At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Patent # | Description |
---|---|
US-1,004,4704 |
Systems and methods for authenticating or identifying personnel and
personnel related material A method is provided. The method includes providing an authentication code onto a reference article associated with a person, determining a signature associated... |
US-1,004,4703 |
User device performing password based authentication and password
registration and authentication methods thereof A password registration method of a user device which uses a password-based authentication manner is provided. The password registration method includes... |
US-1,004,4702 |
Cross instance user authentication architecture In accordance with disclosed embodiments, there are provided methods, systems, and apparatuses for implementing a cross instance user authentication... |
US-1,004,4701 |
Technologies for token-based authentication and authorization of
distributed computing resources Technologies for token-based access authorization to an application program interface (API) include an access management server to receive a service request... |
US-1,004,4700 |
Identity attestation of a minor via a parent A technique allows a parentally attested security token to serve as authentication for a minor using identifying attributes of the minor child. The security... |
US-1,004,4699 |
Method and apparatus of providing messaging service and callback feature
to mobile stations Disclosed are an apparatus and method of performing automated administrative operations on a mobile device. One example method may include determining via a... |
US-1,004,4698 |
Dynamic identity checking for a software service in a virtual machine A selector apparatus to select one or more shared authentication facilities for a software service executing in a virtualized shared computing environment, the... |
US-1,004,4697 |
Multi-level authentication for onboard systems Described herein is a platform and method for providing multi-level authentication by an onboard system in relation to a transaction. In response to receiving... |
US-1,004,4696 |
Simplified sensor integrity An apparatus is provided that includes at least one processor device, an energy storage module to power the apparatus, memory to store a secret such that... |
US-1,004,4695 |
Application instances authenticated by secure measurements A computer-implemented system and method for receiving a request to associate one or more application instance definitions with an application identity of an... |
US-1,004,4694 |
Server, method and system for authenticating application An application authentication program causes a data server and an application server to execute the processes of: accepting an access request containing... |
US-1,004,4693 |
Security for confidential data In an example embodiment, a submission of confidential data is received from a user. Then, the confidential data is encrypted using a first public key generated... |
US-1,004,4692 |
Information processing apparatus for controlling data transmission between
devices in a network There is provided an information processing apparatus, the information processing apparatus including: a control unit configured to cause a second information... |
US-1,004,4691 |
Decrypting network traffic on a middlebox device using a trusted execution
environment Decrypting network traffic on a middlebox device using a trusted execution environment (TEE). In one embodiment, a method may include loading a kernel... |
US-1,004,4690 |
Secure media capture, transfer, and storage A secure media capture device may comprise a secure memory, a first sensor, a second sensor, a processor, and a communication module. The first sensor may be... |
US-1,004,4689 |
System and method for authenticating users A security application for a computing device, e.g., a mobile phone, allows generation of a secret according to a unique user input (e.g., user credentials).... |
US-1,004,4688 |
Decentralized authoritative messaging A secure chat client is described that allows users to exchange encrypted communications via secure chat rooms, as well as one-to-one communications. In... |
US-1,004,4687 |
Internet of things datapoint engine Techniques allow owners of Internet of Things (IoT) devices to provide specific access to data from their IoT devices to requesters of data. A request for data... |
US-1,004,4686 |
Systems and methods for decryption as a service via a hardware security
module Systems and methods for decryption of payloads are disclosed herein. In various embodiments, systems and methods herein are configured for decrypting thousands... |
US-1,004,4685 |
Securing enterprise data on mobile devices Embodiments include method, systems and computer program products for securing enterprise data in a mobile computing environment. Aspects include receiving, by... |
US-1,004,4684 |
Server for authenticating smart chip and method thereof The present invention provides a server for authenticating a smart chip, which is connected to a terminal transmitting and receiving data to and from the smart... |
US-1,004,4683 |
Content transmission and reception device compatible to switch to a new
encryption scheme The disclosure is directed to reduce a load of time and cost at the time of transition to a safer system in which an encryption scheme is newly set. By allowing... |
US-1,004,4682 |
Technique for distributing a piece of content in a content distribution
network A method for distributing a piece of content in a content distribution network, provided by a source entity of which the integrity is ensured by means of a... |
US-1,004,4681 |
Interfaces to manage direct network peerings Methods and apparatus for interfaces to manage direct network peerings. A system may include a data center, endpoint routers and a connectivity coordinator. The... |
US-1,004,4680 |
Method for hiding receiver's address for link layer in group communication The present invention relates to a receiver information hiding method of hiding receiver information of a message in a system including a transmitting terminal... |
