Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2017/0295204 METHOD AND APPARATUS FOR ACQUIRING SIP SIGNALING DECRYPTION PARAMETERS
Disclosed in the embodiment of the present invention is a method for acquiring session initiation protocol (SIP) signaling decryption parameters and the method...
2017/0295202 USING WEB SEARCH ENGINES TO CORRECT DOMAIN NAMES USED FOR SOCIAL ENGINEERING
A computer implemented method, comprising obtaining a first hyperlink associated with a first web resource accessible via a client terminal, converting one or...
2017/0295201 Diameter Edge Agent Attack Detection
In accordance with the example embodiments of the Invention there is at least a method and apparatus to detect that at least one message received from another...
2017/0295200 Distributed Denial Of Service Attack Protection
Disclosed are systems and methods for distributed denial of service (DDoS) protection. One or more nodes in a plurality of routes between a first node and a...
2017/0295199 TECHNIQUES FOR CLOUD SECURITY MONITORING AND THREAT INTELLIGENCE
Systems and methods for cloud security monitoring and threat intelligence in accordance with embodiments of the invention are disclosed. In one embodiment, a...
2017/0295198 SECURITY MANAGEMENT IN A NETWORKED COMPUTING ENVIRONMENT
An approach for addressing (e.g., preventing) detected network intrusions in a virtualized/networked (e.g., cloud) computing environment is provided. In a...
2017/0295197 METHOD AND SYSTEM TO DETECT DISCREPANCY IN INFRASTRUCTURE SECURITY CONFIGURATIONS FROM TRANSLATED SECURITY BEST...
A method, system and/or an apparatus to detect discrepancy in infrastructure security configurations from translated security best practice configurations in...
2017/0295196 NETWORK ANOMALY DETECTION
Examples relate to detecting network anomalies. In one example, a computing device may: receive, from each of a plurality of packet capture devices of a...
2017/0295195 IDENTITY BASED BEHAVIOR MEASUREMENT ARCHITECTURE
An Identity Based Behavior Measurement Architecture (such as the BMA) and related technologies are described herein. In an exemplary embodiment, the BMA can be...
2017/0295194 EVALUATING THE EVALUATION BEHAVIORS OF EVALUATORS
Systems and methods for evaluating the evaluation behaviors of an evaluator are presented. In contrast to evaluation methods that monitor and analyze click...
2017/0295193 ADAPTIVE ANOMALY CONTEXT DESCRIPTION
Techniques are disclosed for providing a context-aware description of anomalous behavior in a computer network. According to one embodiment of the present...
2017/0295192 USING MULTIPLE LAYERS OF POLICY MANAGEMENT TO MANAGE RISK
A system for processing a file using a file issue exclusion policy to manage risk is disclosed. If a file does not conform to a set of rules and would...
2017/0295191 LOAD BALANCING METHOD AND APPARATUS IN INTRUSION DETECTION SYSTEM
A method of load balancing by multiple cores in a multi-core-based load balancing apparatus comparing arriving packets with a signature is provided, and...
2017/0295190 Correlation-Based Detection of Exploit Activity
A security agent implemented on a monitored computing device is described herein. The security agent is configured to receive an event notification indicative...
2017/0295189 Identifying security breaches from clustering properties
Embodiments of the present invention may provide the capability to identify security breaches in computer systems from clustering properties of clusters...
2017/0295188 AUTOMATED SECURITY POLICY GENERATION FOR CONTROLLERS
In one implementation, a method for automatically generating a security policy for a controller includes receiving, by a security policy generation system and...
2017/0295187 DETECTION OF MALICIOUS DOMAINS USING RECURRING PATTERNS IN DOMAIN NAMES
In one embodiment, a security device identifies, from monitored network traffic of one or more users, one or more suspicious domain names as candidate domains,...
2017/0295186 ACCESS CONTROL FOR USER ACCOUNTS USING A BIDIRECTIONAL SEARCH APPROACH
An example method is provided for a computing device to perform access control for a user account. The method may include receiving a request for the user...
2017/0295185 SYSTEM AND METHOD TO ASSOCIATE A PRIVATE USER IDENTITY WITH A PUBLIC USER IDENTITY
The system includes a host, a network including a security gateway, and a public application. Established are an access session between the network and the...
2017/0295184 UNIFORMLY ACCESSING FEDERATED USER REGISTRY TOPOLOGIES
An approach for standardizing access to user registries, the approach involving providing a first schema extension to an identity management system and a...
2017/0295183 ACCESS CONTROL FOR USER ACCOUNTS USING A PARALLEL SEARCH APPROACH
An example method is provided for a computing device to perform access control for a user account. The method may comprise receiving a request for the user...
2017/0295182 SPECIALLY PROGRAMMED COMPUTING SYSTEMS WITH ASSOCIATED DEVICES CONFIGURED TO IMPLEMENT SECURE LOCKDOWNS AND...
In some embodiments, the present invention provides for an exemplary inventive device which includes at least the following components: a secure lockdown...
2017/0295181 ACTIVITY BASED ACCESS CONTROL IN HETEROGENEOUS ENVIRONMENTS
A method, a system and/or an apparatus of activity based access control in heterogeneous information technology infrastructure is disclosed. The infrastructure...
2017/0295180 System and Method for Access Control Using Context-Based Proof
Control of access by a requesting entity to an asset includes defining an approved state of the requesting entity. A validation of a representation of the...
