Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2017/0374084 BOTNET DETECTION SYSTEM AND METHOD
A system and method are provided for detecting a botnet in a network based on traffic flow, daisy chained mechanism and white-list generation mechanism. The...
2017/0374083 SYSTEM SECURITY CONFIGURATIONS BASED ON ASSETS ASSOCIATED WITH ACTIVITIES
Various systems, mediums, and methods may involve a data engine with various components. For example, a system with the data engine may include a segmentation...
2017/0374082 DYNAMIC PACKET INSPECTION PLAN SYSTEM
In one embodiment, a method includes for each one time period of a plurality of time periods performing a weighted random selection of a first set of intrusion...
2017/0374081 Provisioning Work Environments on Personal Mobile Devices
A virtual business mobile device can be provisioned on a personal mobile device, by binding a mobile application for provisioning the business mobile device to...
2017/0374080 SECURE, NON-DISRUPTIVE FIRMWARE UPDATING
Firmware updates for, e.g., thin client devices may be achieved in a seamless, non-disruptive manner using a two-stage firmware loader, including a base loader...
2017/0374079 CROSS-SITE COLLECTION QUERIES
Providing users of an enterprise content management (ECM) system with faster and more accurate results to queries related to permission levels within the ECM...
2017/0374078 MANAGEMENT SYSTEM, COMMUNICATION SYSTEM, AND MANAGEMENT METHOD
A management system, a communication system, and a management method. The management system and the management method include receiving a request to associate...
2017/0374077 VIRTUAL MACHINE ACCESS CONTROL
A system is provided and includes a broadcasting device configured to emit a beacon signal over a predefined range and a mobile computing device. The mobile...
2017/0374076 SYSTEMS AND METHODS FOR DETECTING FRAUDULENT SYSTEM ACTIVITY
Systems and methods are presented for generating intelligence data related to at least one of a group comprising Internet Protocol (IP) addresses, email...
2017/0374075 Methods and Systems for Maintaining Reachability of a Messaging Application
Exemplary embodiments relate to techniques for the atomic switching of user accounts for a messaging client, in order to maintain constant network availability...
2017/0374074 CONTINUOUS SENSITIVE CONTENT AUTHENTICATION
Continuous sensitive content authentication is described. In one example, a request to open content, such as a photograph, spreadsheet, or text-based document,...
2017/0374073 SECURE AND SMART LOGIN ENGINE
A login engine for a network device can operate to secure or determine login access in response to a login request according to different sensor data of one or...
2017/0374072 Systems and Methods for Securing Social Media for Users and Businesses and Rewarding for Enhancing Security
The disclosed system and method enhances security of people, organizations, and other entities that use what has been termed "social media." Recent trends have...
2017/0374071 SYSTEMS AND METHODS FOR CONTROLLING ACCESS TO WIRELESS SERVICES
This disclosure provides a system and method for wireless communication. The system can include a plurality of access points for providing a service. The...
2017/0374070 SCALABLE POLICY BASED EXECUTION OF MULTI-FACTOR AUTHENTICATION
Current approaches to multi-factor authentication lack scalability, among other capabilities and efficiencies. Described herein are methods, devices, and...
2017/0374069 CLOUD DEVICE IDENTIFICATION AND AUTHENTICATION
Methods and apparatuses for authentication and/or provisioning of wireless network devices, and in particular, methods and apparatuses for authentication...
2017/0374068 MOBILE DEVICE AND METHOD
According to authentication by an external authentication system, a mobile device according to the present invention appropriately controls a start or a stop...
2017/0374066 SERVER, IC CARD PROCESSING APPARATUS, AND IC CARD PROCESSING SYSTEM
A server has a communication interface, a database, a biometric authentication means, a password specifying means, and a password transmission means. The...
2017/0374065 METHOD AND APPARATUS FOR PERFORMING OPERATIONS ASSOCIATED WITH BIOMETRIC TEMPLATES
A biometric device configured to perform operations associated with biometric characteristics. A non-volatile, non-transitory memory within the device will...
2017/0374064 SYSTEM AND METHOD FOR PROTECTING SPECIFIED DATA COMBINATIONS
A method in one example implementation includes extracting a plurality of data elements from a record of a data file, tokenizing the data elements into tokens,...
2017/0374063 Introducing an Identity into a Secure Element
A method for introducing an identity into a secure element includes an operating system loaded into the secure element, which comprises a master key which is...
2017/0374062 PROXY-LESS SECURE SOCKETS LAYER (SSL) DATA INSPECTION
Some embodiments of proxy-less Secure Sockets Layer (SSL) data inspection have been presented. In one embodiment, a secured connection according to a secured...
2017/0374061 POLICY-BASED COMPLIANCE MANAGEMENT AND REMEDIATION OF DEVICES IN AN ENTERPRISE SYSTEM
The present disclosure relates generally to managing compliance of remote devices that access an enterprise system. More particularly, techniques are disclosed...
2017/0374060 ATTRIBUTE-BASED ACCESS CONTROL
A received security token includes first access control attributes and a signature of a first identity provider of a first security domain. Additional access...
2017/0374059 SYSTEM AND METHOD FOR SERVICE PROVIDER SPECIFIC REMOTE ACCESS VIA NEUTRAL HOST NETWORKS
Present systems and methods provide ways to provide access services to connecting wireless devices particularly for (but not limited to) neutral host networks....
