Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,026,3999 System for securely accessing network address, and device and method therein
Disclosed are a system for securely accessing a network address, and a device and a method therein. The system for securely accessing a network address...
US-1,026,3998 Automated determination of relevance of a security alert to one or more other security alerts based on shared...
A processing device in one embodiment comprises a processor coupled to a memory and is configured to obtain a plurality of security alerts in a computer...
US-1,026,3997 Data integrity verification
A system performs cryptographic operations utilizing information usable to verify validity of plaintext. To prevent providing information about a plaintext by...
US-1,026,3996 Detecting fraudulent user access to online web services via user flow
Techniques to detect unauthorized access and/or use of a user's account provided by an online web service are provided. A user's activity on the online web...
US-1,026,3995 Provisional computing resource policy evaluation
A policy management service receives a request to evaluate a provisional policy to determine the impact of implementation of the provisional policy. The policy...
US-1,026,3994 Authorized delegation of permissions
Systems and methods are described for delegating permissions to enable account access to entities not directly associated with the account. The systems...
US-1,026,3993 Access guards for multi-tenant logging
A multi-tenant logging system that allows a user to have an individual profile that controls the user's access to tenant logs is provided. The system includes a...
US-1,026,3992 Method for providing browser using browser processes separated for respective access privileges and apparatus...
A method for providing a browser using browser processes separated based on access privileges and an apparatus using the method. The method includes acquiring a...
US-1,026,3991 Remote profile security system
A method comprises storing, at the server computer system, user profile information for the remote user. The user profile information for the remote user (or a...
US-1,026,3990 Mode-based access control method and device
Provided is a mode-based access control method that includes: making a security mode list which indicates security setting states of devices existing in a home...
US-1,026,3989 Method for matching multiple devices, and device and server system for enabling matching
The present invention relates to a method for matching multiple devices, and a device and a server system for enabling the matching thereof. A matching method...
US-1,026,3988 Protected container key management processors, methods, systems, and instructions
A processor of an aspect includes a decode unit to decode an instruction. The instruction to indicate a first structure in a protected container memory and to...
US-1,026,3987 Techniques for sharing virtual machine (VM) resources
Techniques for sharing virtual machine (VM) resources are provided. A relative location for a resource within a VM is created; the relative location dynamically...
US-1,026,3986 Privilege elevation system and method for desktop administration
In one embodiment, a method is executed by an information handling system comprising computer hardware. The method includes monitoring a desktop environment of...
US-1,026,3985 Work method for smart key device
A work method for a smart key device. A host machine acquires data from a trusted server via a browser and then transmits the data to a smart key device; the...
US-1,026,3984 Authentication failure handling for access to services through untrusted wireless networks
Apparatus and methods to support authentication failure handling by network elements and by a wireless communication device when attempting access to services...
US-1,026,3983 Image forming apparatus having transmission function, and control method and storage medium therefor
An image forming apparatus capable of maintaining user's convenience in performing transmission while utilizing a transmission setting even when destinations...
US-1,026,3982 Foldable device and method of controlling the same
A foldable device includes: a display; a touch panel configured to detect a touch input; a sensing interface configured to detect an angle of the foldable...
US-1,026,3981 Public authentication systems and methods
Techniques provided herein relate to electronic authentication on public systems. A backend system receives at least one electronic data action request from a...
US-1,026,3980 Network node, device and methods for providing an authentication module
The invention relates to a method, for providing an Authentication Module (AM) to a device. The method comprises computing an authentication parameter to be...
US-1,026,3979 Identification code generating system and method thereof using virtual reality process
An identification code generating system and method thereof using a virtual reality process includes a first electronic device and a second electronic device....
US-1,026,3978 Multifactor authentication for programmatic interfaces
Systems and methods provide logic that validates a code generated by a user, and that executes a function of a programmatic interface after the user code is...
US-1,026,3977 Directory driven mailbox migrations
An example method for migrating communication data from a source server to a target server includes obtaining, using a computing device, a set of credentials to...
US-1,026,3976 Method for excluding a participant from a group having authorized communication
A method for excluding a participant from a group of multiple participants, in which certificates are used for an authorized communication of the participants...
US-1,026,3975 Information processing device, method, and medium
A network monitoring device including: a communication acquiring unit which acquires communication before the communication reaches an opposite party's...
US-1,026,3974 Methods, apparatuses and computer program products for utilizing visual authentication tokens as cross-platform...
