Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2017/0272465 DYNAMIC DENIAL OF SERVICE DETECTION AND AUTOMATED SAFE MITIGATION
Methods, systems, and computer programs are presented for automated detection and mitigation of Denial of Service (DoS) attacks. One method includes an...
2017/0272464 METHODS, SYSTEMS AND DEVICES TO MITIGATE THE EFFECTS OF SIDE EFFECT URLs IN LEGITIMATE AND PHISHING ELECTRONIC...
A computer-implemented method may comprise receiving an electronic message (such as a legitimate email or malicious phishing email, for example) over a...
2017/0272463 Method and System for Dark Matter Scanning
A method and system for scanning a computing system network for dark matter computing systems and computing devices. The method includes establishing a...
2017/0272462 System and Method for Process Hollowing Detection
A method and system for remediating a process hollowing intrusion on a user device comprising detecting a process starting on the user device, preparing the...
2017/0272461 Detection of Compromised Accounts
Processes and systems described herein enable a computing device to detect compromised accounts. The computing device may obtain a user credential including a...
2017/0272460 METHOD AND SYSTEM OF ELIMINATING VULNERABILITIES OF SMART DEVICES
Disclosed are systems and methods for eliminating vulnerabilities of smart devices connected to a data network. An example method includes: identifying a...
2017/0272459 METHOD AND SYSTEM OF ELIMINATING VULNERABILITIES OF A ROUTER
A method and system is provided for eliminating vulnerabilities on a data network including a router for directing data in the data network. An example method...
2017/0272458 Network Security System with Real-Time and Batch Paths
A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The...
2017/0272457 IMPORTANCE-LEVEL CALCULATION DEVICE, OUTPUT DEVICE, AND RECORDING MEDIUM IN WHICH COMPUTER PROGRAM IS STORED
The present invention provides an importance-level calculation device, etc., with which it is possible to present an alert indicating network abnormality to an...
2017/0272456 INTRUSION DETECTION TO PREVENT IMPERSONATION ATTACKS IN COMPUTER NETWORKS
In an embodiment, a central computer performs a data processing method. The central computer receives telemetry data from intrusion sensors. The central...
2017/0272455 Routing Systems and Methods
Example routing systems and methods are described. In one implementation, a first set of routing systems is interfaced with a network connection via a network...
2017/0272454 SYSTEM AND METHOD FOR DETECTING MALICIOUS CODE USING VISUALIZATION
Disclosed are a system and a method for detecting a malicious code using visualization in order to allow a user to intuitively detect behavior of client...
2017/0272453 USER INTERFACE FOR DISPLAYING NETWORK ANALYTICS
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for presenting data to visualize and interact with results of a...
2017/0272452 Multi-host Threat Tracking
A system and method for tracking data security threats within an organization is proposed. A threat aggregator process executing on an analysis computer system...
2017/0272451 MONITORING APPARATUS AND COMMUNICATION SYSTEM
A monitoring apparatus capable of efficiently disabling, when an invalid frame is detected in an in-vehicle network, the invalid frame by a simple method, for...
2017/0272449 PROVIDING PERMISSIONS TO SPAWNED COMPUTING RESOURCES
Implementations providing permissions to spawned computing resources within a computing environment include initiating a first computing resource whose...
2017/0272448 ENHANCED DATA INTERFACE FOR CONTACTLESS COMMUNICATIONS
Embodiments of the invention are directed at an enhanced data interface (EDI) for contactless communications between a mobile application operating on a mobile...
2017/0272447 SERVICE PROCESSING METHOD, APPARATUS AND SERVER
The present application provides a service processing method, apparatus and server, and the method includes: when a first user logs on a client device based on...
2017/0272446 AUTHENTICATION SYSTEM, OPERATING APPARATUS, AND AUTHENTICATION METHOD
An operating apparatus stores user information including authentication information of users permitted to use a process-carrying-out apparatus; acquires...
2017/0272445 NON-TRANSITORY COMPUTER READABLE MEDIUM, INFORMATION PROCESSING APPARATUS, AND INFORMATION PROCESSING METHOD
A non-transitory computer readable medium storing a program causing a computer to execute a process: the process comprising: performing a first utilization...
2017/0272444 MANAGEMENT OF COLLABORATIVE CONTENT ITEM MODIFICATION
The content management system can receive log-on requests from a plurality of users and a request from the plurality of users to access content stored in a...
2017/0272443 SYSTEM AND METHODS FOR PROVIDING QUERY-BASED PERMISSIONS TO DATA
A method includes generating a database query in a database; receiving a first request to execute the database query on behalf of a first user; in response to...
2017/0272442 METHODS AND SYSTEMS FOR DYNAMIC CREATION OF ACCESS CONTROL LISTS
A method for dynamically creating network access control lists includes, by a processor receiving a request for an access control list (ACL). The method...
2017/0272441 PRIVILEGE DISTRIBUTION THROUGH SIGNED PERMISSIONS GRANTS
A resource owner or administrator submits a request to a permissions management service to create a permissions grant which may include a listing of actions a...
2017/0272440 CONTROLLED ENVIRONMENT SECURE MEDIA STREAMING SYSTEM
A Controlled Environment Secure Media Streaming System manages the delivery of content to Secured Devices. Cloud Services provide content to Integration Hub....
2017/0272439 REMOTE COMMUNICATION SYSTEM, TERMINAL, AND TERMINAL COORDINATION METHOD
A remote communication system includes: a first communication terminal configured to establish a call session for transmitting and receiving at least audio...
