Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,017,1455 Protection of application passwords using a secure proxy
Protecting application passwords using a secure proxy. A request is received by a proxy from a client to access a protected resource located on a target server....
US-1,017,1454 Method for producing dynamic data structures for authentication and/or password identification
A method for generating a changing authentication input or password generation input for a user is provided. The method allows access to a computing device such...
US-1,017,1453 Generalized certificate use in policy-based secure messaging environments
Within a secure messaging environment, a determination is made that a request to send a message has been generated by a message sender. A message protection...
US-1,017,1452 Server authentication using multiple authentication chains
A client seeking to establish a cryptographically-secure channel to a server has an associated public key acceptance policy. The policy specifies a required...
US-1,017,1451 Distributed single sign-on
Respective cryptographic shares of password data, dependent on a user password, are provided at n authentication servers. A number t.sub.1.ltoreq.n of the...
US-1,017,1450 Global time based authentication of client devices
A system for authenticating client devices for communication with one or more wireless communications networks, includes a client device configured to receive a...
US-1,017,1449 Account login method and device
Provided are an account login method and an apparatus. A first account is associated with a second account, and information of a login target corresponding to...
US-1,017,1448 Single sign-on for unmanaged mobile devices
Disclosed are various examples for providing a single sign-on experience for mobile devices that may or may not be managed. A service provider receives an...
US-1,017,1447 Single sign-on for unmanaged mobile devices
Disclosed are various examples for providing a single sign-on experience for mobile applications that may or may not be managed. A first application executed in...
US-1,017,1446 Method and apparatus for limiting traffic rate to an origin server
A method and an apparatus of limiting a rate at which traffic is received at an origin server are described. A first request for a resource at an origin server...
US-1,017,1445 Secure virtualized servers
A system may be configured to provide secure access to a physical resource through the use of a partitionable virtual input/output server in a virtualized...
US-1,017,1444 Securitization of temporal digital communications via authentication and validation for wireless user and...
An access control system and associated devices are described that conceal and securitize data transmissions between one or more secure databases for various...
US-1,017,1443 Displaying the accessibility of hyperlinked files
The accessibility of a hyperlinked files is displayed. A hyperlink that references a resource is extracted from a target file. An attempt to acquire the...
US-1,017,1442 Predicting a need for and creating temporary access to a computer component in infrastructure information...
A computer server may be monitored, and a request that requires executing an action on the computer server is received. Server configuration associated with the...
US-1,017,1441 System and method for transforming Channel ID communications in man-in-the-middle context
Embodiments can provide a computer implemented method in a data processing system comprising a processor and a memory comprising instructions, which are...
US-1,017,1440 Method and apparatus for managing encryption keys for cloud service
Key management methods and systems are provided, one of methods comprises, encrypting a service key used by an instance of a first user of a cloud service by...
US-1,017,1439 Owner based device authentication and authorization for network access
Methods and computerized units grant network access to any one of multiple devices of the same owner. Each of the multiple devices has been previously...
US-1,017,1438 Generating a password
User input is received from a user for identifying a particular account from among multiple accounts. A set of questions specific for the particular account is...
US-1,017,1437 Techniques for security artifacts management
Techniques are provided to manage security artifacts. Specifically, a security management system is disclosed for implementing security artifact archives to...
US-1,017,1436 Distributed learning and aging for management of Internet protocol (IP) addresses
A device includes a security process unit (SPU) associated with a logical ring of SPUs. The SPU receives a packet with an address associated with a malicious...
US-1,017,1435 Devices that utilize random tokens which direct dynamic random access
The disclosure provides for one or more devices and associated system that securitize and conceal data transmitted to and/or data received from the devices that...
US-1,017,1434 Managed device scatternet administration
Managed device scatternet administration is described herein. In one example, to form a scatternet of managed devices, a network entry request including a...
US-1,017,1433 System and method for authenticating users
A security application for a computing device, e.g., a mobile phone, allows generation of a secret according to a unique user input (e.g., user credentials)....
US-1,017,1432 Systems to implement security in computer systems
Systems, methods, and non-transitory computer-readable medium are provided to secure data centers and cloud computing. A method receives network identifiers for...
US-1,017,1431 Secure message handling of an application across deployment locations
A method and system for secure message handling of an application across deployment locations. The application is divided into multiple processing nodes which...
