Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,025,7205 Techniques for authentication level step-down
Techniques are disclosed to modify the authentication level of a session providing access to resources. In some embodiments, an access management system is...
US-1,025,7204 Information processing method and electronic apparatus
The present application provides an information processing method and an electronic apparatus that can automatically adjust the electronic apparatus to an...
US-1,025,7203 Multiple data store authentication
Systems and methods for authenticating access to multiple data stores substantially in real-time are disclosed. The system may include a server coupled to a...
US-1,025,7202 Systems and methods for logging users out of online accounts
The disclosed computer-implemented method for logging users out of online accounts may include (i) receiving, from a first computing device of a user, a request...
US-1,025,7201 Management of service accounts
The present disclosure provides new methods and systems for managing access to service accounts by user accounts. For example, a user account and a service...
US-1,025,7200 Method and system for communication control
A request for communicating with a first user is received by a second user. The request includes a first identification specific to the first user. The first...
US-1,025,7199 Online privacy management system with enhanced automatic information detection
A privacy management system (PMS) is disclosed for a Chief Privacy Officer (CPO) or other user to use in monitoring and/or controlling in realtime the flow of...
US-1,025,7198 Password input method for devices with limited user interface
A system is provided wherein a network control access device that is already in a network, called a Gatekeeper, generates a random short password in the form of...
US-1,025,7197 Private data access controls in mobile applications
In an example embodiment, a request for data is received from an end-user device, the request including one or more contextual attributes of the end-user...
US-1,025,7196 Access control for a document management and collaboration system
A method and apparatus for controlling access to documents retained by a document management and collaboration system is disclosed. The document management and...
US-1,025,7195 Apparatus and method for providing authorization based enhanced address book service in mobile communication system
Method and apparatus are provided for transmitting information to share to an external device, without using a presence server. The method includes determining,...
US-1,025,7194 Distribution of variably secure resources in a networked environment
A method of receiving a request to access a plurality of resources and determining whether a first resource of the plurality of resources is associated with a...
US-1,025,7193 Local verification of code authentication
Embodiments are directed to a computing device having execution hardware including at least one processor core, and non-volatile memory that stores verification...
US-1,025,7192 Storage system and method for performing secure write protect thereof
A storage system includes a host configured to provide a request for setting or clearing secure write protection; and a storage device including a register, the...
US-1,025,7191 Biometric identity verification
Methods and apparatuses for providing biometric authentication of a test user using a registration process where a reference data sample representative of one...
US-1,025,7190 Wi-fi enabled credential enrollment reader and credential management system for access control
A method according to one embodiment includes reading a unique credential identifier of a passive credential device, transmitting the unique credential...
US-1,025,7189 Using hardware based secure isolated region to prevent piracy and cheating on electronic devices
System and methods for using secure isolated technology to prevent piracy and cheating on electronic devices. In some examples, an electronic device can use...
US-1,025,7188 Offline access control for an application
Techniques to facilitate offline access control for an application associated with an industrial automation environment are disclosed herein. In at least one...
US-1,025,7187 Prompting login account
A login request initiated by a user at a current page is received. Whether there exists an account record matched with a login account name and login password...
US-1,025,7186 Method and network element for improved access to communication networks
The present invention proposes a method and network element which allows increasing, in different aspects, communications network protection in a single network...
US-1,025,7185 Automated access data provisioning
A method is disclosed. The method includes transmitting by a computing device, an account creation request to a remote server computer. The method further...
US-1,025,7184 Assigning policies for accessing multiple computing resource services
A centralized policy management may allow for one set of credentials to various applications and services offered by a computing resource service provider or...
US-1,025,7183 Method and apparatus for identity federation gateway
Techniques for an ID federation gateway include determining whether a user associated with a request for a particular network resource is to be identified by...
US-1,025,7181 Methods and processes for utilizing information collected for enhanced verification
A system for verifying a user identity is disclosed. The system is configured to generate a first profile related to the user and receive an indication that the...
US-1,025,7180 Securely authorizing access to remote resources
Methods and an apparatus are provided for securely authorizing access to remote resources. For example, a method is provided that includes receiving a request...
US-1,025,7179 Credential management system and peer detection
A credential management system is described. The credential management system allows a user to identify peers and obtain additional information regarding the...