2017/0272438 INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND STORAGE MEDIUM
An information processing system includes a memory that stores a user and authorization information, indicative of processing permitted for the user to execute...
2017/0272437 SOFTWARE DEFINED NETWORK (SDN) APPLICATION INTEGRITY
A Software-Defined Network (SDN) authorizes Application Programming Interface (API) calls from user SDN applications to user SDN controllers. A user SDN...
2017/0272436 AUTOMATED CONTROL OF TECHNOLOGY RESOURCES
The present invention provides for a fully automated process for controlling technology resources. Specifically, embodiments of the invention streamline the...
2017/0272435 CONTROLLED ENVIRONMENT SECURE MEDIA STREAMING SYSTEM
A Controlled Environment Secure Media Streaming System manages the delivery of content to Secured Devices. Cloud Services provide content to Integration Hub....
2017/0272434 INFORMATION PROCESSING APPARATUS, CONTROL METHOD, AND STORAGE MEDIUM INFORMATION PROCESSING APPARATUS AND...
There is provided a mechanism for invalidating, when an apparatus returns from a high-speed shutdown, authentication identification information issued before...
2017/0272433 METHOD AND SYSTEM FOR STORING AND ACCESSING CLIENT DEVICE INFORMATION IN A DISTRIBUTED SET OF NODES
A method includes identifying a first node in a plurality of nodes based on a client device identifier for a client device, the client device being associated...
2017/0272432 NETWORK OF BIOMETRICALLY SECURE DEVICES WITH ENHANCED PRIVACY PROTECTION
Various methods and devices that involve biometrically secured networked devices with enhanced privacy protection are disclosed. For example, a ...
2017/0272431 METHOD AND APPARATUS FOR ANALYZING A TRANSMISSION SIGNAL
A measurement device comprising a measurement unit adapted to measure a transmission characteristic for providing an eye pattern; and a conversion unit adapted...
2017/0272430 AUTHENTICATION METHOD, APPARATUS AND SYSTEM FOR DEVICE
An authentication method, apparatus and system for a device are disclosed. The authentication method includes: selecting at least one of second devices...
2017/0272429 SYSTEM AND METHOD TO CONDUCT CLINICAL EXAMINATIONS AND SECURELY INTERACT WITH NETWORKED ELECTRONIC APPLICATIONS
Disclosed herein is a single portable computing device with components for secure authentication and subject identification with a set of integrated electronic...
2017/0272428 Method for validating the identity of a user by using geo-location and biometric signature stored in device...
Method for validating the identity of a user by using geo-location and biometric signature stored in device memory and on a remote server.
2017/0272427 OBJECT MANAGEMENT FOR EXTERNAL OFF-HOST AUTHENTICATION PROCESSING SYSTEMS
Systems and methods for providing object management for external off-host authentication processing systems are described. In some embodiments, a method may...
2017/0272426 SECURE DOCUMENT STORAGE AND RETRIEVAL
Disclosed herein is a computer-implemented system and method for hosting companies to offer a service of securely retrieving, storing and distributing critical...
2017/0272425 METHOD AND DEVICE FOR ACCESSING SMART CAMERA
The present disclosure relates to a method and a device for accessing a smart camera. The method includes detecting access media for accessing the smart...
2017/0272424 System for Secure Enrollment and Secure Verification of Network Users by a Centralized Identification Service
A system and method for providing, as a service over a computer network (especially a packet-switched computer network) to a body of merchants connected to the...
2017/0272423 ENTITY TO AUTHORIZE DELEGATION OF PERMISSIONS
Systems and methods are described for delegating permissions to enable account access. The systems utilize a delegation profile that can be created within a...
2017/0272422 SYSTEMS AND METHODS FOR RFID SECURITY
An RFID system includes an RFID tag, an RFID reader, and a server. The RFID tag communicates to the server via encrypted information. The information may be...
2017/0272421 SYSTEMS AND METHODS FOR SECURELY MONITORING AN INDIVIDUAL
A biometric sensor may be coupled to a portable communications device, such as a cellular telephone. The biometric sensor may be configured to acquire one or...
2017/0272420 WEB CLIENT PLUGIN MANAGER IN VCENTER MANAGED OBJECT BROWSER
A method is provided for a plug-in manager in a virtual machine (VM) system to install or update a plug-in at a web client server in the VM system. The plug-in...
2017/0272419 IDENTITY AUTHENTICATION MIGRATION BETWEEN DIFFERENT AUTHENTICATION SYSTEMS
An intermediary can securely migrate a security credential between systems despite different underlying encoding technologies used for authentication by the...
2017/0272418 MULTI-LEVEL AUTHENTICATION FOR ONBOARD SYSTEMS
Described herein is a platform and method for providing multi-level authentication by an onboard system in relation to a transaction. In response to receiving...
2017/0272417 PREVENTING PERSISTENT STORAGE OF CRYPTOGRAPHIC INFORMATION USING SIGNALING
Organizations maintain and generate large amounts of sensitive information using computer hardware resources and services of a service provider. Furthermore,...
2017/0272416 Efficient Communication for Devices of a Home Network
Systems and methods are provided for efficient communication through a fabric network of devices in a home environment or similar environment. For example, an...
2017/0272415 System, Apparatus And Method For Key Provisioning Delegation
In one embodiment, a computing device includes at least one hardware processor to execute instructions, a network interface to enable communication with a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.