Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2017/0302697 Method And System For Dynamic Platform Security In A Device Operating System
A system and method is provided for implementing platform security on a consumer electronic device having an open development platform. The device is of the...
2017/0302696 INTERMEDIATE ENCRYPTION FOR EXPOSED CONTENT
An endpoint encrypts local files with a key to protect file contents. If the endpoint or processes on the endpoint becomes exposed to potentially harmful...
2017/0302695 Automatic Detection and Mitigation of Security Weaknesses With a Self-Configuring Firewall
Some embodiments provide a self-configuring firewall for automatic detection and mitigation of security weaknesses. The self-configuring firewall performs...
2017/0302694 Discovering and provisioning Computing devices in a security enhanced environment
Systems and methods for discovering and provisioning computing devices within a computing environment. An example method may comprise: loading a first kernel...
2017/0302693 REWRITE DETECTION SYSTEM AND INFORMATION PROCESSING DEVICE
Provided are a rewrite detection system and an information processing device capable of reducing communication traffic between devices and processing time in...
2017/0302692 METHODS AND APPARATUS FOR APPLICATION ISOLATION
Processor(s) for detecting malicious software. A hardware virtual machine monitor (HVMM) operates under a host OS. Container(s) initialized with network...
2017/0302691 Systems and Methods for Detecting and Tracking Adversary Trajectory
This disclosure is related to using network flow information of a network to determine the trajectory of an attack. In some examples, an adjacency data...
2017/0302690 Method and Apparatus for Improving Network Security
A method and an apparatus for improving network security. The method includes obtaining, by a control node, alarm information, where the alarm information...
2017/0302689 Network Security Protection Method and Apparatus
A network security protection method and apparatus are provided. The method is executed by a network security protection device, and includes obtaining at...
2017/0302688 METHOD FOR PROCESSING AN INTRUSION INTO A WIRELESS COMMUNICATION NETWORK, RELATED DEVICE AND COMPUTER PROGRAM
A method for processing an intrusion in a communication network including a plurality of node equipment, including a current node, which: discovers of a...
2017/0302687 CELL CONTROL DEVICE THAT CONTROLS MANUFACTURING CELL IN RESPONSE TO COMMAND FROM PRODUCTION MANAGEMENT DEVICE
A cell control device able to prevent unauthorized communication in which a third party makes an unauthorized access to the apparatus. The cell control device...
2017/0302686 SYSTEM AND METHOD FOR REAL-TIME TUNING OF INFERENCE SYSTEMS
A system and method for real-time tuning of inference systems based on quality of incoming data. The method comprises: periodically receiving traffic data...
2017/0302685 FORENSIC ANALYSIS OF COMPUTING ACTIVITY
A data recorder stores endpoint activity on an ongoing basis as sequences of events that causally relate computer objects such as processes and files. When a...
2017/0302684 SECURITY ARCHITECTURE FOR THE CONNECTED AIRCRAFT
Systems and methods of a security architecture for a connected aircraft are disclosed. In at least one embodiment, an avionics server comprises a plurality of...
2017/0302683 ATTACK OBSERVATION APPARATUS AND ATTACK OBSERVATION METHOD
The present invention relates to an attack observation apparatus being a simulation environment where a malicious program such as malware created by an...
2017/0302682 DEVICE AND METHOD FOR ANALYZING MALWARE
A device for analyzing malware includes a memory and a processor coupled to the memory. The memory is configured to store therein an instruction assumed to be...
2017/0302681 SYSTEM AND METHOD FOR PARALLEL SECURE CONTENT BOOTSTRAPPING IN CONTENT-CENTRIC NETWORKS
One embodiment of the present invention provides a system for retrieving a content collection over a network. During operation, the system determines...
2017/0302680 LOCAL AUTHENTICATION
In accordance with an example aspect of the present invention, there is provided an apparatus comprising at least one processing core and at least one memory...
2017/0302679 METHODS AND SYSTEMS OF DUAL-LAYER COMPUTER-SYSTEM SECURITY
In one aspect, a computerized method for implementing dual-layer computer-system security in a private enterprise computer network includes the step of...
2017/0302678 METHOD, SYSTEM, AND COMPUTER PROGRAM PRODUCT FOR PROVIDING SECURITY AND RESPONSIVENESS IN CLOUD BASED DATA...
A storage controller that is coupled to a plurality of storage clouds is maintained. The storage controller determines security requirements for performing a...
2017/0302677 TENANT LOCKBOX
Tenant approval for operator access to tenant data is provided. In order to grant service personnel operators access to a tenant's data for performing a...
2017/0302676 Resource Feature Transfer
Resource feature transfer is described. In one or more embodiments, information is collected about interaction of an unauthenticated user of a computing device...
2017/0302675 ENABLER FOR EDITING A PREVIOUSLY RATIFIED TRANSMISSION
Methods for editing a previously approved transmission are provided. Methods may include allocating a portion of memory on a first platform. The allocating may...
2017/0302674 MANAGING SECURITY RESTRICTIONS ON A RESOURCE IN A DEFINED ENVIRONMENT
Approaches described herein manage security restrictions on a resource in a defined environment to provide authorization and access. Specifically, a security...
2017/0302673 SYSTEM AND METHOD FOR PROVIDING AN INTEGRATED FIREWALL FOR SECURE NETWORK COMMUNICATION IN A MULTI-TENANT...
