Validity Report
Basic Report
US10171433B2 — System and method for authenticating users
Priority Date: 2009-03-25, Publication Date: 2019-01-01, Current Assignee: PACID TECHNOLOGIES LLCReport Generated: 2023-12-18

Preview Results

Patent Id
Score
Title
Patent Type
Publication Date
Priority Date
Search Efficiency
Original Assignee
Current Assignee
EP1400089B1●●●●●Authentification of a user across communicaqtion sessionsGRANT2007-01-312001-06-13GreatCitrix Systems IncCitrix Systems Inc
EP1272915B1●●●●●DEVICE FOR SECURELY STORING SECRET INFORMATIONGRANT2008-07-162000-04-11GreatThomson Licensing SASTHOMSON LICENSING
EP2304636B1●●●●●MOBILE DEVICE ASSISTED SECURE COMPUTER NETWORK COMMUNICATIONSGRANT2018-08-012008-05-16GreatMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US7231517B1●●●●●Apparatus and method for automatically authenticating a network clientGRANT2007-06-122000-03-03GreatNovell IncApple Inc
EP1653697B1●●●●●Secure Peer-to-Peer Messaging Invitation ArchitectureGRANT2016-08-172004-10-29GreatBlackBerry LtdBlackBerry Ltd
US7831051B2●●●●●Secure communication between a hardware device and a computerGRANT2010-11-092007-03-13GreatAladdin Europe GmbHThales DIS Deutschland GmbH
US6215877B1●●●●●Key management server  chat system terminal unit  chat system and recording mediumGRANT2001-04-101998-03-20GreatFujitsu LtdFujitsu Ltd
EP2013758B1●●●●●DYNAMIC AUTHENTICATION IN SECURED WIRELESS NETWORKSGRANT2016-08-032006-04-24GreatRuckus Wireless IncRuckus Wireless Inc
EP1348280B1●●●●●AUTHENTICATION IN DATA COMMUNICATIONGRANT2016-06-222000-12-27GreatNokia Technologies OyNokia Technologies Oy
EP1131911B1●●●●●METHOD AND APPARATUS FOR SECURE DISTRIBUTION OF AUTHENTICATION CREDENTIALS TO ROAMING USERSGRANT2007-09-261998-11-19GreatArcot Systems LLCArcot Systems LLC
EP2181521B1●●●●●METHOD OF AND APPARATUS FOR SHARING SECRET INFORMATION BETWEEN DEVICES IN HOME NETWORKGRANT2016-03-302007-08-20GreatSamsung Electronics Co LtdSamsung Electronics Co Ltd
EP0923827B1●●●●●METHOD AND APPARATUS FOR ENCRYPTING RADIO TRAFFIC IN A TELECOMMUNICATIONS NETWORKGRANT2005-05-111996-09-09GreatTelefonaktiebolaget LM Ericsson ABTelefonaktiebolaget LM Ericsson AB
EP1504561A1●●●●●METHODS AND SYSTEMS FOR SECURE TRANSMISSION OF INFORMATION USING A MOBILE DEVICEGRANT2005-02-092002-04-25GreatVasco Data Security IncOnespan International GmbH
EP1119132A2●●●●●Broadcasting encrypted messages using session keysGRANT2001-07-252000-01-19GreatResearch in Motion LtdBlackBerry Ltd
EP2355401A1●●●●●KEY DISTRIBUTION SYSTEMGRANT2011-08-102008-12-05GreatPanasonic Electric Works Co LtdPanasonic Intellectual Property Management Co Ltd
●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●Great●●●●●●●●●●
●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●Great●●●●●●●●●●
●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●Great●●●●●●●●●●
Keep up the Momentum with full ranked/tiered results. One-time price.

Predictive Analytics

Composite Research Score (1-10)
9
  HARD
Art VolumeHIGH
Tech ComplexityINTRICATE
Priority DateMID
Tech DiversityBROAD
Expert Services Estimate$4,950 — $5,400
There is where a graph would go if the browser supported it.
There is where a graph would go if the browser supported it.

Preview CPC Technology Profile

Possible Classes
589
Recommended Classes
148
Government Assigned Classes
9
CPC
Title
Score
G06F21/62Protecting access to data via a platform  e.g. using keys or access control rules●●●●●
H04L63/0428wherein the data content is protected  e.g. by encrypting or encapsulating the payload●●●●●
H04L9/0838Key agreement  i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by  or associated with  each of these | network architectures or network communication protocols for key exchange in a packet data network | (ref: H04L63/061)●●●●●
H04L9/12Transmitting and receiving encryption devices synchronised or initially set up in a particular manner●●●●●
H04L63/08for supporting authentication of entities communicating through a packet data network | cryptographic mechanisms or cryptographic arrangements for entity authentication | (ref: H04L9/32)●●●●●
G06F21/6209to a single file or object  e.g. in a secure envelope  encrypted and accessed using a key  or with access control rules appended to the object itself●●●●●
G16H10/60for patient-specific data  e.g. for electronic patient records●●●●●
G06F21/78to assure secure storage of data | address-based protection against unauthorised use of memory | (ref: G06F12/14)| | record carriers for use with machines and with at least a part designed to carry digital markings | (ref: G06K19/00)●●●●●
G06F12/1408by using cryptography | for digital transmission | (ref: H04L9/00)●●●●●
H04L9/0822using key encryption key●●●●●
●●●●●●●●●●●●●●●
●●●●●●●●●●●●●●●
●●●●●●●●●●●●●●●
Keep up the Momentum with full ranked/tiered results. One-time price.
Terms of Service | Privacy Policy | Contact | COPYRIGHT 2020. TECHSON IP, LLC. LIMESTONE, TECHSON, AND INTELLIGENT PROPERTY ARE REGISTERED TRADEMARKS. TECHSON IP IS NOT A LAW FIRM AND DOES NOT PROVIDE LEGAL OPINIONS OR LEGAL ADVICE.