Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,029,8599 Systems for detecting a headless browser executing on a client computer
In an embodiment, a computer system is configured to improve security of server computers interacting with client computers through an intermediary computer,...
US-1,029,8598 Countering service enumeration through imposter-driven response
Techniques for improving computer system security by detecting and responding to attacks on computer systems are described herein. A computer system monitors...
US-1,029,8597 Collaborative content evaluation
In an example embodiment, a system for evaluating published content is provided. The system includes at least one processor and a plurality of components...
US-1,029,8596 Method and apparatus for trusted branded email
A trusted branded email method and apparatus in one aspect detects branded electronic messages and performs validation before it is sent to a recipient. In...
US-1,029,8595 Methods and apparatus for security over fibre channel
Methods and apparatus are provided for improving both node-based and message-based security in a fiber channel network. Entity to entity authentication and key...
US-1,029,8594 Graduated authentication in an identity management system
A method and system for graduated security in an identity management system utilize differing levels of time sensitivity, channel security and authentication...
US-1,029,8593 Systems and methods for big-data resource management
Embodiments of the present disclosure include a platform for a resource provisioning system. The platform can execute big data analysis techniques to...
US-1,029,8592 Portable electronic device with user-configurable API data endpoint
Systems, devices methods and media are provided for selecting data received from or sent by a client device. In one example, a system is configured to initiate...
US-1,029,8591 Secure integration of independent cloud foundry applications in a fiori launchpad
An Open Authorization (OAuth) Client Secret of an application associated with a Multi-Tenant Application (MTA) deployed in a cloud-computing environment if read...
US-1,029,8590 Application-based service providing method, apparatus, and system
The present disclosure discloses an application-based service providing method, apparatus, and system. The method includes: acquiring an application identifier...
US-1,029,8589 User abstracted RBAC in a multi tenant environment
Role based access control (RBAC) identity management tools, computing systems, computer products and methods of abstracting individual users from the role...
US-1,029,8588 Secure communication system and method
A secure communication system comprises a software program client operating on a host computing device, a service manager configured to manage client access to...
US-1,029,8587 Peer-to-peer augmented reality handlers
A method and system are provided for generating peer-to-peer augmented reality handlers. The method includes receiving, from a user wearing a pair of augmented...
US-1,029,8586 Using a file whitelist
A method and/or system for using a file whitelist may include receiving a request to approve an application for release in an application store. The request may...
US-1,029,8585 Blockchain interoperability
A system supports asset transfers among blockchains of differing distributed ledger technologies using interop circuitry. The interop circuitry may receive...
US-1,029,8584 System and method for secure control of resources of wireless mobile communication devices
Systems and methods for secure control of a wireless mobile communication device are disclosed. Each of a plurality of domains includes at least one wireless...
US-1,029,8583 Integrated activity management system and method of using same
An integrated activity management system and method for a firm comprising at least one user is disclosed. The system includes at least one communicator, at...
US-1,029,8582 Environment-differentiated named credential instances for development and deployment
Controlling access to sensitive data can be difficult during an application development effort. A developer may not be authorized to see the data that is to be...
US-1,029,8581 Zero-touch IoT device provisioning
In one embodiment, an authorized signing authority server receives an authenticity request from a security registrar to vouch for authenticity of a particular...
US-1,029,8580 Admission of an individual session in a network
An aspect of the disclosure provides a method for session admission at a node in an infrastructure provider network. The method includes receiving a connection...
US-1,029,8579 Integrated hosted directory
Methods, systems, and devices for enterprise-wide management of disparate devices, applications, and users are described. A cloud-based central server may...
US-1,029,8578 Communication relay device, communication network, and communication relay method
A communication relay device that is situated between a corresponding communication node and a bus in a communication network in which a plurality of...
US-1,029,8577 Credential vending to processes
An application is comprised of a plurality of processes. A process is able to accesses a remote service using a service access credential which is adapted to...
US-1,029,8576 Network-based client side encryption
A device may provide an upload request to upload a file. The device may receive, based on the upload request, a unique identifier associated with the device....
US-1,029,8575 Multicomputer processing of an event authentication request with centralized event orchestration
Aspects of the disclosure relate to multicomputer processing of an event authentication request with centralized event orchestration. A computing platform may...
US-1,029,8574 Managing client device credentials to facilitate secure computer system configuration
A method includes a client device forming a link-layer protocol packet having a field that includes first credentials of the client device and sending the...
