Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2017/0331832 IDENTITY CLOUD SERVICE AUTHORIZATION MODEL
A system for authorizing access to a resource receives a request for an access token that corresponds to the resource, where the request includes user...
2017/0331831 TRUST EVALUATION METHOD AND SYSTEM IN INTERNET OF THINGS
According to one example embodiment, trust evaluation system may include a collection unit collecting internal data and external data; a calculation unit...
2017/0331830 Method And Apparatus For Determining Phishing Website
Disclosed are a method and an apparatus for determining a phishing website. The method comprises: a server determining whether a target website accessed by a...
2017/0331829 SECURITY TOKENS FOR A MULTI-TENANT IDENTITY AND DATA SECURITY MANAGEMENT CLOUD SERVICE
A system provides cloud-based identity and access management. The system receives a request from a client for obtaining an access token for a user to access a...
2017/0331828 SYSTEMS AND METHODS TO AUTHENTICATE USERS AND/OR CONTROL ACCESS MADE BY USERS ON A COMPUTER NETWORK USING...
A controller for user authentication and access control, configured to: store data representing a graph having: nodes representing data elements associated...
2017/0331827 MANAGED ACCESS SYSTEM WITH SECURITY ASSESSMENT EQUIPMENT
A managed access system for mobile wireless devices (MWDs) in a facility that is geographically within a wireless communications network includes a plurality...
2017/0331826 HYBRID DATABASE ACCESS CONTROL IN EXTERNAL-TO-DATABASE SECURITY SYSTEMS
Hybrid database access control in external-to-database security systems is achieved by selectively operating a database server system in different security...
2017/0331825 SELF-SERVICE ACQUISITION OF SUBSCRIPTIONS TO ONLINE SERVICES
A provider of a subscription-based online service provides use of the online service to an end-user of an organization. A tenant account request is received...
2017/0331824 Linking Channel-Specific Systems with a User Authentication Hub to Provide Omni-Channel User Authentication
Aspects of the disclosure relate to linking channel-specific systems with a user authentication hub. In some embodiments, a computing platform may receive,...
2017/0331823 EMBEDDING SECURITY POSTURE IN NETWORK TRAFFIC
Embedding security posture in network traffic is disclosed. Security posture information is received. The security posture information is embedded into a...
2017/0331822 ENHANCED AUTHENTICATION FOR SECURE COMMUNICATIONS
A server obtains a challenge from another computer system during a negotiation with a client according to a protocol. The server injects the challenge into a...
2017/0331821 SECURE GATEWAY SYSTEM AND METHOD
A gateway system for authenticating a transaction event, the gateway system comprising a target server that receives a transaction event information signal...
2017/0331820 METHOD FOR CONNECTING A MOBILE TERMINAL WITH A SERVER OF A SERVICE PROVIDER VIA AN OPERATOR PLATFORM
A method connecting a user's mobile terminal with a server of a service provider. The method includes: the server stores an identifier of a card assigned to...
2017/0331819 SYSTEM AND METHOD FOR ENABLING SECURE AUTHENTICATION
Broadly speaking, embodiments of the present invention provide systems and methods to provide a solution to the SIM swap attack problem for users that possess...
2017/0331818 SYSTEMS AND METHODS FOR LOCATION-RESTRICTING ONE-TIME PASSCODES
The disclosed computer-implemented method for location-restricting one-time passcodes may include (1) receiving, from a client, an authentication request for a...
2017/0331817 Preventing Unauthorized Access to Secured Information Systems Using Multi-Device Authentication Techniques
A computing platform may receive, from a client portal server, a request to authenticate a first user to a first user account. The computing platform may...
2017/0331816 Preventing Unauthorized Access to Secured Information Systems Using Multi-Device Authentication Techniques
A computing platform may receive, from a client portal server, a request to authenticate a user to a user account. The computing platform may generate a first...
2017/0331815 UNIFIED VPN AND IDENTITY BASED AUTHENTICATION TO CLOUD-BASED SERVICES
Techniques are disclosed to provide VPN and identity based authentication to cloud-based services. In various embodiments, a request to authenticate a user to...
2017/0331814 DATA SECURITY
In one embodiment, a method is provided that may include one or more operations. One of these operations may include, in response, at least in part, to a...
2017/0331813 TASK SEGREGATION IN A MULTI-TENANT IDENTITY AND DATA SECURITY MANAGEMENT CLOUD SERVICE
A system provides cloud-based identity and access management. The system receives a request to perform an identity management service, and accesses a...
2017/0331812 MICROSERVICES BASED MULTI-TENANT IDENTITY AND DATA SECURITY MANAGEMENT CLOUD SERVICE
A system provides cloud-based identity and access management. The system receives a request for performing an identity management service, where the request...
2017/0331811 PROTECTION FROM UNFAMILIAR LOGIN LOCATIONS
In one embodiment, a user authentication server may use geo-location tracking to determine whether to present an enhanced identity challenge. A communication...
2017/0331810 SYSTEM FOR MANAGING SECURITY AND ACCESS TO RESOURCE SUB-COMPONENTS
A means for managing security and access to resources associated with blocks/sub-components of a distributed validating network, such as a blockchain network....
2017/0331809 METHOD, APPARATUS, AND SYSTEM FOR PROVIDING A SECURITY CHECK
Embodiments of the present application relate to a method, apparatus, and system for providing a security check. The method includes receiving a security...
2017/0331808 PROTECTION FROM DATA SECURITY THREATS
A credential, such as a password, for an entity is used to generate multiple keys. The generated keys are distributed to credential verification systems to...
2017/0331807 HANDS-FREE USER AUTHENTICATION
A foreign device (FD) authenticates a user by communicating with a personal device (PD) using an audible signal. A system detects audible signals within time...
