Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2017/0264657 STREAMING SERVICE DATA RECEIVING DEVICE AND METHOD IN MOBILE COMMUNICATION SYSTEM FOR SUPPORTING PLURALITY OF...
The present invention relates to technology for a sensor network, machine to machine (M2M) communication, machine type communication (MTC), and the Internet of...
2017/0264656 HANDLING SOURCE ROUTED CONTENT
Methods for handling source-routed content are provided, together with apparatuses for performing the methods. A method at a receiving network node includes...
2017/0264655 Indicating an Association Between a Social-Media Account and a Media Playback System
Examples disclosed herein include a social-media computing system receiving, from a first computing device, a first message indicating that a media playback...
2017/0264654 RETRIEVAL OF WIRELESS NETWORK CREDENTIALS
Methods, systems, and computer readable media may be operable to facilitate a retrieval and display of network credentials. A predetermined input may be...
2017/0264653 Remote support service with two-way smart whiteboard
Mobile devices, such as a smartphone, tablet or wearable, are leveraged to facilitate remote support between a user of the device, and a remote technician. In...
2017/0264652 CROSS-PLATFORM VIDEO CONVERSATION BETWEEN RELATED DEVICES
Cross-platform video conversation between related devices is described. Techniques described herein include receiving, by a first device registered with a...
2017/0264651 Communication System
There is provided a method comprising: causing received image and/or audio data associated with an audio-visual call to be played-out via a user interface;...
2017/0264650 AUTOMATIC CONFIGURATION OF ENDPOINT COMMUNICATION DEVICES TO SET UP A VOIP NETWORK
Implementations relate to automatic configuration of endpoint communication devices to set up a communication network such as a VOIP network. In some...
2017/0264649 EMPLOYING SESSION LEVEL RESTRICTIONS TO LIMIT ACCESS TO A REDIRECTED INTERFACE OF A COMPOSITE DEVICE
Session level restrictions can be implemented to limit access to a redirected interface of a composite device. These session level restrictions can be defined...
2017/0264648 PROVIDING SIP SIGNALING DATA FOR THIRD PARTY SURVEILLANCE
A method for facilitating surveillance of a targeted user participating in communication sessions conducted over a communications network, such as a voice over...
2017/0264647 GROUP COMMUNICATION SERVICE ENABLER SECURITY
Systems, methods, apparatuses, and computer program products for securing user plane (e.g., MB2-U) interface between a group communication service application...
2017/0264646 SYSTEM AND METHOD FOR SOFTWARE DEFINED BEHAVIORAL DDOS ATTACK MITIGATION
Systems and methods for software defined behavioral DDoS attack mitigation are provided. According to one embodiment, a method is provided for controlling...
2017/0264645 LOCATION BASED SHARING OF A NETWORK ACCESS CREDENTIAL
A network access credential can be shared among devices based on location information for a device. Location information can include timed fingerprint location...
2017/0264644 APPLICATION PLATFORM SECURITY ENFORCEMENT IN CROSS DEVICE AND OWNERSHIP STRUCTURES
Methods and systems provide application platform security enforcement. A distributed system communicates between a plurality of remote devices and at least one...
2017/0264643 LANGUAGE-LOCALIZED POLICY STATEMENTS
Techniques for generating and using reader-friendly policy statements are disclosed. In one or more embodiments, a policy management service receives a request...
2017/0264642 THICK CLIENT POLICY CACHING
Techniques for evaluating authorization requests using cached policy data are disclosed. In one or more embodiments, a thick client receives an authorization...
2017/0264641 ENHANCED FIREWALL AND METHOD FOR SECURING INTERNET COMMUNICATIONS
A system and method are described for securing a network-connected device from a hacker having access to a network to which the network-connected device is...
2017/0264640 SYSTEMS AND METHODS OF ENFORCING MULTI-PART POLICIES ON DATA-DEFICIENT TRANSACTIONS OF CLOUD COMPUTING SERVICES
The technology disclosed relates to enforcing multi-part policies on data-deficient transactions of independent data stores. In particular, it relates to...
2017/0264639 ACTIVE DECEPTION SYSTEM
Provided are methods, including computer-implemented methods or methods implemented by a network device, devices including network devices, and ...
2017/0264638 SYSTEM AND METHOD FOR SOFTWARE DEFINED BEHAVIORAL DDOS ATTACK MITIGATION
Systems and methods for software defined behavioral DDoS attack mitigation are provided. According to one embodiment, a method is provided for mitigating DDoS...
2017/0264637 Method, Apparatus and System for Processing Attack Behavior of Cloud Application in Cloud Computing System
An apparatus for processing an attack behavior of a cloud application in a cloud computing system, including a policy manager configured to store a security...
2017/0264636 SECURITY NETWORK BUFFER DEVICE
A secure connection is facilitated between a device and a network. A security buffer device is used to determine an available network and connect to the...
2017/0264635 APPLICATION PLATFORM SECURITY ENFORCEMENT IN CROSS DEVICE AND OWNERSHIP STRUCTURES
Methods and systems provide application platform security enforcement. A distributed system communicates between a plurality of remote devices and at least one...
2017/0264634 SYSTEMS AND METHODS FOR SUPPORTING INFORMATION SECURITY AND SUB-SYSTEM OPERATIONAL PROTOCOL CONFORMANCE
Systems and methods are described that support information security and sub-system operational conformance with protocols. In some embodiments, agent access to...
2017/0264633 Social Engineering Simulation Workflow Appliance
A system for evaluating the susceptibility of an organization to social engineering, the organization having a plurality of sources and a plurality of members...
