Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,948,654 Method for accessing a plurality of services by a mobile terminal user, and related secure device
The invention relates to a method for enabling the user of at least one mobile terminal to access a plurality of services, said method consisting of: creating...
US-9,948,653 Policy partial results
Technology for policies with reduced associated costs is disclosed. A policy may include an ordered rule set. When evaluated, the highest priority rule in the...
US-9,948,652 System for resource-centric threat modeling and identifying controls for securing technology resources
Systems, computer program products, and methods are described herein for identifying threat vectors and implementing controls for securing resources within a...
US-9,948,651 Automatic shared personal image privacy level detection and management
Network traffic is monitored, and activities concerning posting images to sharing sites are detected. Detected activities can be attempts to login to sharing...
US-9,948,650 Search engine with privacy protection
A search engine system with privacy protection, including a data indexer configured to create an index of data, a search engine configured to search the index...
US-9,948,649 Internet address filtering based on a local database
A device may receive a request to access a resource. The resource may be associated with resource information. The device may obtain rating information based on...
US-9,948,648 System and method for enforcing access control to publicly-accessible web applications
A method for enforcing access control to a web application. The method includes generating a computationally-secure pseudo-random password, associating the...
US-9,948,647 Method and device for authenticating static user terminal
Provided are a method and device for authenticating a static user terminal. The method comprises: an identity request message used for acquiring a user identity...
US-9,948,646 Machine type communication interworking function proxy
A method of establishing connectivity between a mobile network operator (MNO) and a machine type communications (MTC) service provider. A machine type...
US-9,948,645 Techniques for call-based user verification
Techniques for call-based user verification are described. In one embodiment, for example, an apparatus may comprise a processor circuit and a storage...
US-9,948,644 Routing messages between applications
A system and method for enabling the interchange of enterprise data through an open platform is disclosed. This open platform can be based on a standardized...
US-9,948,643 Connection management of smart devices with automobile head unit
Embodiments are directed towards establishing a network connection between a mobile device and an automobile head unit. A user of the mobile device interacts...
US-9,948,642 Multi-modal biometric identification
At least two biometric measurement signals are generated by contact with a single individual. At least one feature is extracted from each signal of the at least...
US-9,948,641 Method and devices for providing a subscription profile on a mobile terminal
A method and a system are provided for providing a subscription profile on a mobile terminal for communication via a mobile communication network. The method...
US-9,948,640 Secure server on a system with virtual machines
A system, an apparatus and a method for providing a secure computing environment may be provided. In one aspect, an apparatus may comprise a communication port...
US-9,948,639 System and method for issuing OTP application in face-to-face confirmation manner
The present invention relates to a system and method for issuing an OTP application in a face-to-face confirmation manner, and the system includes at least one...
US-9,948,638 System and method of secure personal identification
A system and method for securely and automatically identifying users to an inquirer for purposes of obtaining user identifying information is described. The...
US-9,948,637 System and method for data security on big data sets
Systems and methods of securely storing and retrieving data are disclosed. A database may include a table of data with rows and columns and encrypted at rest....
US-9,948,636 Securing a computing device accessory
Various embodiments are disclosed that relate to security of a computer accessory device. For example, one non-limiting embodiment provides a host computing...
US-9,948,635 Generalized certificate use in policy-based secure messaging environments
Within a secure messaging environment, a determination is made that a request to send a message has been generated by a message sender. A message protection...
US-9,948,634 Generalized certificate use in policy-based secure messaging environments
Within a secure messaging environment, a determination is made that a request to send a message has been generated by a message sender. A message protection...
US-9,948,633 Systems and methods for policy driven fine grain validation of servers' SSL certificate for clientless SSLVPN...
The present disclosure is directed towards systems and methods for validation of a secure socket layer (SSL) certificate of a server for clientless SSL virtual...
US-9,948,632 Sharing data between sandboxed applications with certificates
Disclosed are various approaches for sharing data between sandboxed applications with certificates. A request for a certificate is received from a client...
US-9,948,631 Implementing single sign-on in a transaction processing system
A single sign-on is implemented in an online transaction processing system. A security token extracted from a transaction request is received. The security...
US-9,948,630 System and method of providing identity verification services
A system and method of validating an upgrade of authentication credentials includes authenticating a first user being associated with a first entity, receiving...