An integrated firewall provides security in a multi-tenant environment having a connection-based switched fabric directly connecting database servers which...
2017/0302672 SANDBOX TECHNOLOGY BASED WEBPAGE BROWSING METHOD AND DEVICE
The disclosure includes a sandbox technology based webpage browsing method and device. A method comprises receiving an instruction for webpage browsing in a...
2017/0302671 TECHNOLOGY FOR MANAGING ELECTRONIC COMMUNICATIONS HAVING CERTAIN DESIGNATIONS
Systems and methods for managing and storing electronic communications are disclosed. According to certain aspects, the systems and methods may receive an...
2017/0302670 METHOD, DEVICE, AND SYSTEM FOR EXECUTING NETWORK SERVICE
A method for executing a network service includes: receiving a network service request sent by a first terminal, the network service request including a target...
2017/0302669 USING MOBILE DEVICES AS GATEWAYS FOR INTERNET OF THINGS DEVICES
A mobile device may include first and second communication interfaces. The mobile device may receive, from another device, a dispatch message to receive data...
2017/0302668 MODEL FRAMEWORK AND SYSTEM FOR CYBER SECURITY SERVICES
Systems, computer program products, and methods are described herein for a model framework and system for cyber security services. The present invention is...
2017/0302667 SECURITY ARCHITECTURE FOR AUTHENTICATION AND AUDIT
A mechanism for consolidating communications between a computer tenant and a web services layer is provided. The mechanism may include a web services layer....
2017/0302666 ESTABLISHING TRUST BETWEEN TWO DEVICES
Techniques described herein leverage a trusted entity within a domain to enable devices to establish trust with one another so they can securely discover each...
2017/0302665 NETWORK HOLOGRAM FOR ENTERPRISE SECURITY
The disclosed teachings include a computer-implemented method for discovering and building relationships between users, user devices, software applications,...
2017/0302664 USING CLOCK DRIFT, CLOCK SKEW, AND NETWORK LATENCY TO ENHANCE MACHINE IDENTIFICATION
Methods and systems for authenticating a user device employ a database of global network latencies categorized and searchable by location and calendar...
2017/0302663 BLOCK CHAIN BASED IoT DEVICE IDENTITY VERIFICATION AND ANOMALY DETECTION
In one embodiment, a device in a network receives a network registration request from a particular node. The network registration request comprises information...
2017/0302662 ACCOUNT INFORMATION OBTAINING METHOD, TERMINAL, SERVER AND SYSTEM
An account information obtaining method performed at a terminal includes the following steps: in response to a request of a current user of the terminal,...
2017/0302661 ANONYMIZING BIOMETRIC DATA FOR USE IN A SECURITY SYSTEM
An anonymized biometric representation of a target individual is used in a computer based security system. A detailed input biometric signal associated with a...
2017/0302660 FORWARDING METHOD, FORWARDING APPARATUS, AND FORWARDER FOR AUTHENTICATION INFORMATION IN INTERNET OF THINGS
Embodiments of the present application disclose a forwarding method, a forwarding apparatus, and a forwarder for authentication information in the Internet of...
2017/0302659 TWO-FACTOR AUTHENTICATION
Systems, methods, and computer-readable storage media are provided for authenticating users to secure services or apps utilizing reversed, hands-free and/or...
2017/0302658 HIGH-SAFETY USER MULTI-AUTHENTICATION SYSTEM AND METHOD
A high-safety user multi-authentication system, comprising: a server having a user habit information and a key generator for generating a real key...
2017/0302657 DIGITAL CERTIFICATE WITH SOFTWARE ENABLING INDICATOR
A system and method of enabling software features on apheresis machines and/or infusion pumps uses a license server disposed outside of a medical facility and...
2017/0302656 Device-Level Authentication with Unique Device Identifiers
An embodiment may include transmitting a manufacturer security certificate to a provisioning server device, and establishing, with the provisioning server...
2017/0302655 BUNDLED AUTHORIZATION REQUESTS
A framework, which conforms to the OAuth standard, involves a generic OAuth authorization server that can be used by multiple resource servers in order to...
2017/0302654 INFORMATION PROCESSOR, METHOD FOR CONTROLLING LOGGING ON, AND NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM...
An information processor includes an authentication processor that authenticates a user during a logging-on process of the user; a confirmer that confirms...
2017/0302653 PORTABLE ENCRYPTION FORMAT
A portable encryption format wraps encrypted files in a self-executing container that facilitates transparent, identity-based decryption for properly...
2017/0302652 Data Backup and Transfer System, Method and Computer Program Product
A backup system having a plurality of accounts for copying selected data between one or more account user computers and a system computer where an account...
2017/0302651 Managing and Securing Manageable Resources in Stateless Web Server Architecture Using Servlet Filters
Access is controlled to managed resources in a stateless web server architecture including a stateless web server computing platform; a resource locator map...
2017/0302650 METHOD OF SENDING A DATA FROM A SECURE TOKEN TO A SERVER
The invention is a method for managing a response generated by an application embedded in a secure token in response to a command requesting opening a...
2017/0302649 SYSTEMS AND METHODS FOR SEGMENTING INDUSTRIAL ASSET SERVICES
Systems and methods are presented for receiving, at a server computer associated with an industrial asset cloud computing system, a request from a user device...
2017/0302648 Web Service Picture Passwords
A picture password interface is displayed to generate a password for a web service that accepts text passwords to help users more easily remember their...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.