US-1,029,8573 Management system, communication system, data management method and recording medium
A management system includes an authentication information management unit configured to manage authentication information used in authentication of a request...
US-1,029,8572 Systems and methods for providing block chain-based multifactor personal identity verification
Block chain-based multifactor personal identity verification may be provided. Verification addresses may be established on a block chain by: associating...
US-1,029,8571 Systems and methods for providing block chain-based multifactor personal identity verification
Block chain-based multifactor personal identity verification may be provided. Verification addresses may be established on a block chain by: associating...
US-1,029,8570 Optoelectronic systems and method for operating the same
Optoelectronic systems include an array of optoelectronic modules and a computational unit. The array of optoelectronic modules and the computational unit are...
US-1,029,8569 CAPTCHA systems and methods
Systems and methods for verifying human users through cognitive processes that computers cannot imitate are described herein. Human cognitive language...
US-1,029,8568 System integrating an identity selector and user-portable device and method of use in a user-centric identity...
A combination includes a user-portable computing device, and an identity selector adapted for interoperable use with the user device. The user computing device...
US-1,029,8567 System for providing multi-device access to complementary content
A system is disclosed that enables a user to access a first piece of content on a first computing device while accessing a related, but different piece of...
US-1,029,8566 Bank speech authentication
Authentication mechanisms are disclosed. For example, an enterprise associated number or a social security number (SSN) can be provided to enter a first level....
US-1,029,8565 Method and apparatus for user identity authentication
A method for user identity authentication is provided. The method includes receiving an authentication image selected by a user, and acquiring, based on the...
US-1,029,8564 Secure authenticated distance measurement
The invention relates to a method for a first communication device to perform authenticated distance measurement between the first communication device and a...
US-1,029,8563 Multi-factor authorization for IEEE 802.1x-enabled networks
The present disclosure discloses a system and method for providing multi-factor authorization for IEEE 802.1x-enabled networks. Specifically, a network device...
US-1,029,8562 Distributed single sign on technologies including privacy protection and proactive updating
Technologies for distributed single sign-on operable to provide user access to a plurality of services via authentication to a single entity. The distributed...
US-1,029,8561 Providing a single session experience across multiple applications
A system is described allowing a user to log into an API proxy by supplying login credentials and to have the API proxy log into the APIs of various web-based...
US-1,029,8560 Methods, systems, devices and products for error correction in computer programs
A login session server establishes a communications session between an application executing on a device and a service provided by a web services gateway. A...
US-1,029,8559 Pre-authenticated identification token
A pre-authenticated token system includes an identification token having a switch, a transmitter and receiver circuit, and a sensor; a docking station having...
US-1,029,8558 User authentication relying on recurring public events for shared secrets
An access manager manages access to a resource. At a first time, the access manager designates a variable attribute associated with a recurring public event as...
US-1,029,8557 Method of sharing key between devices using physical access restriction
A method of operating a hub used in an internet of things (IoT) network system which includes a first controller and an IoT device is provided. The method...
US-1,029,8556 Systems and methods for secure storage and management of credentials and encryption keys
A system for storing and managing credentials and encryption keys includes a first data store, a second data store, a client device, and a secure key platform....
US-1,029,8555 Securing files under the semi-trusted user threat model using per-file key encryption
A computer system and methods for securing files in a file system with storage resources accessible to an authenticable user using an untrusted client device in...
US-1,029,8554 System and method for enhanced data protection
In one embodiment, a method of secure network transmission is performed by a computer system. The method includes encrypting a payload via a first symmetric key...
US-1,029,8553 Hardware trusted data communications over system-on-chip (SOC) architectures
A System-On-Chip (SOC) exchanges hardware trusted data communications. A Central Processing Unit (CPU) executes an internal application. A transceiver receives...
US-1,029,8552 Digital broadcast methods using secure meshes and wavelets
Methods and apparatuses are presented for securely providing digital streaming data to subscriber devices using encrypted wavelet meshes. A recorded image may...
US-1,029,8551 Privacy-preserving policy enforcement for messaging
An apparatus in one embodiment comprises at least one processing device having a processor coupled to a memory. The processing device implements a messaging...
US-1,029,8550 Packet flow in an overlay network
A computer program product for transmitting data flow in a network between two resources using a processing circuit to perform a method which includes obtaining...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.