2017/0264632 A TELECOMMUNICATIONS DEFENCE SYSTEM
A telecommunications defence system (1) comprises at least one server (3) adapted to be in communication with a client telecommunications system (5) via a...
2017/0264631 CONTROL DEVICE FOR A NETWORK AND VULNERABILITY SCANNER
A control device for a network and vulnerability scanner for testing a computer system for the presence of security vulnerabilities includes: a first interface...
2017/0264630 SELECTIVE EXTENDED ARCHIVING OF DATA
A system is provided for selective extended archiving of data. A network analyzer may intercept and log traffic that passes over at least part of a computer...
2017/0264629 PRODUCTION PROCESS KNOWLEDGE-BASED INTRUSION DETECTION FOR INDUSTRIAL CONTROL SYSTEMS
A system for threat detection in an industrial production environment comprises a programmable logic controller. This programmable logic controller includes a...
2017/0264628 AUTOMATED INSIDER THREAT PREVENTION
Techniques for automated insider threat prevention are disclosed. In some embodiments, a system, process, and/or computer program product for automated insider...
2017/0264627 Cost Prioritized Evaluations of Indicators of Compromise
A method for evaluating indicators of compromise (IOCs) is performed at a device having one or more processors and memory. The method includes receiving...
2017/0264626 MALICIOUS HTTP COOKIES DETECTION AND CLUSTERING
Techniques for malicious HTTP cookies detection and clustering are disclosed. In some embodiments, a system, process, and/or computer program product for...
2017/0264625 SECURITY TEST TOOL
A test tool includes a connection engine, a transformation engine, a validation engine, and a messaging engine. The connection engine connects to a first...
2017/0264624 METHOD OF MITIGATING COOKIE-INJECTION AND COOKIE-REPLAYING ATTACKS
The present disclosure is drawn to systems, methods, and computer-readable media for mitigating cookie-injection and cookie-replaying attacks using a VPN...
2017/0264623 APPLYING BYTECODE OBFUSCATION TECHNIQUES TO PROGRAMS WRITTEN IN AN INTERPRETED LANGUAGE
In an embodiment, a computer system configured to improve security of client computer interacting with server computers comprises one or more processors; a...
2017/0264622 PROVIDING A VIRTUAL SECURITY APPLIANCE ARCHITECTURE TO A VIRTUAL CLOUD INFRASTRUCTURE
A method in an embodiment includes detecting a change for a virtual machine in a virtual server of a virtual network infrastructure, determining whether a...
2017/0264621 LOGIN PERFORMANCE
An embodiment of the invention may include a method, computer program product and system for receiving a request from a user to access a system. The user...
2017/0264620 DEVICE AND METHOD FOR CONTROLLING A COMMUNICATION NETWORK
A device for controlling a communication network having a plurality of terminals for a data communication is provided. The device comprises a control unit...
2017/0264619 MIDDLE WARE SECURITY LAYER FOR CLOUD COMPUTING SERVICES
The technology disclosed relates to enforcing multi-part policies on data-deficient transactions of independent data stores. In particular, it relates to...
2017/0264618 SHARE PERMISSIONS AND ORGANIZATION OF CONTENT IN AN APPLICATION WITH MULTIPLE LEVELS OF ORGANIZATIONAL HIERARCHY
Share permissions and organization of content in an application with multiple levels of organizational hierarchy is provided. In some examples, an application...
2017/0264617 Systems and Methods for Detecting and Reacting to Malicious Activity in Computer Networks
Described herein are systems and methods for performing detection operations on secure ticket data to detect potentially malicious activity. Embodiments may...
2017/0264616 INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, AND NON-TRANSITORY...
An information processing device includes: a first reception unit that receives first information indicating a storage location of a document to be printed; a...
2017/0264615 SYSTEM, INFORMATION PROCESSING APPARATUS, AND STORAGE MEDIUM
A system includes an apparatus among apparatuses configured to relay communication between equipment, and another apparatus coupled to the apparatuses through...
2017/0264614 Security control method for social network user, social application device and terminal
A security control method for a social network user, a social application device and a terminal are provided. The method includes: when information is...
2017/0264613 COMMUNICATION MECHANISM FOR DATA PROCESSING DEVICES
A method for controlling communications between a data processing device in a first network and a target service in a second network via a gateway apparatus,...
2017/0264612 SYSTEM AND METHOD FOR PROVIDING A UNIVERSAL SECURITY HANDLER FOR A CLOUD-BASED INTEGRATION PLATFORM
In accordance with an embodiment, described herein is a system and method for providing a universal security handler for use with a cloud-based integration...
2017/0264611 System And Method For Securing Account Access By Verifying Account With Email Provider
Methods and systems are provided for automatically securing account access by verifying account information with an email provider. The methods and systems...
2017/0264610 DATA PROCESSING METHOD AND APPARATUS BASED ON MOBILE APPLICATION ENTRANCE AND SYSTEM
A data processing method is performed at a computer system managing application programming interfaces (APIs) and mobile application entrances. An API...
2017/0264609 SERVER FOR AUTHENTICATION BASED ON CONTEXT INFORMATION OF PARTICULAR LOCATION, CONTROL METHOD THEREOF AND...
A server, a control method thereof, and an electronic apparatus are provided. The method of operating a server may include: transmitting question information...
2017/0264608 VISUAL BIOMETRIC AUTHENTICATION SUPPLEMENTED WITH A TIME-BASED SECONDARY AUTHENTICATION FACTOR
Various features pertain to two-factor authentication. A user seeking access to the secure facility or system generates a time-limited Quick Response (QR) code...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.