Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2019/0068606 SYSTEM AND METHOD FOR SUPPORTING OBJECT-BASED SECURITY
In accordance with an embodiment, described herein is a system and method for supporting object-based security features for use with messaging services in an...
2019/0068605 SYSTEM AND METHOD FOR PROVIDING ACCESS TO SECURED DATA VIA A PUSH NOTIFICATION
The present disclosure relates to providing access to secured data from a system management appliance (SMA) and, more particularly, to a system and method of...
2019/0068604 SYSTEM AND METHOD FOR AGGREGATING CLIENT DATA AND CYBER DATA FOR AUTHENTICATION DETERMINATIONS
The invention relates to a method and system that aggregates client data and cyber indicators to authenticate a client. The system comprises: a computer server...
2019/0068603 TECHNIQUES FOR COMMUNICATING VIA EXCHANGES OF PHYSICAL CHARMS
In one embodiment, a charm application enables user devices to communicate via physical charms. Upon receiving, from a first user device, a read request that...
2019/0068602 SECURE CLIENT-SERVER COMMUNICATION
A secure client-server connection method compatible with RESTful (REpresentational State Transfer) APIs (Application Programming Interface) that is resistant...
2019/0068601 Method to Virtualize Large Files In A Sandbox
There is provided a method and system with an improved bitmap access control method of file virtualization for large files in sandbox. The process divides a...
2019/0068600 SYSTEM FOR REGULATING ACCESS TO AND DISTRIBUTING CONTENT IN A NETWORK
There is provided a system for regulating access and managing distribution of content in a network, such as the Internet. The system includes communication...
2019/0068599 Multi-Factor Privilege Granting
Described herein are techniques for granting a privilege. A granting user is identified using facial recognition. The identity of the granting user is...
2019/0068598 VERIFYING WHETHER CONNECTIVITY IN A COMPOSED POLICY GRAPH REFLECTS A CORRESPONDING POLICY IN INPUT POLICY GRAPHS
Example method includes: receiving, by a network device, a plurality of input policy graphs and a composed policy graph associated with the input policy...
2019/0068597 EXTENDING AND RE-USING AN IP MULTIMEDIA SUBSYSTEM (IMS)
Systems and methods for extending and re-using an IP multimedia subsystem (IMS) to extend the trust relationship from a closed group of customers of wireless...
2019/0068595 COMMUNICATION SYSTEM, RELAY SERVER, INFORMATION PROCESSING APPARATUS, IMAGE FORMING APPARATUS, METHODS OF...
A communication system has first terminal and second terminals, and a relay server that relays communication between the first and second terminals. When a...
2019/0068594 End-To-End Realtime Telephony Authentication Using Biometrics And Cryptography
Systems and methods for authenticating a user and a telephony device. The systems and methods utilize biometric data and/or cryptography for authenticating the...
2019/0068593 METHOD FOR PROVIDING SERVICE UPDATE AND ELECTRONIC DEVICE SUPPORTING THE SAME
Methods and electronic devices are provided for providing a service update. First data including first information is received from a first external device as...
2019/0068592 Uncloneable Registration of an Internet of Things (IoT) Device in a Network
An IoT device has a public device identifier and a private device identifier, where the public device identifier is publicly available and the private device...
2019/0068591 Key Distribution And Authentication Method And System, And Apparatus
The present disclosure relates to example key distribution and authentication methods and devices. In one example method, a second-level key is received by a...
2019/0068590 REMOTE DOCUMENT EXECUTION AND NETWORK TRANSFER USING AUGMENTED REALITY DISPLAY DEVICES
An augmented reality user device includes a display, a physical identification verification engine, a gesture confirmation engine, and in interface. The...
2019/0068589 Range of Motion Tracking System
A method for range of motion (ROM) tracking, that determines with a ROM tracking system, an exercise identified by a caregiver to be performed by a subject by...
2019/0068588 AUTHENTICATION SYSTEM
A server performs authentication, in response to an authentication request from a client PC and issues a token, when the user of an application is permitted....
2019/0068587 Carrier ePDG Gateway Access System and Method for Implementing Mobile Communications
An operator ePDG access system is provided, including a mobile terminal installed with a first SIM card, and a SIM card reading apparatus installed with a...
2019/0068586 TEMPORAL IDENTITY VAULTING
A temporal identity vault used to authenticate an individual is described herein. User identifying input is received on a device, such as a cell phone. The...
2019/0068585 LOCAL CLAIM-BASED SECURITY SERVICE WITH CROSS-BROWSER COMPATIBILITY
A web application that is attempting to access a site hosted by a system that needs authentication based on a hardware-protected key is redirected to a local...
2019/0068584 VERIFICATION INFORMATION PROCESSING METHOD AND DEVICE
Extracting and processing verification information is disclosed, including: receiving a message at a device; extracting verification information for...
2019/0068583 Method for Enabling and/or Requesting Access by a First Network Subscriber to a Second Network Subscriber in a...
A method for enabling access by a first network subscriber to a second network subscriber in a network includes receiving a communication request from the...
2019/0068582 Authentication Of Vehicle-To-Vehicle Communications
Systems, methods, and devices for authenticating vehicle-to-vehicle communication are disclosed. A method includes receiving sensor data from a first vehicle...
2019/0068581 SECURITY UPDATE PROCESSING
A device is configured for dynamically obtaining updated hash values for certificate processing of endpoints from a dedicated and single server. The server's...
2019/0068580 HTTPS ENABLED CLIENT TOOL
A system that implements a Hypertext Transfer Protocol Secure (HTTPS) enabled client tool to facilitate HTTPS communication between a client device (on which...
