authentication using multiple devices
A system, method, and computer-readable medium for performing an authentication operation comprising: identifying a plurality of user devices associated with a...
US-1,006,3563 Trustworthiness of processed data
A method indicates a trustworthiness of data processed in accordance with a processing rule. A first trust weight is assigned to a data item to be processed to...
US-1,006,3562 Flexible access management framework based on measuring application usage behavior
Techniques of controlling access to a resource involve selecting an authentication scheme for authenticating a user based on an environmental context in which...
US-1,006,3561 Authentication and authorization without the use of supplicants
Provided is authentication and authorization without the use of supplicants. Authentication and authorization includes generating a profile for a device based...
US-1,006,3560 Gaze-based authentication
A user may be authenticated to access an account, computing device, or other resource using gaze tracking. A gaze-based password may be established by prompting...
US-1,006,3559 Sharing content in social networks
The present disclosure relates to systems, methods, and software for sharing content in social networks. A request from a user of the social network to share...
US-1,006,3558 Method for blocking unauthorized data access and computing device with feature of blocking unauthorized data access
Methods and apparatuses for blocking unauthorized data access are provided, one of methods comprises, monitoring whether there is an access to an object by an...
US-1,006,3557 Account access recovery system, method and apparatus
Some embodiments of the invention provide a program for recovering access to an account. The program receives an access recovery parameter (ARP) after providing...
US-1,006,3556 Content service on demand
A method is provided and may include receiving a request for a network content delivery service from an access device; directing the access device to a network...
US-1,006,3555 Method, apparatus, and system for achieving privilege separation
Methods, apparatus, and systems for achieving privilege separation are provided herein. In an exemplary method, an operation-applying instruction sent by a...
US-1,006,3554 Techniques for detecting unauthorized access to cloud applications based on velocity events
A system and method for detecting unauthorized access to cloud applications based on velocity events are presented. The method includes identifying a first...
US-1,006,3553 Programmable display
A programmable display for connection to a control device includes: a user management unit configured to identify a user accessing the programmable display; a...
US-1,006,3552 Unified workspace for thin, remote, and SAAS applications
Application-manager software authenticates a user of a client device over a channel. The authentication operation is performed using a directory service. The...
US-1,006,3551 Advanced gateway device
The present disclosure is directed to an advanced gateway device ("gateway") for enabling communications between devices operating on or in communication with a...
US-1,006,3550 Method and system for realizing presence service, presence information processing device and presentity client
A method for processing presence information is disclosed. Presence information includes different values of a presence element, classes corresponding to the...
US-1,006,3549 Techniques for sharing authentication data among authentication servers
A technique of supporting multi-factor authentication uses a database server. The technique involves receiving suspicious user activity data from a first set of...
US-1,006,3548 System, method, and program product for processing secure transactions within a cloud computing system
Particular systems, methods, and program products for web-based security systems for user authentication and processing in a distributed computing environment...
US-1,006,3547 Authorization authentication method and apparatus
A third-party application client performs authorization authentication with a user client and a platform server. The third party application obtains an access...
US-1,006,3546 Network access control method and apparatus
A network access control method and apparatus. The network access control method includes configuring network access permission of a first application, where...
US-1,006,3545 Rapid identification of message authentication
Techniques are presented for uniquely identifying authentication associated with messages. A message is inspected for sender or domain identifying information...
US-1,006,3544 System and method for supporting consistent handling of internal ID spaces for different partitions in an...
A system and method can support consistent handling of internal ID space for different partitions in an InfiniBand (IB) network. A plurality of partitions can...
US-1,006,3543 Computer implemented method to prevent attacks against user authentication and computer programs products thereof
The computer implemented method comprising: receiving a first server a request in the name of a user to be logged into a service of said first server and...
US-1,006,3542 Systems and methods for simultaneous voice and sound multifactor authentication
A computer-implemented method is described for authenticating an identity of a user requesting execution of a computerized transaction via a first client...
US-1,006,3541 User authentication method and electronic device performing user authentication
Provided are a user authentication method and an electronic device performing the method. The method is performed under the control of a processor and includes...
