Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0063157 MANAGING TEMPORAL ASPECTS OF ACCOUNTS AND ENTITLEMENTS
A method and system for managing temporal aspects of accounts and entitlements in target systems in an organization is provided. In an embodiment, an identity...
2018/0063156 RESTORE OF HEADLESS ELECTRONIC DEVICE
A method for restoring a setting on a network connected device achieves increased security. The method includes receiving an initiation signal representing a...
2018/0063155 CONTROLLING ACCESS TO DATA ORIGINATING FROM A THIRD PARTY WEBSITE
Embodiments of a system and method for controlling access to personal information are generally described herein. In an example, a method may include...
2018/0063154 CONTROLLING ACCESS TO A COMPUTER NETWORK USING MEASURED DEVICE LOCATION
A technique for controlling access to a network provides an electronic system that includes multiple antennas located in a physical space. The antennas receive...
2018/0063153 SECURITY AND PERMISSION ARCHITECTURE
When a user inputs an action request, such as a requested command, to be performed on a target machine, a management system receives the request and verifies...
2018/0063152 DEVICE-AGNOSTIC USER AUTHENTICATION AND TOKEN PROVISIONING
In various embodiments, the user of a client device that executes a remote application is authenticated by first receiving an HTTP or HTTPS request to...
2018/0063151 SYSTEM CONFIGURATIONS FOR DATA STREAM ACCESSIBILITY
Obtaining information may be increasingly more challenging in modern times. The systems described herein enable a user to have access to one or more data...
2018/0063150 CONNECTED DEVICE RIGHTS MANAGEMENT ADMINISTRATION
Various aspects and embodiments of dwelling automation administration are described. Among other aspects or features of the embodiments, a dwelling automation...
2018/0063149 Enhanced Security Using Wearable Device with Authentication System
An approach is provided for securing a network-accessible site such as a bank, financial institution, or a user's home system. A request is received from a...
2018/0063148 CONTROLLING INTERACTIONS AND GENERATING ALERTS BASED ON ITERATIVE FUZZY SEARCHES OF A DATABASE AND COMPARISONS...
A computing platform may receive, from a web server, entity identification information in different formats, and normalize the entity identification...
2018/0063147 NETWORK CONTENT RATING BASED ON PUBLIC RATING DATABASE
Systems and methods for inspecting/analyzing a data stream to identify one or more attributes of content associated with the data stream, and apply appropriate...
2018/0063146 BLACK LIST GENERATING DEVICE, BLACK LIST GENERATING SYSTEM, METHOD OF GENERATING BLACK LIST, AND PROGRAM OF...
A blacklist generating device acquires a malicious communication log and a normal communication log. A malicious communication profile extracting function...
2018/0063145 COMPUTER PRODUCT, METHOD, AND SYSTEM TO DYNAMICALLY PROVIDE DISCOVERY SERVICES FOR HOST NODES OF TARGET SYSTEMS...
Provided are a computer product, method, and system to dynamically provide discovery services for host nodes of target systems and storage resources in a...
2018/0063144 RULE-BASED APPLICATION ACCESS MANAGEMENT
A container that manages access to protected resources using rules to intelligently manage them includes an environment having a set of software and...
2018/0063143 DATA MANAGEMENT FOR A MULTI-TENANT IDENTITY CLOUD SERVICE
Cloud based identity management is provided by receiving a request from an application by a web gate for a resource, where the request includes an operation on...
2018/0063142 IDENTIFYING USER EQUIPMENT USING TUPLE OF BROWSER TYPE AND ELAPSED HASH TIME FOR CHALLENGE DATA SET
A historical repository of UE identifiers associated with sets of prior mean values and prior standard deviation values, is maintained. A browser request...
2018/0063141 INTEGRATED DNS SERVICE PROVIDER SERVICES USING TOKEN-BASED AUTHENTICATION
Techniques for allowing third-party DNS service providers to programmatically initiate changes to DNS resource records using an interface provided by a...
2018/0063140 CONFIGURATION BASED CLIENT FOR OAUTH AUTHORIZATION WITH ARBITRARY SERVICES AND APPLICATIONS
Systems, methods, and computer program products to perform an operation comprising receiving, from a first application by a second application, a request to...
2018/0063139 System and Method for Secure Transmission of Streamed Data Frames
Data acquired, for example by a mobile platform, such as a sequence of images observed by a mobile platform, is grouped. A signature is computed for each group...
2018/0063138 SELECTIVE PROCESSING OF APPLICATION PERMISSIONS
An application permissions processing system and method for processing application permission requests is provided. The method includes the steps of detecting...
2018/0063137 INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM
An information processing apparatus includes: a process identification information acquiring unit that acquires process identification information in...
2018/0063136 END-TO-END PROTECTION FOR SHROUDED VIRTUAL SERVERS
Technical solutions are described for securely deploying a shrouded virtual server. An example method includes sending, by a host manager, authentication...
2018/0063135 METHOD FOR PERFORMING AUTHENTICATION OF USER EQUIPMENT FOR INDIVIDUAL SERVICES IN WIRELESS COMMUNICATION SYSTEM...
A method for performing authentication of a User Equipment (UE) for individual services in a wireless communication system according to the present invention,...
2018/0063134 AUTHENTICATION SYSTEM AND METHOD BASED ON AUTHENTICATION ANNOTATIONS
A system and method for providing secure access to electronic records. A processor receives, from a first client, a first request to access the electronic...
2018/0063133 Preventing Unauthorized Access to Secured Information Systems by Injecting Device Data Collectors
Aspects of the disclosure relate to providing information security and preventing unauthorized access to resources of an information system by injecting device...
