Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2017/0346858 REGISTRATION MANAGEMENT FOR A SECONDARY WIRELESS DEVICE USING A PRIMARY WIRELESS DEVICE
Methods and apparatus to manage registration for cellular services of a secondary wireless device associated with a primary wireless device are disclosed. The...
2017/0346857 SECURITY MEDIATION FOR DYNAMICALLY PROGRAMMABLE NETWORK
A network security policy may be implemented at network switches as a set of active packet disposition directives. In a dynamically programmable network, the...
2017/0346856 DEVICE AUTHENTICATION BASED UPON TUNNEL CLIENT NETWORK REQUESTS
Disclosed are various approaches for providing authentication of a user and a client device. A user's credentials can be authenticated by an identity provider....
2017/0346855 IDENTITY BASED DOMAIN NAME SYSTEM (DNS) CACHING WITH SECURITY AS A SERVICE (SECAAS)
A local network element on an enterprise network caches Domain Name System (DNS) responses in association with user identifiers in accordance with a DNS-based...
2017/0346854 Apparatus and Method of Securing Network Communications
An apparatus and/or method secures session communications between a first network (having a first encryption device configured to encrypt at least some session...
2017/0346853 METHODS AND SYSTEMS FOR DETECTING AND PREVENTING NETWORK CONNECTION COMPROMISE
The security of network connections on a computing device is protected by detecting and preventing compromise of the network connections, including ...
2017/0346852 Secure Wireless Ranging
Embodiments for securely determining a separation distance between wireless communication devices is provided. These embodiments include receiving a...
2017/0346851 Mutual authentication security system with detection and mitigation of active man-in-the-middle browser...
A strong, unified and comprehensive new computer security and authentication solution is disclosed. It is ideal for everyday users, and invents faster and...
2017/0346850 RELIABLE TIMESTAMP CREDENTIAL
A process for generating an access credential by a communication device may include determining whether a communication device successfully executed a...
2017/0346848 System, Apparatus And Method For Scalable Internet Of Things (IOT) Device On-Boarding With Quarantine Capabilities
In one embodiment, a domain controller includes: a quarantine logic to quarantine unknown devices from unrestricted network access, the quarantine logic...
2017/0346847 Site Independent Methods for Deriving Contextually Tailored Security Vulnerability Corrections for Hardening...
In auditing a target Web site for security exposures, site specific remediation reports are generated to provide instructional data tailored to components of...
2017/0346846 SECURITY THREAT INFORMATION GATHERING AND INCIDENT REPORTING SYSTEMS AND METHODS
A common misconception equates information with intelligence. To transform information into intelligence a number of analytical steps must occur within a...
2017/0346845 SYSTEM AND METHOD FOR HIERARCHICAL AND CHAINED INTERNET SECURITY ANALYSIS
According to one embodiment, a method for predicting the trustworthiness of a particular website comprising receiving information about a plurality of websites...
2017/0346844 Mitigating Multiple Advanced Evasion Technique Attacks
Aspects of the invention relate to a method of identifying a potential attack in network traffic that includes payload data transmitted to a host entity in the...
2017/0346843 BEHAVIOR PROCESSING METHOD AND DEVICE BASED ON APPLICATION PROGRAM
The disclosure discloses a behavior processing method and device based on application program. The method comprises: when a startup operation of an application...
2017/0346842 ORDERED CORRECTION OF APPLICATION BASED ON DEPENDENCY TOPOLOGY
For each event detected during execution of a monitored application comprising a plurality of application components, a determination is made of which of the...
2017/0346841 Generation of Natural Language Notifications
Natural language notification generation techniques and system are described. In an implementation, natural language notifications are generated to provide...
2017/0346840 Secured Automated or Semi-Automated Systems
Secured automated or semi-automated systems are provided herein. In one embodiment, a sensor system includes a sensor, a legacy computing environment that is...
2017/0346839 SIMILARITY SEARCH FOR DISCOVERING MULTIPLE VECTOR ATTACKS
A similarity search may be performed on a digraph to identify additional attack vectors that are potentially under attack in response to an initial attack...
2017/0346838 DETECTING A MALICIOUS FILE INFECTION VIA SANDBOXING
A device may receive a trigger to determine whether a malicious file is operating on a client device. The device may determine a network activity profile...
2017/0346837 REAL-TIME SECURITY MODIFICATION AND CONTROL
A principal is authenticated for access to a resource and assigned access rights for an authenticated session with the resource. Activity of the principal is...
2017/0346836 SYSTEM AND METHOD FOR PREVENTING SECURITY BREACHES IN AN INTERNET OF THINGS (IOT) SYSTEM
A system and method are described for preventing security breaches in an IoT system. For example, one embodiment of a system comprises: an Internet of Things...
2017/0346835 SERVER DRIFT MONITORING
Threat detection is improved by monitoring variations in observable events and correlating these variations to malicious activity. The disclosed techniques can...
2017/0346834 RELATING TO THE MONITORING OF NETWORK SECURITY
The present invention provides a target centric monitoring of a network enabling a likelihood score for the existence of an attack to be calculated. The score...
2017/0346833 BLOCKCHAIN-BASED SYSTEM, AND ELECTRONIC APPARATUS AND METHOD IN THE SYSTEM
There is disclosed a blockchain-based system, and an electronic apparatus and a method in the system. The electronic apparatus at a control node end includes a...
2017/0346832 AUTHENTICATION SERVER, AUTHENTICATION METHOD IN AUTHENTICATION SERVER, AND NON-TRANSITORY COMPUTER READABLE...
According to one embodiment, an authentication method in an authentication server determines, based on positional information of a terminal to be used and...
