Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,009,7561 Data loss prevention for mobile computing devices
System calls to a kernel of a mobile computing device are monitored. A particular system call is intercepted relating to input/output (I/O) functionality of the...
US-1,009,7560 Systems and methods for automatically adjusting user access permissions based on beacon proximity
The disclosed computer-implemented method for automatically adjusting user access permissions based on beacon proximity may include (1) identifying a...
US-1,009,7559 Method and apparatus for providing an adaptable security level in an electronic communication
A method of communicating in a secure communication system, comprises the steps of assembling a message at a sender, then determining a frame type, and...
US-1,009,7558 Delegated permissions in a distributed electronic environment
Permissions can be delegated to enable access to resources associated with one or more different accounts, which might be associated with one or more different...
US-1,009,7557 Virtual collaboration systems and methods
A system including a domain controller and a document, policy, and collaboration servers. The document server receives a request signal based on an input...
US-1,009,7556 Methods and systems for maintaining reachability of a messaging application
Exemplary embodiments relate to techniques for the atomic switching of user accounts for a messaging client, in order to maintain constant network availability...
US-1,009,7555 Device-to-device network membership confirmation
An electronic device in a device-to-device network of a user of the electronic device communicates with a group of one or more other instances of the electronic...
US-1,009,7554 Technologies for secure server access using a trusted license agent
Technologies for secure server access include a client computing device that loads a license agent into a secure enclave established by a processor of the...
US-1,009,7553 Installation of a secure-element-related service application in a secure element in a communication device,...
A method for installation of a secure-element-related service application in a secure element of a user equipment (UE) associated with a subscriber of a...
US-1,009,7552 Network of trusted users
A system may include at least one server having a processor and a communication interface communicatively coupled to an Internet connection and a non-transitory...
US-1,009,7551 Authorization token cache system and method
A system includes one or more processors to request access tokens from a token service computer, cache the access tokens and related information in a token...
US-1,009,7550 Systems and methods for providing security via interactive media
Methods and systems for providing security and verifying a human user and/or an authorized user are described. A system may include a processor and a...
US-1,009,7549 Apparatus and methods for device authorization in a premises network
Apparatus and methods for enabling protected premises networking capabilities. In one embodiment, a white list of devices authorized to access a premises...
US-1,009,7548 Automobile network to communicate with multiple smart devices
Embodiments are directed towards establishing a network between mobile devices, an automobile head unit, and a plurality of automobile accessories. A user...
US-1,009,7547 Security verification method, apparatus and terminal
Disclosed are a security verification method, apparatus, and terminal. The method includes: acquiring a first verification code and prompting the first...
US-1,009,7546 Authentication of a user device using traffic flow information
A device may receive traffic flow information that includes user device identifiers. The device may receive, from a user device accessing an application...
US-1,009,7545 Nullifying biometrics
Artificial biometric traits self-nullify due to natural physiological processes. Biometric enrollment and authentication may then be based on a life associated...
US-1,009,7544 Protection and verification of user authentication credentials against server compromise
Authenticating a user is provided. A decryption key corresponding to an authentication account of the user of a client device and authentication credential data...
US-1,009,7543 Networked device access control
A computer apparatus is remotely initiated. Confirmation of a detected and authenticated presence of a user remote from the computer apparatus is detected and...
US-1,009,7542 Mobile user interface system and methods therefor
A system. At least some embodiments are a system including a first processor and a non-volatile random access memory coupled to the first processor, the...
US-1,009,7541 Computer security based on mouse device speed setting authentication
A method of performing operations by a processor of a computer terminal, includes determining an operation system (OS) speed scaling gain used by the OS to...
US-1,009,7540 Convenient WiFi network access using unique identifier value
A WiFi network manager stores a unique identifier value such as a network address associated with a communication device as being a valid credential for the...
US-1,009,7539 Authentication on a computing device
Systems and/or methods provide a user of a first computing device with the ability to authenticate themselves on a remotely provided process or service using a...
US-1,009,7538 User authentication systems and methods
A method of authenticating a user of a multifunction device to a server, the method comprising associating a user-supplied image with user login credentials,...
US-1,009,7537 Cloud-based authentication keyboard
Aspects of the subject disclosure may include, for example a method that includes detecting, by a system comprising a processor, a password creation request,...
