Validity Report
Basic Report
US10726102B2 — Method of and system for providing access to access restricted content to a user
Priority Date: 2014-01-08, Publication Date: 2020-07-28, Current Assignee: Ipra Technologies Ltd OyReport Generated: 2022-04-15

Preview Results

Patent Id
Score
Title
Patent Type
Publication Date
Priority Date
Search Efficiency
Original Assignee
Current Assignee
EP3860083A1●●●●●SYSTEM AND METHOD FOR IDENTITY MANAGEMENTGRANT2021-08-042013-08-23GreatIdemia Identity and Security USA LLCIdemia Identity and Security USA LLC
EP3901792A1●●●●●METHOD AND SYSTEM FOR CONTENT DISTRIBUTIONGRANT2021-10-272011-12-29GreatKoninklijke KPN NVKoninklijke KPN NV
EP3907636A1●●●●●SECURELY COMMUNICATING BETWEEN A CARD READER AND A MOBILE DEVICEGRANT2021-11-102012-06-12GreatSquare IncBlock Inc
EP3916593A1●●●●●SYSTEM AND METHOD FOR EFFICIENTLY ENROLLING  REGISTERING  AND AUTHENTICATING WITH MULTIPLE AUTHENTICATION DEVICESGRANT2021-12-012012-12-28GreatNok Nok Labs IncNok Nok Labs Inc
EP3917106A1●●●●●METHOD AND APPARATUS FOR PROVIDING AUTHENTICATION SESSION SHARINGGRANT2021-12-012010-02-18GreatNokia Technologies OyNokia Technologies Oy
EP3866447A1●●●●●SYSTEM AND METHOD FOR AUTHORIZING ACCESS TO ACCESS-CONTROLLED ENVIRONMENTSGRANT2021-08-182013-05-13GreatVeridium IP LtdVeridium IP Ltd
EP3859635A1●●●●●FILE-LEVEL COMMENTINGGRANT2021-08-042013-11-14GreatDropbox IncDropbox Inc
EP3910580A1●●●●●PAYMENT SYSTEMGRANT2021-11-172011-04-05GreatVisa Europe LtdVisa Europe Ltd
EP3917111A1●●●●●STORAGE DEVICE AUTHENTICATIONGRANT2021-12-012009-05-15GreatAmazon Technologies IncAmazon Technologies Inc
EP3905076A1●●●●●CONTENT PROTECTIONGRANT2021-11-032012-11-04GreatMining Ip LtdMining Ip Ltd
EP3905171A1●●●●●METHOD AND SYSTEM FOR SECURE ORDER MANAGEMENT SYSTEM DATA ENCRYPTION  DECRYPTION  AND SEGMENTATIONGRANT2021-11-032010-06-11GreatCardinalCommerce CorpCardinalCommerce Corp
EP3890217A1●●●●●SYSTEMS  METHODS  AND DEVICES FOR SCANNING BROADCASTSGRANT2021-10-062008-02-05GreatStratosAudio IncStratosAudio Inc
EP3860094A1●●●●●SUBSCRIPTION-NOTIFICATION MECHANISMS FOR SYNCHRONIZATION OF DISTRIBUTED STATESGRANT2021-08-042012-09-22GreatGoogle LLCGoogle LLC
EP3886452A1●●●●●METHOD FOR SHARING MEDIA CONTENT  TERMINAL DEVICE  AND CONTENT SHARING SYSTEMGRANT2021-09-292013-07-23GreatHuawei Technologies Co LtdHuawei Technologies Co Ltd
EP3872724A1●●●●●NOTIFICATION FEED ACROSS MULTIPLE CLIENT DEVICESGRANT2021-09-012013-01-14GreatDropbox IncDropbox Inc
●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●Great●●●●●●●●●●
●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●Great●●●●●●●●●●
●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●Great●●●●●●●●●●
Keep up the Momentum with full ranked/tiered results. One-time price.

Predictive Analytics

Composite Research Score (1-10)
8
  HARD
Art VolumeMEDIUM
Tech ComplexityINTRICATE
Priority DateMID
Tech DiversityBROAD
Expert Services Estimate$4,350 — $4,800
There is where a graph would go if the browser supported it.
There is where a graph would go if the browser supported it.

Preview CPC Technology Profile

Possible Classes
2,082
Recommended Classes
521
Government Assigned Classes
1
CPC
Title
Score
H04L9/08Key distribution | or management  e.g. generation  sharing or updating  of cryptographic keys or passwords | network architectures or network communication protocols for supporting key management in a packet data network | (ref: H04L63/06)●●●●●
H04L9/0844with user authentication or key authentication  e.g. ElGamal  MTI  MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys●●●●●
G06F21/10Protecting distributed programs or content  e.g. vending or licensing of copyrighted material●●●●●
H04L63/061for key exchange  e.g. in peer-to-peer networks | cryptographic mechanisms or cryptographic arrangements for key agreement | (ref: H04L9/0838)●●●●●
H04N21/2347involving video stream encryption | arrangements for secret or secure communication | (ref: H04L9/00)|   analogue secrecy systems | (ref: H04N7/16)|  | | arrangements using cryptography for the use of broadcast information or broadcast-related information | (ref: H04H60/23)| | arrangements for preventing the taking of data from a data transmission channel without authorisation | (ref: H04L12/22)| | security arrangements in wireless networks | (ref: H04W12/00)●●●●●
G06F21/6272by registering files or documents with a third party●●●●●
G06Q10/101Collaborative creation of products or services●●●●●
G06F21/602Providing cryptographic facilities or services●●●●●
G06F21/6263during internet communication  e.g. revealing personal data from cookies●●●●●
H04L63/0428wherein the data content is protected  e.g. by encrypting or encapsulating the payload●●●●●
●●●●●●●●●●●●●●●
●●●●●●●●●●●●●●●
●●●●●●●●●●●●●●●
Keep up the Momentum with full ranked/tiered results. One-time price.
Terms of Service | Privacy Policy | Contact | COPYRIGHT 2020. TECHSON IP, LLC. LIMESTONE, TECHSON, AND INTELLIGENT PROPERTY ARE REGISTERED TRADEMARKS. TECHSON IP IS NOT A LAW FIRM AND DOES NOT PROVIDE LEGAL OPINIONS OR LEGAL ADVICE.