US-1,006,3540 Trusted status transfer between associated devices
The embodiments set forth systems and techniques to authenticate a user device for device services, such as by transferring or extending a trusted device status...
US-1,006,3539 SSO functionality by means of a temporary password and out-of-band communications
A system and method for using a single-use password to add SSO functionality to a service of a Service Provider belonging to an F-SSO federation that does not...
US-1,006,3538 System for secure login, and method and apparatus for same
A system for secure login, and a method and an apparatus for the same are disclosed. The system for secure login comprises: an authentication unit; a first...
US-1,006,3537 Permission architecture for remote management and capacity instances
When a user inputs an action request, such as a requested command, to be performed on a target machine, a management system receives the request and verifies it...
US-1,006,3536 Short term or one-time-use X.509 digital certificates
A method includes receiving a request from a certificate user to utilize a short-term private key-public key pair. The short-term private key-public key pair...
US-1,006,3535 User authentication based on personal access history
Methods and systems are provided for authenticating a user using data related to the historical interactions of the user with computer based applications.
US-1,006,3534 System and method for providing security monitoring
The present disclosure describes systems and methods for processing security sensor data that enhances the ability of a user to quickly and efficiently review...
US-1,006,3533 Protecting a web server against an unauthorized client application
An approach is provided for securing communication between a server computer and a client computer. A first string is sent to the client in response to a...
US-1,006,3532 Authentication apparatus that authenticates user
Provided is an authentication apparatus that performs user authentication, using a wearable terminal worn by a user, whereby allowing a high security to be...
US-1,006,3531 Method for key rotation
A method for key rotation includes initiating key rotation for a user account of a multi-factor authentication platform enabling one-time password...
US-1,006,3530 Voice-over-internet protocol credentials
A computer-implemented method to provide voice-over-internet protocol (VoIP) credentials to a device may include receiving, at a system, first credentials from...
US-1,006,3529 Secure 3D model sharing using distributed ledger
This document generally describes systems, methods, devices, and other techniques for using distributed ledgers, such as a blockchain database, to facilitate...
US-1,006,3528 Searchable encryption enabling encrypted search based on document type
A searchable encryption method enables encrypted search of encrypted documents based on document type. In some embodiments, the searchable encryption method is...
US-1,006,3527 Techniques for handshake-free encrypted communication using symmetric key caching during request-and-response
Techniques for handshake-free encrypted communication are described. An apparatus may comprise a key component, a message component, and a network component....
US-1,006,3526 Method and apparatus for secure provisioning of an integrated circuit device
A method of operating an integrated circuit may include generating a session key with a random number generator circuit. The session key may then be used to...
US-1,006,3525 Collision avoidance in a distributed tokenization environment
A client receives sensitive data to be tokenized. The client queries a token table with a portion of the sensitive data to determine if the token table includes...
US-1,006,3524 Method and apparatus for encoding security status information
A method of transmitting messages from a sender to a recipient over a wireless channel, the messages including a sequence counter and a frame counter. The...
US-1,006,3523 Crafted identities
Crafted identities are provided. A statement is provided to the principal for using a crafted identity. The statement includes an identifier that provides...
US-1,006,3522 System and method for operating a safety-critical device over a non-secure communication network
A system and method for operating, at a near location, a safety-critical device located at a far location. The system includes a first operating input device to...
US-1,006,3521 Client network access provision by a network traffic manager
In one embodiment, a computer implemented method provides a client computing device network access to a private network by a network traffic manager, and the...
US-1,006,3520 Smart storage with VPN and discovery
Systems and methods for independently secured storage are described. In one embodiment, a storage device includes a network adapter to discover a remote storage...
US-1,006,3519 Automatically optimizing web application firewall rule sets
In one embodiment, a rule optimization application optimizes a rule set that a firewall applies to protect web applications from on-line attacks. The rule...
US-1,006,3518 Reducing data connections for transmitting secured data
A method for reducing data transfer connections is provided. The method may include receiving data requests associated with devices. The method may further...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.