Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2017/0289189 SYSTEM AND METHOD FOR AUTOMATIC GENERATION OF FILTER RULES
In general, certain embodiments of the present disclosure provide methods and systems for automatic generation of filter rules based on functional network...
2017/0289188 DEVICE IDENTIFICATION SYSTEMS
Methods and systems for a device identification system may be provided. The device identification system may determine an identity of a user device associated...
2017/0289187 SYSTEM AND METHOD FOR VISUALIZING AND ANALYZING CYBER-ATTACKS USING A GRAPH MODEL
A system and method for implementing a graph database to analyze and monitor a status of an enterprise computer network is provided. In one example, a...
2017/0289186 SYSTEM AND METHOD TO PROTECT A WEBSERVER AGAINST APPLICATION EXPLOITS AND ATTACKS
A method and a system of protecting a target computer server system from packet data communication exploits are described. Such a method may include:...
2017/0289185 DEVICE ASSISTED TRAFFIC ANOMALY DETECTION
Techniques for traffic anomaly detection are provided. A method according to these techniques includes producing, at a client device, a handshake message for...
2017/0289184 ADAPTIVE INTERNET OF THINGS EDGE DEVICE SECURITY
In an example, there is disclosed an apparatus, including: a network interface to communicatively couple to an internet of thing (IoT) having at least one edge...
2017/0289183 IOT AND POS ANTI-MALWARE STRATEGY
Providing security to a device includes detecting, in a first device, a first function call, determining whether the first function call is forbidden for the...
2017/0289182 Security System Monitoring Techniques
Security rules of a security system include original security scores as conditions for raising alerts. The original security scores are dependent on the...
2017/0289181 PAYMENT METHOD, APPARATUS AND MEDIUM
A payment method, apparatus and medium are provided. The method includes: preventing a floating window from being displayed on an interface displayed by a...
2017/0289180 FILTERING OF METADATA SIGNATURES
Systems and methods for high performance IDS/IPS with efficient metadata filtering are provided. According to one embodiment, a signature database of an...
2017/0289179 SANDBOXING PROTECTION FOR ENDPOINTS
Methods and systems for integrating a sandboxing service and distributed threat intelligence within an endpoint security application are provided. According to...
2017/0289178 SYSTEMS AND METHODS FOR DETECTING SECURITY THREATS
The disclosed computer-implemented method for detecting security threats may include (1) detecting, by a software security program, a security incident at a...
2017/0289177 Cloud-Based Communication Account Security
A request is received over a network to resolve a problem relating to a networked user device. The request is accepted in order to provide user service. Based...
2017/0289176 INTERNET OF THINGS SECURITY APPLIANCE
A method for implementing an Internet of Things security appliance is presented. The method may include intercepting a data packet sent from a server to a...
2017/0289175 SYSTEM AND METHOD FOR ENHANCED DISPLAY-SCREEN SECURITY AND PRIVACY
A security method that includes assigning a sensitivity value for a communication with a sensitivity determining module including at least one hardware...
2017/0289174 SECURITY ASSESSMENT INCENTIVE METHOD FOR PROMOTING DISCOVERY OF COMPUTER SOFTWARE VULNERABILITIES
In one aspect, the disclosure provides: A method comprising: assessing a plurality of researchers as a precondition for receiving an invitation to be a...
2017/0289173 TEMPORARY ENROLLMENT IN ANONYMOUSLY OBTAINED CREDENTIALS
A method begins by receiving, by an authenticated device of a dispersed storage network (DSN), an access request from a requesting device. The method continues...
2017/0289172 REQUEST AUTHENTICATION FROM MESSAGE CONTENT
In example embodiments, a system and method performs authentication and confirmation of requests within a control server system. Accordingly, a first message...
2017/0289171 HIERARCHIES OF CREDENTIAL AND ACCESS CONTROL SHARING BETWEEN DSN MEMORIES
A method includes detecting a change to one or more of: a credential of set of storage units supporting a logical storage vault and access control information...
2017/0289170 REMOTE PROCESSSING OF MOBILE APPLICATIONS
In an example implementation of the disclosed technology, a method includes accessing, by a management agent associated with a client device, a profile...
2017/0289169 ESTABLISHING A CLEANROOM DATA PROCESSING ENVIRONMENT
Techniques for providing a virtual cleanroom data processing environment are described herein. In one or more embodiments, a virtual private cloud environment...
2017/0289168 Personalized Inferred Authentication For Virtual Assistance
Aspects of the technology described herein provide a mechanism for controlling access to secure computing resources based on inferred user authentication. A...
2017/0289167 Remotely Controlling Access To A Computing Device
Embodiments include devices and methods for remotely controlling access to a first computing device. A processor of the first computing device may receive an...
2017/0289166 METHODS AND APPARATUSES FOR PROVIDING IMPROVED DIRECTORY SERVICES
A method, apparatus and computer program product are provided for implementing an improved directory services system. An example of the method includes...
2017/0289165 Systems and methods for providing visualization of Geo location of pupil transportation buses
A computer-implemented system and method that includes receiving a request to know the Geo location of a pupil transportation vehicle ("Yellow School Bus"or...
2017/0289164 ACCESS RELATIONSHIP IN A COMPUTER SYSTEM
Various mechanisms can be used for authorizing access between entities in a computing environment. Configuring such access may involve configuration data...