2018/0063132 Preventing Unauthorized Access to Secured Information Systems by Injecting Device Data Collectors
Aspects of the disclosure relate to providing information security and preventing unauthorized access to resources of an information system by injecting device...
2018/0063131 MUTUAL AUTHENTICATION
A first terminal and a server, wherein the first terminal is configured to authenticate the server by: generating a first authentication token, being a data...
2018/0063130 TERMINAL CONTROL METHOD AND DEVICE
A terminal control method includes acquiring eyeball information of a user upon receiving an operation request of the user; sending an application request to a...
2018/0063129 SECURE CRYPTOPROCESSOR FOR AUTHORIZING CONNECTED DEVICE REQUESTS
A computing device described herein utilizes a secure cryptoprocessor of the computing device to compute a response to a request for authorization received...
2018/0063128 METHOD FOR AUTOMATICALLY DELETING A USER PASSWORD UPON SUCCESSFUL USE OF A MULTI-FACTOR AUTHENTICATION MODALITY
A method is provided for automatically deleting user passwords. Upon receiving a password-less user authentication a password grace period timer is started....
2018/0063127 METHOD AND AN INFORMATION APPLIANCE DEVICE FOR PREVENTING SECURITY BREACH IN INFORMATION APPLIANCE DEVICE
Embodiments herein relate to a method and an information appliance device having a unique access card for preventing security breach in the information...
2018/0063126 METHODS AND USER DEVICE AND AUTHENTICATOR DEVICE FOR AUTHENTICATION OF THE USER DEVICE
A method and a user device (110) for authentication of the user device (110) as well as a method and an authenticator device (120) for authentication of the...
2018/0063125 Controlling Device Operation Based on Interaction with Additional Device
Systems and arrangements for modifying the functionality of a computing device are provided. A user may initiate an event at the computing device and may...
2018/0063124 METHOD AND APPARATUS FOR SECURING THE PRIVACY OF A COMPUTER NETWORK
A method and apparatus for secure access to a computer network and for safeguarding the confidentiality and privacy of data stored and distributed by the...
2018/0063123 SYSTEMS AND METHODS FOR CREDENTIALS DISTRIBUTION
A method by a management server is described. The method includes receiving a credentials request from a requesting management node. The credentials request...
2018/0063122 IDENTIFICATION FEDERATION BASED SINGLE SIGN-ON
A computer readable medium having instructions embodied therewith, the instructions executable by a processor or programmable circuitry of a federation server...
2018/0063121 METHODS AND SYSTEMS FOR EFFICIENT CONTENT DELIVERY
Methods and systems for improved device authentication and presentation of media content to passengers aboard a transportation apparatus are disclosed. In some...
2018/0063120 SURVEILLANCE CAMERA SETTING METHOD, METHOD OF CONTROLLING AN INSTALLATION OF A SURVEILLANCE CAMERA AND...
A method of setting a surveillance camera includes the steps of recognizing a readable object in an image captured by the surveillance camera, updating a set...
2018/0063119 VAULT APPLIANCE FOR IDENTITY VERIFICATION AND SECURE DISPATCH OF RIGHTS
A technique for promoting network security employs a vault appliance that serves as a local security hub for users and their devices. The vault appliance...
2018/0063118 REAL TIME DIGITAL ISSUANCE OF RESOURCES
Systems and devices are provided for real-time digital issuance/provisioning of digital resources. In accordance with embodiments of the invention, real-time...
2018/0063117 MERGED VIDEO STREAMING, AUTHORIZATION, AND METADATA REQUESTS
Implementations disclose merged video streaming, authorization, and metadata request. A method includes receiving, by a streaming server, a first request to...
2018/0063116 METHOD AND APPARATUS FOR GENERATING AN INTELLIGENT PRIMARY KEY FACILITATING FASTER OBJECT RETRIEVAL
Various methods are provided for facilitating a reduction in the number of required search operations during account creation. One example method may comprise...
2018/0063115 ACCESS TO DOCUMENTS IN A DOCUMENT MANAGEMENT AND COLLABORATION SYSTEM
A method and apparatus for securing access to a document stored by a document management and collaboration system are disclosed. In the method and apparatus,...
2018/0063114 METHOD AND APPARATUS OF PROVIDING MESSAGING SERVICE AND CALLBACK FEATURE TO MOBILE STATIONS
Disclosed are an apparatus and method of performing automated administrative operations on a mobile device. One example method may include determining via a...
2018/0063113 SECURE TRANSACTION SYSTEMS AND METHODS
Systems and methods are described that use tag authentication and presence verification techniques in connection with a variety of transactions. In certain...
2018/0063112 DISPLAYING THE ACCESSIBILITY OF HYPERLINKED FILES
The accessibility of a hyperlinked files is displayed. A hyperlink that references a resource is extracted from a target file. An attempt to acquire the...
2018/0063111 Entitlement Based Wi-Fi Authentication
This disclosure relates to techniques for performing Wi-Fi authentication using an entitlement server in a wireless communication system. A wireless station...
2018/0063110 METHODS AND SYSTEMS FOR GENERATING A USER PROFILE
Systems and methods are provided for authenticating a user. The systems and methods include receiving a request to generate a user profile from a device of a...
2018/0063108 Adaptive Enhanced Environment-Aware Authentication for IoT Devices
A mechanism is provided for authentication and authorization of an access to a resource by a device may be provided. The device may be a system-on-a-chip...
2018/0063107 SECURE CAPTCHA TEST
In one embodiment, a system including a processor to run a web browser application and a CAPTCHA challenge application, wherein the web browser application is...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.