US-1,025,7178 Method and system for creating a unique identifier
Method and apparatus for creating a second unique identifier for a user in a second system based on a first unique identifier for a user in a first system. A...
US-1,025,7177 Electronic device and method for managing re-enrollment
The present disclosure relates to electronic devices and methods for managing re-enrollment. According to the present disclosure, a method for managing...
US-1,025,7176 Replacing keys in a computer system
A first private key used by a device is replaced by a second private key, the first private key having an associated public key. The second private key is...
US-1,025,7175 Encryption deployment discovery
Apparatuses and methods are described herein discovering and managing key information, including, but not limited to, obtaining the key information associated...
US-1,025,7174 Methods and systems for providing secure and auditable transfer of encrypted data between remote locations
Methods and systems for directly and securely transferring encrypted medical data between two remote locations, such as an imaging site and a diagnostic site,...
US-1,025,7173 Secure comparison of information
The technology encompasses new uses of already-known cryptographic techniques. The technology entails computer-based methods of sharing information securely, in...
US-1,025,7172 Risk-based encryption of communication on a computer system node
A streams manager assesses the security risk of streams communication and when possible turns off encryption of intranode communication between operators of a...
US-1,025,7171 Server public key pinning by URL
A method of ensuring the identity of a first processing device to a second processing device allows for secure network communication between the devices. A...
US-1,025,7170 Systems and methods for decrypting network traffic in a virtualized environment
Described systems and methods enable a decryption of encrypted communication between a client system and a remote party, for applications such as detection and...
US-1,025,7169 Methods and systems of data security in browser storage
Mechanisms and methods are provided for managing OAuth access in a database network system, and extending the OAuth flow of authentication to securely store the...
US-1,025,7168 System and method for securing telecommunications traffic data
A method and system are provided for securing telecommunications traffic data. A method is provided for transmitting messages via a telecommunications network...
US-1,025,7167 Intelligent virtual private network (VPN) client configured to manage common VPN sessions with distributed VPN...
Embodiments presented herein disclose a VPN service which includes a cluster of VPN appliances that requires only an eventually consistent database to share VPN...
US-1,025,7166 Guest netfilter protection by virtual machine function
A system and method for guest netfilter protection using a virtual machine function includes a memory, one or more processors, in communication with the memory,...
US-1,025,7165 Dynamic provisioning of a firewall role to user devices
A system and method of providing security service to a mobile traffic network are provided. A local network group comprising a plurality of user devices that...
US-1,025,7164 Classifying e-mail connections for policy enforcement
A method and system for the policy-based restriction of electronic mail transmissions. A method for classifying electronic mail message transfer requests for...
US-1,025,7163 Secured process control communications
Securing communications from a process plant to a remote system includes a data diode disposed therebetween that allows data to egress from the plant but...
US-1,025,7162 Method and system for providing "anywhere access" for fixed broadband subscribers
A method is implemented by a border network gateway for enabling an end user device to access home network resources and receive subscriber services in a...
US-1,025,7161 Using neighbor discovery to create trust information for other applications
Neighbor discovery is used to create a generic trust database for other applications. As part of the neighbor discovery, each device performs classification and...
US-1,025,7160 Method and system for resolving internet of things heterogeneous identifiers
The present invention relates to a method and system for resolving Internet of Things heterogeneous identifiers. The method provides a special description...
US-1,025,7159 Methods, systems, and apparatuses for providing a single network address translation connection for multiple...
Techniques and systems for operating a device as a proxy network address translation device for other devices are provided. For example, a method, computing...
US-1,025,7158 Client device address assignment following authentication
Methods and systems are described for assigning the proper Internet protocol (IP) address to a client device following authentication of the client device on a...
US-1,025,7157 Restricting communication over an encrypted network connection to internet domains that share common IP...
An apparatus prevents communication by a client device to a domain that cannot be uniquely identified by relocating the DNS mapping of the domain to a...
US-1,025,7156 Overprovisioning floating IP addresses to provide stateful ECMP for traffic groups
Embodiments are directed towards overprovisioning IP addresses among a plurality of traffic management devices (TMDs). A plurality of IP addresses may be...
US-1,025,7155 Suggesting a discussion group based on indexing of the posts within that discussion group
A system and corresponding methods for recommending a discussion group as an appropriate place to post a message are provided. In one embodiment, the system...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.