2017/0289163 METHOD AND SYSTEM FOR SYSTEM FOR CONTROLLING ONLINE USER ACCOUNT USING A MOBILE DEVICE
A method and system for controlling online user account using a mobile device. The method includes receiving an option to lock an online account of a user from...
2017/0289162 DELIVERING AUTHOR SPECIFIC CONTENT
Delivering author specific content includes identifying author specific content with tags inserted into its metadata across multiple online resources and...
2017/0289161 Apparatus and Method for Automated Email and Password Creation and Curation Across Multiple Websites
A machine has a network interface circuit for connection with a network. A processor is connected to the network interface circuit. A memory is connected to...
2017/0289160 CONTROL SYSTEM, CONTROL METHOD, AND NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUM
A control system includes a communication control device including a memory, and a processor coupled to the memory and configured to execute a determination...
2017/0289159 SECURITY SUPPORT FOR FREE WI-FI AND SPONSORED CONNECTIVITY FOR PAID WI-FI
Methods and apparatus to support secure Wi-Fi AP protocols are disclosed. An example method includes in response to receiving a request from a computing device...
2017/0289158 EXTENDING AND RE-USING AN IP MULTIMEDIA SUBSYSTEM (IMS)
Systems and methods for extending and re-using an IP multimedia subsystem (IMS) to extend the trust relationship from a closed group of customers of wireless...
2017/0289157 ESTABLISHING TRUST BETWEEN TWO DEVICES
Techniques described herein leverage a trusted entity within a domain to enable devices to establish trust with one another so they can securely discover each...
2017/0289155 COMMUNICATION BETWEEN DEVICES WITHOUT ESTABLISHING A PERSISTENT CONNECTION
Methods and apparatuses are disclosed for enabling non-persistent communications between devices. A device can receive a first broadcast from a broadcasting...
2017/0289154 Generating and Using Ephemeral Identifiers and Message Integrity Codes
Systems and methods for generating and using ephemeral identifiers are provided. One example method includes determining, by one or more computing devices, a...
2017/0289153 SECURE ARCHIVAL AND RECOVERY OF MULTIFACTOR AUTHENTICATION TEMPLATES
Systems, apparatuses and methods may provide for generating, at a computing device, a challenge message in response to a recovery request and conducting a...
2017/0289152 NEGOTIATING TRUST DEGRADATION FOR A CENTRAL ENTITY BY PEERS LACKING DIRECT COMMUNICATION WITH ONE ANOTHER
Systems, apparatuses and methods may provide for generating, in response to a decrease in trustworthiness with respect to a controller, a notification message...
2017/0289151 TECHNOLOGIES FOR DYNAMIC LOADING OF INTEGRITY PROTECTED MODULES INTO SECURE ENCLAVES
Technologies for dynamic loading of integrity protected modules into a secure enclave include a computing device having a processor with secure enclave...
2017/0289150 Securing Remote Authentication
Authenticating a secure session between a first user entity and an identity provider using a second user entity. The method receiving a request for a session...
2017/0289149 SYSTEMS AND METHODS FOR MUTUAL AUTHENTICATION OF ELECTRONIC DEVICES
Embodiments are provided for mutually authenticating a pair of electronic devices. According to certain aspects, the electronic devices may connect to each...
2017/0289148 MEDIA SERVICES WITH ACCESS CONTROL
Systems and methods are describe wherein a service provider provides media services that can include, but are not limited to, telephone, radio, interactive and...
2017/0289147 SYSTEM AND METHOD FOR ACCESS AUTHENTICATION
A method for access authentication includes receiving a facial recognition picture from a mobile electronic apparatus of a user. The facial recognition picture...
2017/0289146 AUTHENTICATION METHOD WITH ENHANCED SECURITY BASED ON EYE RECOGNITION AND AUTHENTICATION SYSTEM THEREOF
An authentication method and system with an enhanced security based on eye recognition includes registering eye information extracted from an input image...
2017/0289145 Wireless Dongle for Communications with Wireless Earpieces
A wireless earpiece system, method, and one or more wireless earpieces for communications between one or more wireless earpieces and a wireless dongle. The one...
2017/0289144 METHODS AND SYSTEMS FOR AUTHENTICATING USERS
A method of authenticating users is provided that includes storing data in a buffer. The data is within a temporal window and includes biometric data extracted...
2017/0289143 Electronic Messaging Exchange
A computer-implemented system and method for secure electronic message exchange including coupling a control platform to a workstation of a plurality of...
2017/0289142 METHODS AND APPARATUS FOR ESTABLISHING A SECURE COMMUNICATION CHANNEL
A method for establishing a secure communication channel between an off-card entity and an embedded Universal Integrated Circuit Card (eUICC) is provided. The...
2017/0289141 OPERATING METHOD FOR ONE-TIME PASSWORD WITH UPDATABLE SEED
An operating method for a one-time password with an updatable seed. The method comprises: a one-time password entering a dormancy mode after being powered on...
2017/0289140 SYSTEM AND METHOD FOR INTEGRATING A TRANSACTIONAL MIDDLEWARE PLATFORM WITH A CENTRALIZED ACCESS MANAGER FOR...
In accordance with an embodiment, described is a system and method for integrating a transactional middleware platform with a centralized access manager to...
2017/0289139 DEVICE VERIFICATION METHOD AND APPARATUS
The present invention provides device verification methods and apparatuses, wherein the device verification methods are used for verifying a target device...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.