Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0027013 METHODS FOR PREVENTING CYBER INTRUSIONS AND PHISHING ACTIVITY
Systems and methods for mitigating cyber intrusions includes: receiving target domain input, wherein the target domain input comprises a domain name associated...
2018/0027012 TECHNOLOGIES FOR PREVENTING MAN-IN-THE-MIDDLE ATTACKS IN SOFTWARE DEFINED NETWORKS
Systems, methods, and computer-readable media for preventing man-in-the-middle attacks within network, without the need to maintain trusted/un-trusted port...
2018/0027011 Local Applications and Local Application Distribution
Concepts and technologies are disclosed herein for local applications and local application distribution. According to one aspect of the concepts and...
2018/0027010 REALTIME TRIGGERING FRAMEWORK
A computer-implemented method generates a trigger registration for a selected triggering type. The generated trigger registration is stored in a triggering...
2018/0027009 AUTOMATED CONTAINER SECURITY
Systems, methods, and computer-readable storage media for determining threat mitigation policies and deploying tested security fixes. In some cases, the...
2018/0027008 DEVICE ACTIVITY AND DATA TRAFFIC SIGNATURE-BASED DETECTION OF MOBILE DEVICE HEALTH
The subject matter described herein includes methods, systems, and computer program products for data traffic signature-based detection and protection against...
2018/0027007 SANDBOXED EXECUTION OF PLUG-INS
A sandbox architecture that isolates and identifies misbehaving plug-ins (intentional or unintentional) to prevent system interruptions and failure. Based on...
2018/0027006 SYSTEM AND METHOD FOR SECURING AN ENTERPRISE COMPUTING ENVIRONMENT
Methods and systems provided herein include a cyber intelligence system, a unified application firewall, and a cloud security fabric that has enterprise APIs...
2018/0027005 LOG TRACING APPARATUS AND NON-TRANSITORY COMPUTER-READABLE MEDIUM STORING A LOG TRACING PROGRAM
An association degree computation unit computes a same period probability between respective types of events that occurred during a same period, based on...
2018/0027004 MULTI-DIMENSIONAL SYSTEM ANOMALY DETECTION
In one embodiment, a device in a network receives a first plurality of measurements for network metrics captured during a first time period. The device...
2018/0027003 USING PHOTONIC EMISSION TO DEVELOP ELECTROMAGNETIC EMISSION MODELS
A method and apparatus related to developing electromagnetic emission and power models for a target device using photonic emissions thereof are provided. Data...
2018/0027002 OUTLIER DETECTION IN ENTERPRISE THREAT DETECTION
A selection of data types is defined from available log data for an evaluation of events associated with an entity. One or more evaluations are defined that...
2018/0027001 Digital Safety and Account Discovery
Methods, computer-readable media, software, and apparatuses may assist a consumer in keeping track of a consumer's accounts in order to prevent unauthorized...
2018/0027000 INTELLIGENT WEB PAGE CONTENT BLOCKING
Systems and methods for efficient downloading and rendering of a web page on a network connected processing device are provided. A per-page manifest specifies...
2018/0026999 SECURITY SYSTEM FOR MACHINE TO MACHINE CYBER ATTACK DETECTION AND PREVENTION
Apparatus, system and method useful for machine to machine (M2M) communication cyber-attack detection and prevention, are provided. An embedded security bridge...
2018/0026998 Incident Detection System
A system that detects any unauthorized communication without imposing a processing load on a control device is provided. In the incident detection system...
2018/0026997 SYSTEM AND METHOD FOR VOICE SECURITY IN A TELECOMMUNICATIONS NETWORK
Aspects of the present disclosure involve systems, methods, computer program products, and the like, for identifying and mitigating attacks on a voice...
2018/0026996 Digital Safety and Account Discovery
Methods, computer-readable media, software, and apparatuses may assist a consumer in keeping track of a consumer's accounts in order to prevent unauthorized...
2018/0026995 DYNAMIC SENSORS
Examples of the present disclosure describe systems and methods for generating dynamic sensors. In aspects, a device may be detected on a network. If the...
2018/0026994 NETWORK ATTACK DEFENSE SYSTEM AND METHOD
Network attack defense includes: obtaining a set of one or more statistical attributes for a protected site by gathering statistics for a set of one or more...
2018/0026993 DIFFERENTIAL MALWARE DETECTION USING NETWORK AND ENDPOINT SENSORS
A method is disclosed in which a system compares a first set of reports characterizing network traffic flows originating from an endpoint device with a second...
2018/0026991 SOCIAL NETWORK PRIVACY AUDITOR
A privacy auditor determines discrepancies between user privacy settings in a social network and installed applications. The privacy auditor can employ a...
2018/0026990 SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR SECURITY VERIFICATION OF COMMUNICATIONS TO TENANTS OF AN...
In accordance with embodiments, there are provided mechanisms and methods for security verification of communications to tenants of an on-demand database...