US-9,948,629 Systems and methods of sharing information through a tag-based consortium
The invention provides one or more consortia of networks that identify and share information about users and/or user devices interacting with the consortia....
US-9,948,628 Method for enabling lawful interception by providing security information
A method and apparatus are provided. Information associated with a lawful interception of communication data of a user equipment is received. Security...
US-9,948,627 Secure electronic document delivery system
The secure electronic document delivery system enables a sender to identify file information and recipient information to be sent to a recipient. The system...
US-9,948,626 Split authentication network systems and methods
Disclosed is a system comprising: an authentication datastore; a device presence engine; a traffic monitor engine; an authentication presence monitor engine; an...
US-9,948,625 Encrypted group communication method
Embodiments herein include, for example, a method, comprising: generating a shared symmetric key to begin a communication session among a group of users by a...
US-9,948,624 Key downloading method, management method, downloading management method, device and system
Disclosed is a key downloading method. The method comprises: sending a hardware series number (SN) and a first random number (Rnd1) to a key server; receiving a...
US-9,948,623 Reoccurring keying system
A secure communication system or method are disclosed that may employ a constant level of trust between participants and a security management entity. As part...
US-9,948,622 Authenticated session establishment
Methods, devices, and machine-readable media are provided to provide secure communications between entities. As provided in this disclosure, this may include...
US-9,948,621 Policy based cryptographic key distribution for network group encryption
Various embodiments include a method for managing a group of devices in communication with each other and sharing a set of keys. The method may include opening...
US-9,948,620 Management of encryption within processing elements
A streaming environment includes at least a first processing element of a first compute node and a second processing element of a second compute node. A tuple...
US-9,948,619 System and method for encryption key management in a mixed infrastructure stream processing framework
A system and method for protecting streams in a mixed infrastructure includes determining processing elements that are to access a data stream in a stream...
US-9,948,618 Secure stream buffer on network attached storage
A network attached storage device coupled to a local network and including a network interface configured to receive digital content from a remote content...
US-9,948,617 Secure software updates
Improved techniques to update software in electronic devices that are already in use are disclosed. In one embodiment, software can be updated in a secure and...
US-9,948,616 Apparatus and method for providing security service based on virtualization
An apparatus for providing security services based on virtualization, the apparatus including: a host virtual machine in which a host operating system that...
US-9,948,615 Increased storage unit encryption based on loss of trust
A method for storage unit communication is provided. The method includes detecting an event associated with a loss of trust for the data stored within a storage...
US-9,948,614 Remote device initialization using asymmetric cryptography
The present disclosure is directed to a system and method for remotely initializing at least one device in communication with a local host device utilizing an...
US-9,948,613 Method and apparatus for managing device context using an IP address in a communication system
The present invention relates to a system configuration and an apparatus for preventing the infringement of user privacy, and for collecting and analyzing...
US-9,948,612 Secure single sign on and conditional access for client applications
Methods and systems for implementing single sign on (SSO) and/or conditional access for client applications are described herein. The system may comprise an...
US-9,948,611 Packet tagging for improved guest system security
Some embodiments provide a novel method for monitoring network requests from a machine. The method captures the network request at various layers of a protocol...
US-9,948,610 Method and apparatus for accessing third-party resources
A method, system, and apparatus for providing a client access to third-party resources by utilizing third-party access tokens via a network gateway. The method...
US-9,948,609 Cloud-based mail system and mail service method for providing improved security
Provided are a cloud-based mail system and a mail service method for providing an improved security. The cloud-based mail system including: an e-mail...
US-9,948,608 Systems and methods for using an HTTP-aware client agent
Systems and methods are described for using a client agent operating in a virtual private network environment to intercept HyperText Transfer Protocol (HTTP)...
US-9,948,607 System and method for securing virtualized networks
Systems and methods for securing a dynamic virtualized network are provided. According to one embodiment, a network policy of a dynamic virtualized network is...
US-9,948,606 Enhancing privacy and security on a SDN network using SDN flow based forwarding control
A computer implemented method for providing security on a software defined network (SDN). The method comprises providing a master SDN controller for managing...
US-9,948,605 Network traffic classification
Some aspects as described herein are directed to mirroring, in upstream and/or downstream data traffic for a particular connection, markings of data packets...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.