Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,860,251 Dynamic encryption of a universal resource locator
A system and computer program product for implementing a method for restricting access to information transmitted over a computing network. A computer receives...
US-9,860,250 Systems and methods for use in indexing applications based on security standards
Systems and methods are provided for assigning scores to target applications, based on one or more security standards, whereby the scores are indicative of the...
US-9,860,249 System and method for secure proxy-based authentication
A system and method for secure authentication facilitates improving the security of authentication between a client and a target by using an innovative...
US-9,860,248 Computer implemented method, communications system and computer programs products for securing operations in...
The computer implemented method comprising controlling the access to different resources and actions defined for a user by a first server, reducing the exposure...
US-9,860,247 CAPTCHA systems and methods
Systems and methods for verifying human users through cognitive processes that computers cannot imitate are described herein. Human cognitive language...
US-9,860,246 Generation and validation of user credentials having multiple representations
Obtaining and/or validating user credentials at client devices is described. This disclosure describes methods of generating representations of credentials for...
US-9,860,245 System and methods for online authentication
A method of authenticating a network client to a relying party computer via a computer server comprises the computer server receiving a transaction code from a...
US-9,860,244 Server and/or client device authentication
Embodiments of systems and methods for client and/or server authentication are provided. In one embodiment, a method includes sending information from a mobile...
US-9,860,243 Authenticating applications using a temporary password
A mobile device can receive, from an application installed on a wearable device, an authentication query. Based upon the authentication query, an application...
US-9,860,242 One-time access to an automation system
Methods and systems are described for managing one-time access to an automation system. According to at least one embodiment, a computer-implemented method to...
US-9,860,241 Device registration, authentication, and authorization system and method
A system includes one or more processors to receive a registration request, the registration request comprising a representation of a username and a password,...
US-9,860,240 Multi-ring encryption approach to securing a payload using hardware modules
Disclosed are systems and methods of employing a multi-ring encryption approach to secure a data payload. Each ring of encryption may be encrypted from a key...
US-9,860,239 System and method for utilizing behavioral characteristics in authentication and fraud prevention
A behavioral characteristics authentication system and method ("BCA system") that facilitates authentication of the identity of a user, registrant, or applicant...
US-9,860,238 Smart remote control system
A smart remote control system includes multiple terminals and a server. Each terminal is accessible by an electronic device through use of a registered...
US-9,860,237 Password-based authentication in server systems
A system of .lamda..gtoreq.2 servers is provided. The server system comprises an access control server for communication with user computers via a network and...
US-9,860,236 Method, system and device for generating, storing, using, and validating NFC tags and data
A smart tag and methods of interacting with and authenticating interactions with the same are provided. The smart tag (308) is enabled to generate a Tag...
US-9,860,235 Method of establishing a trusted identity for an agent device
A trusted identity may be established for an agent device for performing trusted communication with one or more application providing apparatuses. The method of...
US-9,860,234 Bundled authorization requests
A framework, which conforms to the OAuth standard, involves a generic OAuth authorization server that can be used by multiple resource servers in order to...
US-9,860,233 Comprehensive authentication and identity system and method
A comprehensive authentication and identity system and method are disclosed. A central profile is created for a user which includes user information that can be...
US-9,860,232 Protecting network communication security
A method and apparatus for protecting a network communication security. In one embodiment, there is provided a method for protecting network communication...
US-9,860,231 Relay apparatus, communication apparatus and relay method
A relay apparatus is connected to a communication apparatus, a service providing apparatus and a browser-equipped apparatus. The relay apparatus includes: a...
US-9,860,230 Systems and methods for digitally signing executables with reputation information
A computer-implemented method for digitally signing executables with reputation information is disclosed. This method may include (1) receiving a request for a...
US-9,860,229 Integrated data extraction and retrieval system
A first computing device connected to an internal network de-anonymizes data. A record including a surrogate key is received from a second computing device...
US-9,860,228 Pre-delivery authentication
Pre-delivery authentication may be required prior to routing and delivery of electronic content. A sender of the electronic content, for example, may require...
US-9,860,227 Identifying panelists based on input interaction patterns
A panelist identification device for determining an identity of a panelist based on an input interaction pattern of the panelist is provided. Additionally, a...