2019/0068579 METHOD AND SYSTEM FOR CREATING A VIRTUAL SIP USER AGENT BY USE OF A WEBRTC ENABLED WEB BROWSER
A method for creating a virtual SIP user agent by use of a webRTC enabled web browser comprises a user logging in to a web application server via a webRTC...
2019/0068578 HYBRID SINGLE SIGN-ON FOR SOFTWARE APPLICATIONS AND SERVICES USING CLASSIC AND MODERN IDENTITY PROVIDERS
An authentication management system receives a resource request directed to a software service, which may require password-based authentication. The system...
2019/0068577 SYSTEM AND METHOD FOR CLOUD-BASED ANALYTICS
A system and method in accordance with example embodiments may include systems and methods for a cloud-based analytics platform. The cloud-based analytics...
2019/0068576 METHOD, APPARATUS AND SYSTEM FOR REMOTE CONTROLLING INTELLIGENT DEVICES
A method, apparatus and system for remote control of intelligent device are disclosed. The method comprises: sending account information to a third-party...
2019/0068575 AUTHORIZATION FLOW INITIATION USING SHORT-TERM WIRELESS COMMUNICATION
In general, aspects of the disclosure are directed towards techniques for initiating an authorization flow with a user to enable a user interface-limited...
2019/0068574 METHOD, DEVICE, AND SYSTEM ESTABLISHING A WIRELESS COMMUNICATION CHANNEL BETWEEN ELECTRONIC DEVICES
Provided herein are methods, devices, and systems of wireless communication. In one embodiment, a method for wireless communication between a first electronic...
2019/0068573 DETECTION OF THE NETWORK LOGON PROTOCOL USED IN PASS-THROUGH AUTHENTICATION
The network logon protocol used in a pass-through authentication request embedded in an encrypted network packet is identified. A protocol detection engine...
2019/0068572 CUSTOMIZABLE SECONDARY VERIFICATION IN A MULTI-TENANT SYSTEM
Techniques are disclosed relating to verifying access to functions in a multi-tenant computer system. In various embodiments, a multi-tenant computer system...
2019/0068571 METHOD, APPARATUS, AND SYSTEM FOR PROVIDING A SECURITY CHECK
Embodiments of the present application relate to a method, apparatus, and system for providing a security check. The method includes receiving a security...
2019/0068570 MULTI-PARTY AUTHENTICATION IN A ZERO-TRUST DISTRIBUTED SYSTEM
A zero-trust network and methods of using same are disclosed. The network includes a plurality of nodes, some of which are user devices, such as mobile phones,...
2019/0068569 Cloud Queue Access Control
An example implementation may involve a computing system receiving, from a media playback system, a request to initiate playback of a cloud queue. The cloud...
2019/0068568 DISTRIBUTED PROFILE AND KEY MANAGEMENT
Disclosed are various examples for distributed profile and key management. In one example, a management service can generate a partially populated device...
2019/0068567 Receiving an Encrypted Communication from a User in a Second Secure Communication Network
The present disclosure describes a method, system, and non-transitory computer readable medium that includes instructions that permit users of different secure...
2019/0068566 NETWORK-BASED KEY DISTRIBUTION SYSTEM, METHOD, AND APPARATUS
An apparatus includes a computing system that is configured to receive, from an electronic device, a verification message indicating that the electronic device...
2019/0068565 Systems and Methods for Providing Access Through Use of Security Key Pairs
Exemplary systems and methods are disclosed for providing access through security key pairs. One exemplary method includes generating, by a platform, a key...
2019/0068564 METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR MONITORING ENCRYPTED NETWORK TRAFFIC FLOWS
Methods, systems, and computer readable media for monitoring encrypted packet communications are disclosed. According to one method executed at an encryption...
2019/0068563 Ensuring Information Security in Data Transfers by Utilizing Proximity Keys
Aspects of the disclosure relate to ensuring information security in data transfers by utilizing proximity keys. A computing platform may receive a data...
2019/0068562 STREAMING AUTHENTICATION USING CHAINED IDENTIFIERS
An apparatus, intended for use in an authentication event, having a hardware processor, a memory, a receiver/transmitter unit, a stream block generation module...
2019/0068561 Systems and Methods for Decrypting Network Traffic in a Virtualized Environment
Described systems and methods enable a decryption of encrypted communication between a client system and a remote party, for applications such as detection and...
2019/0068560 RESOURCE LOCATORS WITH KEYS
Requests are pre-generated to include a cryptographic key to be used in fulfilling the requests. The requests may be encoded in uniform resource locators and...
2019/0068559 SYSTEMS AND METHODS FOR OPTIMIZED NETWORK LAYER MESSAGE PROCESSING
A method by a mesh device is described. The method includes de-obfuscating first information of a received packet with a privacy key that matches a network...
2019/0068558 Systems and Methods for Data Encryption and Decryption
A computer-implemented method is provided for encrypting a message using a plurality of keys and a plurality of encryption algorithms. The method includes...
2019/0068557 EFFICIENT MIGRATION FOR ENCRYPTED VIRTUAL MACHINES BY ACTIVE PAGE COPYING
Systems and methods for efficient migration for encrypted virtual machines (VMs) by active page copying are disclosed. An example method may include receiving...
2019/0068556 METHOD TO AVOID INSPECTION BYPASS DUE TO DNS POISONING OR HTTP HOST HEADER SPOOFING
Cyber security protection from, and avoiding inspection bypass, in network communication connections, in particular due to DNS poisoning or HTTP HOST header...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.