US-1,004,4679 |
System and method for proxy-based privacy protection User privacy while browsing the Internet can be preserved by reversing the man-in-the-middle attack using a distributed network of proxy servers. The proxy... |
US-1,004,4678 |
Methods and apparatus to configure virtual private mobile networks with
virtual private networks Methods and apparatus to configure virtual private mobile networks with virtual private networks are disclosed. A disclosed example method includes logically... |
US-1,004,4677 |
System and method to configure a firewall for access to a captive network An approach is proposed that contemplates system and method to configure firewall rules of a VPN gateway of a protected network so that users of devices in the... |
US-1,004,4676 |
Using headerspace analysis to identify unneeded distributed firewall rules Some embodiments provide a method for identifying unnecessary firewall rules for a distributed firewall of a logical network. The method identifies a firewall... |
US-1,004,4675 |
Integrating a honey network with a target network to counter IP and
peer-checking evasion techniques Techniques for integrating a honey network with a target network environment (e.g., an enterprise network) to counter IP and peer-checking evasion techniques... |
US-1,004,4674 |
System and method for automatic wireless network authentication in an
internet of things (IOT) system A system, apparatus, and method are described for a secure IoT wireless network configuration. For example, one embodiment of an Internet of Things (IoT) hub... |
US-1,004,4673 |
Protecting communication link between content delivery network and content
origin server A privatized link between an origin server and a content delivery network is provided. A privatized link can be direct connection that does not route over the... |
US-1,004,4672 |
IPv6 address assignment method and apparatus IPv6 address assignment method and apparatus are provided. The method includes: receiving first Prefix Delegations (PDs) sent by at least two network access... |
US-1,004,4671 |
Control apparatus, communication system, communication method, and program A control apparatus includes: a first control information setting unit configured to set first control information for forwarding packets between predetermined... |
US-1,004,4670 |
Connecting transparent network devices to optimize unidirectional network
traffic Transparent network devices intercept unidirectional network traffic and use bidirectional network protocol messages to discover each other and configure an... |
US-1,004,4669 |
Suggesting a message to user to post on a social network based on prior
posts directed to same topic in a... A method, system and computer program product for improving the quality of the posts in a social network. A topic of a post to a social network environment is... |
US-1,004,4668 |
Expanding a social network This disclosure relates to systems and methods for expanding a social network. A method includes retrieving contact lists from a plurality of devices,... |
US-1,004,4667 |
Method and device for controlling peripheral devices via a social
networking platform A method and device for providing access and control of a peripheral device through a support service provider thereof over a social networking platform... |
US-1,004,4666 |
System for communicating between devices A computer implemented method of communicating between devices is disclosed. This method includes: selecting a plurality of options associated with a... |
US-1,004,4665 |
Managing data on computer and telecommunications networks Protecting personal information by generating entity-specific aliases for use in communication with third parties is disclosed. |
US-1,004,4664 |
Prevention of sending messages by mistake Machine logic implemented techniques for preventing sending messages by mistake (with such "mistakes" including sending a message to an unintended recipient).... |
US-1,004,4663 |
System for electronic mail server configuration management The present invention provides for a rules-based system for managing the configuration of electronic mail (email) and/or messaging servers within an enterprise.... |
US-1,004,4662 |
Email conversation linking A system adapted to link email conversations is disclosed. An email client identifies email conversations from email header information and presents the... |
US-1,004,4661 |
Social media message delivery based on user location An approach for delaying social media messages is provided herein. A first computing device receives user preferences. The first computing device detects a... |
US-1,004,4660 |
Computer implemented methods and apparatus for providing communication
between network domains in a service cloud Disclosed are systems, apparatus, and methods for integrating a service console application by providing communication between a first and second network... |
US-1,004,4659 |
Dynamic e-mail chain participant manager An approach for new recipient inclusion to e-mail chains. E-mail chain manager receives include participants associated with an e-mail chain, current... |
US-1,004,4658 |
Group messaging method, and device A group messaging method and a device, which relate to the field of communications is described. The group messaging method is applied to a group-send... |
US-1,004,4657 |
Preventing messages from being sent using inappropriate communication
accounts A method, system and computer program product for preventing messages from being sent using inappropriate communication accounts. A message created by a user of... |
US-1,004,4656 |
Statistical message classifier A system and method are disclosed for improving a statistical message classifier. A message may be tested with a machine classifier, wherein the machine... |
US-1,004,4655 |
Managing distribution of media content This disclosure relates to systems and methods that include receiving media content from a content submitter, classifying the media content by initiating one of... |