US-1,017,1430 Making a secure connection over insecure lines more secure
A secure or insecure communications channel for a secure communications system that carries sensitive user datagrams inside a proprietary or other undisclosed...
US-1,017,1429 Providing security to video frames
A method and system are provided for processing a media stream including at least a portion of a media program in a player executed by a computer. The player is...
US-1,017,1428 Confidential data management method and device, and security authentication method and system
The present invention relates to a method for safely managing confidential data and a security authentication method and system for performing a security...
US-1,017,1427 Portable encryption and authentication service module
Portable, hand-held electronic devices and methods to allow a user to anonymously utilize a host device are presented. The host device includes a processor to...
US-1,017,1426 Home network controlling apparatus and method to obtain encrypted control information
A network control apparatus and method is provided. The method includes operations of informing a server of capability information including an ...
US-1,017,1425 Active firewall control for network traffic sessions within virtual processing platforms
Methods and systems are disclosed that provide active firewall control for network traffic sessions within virtual processing platforms. Client agent instances...
US-1,017,1424 Privacy enhancing networks
The presently disclosed privacy enhancing networks (PENs) comprises a network of gateways in communication with one or more controllers. By dynamically creating...
US-1,017,1423 Services offloading for application layer services
A device may receive a set of packets. The device may select a first one or more packets, of the set of packets, for a Layer 7 (L-7) inspection based on a type...
US-1,017,1422 Dynamically configurable packet filter
A configurable packet filtering system includes a packet filter configured to receive packets or groups of packets on an input. The packet filter compares...
US-1,017,1421 Intrusion prevention and detection in a wireless network
The invention provides an intrusion detection and prevention system and computer program which, when operated or executed by a security element (7) situated...
US-1,017,1420 Spatial reuse for uplink multiuser transmissions
Methods, apparatuses, computer readable media for spatial reuse for uplink multi-user transmissions. An apparatus of a station comprising processing circuitry...
US-1,017,1419 IP route caching with two search stages on prefix length
A data packet is received in a network element. The network element has a cache memory in which cache entries represent a portion of addresses stored in a main...
US-1,017,1418 Method and apparatus for accessing demilitarized zone host on local area network
A method for accessing a demilitarized zone (DMZ) host in a local access network (LAN) includes: configuring a mapping relationship between public IP addresses...
US-1,017,1417 Distributed IP allocation and de-allocation mechanism in a communications network having a distributed S/PGW...
A non-transitory computer readable medium has instructions stored therein to be executed by a packet processing unit (PPU) in a communications network to allow...
US-1,017,1416 Method for establishing data connection on mobile network, mobile network, and policy control entity
A method for establishing data connections on a mobile network, a mobile network, and a policy control entity are disclosed. The method includes: establishing a...
US-1,017,1415 Characterization of domain names based on changes of authoritative name servers
Embodiments relate to systems, devices, and computer-implemented methods for characterizing domain names by determining a name server switching footprint for...
US-1,017,1414 Method for allocating internet protocol addresses to clients of a network and corresponding apparatus
An access device and an extender access device, forming a network for network client devices. A single IP address attribution server in the network attributes...
US-1,017,1413 Secure electronics mail system
An e-mail system is disclosed that overcomes many deficiencies of, but is backward compatible with, existing e-mail systems. Embodiments of the system may...
US-1,017,1412 Email quota management system
A computer receives an out of office status a user has indicated on an email application, the email application using a communications network and determines a...
US-1,017,1411 Communication message consolidation with content difference formatting
A set of similar messages addressed to a user is detected. Redundantly similar portions of the set of similar messages and a progressive set of differences...
US-1,017,1410 Cross-mode communiation
The techniques described herein are directed to cross-channel communication. The techniques can employ a central method, system, or mode ("Cross-Mode Manager"...
US-1,017,1409 Systems and methods for path optimization in a message campaign
A method is provided for path optimization for a message campaign. A graphical user interface representation of the message campaign is displayed. Sets of input...
US-1,017,1408 Following/subscribing for productivity applications
A method for following asynchronous and synchronous productivity application communications includes providing, by an update processor, a targeted medium with a...
US-1,017,1407 Cognitive adjustment of social interactions to edited content
A shift in sentiment is computed, the shift including a difference between an original sentiment value of an original content of a post on social media and an...
US-1,017,1406 Managing encouraging messages from social media contacts to enhance performance
An approach is provided for managing messages for an individual. Using one or more social media services, encouraging messages are solicited from social media...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.