2017/0295179 SYSTEM AND METHOD FOR COLLABORATIVE AUTHENTICATION
Systems and methods are disclosed for collaborative authentication of a person based on an interaction with another person. A request for collaborative...
2017/0295178 NETWORK VERIFICATION OF WEARABLE DEVICES
The present disclosure provides a solution to this problem by enabling the communications network to verify the relationship of the first UE and the second UE...
2017/0295177 IDENTITY VERIFICATION METHOD, TERMINAL, AND SERVER
An identity verification method performed at a terminal includes: displaying and/or playing in an audio form action guide information selected from a preset...
2017/0295176 ANONYMOUS ASSOCIATION SYSTEM UTILIZING BIOMETRICS
Various exemplary embodiments relate to an anonymous database system. The system includes a plurality of biometric nodes in communication with one another....
2017/0295175 AUTHENTICATION METHOD AND DEVICE
An account authentication method performed at a server, including: receiving a login request sent by an initiating terminal; searching, among binding...
2017/0295174 ELECTRONIC DEVICE, SERVER, AND METHOD FOR AUTHENTICATING BIOMETRIC INFORMATION
An electronic device is provided. The electronic device includes a communication circuit configured to communicate with a user terminal and an authentication...
2017/0295173 System And Method For Providing Wearable Authentication and Management
A system for wearable authentication and management is disclosed. In particular, the system may include identifying and authenticating a user through biometric...
2017/0295172 Method and Devices for Providing a Subscription Profile on a Mobile Terminal
A method and a system are provided for providing a subscription profile on a mobile terminal for communication via a mobile communication network. The method...
2017/0295171 PEERING METHOD
Some embodiments are directed to a method for peering between first and second modules each installed in a different device, the device of the first module...
2017/0295170 AUTHENTICATING ACTIVITIES OF ACCOUNTS
A system, a medium, and a method involve a communication interface of a server device that receives first activity data associated with a first activity of an...
2017/0295169 TEMPORARY CONTROL OF COMPONENTS USING LOCATION BASED GRANTS
A device, system, and method gives temporary control of a user device using location based grants. The method performed by a control server of a third party is...
2017/0295168 ACTIVATION OF MOBILE DEVICES IN ENTERPRISE MOBILE MANAGEMENT
The present disclosure is drawn to systems and methods for activating a mobile device in an enterprise mobile management context. The mobile device is...
2017/0295167 REGISTERING A SMART DEVICE WITH A REGISTRATION DEVICE USING A MULTICAST PROTOCOL
A device may transmit, to a first device, a first point-to-multipoint message to determine whether to request security information. The security information...
2017/0295166 FEDERATED REALM DISCOVERY
A federated realm discovery system within a federation determines a "home" realm associated with a portion of the user's credentials before the user's secret...
2017/0295165 AGGREGATOR TECHNOLOGY WITHOUT USERNAMES AND PASSWORDS
Techniques are described in which to access a user's web applications, the user registers and signs on to an aggregator system using any supported login...
2017/0295164 SYSTEM FOR MANAGEMENT OF A MONITOR APPARATUS MONITORING A DEVICE IN A CUSTOMER ENVIRONMENT
To install a monitor apparatus module, a monitor apparatus transmits a registration request including a client ID and an initial authentication key included in...
2017/0295163 PROVIDING A MASKED SHORT MESSAGE SERVICE IN A WIRELESS NETWORK
A method and apparatus for providing a masked short message service in a wireless network are disclosed. For example, the method receives a message from a...
2017/0295162 Computer-Implemented Method for Mobile Authentication and Corresponding Computer System
In one embodiment of the present invention a computerized method includes receiving at a personal-mobile device a first communication, which includes...
2017/0295161 Distributed Authorization
Systems and methods for distributed authorization are described. In some embodiments, an Information Handling System (IHS) may include a processor; and a...
2017/0295160 CLOUD-BASED AUTHENTICATION KEYBOARD
Aspects of the subject disclosure may include, for example a method that includes detecting, by a system comprising a processor, a password creation request,...
2017/0295159 Authenticating Clients Using Tokens
A computing platform may receive, from a client communication server, a first token request requesting a token for a first client. The computing platform may...
2017/0295158 Apparatus and Method for Managing Security Domains for a Universal Integrated Circuit Card
A device that incorporates the subject disclosure may perform, for example, generating a security domain root structure for a universal integrated circuit card...
2017/0295157 SMARTPHONE FRAUD-PROOF AUTHORIZATION AND AUTHENTICATION FOR SECURE INTERACTIONS
Mobile devices and other devices used in transactions or interactions with other computer systems can be identified by an abstract composite of information...
2017/0295156 PROVISIONING ENTERPRISE SERVICES
Systems, methods, and software can be used to share content. In some aspect, an enterprise mobility management (EMM) server receives a command for provisioning...
2017/0295155 TOKENIZATION OF CO-NETWORK ACCOUNTS
The present disclosure relates generally to tokenization of a co-network account. A co-network account, as used herein, refers to an account associated with a...
2017/0295154 SYSTEMS AND METHODS FOR AUTHENTICATING APPLICATIONS TO ON-BOARD SERVICES
Techniques for authenticating client applications to services and/or applications that are provided within an environment that may become disconnected, as a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.