US-1,009,7536 Space-time separated and jointly evolving relationship-based network access and data protection system
A network security system that employs space-time separated and jointly-evolving relationships to provide fast network access control, efficient real-time...
US-1,009,7535 Methods and apparatuses for securely operating shared host computers with portable apparatuses
The present invention provides methods and apparatuses that utilize a portable apparatus to securely operate a host electronic device. Typically, each portable...
US-1,009,7534 System and method to redirect hardware secure USB storage devices in high latency VDI environments
In certain information handling system environments, physical devices connected to a client are redirected to a server or other information handling system....
US-1,009,7533 Detection and repair of broken single sign-on integration
An identity management system provides single sign-on (SSO) services to clients, logging the clients into a variety of third-party services for which the...
US-1,009,7532 Session management technique
A system for managing sessions between a client and multiple servers includes: a receiver for receiving, as a proxy for each of the servers, a request from the...
US-1,009,7531 Techniques for credential generation
A plurality of virtual computing resources is detected to have been provisioned. Credentials are distributed to the plurality of virtual computing resources. A...
US-1,009,7530 Security authentication method and bidirectional forwarding detection BFD device
A security authentication method includes: receiving, by a control plane of a BFD device, a first BFD packet that is sent by a control plane of a peer BFD...
US-1,009,7529 Semiconductor device for controlling access right to server of internet of things device and method of...
A method of operating a hub which authenticates a plurality of IoT devices between a server and the IoT devices in place of the server includes authenticating a...
US-1,009,7528 Non-repeatable challenge-response authentication
User data is aggregated across a plurality of electronic communication channels and domains. An online system initially authenticates a user for access to the...
US-1,009,7527 Authentication management
A method of managing authentication during a user session comprises the steps of operating a user session for a specific user, maintaining a user authentication...
US-1,009,7526 Key distribution in a wireless system
Distribution of a key in a wireless system comprising at least one mobile device is disclosed. Data regarding relative rotation between devices in optical data...
US-1,009,7525 System, apparatus and method for generating dynamic IPV6 addresses for secure authentication
Apparatus, system and method for authenticating a device for secure network communication. Identification data is configured as a hash of a public key for...
US-1,009,7524 Network configuration method, and related apparatus and system
A network configuration method, including acquiring a public key operation value of a second device in an out-of-band manner, acquiring a public key copy of the...
US-1,009,7523 Method and system for providing secure remote external client access to device or service on a remote network
In order to provide secure user access to a device or service on a remote network, upon receipt of a request to access the device or service on a portal on a...
US-1,009,7522 Encrypted query-based access to data
A query-based system for sharing encrypted data, comprising at least one hardware processor; and at least one non-transitory memory device having embodied...
US-1,009,7521 Transparent encryption in a content centric network
One embodiment provides a system that facilitates efficient and transparent encryption of packets between a client computing device and a content producing...
US-1,009,7520 Method and apparatus for causing delay in processing requests for internet resources received from client devices
A method and apparatus for delaying responses to requests in a server are described. Upon receipt, from a client device, of a first request for a resource at a...
US-1,009,7519 Process and system for selectable data transmission
Methods and systems are provided for selectable data transmissions. An electronic key may be assigned to authenticated data associated with a particular user,...
US-1,009,7518 Data encryption parameter dispersal
A method for securely distributing a profile within a dispersed storage network (DSN) that begins by encrypting a profile using a key. The method continues by...
US-1,009,7517 Secure tunnels for the internet of things
A system for the maintenance and creation of security tunnels between IoT devices and IoT cloud servers, comprising the steps of receiving one or more packets...
US-1,009,7516 Partitioning a filter to facilitate filtration of packets
A method may include obtaining a match vector that indicates one or more filter rules that are potentially applicable to a packet. The method may include...
US-1,009,7515 Firewall control device, method and firewall device
A firewall control device controls a plurality of firewall devices provided between a core network and a plurality of sub-networks respectively, the firewall...
US-1,009,7514 Filtering hidden data embedded in media files
Systems and methods for filtering unsafe content by a network security device are provided. According to one embodiment, a network security device captures...
US-1,009,7513 Trusted execution environment extensible computing device interface
Constructs to define a Trusted Execution Environment Driver that can implement a standard communication interface in a first environment for discovering and/or...
US-1,009,7512 System and methods of installing and operating devices without explicit network addresses
A method of discovering addressing information of one or more upstream devices to respond to specific messages by a second device on behalf of the one or more...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.