2017/0346831 VNF PACKAGE OPERATION METHOD AND APPARATUS
The present invention relates to the field of communications technologies, and in particular, to a VNF package operation method and apparatus, so as to resolve...
2017/0346830 CENTRALIZED ACCESS MANAGEMENT OF WEB-BASED OR NATIVE APPLICATIONS
Provided is a process including: processing, with a permission-management application requests to manage permissions of one or more users to access resources...
2017/0346829 Account Verification in Deferred Provisioning Systems
Provisioning a user account. A method includes, at a local entity contacting an identity system to begin user account provisioning. The method further includes...
2017/0346828 DOCUMENT ARCHITECTURE WITH FRAGMENT-DRIVEN ROLE-BASED ACCESS CONTROLS
A document production system may construct a document from fragments based on a theme associated with the document. The theme may contain section(s), each...
2017/0346827 USING A PROBABILITY-BASED MODEL TO DETECT RANDOM CONTENT IN A PROTOCOL FIELD ASSOCIATED WITH NETWORK TRAFFIC
A device may receive network traffic. The device may identify candidate text included in a protocol field associated with the network traffic. The device may...
2017/0346826 Restricted Wi-Fi Access Between Public and Private SSIDs
Novel tools and techniques are provided for implementing network access configurations, and, more particularly, for implementing restricted Wi-Fi access...
2017/0346825 METHOD AND DEVICE FOR IMPROVING THE PROTECTION OF A MULTIMEDIA SIGNAL AGAINST A MALICIOUS ATTACK
A device protects an incoming multimedia signal with a protection that is controllable and configured for enabling or disabling an application for an interface...
2017/0346824 METHODS AND SYSTEMS FOR MOBILE DEVICE RISK MANAGEMENT
Mobile device risk management systems and methods are provided. The system has a risk assessment server in communication with a mobile device. A risk...
2017/0346823 NETWORK OF TRUSTED USERS
A system may include at least one server having a processor and a communication interface communicatively coupled to an Internet connection and a...
2017/0346822 SYSTEM FOR DETECTION AND IDENTIFICATION OF ELECTRONIC DEVICES AND ALLOCATION OF PROXY IDENTIFIERS FOR SAME
Embodiments are directed to detection and identification of electronic devices and allocation of proxy identifiers for the same. Embodiments detect one or more...
2017/0346821 IDENTIFYING ACCOUNTS HAVING SHARED CREDENTIALS
Disclosed are systems, methods, and non-transitory computer-readable storage media for identifying accounts having shared credentials. In some implementations,...
2017/0346820 METHODS, SYSTEMS, AND DEVICES FOR GENERATING A UNIQUE ELECTRONIC COMMUNICATIONS ACCOUNT BASED ON A PHYSICAL...
A unique electronic communications account is generated and linked to a physical address of a user. A network of electronic mail addresses linked to physical...
2017/0346819 MUTUAL AUTHENTICATION WITH SYMMETRIC SECRETS AND SIGNATURES
A client and server negotiate a secure communication channel using a pre-shared key where the server, at the time the negotiation initiates, lacks access to...
2017/0346818 MOBILE USER INTERFACE SYSTEM AND METHODS THEREFOR
A method. At least some embodiments are a method including detecting docking of a mobile computer system to a docking device. In response to detecting the...
2017/0346817 AUTHENTICATION BASED ON GAZE AND PHYSIOLOGICAL RESPONSE TO STIMULI
A user may be authenticated to access an account, computing device, or other resource based on the user's gaze pattern and neural or other physiological...
2017/0346816 METHOD FOR READING OUT ACCESS AUTHORIZATIONS OR ID'S FROM AT LEAST ONE CUSTOMER MEDIUM BY MEANS OF AT LEAST ONE...
A method of reading out access authorizations or ID's from at least one customer medium by at least one reader (3, 4, 5) of an access control device (2) and...
2017/0346815 MULTIFACTOR AUTHENTICATION PROCESSING USING TWO OR MORE DEVICES
A first user request may be received to access a particular resource. A first authentication credential from a first client device may be received based on a...
2017/0346814 USING HARDWARE BASED SECURE ISOLATED REGION TO PREVENT PIRACY AND CHEATING ON ELECTRONIC DEVICES
System and methods for using secure isolated technology to prevent piracy and cheating on electronic devices. In some examples, an electronic device can use...
2017/0346813 EXPECTED RESPONSE ONE-TIME PASSWORD
A system may generate a seed one-time password (OTP). The system may also perform steps including transmitting the seed OTP to a user device, receiving a...
2017/0346812 DEVICE AUTHENTICATION BASED UPON TUNNEL CLIENT NETWORK REQUESTS
Disclosed are various approaches for providing authentication of a user and a client device. A user's credentials can be authenticated by an identity provider....
2017/0346811 DEVICE AUTHENTICATION BASED UPON TUNNEL CLIENT NETWORK REQUESTS
Disclosed are various approaches for providing authentication of a user and a client device. A user's credentials can be authenticated by an identity provider....
2017/0346810 DEVICES, SYSTEMS, AND METHODS FOR ZERO-TRUST SINGLE SIGN-ON
Devices, systems, and methods receive a token and a request to create a joint tenant, wherein at least one of the token and the request identifies a first user...
2017/0346809 DISTINGUISHING VERTICAL BRUTE FORCE ATTACKS FROM BENIGN ERRORS
Brute force attacks on a given account with various password attempts are a common threat to computer security. When a suspected brute force on an account is...
2017/0346808 INFORMATION DEVICE, DATA PROCESSING SYSTEM, DATA PROCESSING METHOD, AND NON-TRANSITORY STORAGE MEDIUM
An information device includes a reader, and a data processor. The reader reads, from a removable medium, ticket data that is provided from a server upon...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.