2017/0331806 DUAL TOKEN BASED AUTHENTICATION AND TRANSPORT MECHANISM
A client token is generated for a client process in response to a client token request. An authentication request including the client token is received from a...
2017/0331805 LOCATION-BASED INFORMATION DISTRIBUTION
A method of matching geographic information to a requester including matching users subscribed to a service with devices used by the users; receiving and...
2017/0331804 LICENSING AUTHENTICATION VIA MOBILE DEVICE
A mobile device can be used as an intermediary to allow a client device to obtain licensing authentication. The mobile device can connect to the client device...
2017/0331802 Key Generation and Rollover
Key generation and roll over is provided for a cloud based identity management system. A key set is generated that includes a previous key and expiration time,...
2017/0331801 Cross-site, TOTP-based two factor authentication
A host machine has a web browser. A user of the host machine also has a mobile device. A time-based, one-time password (TOTP) authentication scheme leverages a...
2017/0331800 SYSTEM FOR A SECURE ENCRYPTION PROXY IN A CONTENT CENTRIC NETWORK
One embodiment provides a system that facilitates a secure encryption proxy in a content centric network. During operation, the system receives, by an...
2017/0331799 SERVICE PROVIDING SYSTEM, SERVICE PROVIDING APPARATUS, AND SERVICE PROVIDING METHOD
A service providing system includes a login information publishing apparatus that publishes login information when a user logs in the login information...
2017/0331798 ENCRYPTED-BYPASS WEBRTC-BASED VOICE AND/OR VIDEO COMMUNICATION METHOD
An encrypted-bypass webRTC-based voice and/or video communication method provides dynamic use of the encryption algorithms in WebRTC communication.
2017/0331797 Systems and Methods for Controlling Email Access
Embodiments of the disclosure relate to proxying one or more email resources in transit to the client devices from the email services, removing one or more...
2017/0331796 SYSTEMS AND METHODS FOR OBFUSCATION OF DATA VIA AN AGGREGATION OF CLOUD STORAGE SERVICES
The present disclosure describes systems and methods for aggregation and management of cloud storage among a plurality of providers via file fragmenting to...
2017/0331795 VEHICLE DATA ENCRYPTION
A wireless communication system includes a server, in communication with a vehicle controller. The server, in response to receiving from the controller a...
2017/0331794 SYSTEM AND METHOD FOR PROGRAMMABLE NETWORK BASED ENCRYPTION IN SOFTWARE DEFINED NETWORKS
Sensitive data is sent through insecure network regions across different software defined networks (SDNs) over an encrypted path without requiring encryption...
2017/0331793 METHOD AND A SYSTEM FOR MANAGING USER IDENTITIES FOR USE DURING COMMUNICATION BETWEEN TWO WEB BROWSERS
A management method for managing an identity of a first user during communication between a first web browser installed on a communication terminal of the...
2017/0331792 SYSTEM AND METHOD FOR DECODING TRAFFIC OVER PROXY SERVERS
Methods and systems for applying surveillance to client computers that communicate via proxy servers. A decoding system accepts communication packets from a...
2017/0331791 POLICY ENFORCEMENT POINT FOR A MULTI-TENANT IDENTITY AND DATA SECURITY MANAGEMENT CLOUD SERVICE
A system provides cloud-based identity and access management. The system receives a request by a web gate for an identity management service for reaching an...
2017/0331790 System and Method for Digital Payload Inspection
Use of an ancillary proxy server can be used as a man-in-the-middle agent, for example, as part of a firewall system that brackets the inputs and outputs of...
2017/0331789 SYSTEMS AND METHODS FOR A UNIQUE MECHANISM OF PROVIDING 'CLIENTLESS SSLVPN' ACCESS TO A VARIETY OF...
The present disclosure is directed towards systems and methods for rewriting a HTTP response transmitted via a clientless SSL VPN session. An intermediary...
2017/0331788 SYSTEM FOR PROVIDING DNS-BASED CONTROL OF INDIVIDUAL DEVICES
A device control system is associated with individual devices connected through a network control point to a gateway and thereby to the Internet. The gateway...
2017/0331787 UNAUTHORIZED COMMUNICATION DETECTION SYSTEM AND UNAUTHORIZED COMMUNICATION DETECTION METHOD
A detection apparatus 30 stores a determination list (A1601) for determining whether there is unauthorized communication, receives a communication packet...
2017/0331786 GENERATING DOMAIN NAMES COMPRISING MULTIPLE LANGUAGES
Systems and methods of the present invention provide for one or more server computers communicatively coupled to a network and configured to: receive a domain...
2017/0331785 METHOD AND APPARATUS FOR SUPPORTING NETWORK SLICING SELECTION AND AUTHORIZATION FOR NEW RADIO ACCESS TECHNOLOGY
For supporting selection/authorization of network slicing, a radio access network (RAN) node in a new radio access technology (RAT), e.g. gNB, receives a...
2017/0331784 OID CONFIGURATION, RESOLUTION METHOD, CLIENT, NODE, DATABASE AND STORAGE MEDIUM
Disclosed are an Object Identifier (OID) configuration, a configuration method, an OID Resolution System (ORS) client, an OID node and a database thereof. The...
2017/0331783 AUTO COMPLETING DOMAIN NAMES COMPRISING MULTIPLE LANGUAGES
Systems and methods of the present invention provide for one or more server computers communicatively coupled to a network and configured to: monitor a...
2017/0331782 VERIFYING CHARACTER SETS IN DOMAIN NAME REQUESTS
Systems and methods of the present invention provide for one or more server computers communicatively coupled to a network and configured to: create a data...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.