US-9,860,226 Sensitive information cloud service
In an example embodiment, login credentials are received from a user. These login credentials are validated. Sensitive information is received from the user....
US-9,860,225 Network directory and access service
A network directory service, responsive to receiving a target device symbolic name from a client, identifies a network access server in communication with a...
US-9,860,224 Systems and methods for secured entry of user authentication data
Techniques for improving security of transactions requesting user authentication data entry via mobile devices are described herein. The mobile device is...
US-9,860,223 Mapping the network file system (NFS) protocol to secure web-based applications
Users on a client system access files served by a web application through the Network File System (NFS) protocol using common web authentication mechanisms...
US-9,860,222 Device, method, and system for staging account setup
A device, method and system for staging account setup are provided. An account identifier indicative of an account is transmitted from a device to a server. An...
US-9,860,221 Internet of things group formation using a key-based join protocol
Systems and methods may provide for determining a first key associated with a first group and determining a first resource exposure policy for the device with...
US-9,860,220 Methods and devices having a key distributor function for improving the speed and quality of a handover
A key distributor node for a network includes a memory device with at least one first key, at least one data communication device that can exchange data with...
US-9,860,219 Runtime instantiation of broadcast encryption schemes
Embodiments of the present invention relate to runtime instantiation of broadcast encryption schemes. In one embodiment, a method of and computer program...
US-9,860,218 Information processing terminal, information processing method, and information processing system
A system software unit performs a first authentication operation with an external device using a first key that is registered in advance. A secure software unit...
US-9,860,217 Encrypted streams to receivers
Techniques to ensure that a content stream will be encrypted prior to it being served it to the stream receiver if either the stream receiver returned an...
US-9,860,216 Anonymous decisions in an access control system
A controller device may correspond to a physical access controller in a distributed physical access control system. The controller device may include logic...
US-9,860,215 Firewall interface configuration to enable bi-directional VoIP traversal communications
Methods and systems for an intelligent network protection gateway (NPG) and network architecture are provided. According to one embodiment, a firewall provides...
US-9,860,214 Interconnecting external networks with overlay networks in a shared computing environment
A method includes obtaining, by one or more processor, data from a virtual network of a tenant and an identifier of the tenant, where the virtual network of the...
US-9,860,213 Method and system for securing and protecting smart devices within the internet of things ecosystem
A gateway device including a network interface having wired and/or wireless connections to smart devices and a network access point. The gateway device also...
US-9,860,212 Filtering hidden data embedded in media files
Systems and methods for filtering unsafe content by a network security device are provided. According to one embodiment, a network security device captures...
US-9,860,211 Data leak protection
Methods and systems for Data Leak Prevention (DLP) in an enterprise network are provided. According to one embodiment, a network security device maintains a...
US-9,860,210 Multi-layered application classification and decoding
An intrusion detection system is described that is capable of applying a plurality of stacked (layered) application-layer decoders to extract encapsulated...
US-9,860,209 Stateful connection processing in a security device cluster
A method operable in a security device cluster having a plurality of security devices each configured to receive respective data flows. The method includes...
US-9,860,208 Bridging a virtual clone of a target device in a honey network to a suspicious device in an enterprise network
Techniques for bridging a honey network to a suspicious device in a network (e.g., an enterprise network) are disclosed. In some embodiments, a system for...
US-9,860,207 Methods of using beacon messages to discover devices across subnets
A method of discovering a device to be discovered in a communication network having multiple interconnected nodes includes transmitting, by a discoverer, at...
US-9,860,205 Managing for-sale group postings
The present disclosure is directed toward systems and method for managing social networking system for-sale groups. For example, systems and method described...
US-9,860,204 Variable notification alerts
Approaches in accordance with various embodiments attempt to provide a user with less disruptive event notifications by being aware of a user's context. Before...
US-9,860,203 Methods, systems, and devices for generating a unique electronic communications account based on a physical...
A unique electronic communications account is generated and linked to a physical address of a user. A network of electronic mail addresses linked to physical...
US-9,860,202 Method and system for email disambiguation
A system comprises email processing circuitry and network interface circuitry. The email processing circuitry is operable to receive an email message to be sent...
US-9,860,201 Information processing system, information processing method, and non-transitory computer readable storage...
An information processing system includes a register module, a determining module, and a transfer module. The register module is configured to store event data...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.