2017/0374058 AUTHENTICATION SYSTEM, COMMUNICATION SYSTEM, AND AUTHENTICATION AND AUTHORIZATION METHOD
An authentication system, a communication system, and a method of performing authentication and authorization. The authentication system and the method include...
2017/0374057 SYSTEM AND METHOD FOR SECURE ONLINE AUTHENTICATION
Disclosed are systems and methods for secure online authentication. An exemplary method comprises: determining, via a processor of a computing device, a...
2017/0374056 Single Sign-On Processing For Associated Mobile Applications
Systems, methods and computer-readable media are disclosed for performing single sign-on processing between associated mobile applications. The single sign-on...
2017/0374055 Continuous Multi-Factor Authentication
Technologies for continuously authenticating a user via multiple authentication factors include a computing device for generating a continuous authentication...
2017/0374054 LINKED REGISTRATION
Secure registration of a new application with a server system is provided. An old application has been registered with the system. A first link between the new...
2017/0374053 INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, COMPUTER READABLE STORAGE MEDIUM
An information processing device including: a processor coupled to the memory and the processor configured to: in response to generation of an input screen...
2017/0374052 COMPUTER-READABLE RECORDING MEDIUM, INFORMATION PROVISION METHOD AND INFORMATION PROVISION SYSTEM
A non-transitory computer-readable recording medium having stored therein a program that causes a computer to execute a process includes transmitting...
2017/0374051 METHOD FOR OPERATING A NETWORK AND A NETWORK
A method for providing a guarantee of a network property includes receiving, from a network user, a signature and a request for the network property, wherein...
2017/0374050 SEAMLESS AUTHENTICATION FOR AN APPLICATION DEVELOPMENT PLATFORM
Various embodiments concern mechanisms for facilitating communication between network-accessible platforms for developing, hosting, or running hybrid...
2017/0374049 DISTRIBUTED KEY SECRET FOR REWRITABLE BLOCKCHAIN
A system includes circuitry for rewriting blockchains in a non-tamper-evident or tamper-evident operation using a key secret held in portions by multiple...
2017/0374048 SYSTEMS AND METHODS FOR CLOUD DATA SECURITY
Techniques for providing data security services with respect to cloud-based services are described. Examples include a security service provider ("SSP")...
2017/0374047 LOCKING AND UNLOCKING SYSTEM AND KEY UNIT
A locking and unlocking system includes: a portable terminal; a key unit; and a locking and unlocking device of a vehicle or facilities. The portable terminal...
2017/0374046 SHORT RANGE SECURE DATA COMMUNICATION
Systems and methods for transmitting user data among user devices u are disclosed. An example method includes: wirelessly detecting, using a trusted user...
2017/0374045 SYSTEMS AND METHODS FOR IMPLEMENTING A PROXIMITY LOCK USING BLUETOOTH LOW ENERGY
Systems and methods for implementing a proximity lock using Bluetooth Low Energy are disclosed. According to one embodiment, a Bluetooth low energy proximity...
2017/0374044 MESSENGER APPLICATION SYSTEMS AND METHODS
A non-transitory computer-readable medium storing instructions which when executed by a computer of a first client device cause the computer to perform a...
2017/0374043 Intercepting Secure Session upon Receipt of Untrusted Certificate
A method for intercepting, by a security gateway, a secure data session comprises the steps of establishing a first secure data session between a client device...
2017/0374042 REGISTERING, MANAGING, AND COMMUNICATING WITH IOT DEVICES USING DOMAIN NAME SYSTEM PROCESSES
Provided herein is a method for registering an IoT device with a DNS registry. The method can include obtaining, at a DNS server, an identifier, IP address,...
2017/0374041 DISTRIBUTED PROCESSING OF A PRODUCT ON THE BASIS OF CENTRALLY ENCRYPTED STORED DATA
The invention provides a system for encryptedly storing product data of a product having an attached tag centrally on a product data server, and reading out...
2017/0374040 Data Processing Method and Apparatus
A data processing method and apparatus, where the method includes acquiring a first network data packet that is sent by a target application that runs in an...
2017/0374039 Systems and Methods for Application Identification
Systems and methods for application identification in accordance with embodiments of the invention are disclosed. In one embodiment, a user device includes a...
2017/0374038 SYSTEMS AND DEVICES FOR ENCRYPTING, CONVERTING AND INTERACTING WITH MEDICAL IMAGES
A network device and a peripheral device for attachment with a medical imaging device provides for the encryption and conversion of a medical image into a...
2017/0374037 SECURE DATA TRANSMISSION VIA EMAIL
Methods and systems for secure transmission of data in an email are provided. In one embodiment, a secure email transmission system is provided that includes a...
2017/0374036 WEARABLE DEVICE JOURNALING AND COACHING
A method to create autonomous decision logic (ADL) may include receiving a request to create the ADL. The request includes a selection of an input and a...
2017/0374035 ZERO-DELAY INITIALIZATION ENCRYPTION FOR STREAMING CONTENT
Methods are disclosed for creating a virtual encryption session prior to video streaming content being requested to reduce or eliminate delay in initialization...
2017/0374034 CONTEXT-BASED PROTOCOL STACK PRIVACY
A method for use in a wireless transmit/receive unit (WTRU) for configuring a privacy protocol stack profile, including private addresses for the WTRU is...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.