An apparatus is provided for facilitating cross-platform authentication. The apparatus may include at least one memory and at least one processor configured to...
US-1,026,3973 Method for accessing a service, corresponding first device, second device and system
A first device generates a first signature by using complete transaction data received from a second device, a first algorithm and a first key, modifies at...
US-1,026,3972 Authenticating by labeling
Methods, apparatus and articles of manufacture for authenticating by labeling are provided herein. A method includes identifying each of one or more...
US-1,026,3971 Preventing unauthorized access to secured information systems by injecting device data collectors
Aspects of the disclosure relate to providing information security and preventing unauthorized access to resources of an information system by injecting device...
US-1,026,3970 System, method and architecture for secure sharing of customer intelligence
A key master service capable of operating on a service provider in a network enables is disclosed. The key master enables authorized parties to securely...
US-1,026,3969 Method and apparatus for authenticated key exchange using password and identity-based signature
Disclosed herein are an apparatus and method for authenticated key exchange using a password and an identity-based signature, by which robustness is provided in...
US-1,026,3968 Security measure for exchanging keys over networks
Aspects of the present disclosure relate to systems and methods for exchanging keys within a peer-to-peer network. Exchanging keys within a peer-to-peer network...
US-1,026,3967 Apparatuses, systems and methods for constructing unique identifiers
An apparatus for producing unique user specific identifiers including capturing user specific biometric data, kinetic data, biokinetic data, kinetic data and...
US-1,026,3966 Perimeter enforcement of encryption rules
Rules are applied at a network perimeter to outbound network communications that contain file attachments. The rules may, in a variety of circumstances, require...
US-1,026,3965 Encrypted CCNx
One embodiment provides a system that facilitates selective encryption of bit groups of a message. During operation, the system determines, by a content...
US-1,026,3964 Secure time-to-live
Determining whether to allow access to a message is disclosed. A message is received from a sender. The message is associated with a first time-to-live (TTL)...
US-1,026,3963 Method and apparatus for mediating communications
A method of mediating communications between a first computing device and a second computing device, by an intermediary computing device, comprising...
US-1,026,3962 User authentication over networks
Methods are provided for authenticating user authentication data, associated with a user ID, at an authentication system. The authentication system comprises an...
US-1,026,3961 Security chip and application processor
A security chip and an application processor may be included in a device configured to engage in encrypted communications with an external client, including...
US-1,026,3960 Wireless communication system and wireless communication method
A wireless communication device 1 encrypts a passphrase which corresponds to a communication mode after change and which is a character string for ...
US-1,026,3958 Internet mediation
A system for mediating Internet service includes a DNS server and a DNS policy engine associated with the DNS server. The DNS policy engine can be configured to...
US-1,026,3957 System and method for a fallback access control list port configuration
A method and apparatus of a device that installs a new access control list for a port of a network element is described. In an exemplary embodiment, a network...
US-1,026,3956 Physical level-based security system for data security of security terminal and method using the same
A physical level-based security system for data security of a security terminal and a method using the system. The security system includes at least one normal...
US-1,026,3955 Multi-tiered protection platform
A multi-tier platform provides security at a perimeter of a computer system, where an intermediate layer interacts between a web layer and an application layer....
US-1,026,3954 Identifying the source and destination sites for a VoIP call with dynamic-IP address end points
In a voice-over-IP communications network, call data records include dynamically assigned IP signaling addresses such as IPv6 signaling addresses used in...
US-1,026,3953 Automated website generation via integrated domain registration, hosting provisioning, and website building
Methods of the present inventions allow for generating and providing an enhanced domain name. An exemplary method may comprise providing an enhanced domain to a...
US-1,026,3952 Providing origin insight for web applications via session traversal utilities for network address translation...
Providing origin insight via Session Traversal Utilities for Network Address Translation (STUN) messages for web applications, and related methods, systems, and...
US-1,026,3951 Network address family translation method and system
The present invention, generally, is directed towards sending and receiving communication sessions across more than one network using an address family...
US-1,026,3950 Directing clients based on communication format
Methods and systems for redirecting client requests are provided. According to one embodiment, a system includes a processor and a memory coupled to the...
US-1,026,3949 Determining and utilizing one or more attributes of IP addresses
Methods related to determining and utilizing one or more attributes to associate with an IP addresses. Attributes are determined based on request data provided...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.