2018/0026989 SYSTEMS AND METHODS FOR PROCESSING ACCESS PERMISSION TYPE-SPECIFIC ACCESS PERMISSION REQUESTS IN AN ENTERPRISE
A system including a processor and a non-transitory, tangible computer-readable medium in which computer program instructions are stored, which instructions,...
2018/0026988 On-Demand Security Policy Activation
On-demand activation of a security policy may be provided. Upon receiving a selection of a link, a profile identified by a security policy associated with the...
2018/0026987 SYSTEMS AND METHODS FOR PROVIDING SOFTWARE DEFINED NETWORK BASED DYNAMIC ACCESS CONTROL IN A CLOUD
A system for providing access control in a cloud includes a software defined network including a software defined network controller. The system is configured...
2018/0026986 DATA LOSS PREVENTION SYSTEM AND DATA LOSS PREVENTION METHOD
A data loss prevention system holds: a first file, which is one of an unencrypted file and a file that is automatically decryptable by the processor; a second...
2018/0026985 USAGE TRACKING IN HYBRID CLOUD COMPUTING SYSTEMS
Techniques for facilitating usage tracking in hybrid cloud computing systems are disclosed herein. In one embodiment, a method can include receiving, from a...
2018/0026984 ACCESS AUTHENTICATION FOR CLOUD-BASED SHARED CONTENT
Systems for managing content in a cloud-based service platform. Embodiments operate using a server in a cloud-based environment. The server is configured to...
2018/0026983 SYSTEM AND METHODS TO ESTABLISH USER PROFILE USING MULTIPLE CHANNELS
Embodiments of the disclosure provide a method of establishing a user profile using multiple channels. Embodiments allow compatibility of the user profile...
2018/0026982 UNIFIED AUTHENTICATION METHOD FOR APPLICATION IN TRUNKING SYSTEM, SERVER AND TERMINAL
Embodiments of the present disclosure provide a unified authentication method for application in a trunking system, a server and a terminal. The method...
2018/0026981 SECURE SENSOR DATA TRANSPORT AND PROCESSING
The present disclosure is directed to secure sensor data transport and processing. End-to-end security may prevent attackers from altering data during the...
2018/0026980 MOBILE DEVICE, AUTHENTICATION DEVICE AND AUTHENTICATION METHODS THEREOF
A mobile device, an authentication device and authentication methods thereof are provided. The mobile device displays a QR code on its display panel, and...
2018/0026979 DATABASE MANAGEMENT SYSTEM SHARED LEDGER SUPPORT
A business application may provide a secure ledger update while maintaining anonymity and security from unauthorized third parties. One example may include...
2018/0026978 SYSTEMS AND METHODS FOR ADDING A NON-INHERENT COMPONENT TO A DEVICE KEY OF A NETWORKED DEVICE
Systems, methods and apparatus for adding a non-inherent component to a device key of a networked device are disclosed. The methods include receiving a device...
2018/0026977 INTEGRATED SYSTEM COMPONENT AND ELECTRONIC DEVICE
A computer-implemented method for implementing an integrated device includes operating a component of a security and/or automation system, wherein the...
2018/0026976 METHODS AND SYSTEMS FOR AUTHENTICATING USERS
A method of authenticating users to reduce transaction risks includes indicating a desire to conduct a transaction and determining whether the transaction...
2018/0026975 DEVICE AND METHOD FOR TRANSMITTING MESSAGE
Provided is a method of transmitting a message. The method includes: obtaining identification information used to identify a user based on bio information of...
2018/0026974 PORTABLE ELECTRIC DEVICE AND OPERATING METHOD THEREFOR
An operating method for a portable electric device is provided. The portable electric device has a fixing component, a body, and an authentication register....
2018/0026973 ENHANCED AUTHENTICATION BASED ON SECONDARY DEVICE INTERACTIONS
Enhance authentication techniques may include receiving credential data of a secondary device by a primary device, generating a cryptogram using the credential...
2018/0026972 Authentication of a Client Device Based on Entropy from a Server or Other Device
Methods and systems for authenticating a client device using entropy provided by a server and/or a device paired with the client device are described herein....
2018/0026971 COMPUTING DEVICE WITH INTEGRATED AUTHENTICATION TOKEN
Disclosed are various embodiments for a computing device with an integrated authentication token. The computing device includes first circuitry having a...
2018/0026970 Preventing Unauthorized Access to Secured Information Systems Using Multi-Device Authentication Techniques
A computing platform may receive, from a client portal server, a request to authenticate a user to a user account associated with a client portal. Based on...
2018/0026969 METHOD TO PREVENT CLONING OF ELECTRONIC COMPONENTS USING PUBLIC KEY INFRASTRUCTURE SECURE HARDWARE DEVICE
An electronic component includes a processor and a memory. The electronic component has a secure platform capable of storing at least one dual key pair and a...
2018/0026968 MANAGING SECURITY CREDENTIALS
Disclosed are various embodiments for managing security credentials. In one embodiment, network content for a network site is obtained in response to a user...
2018/0026967 INFORMATION PROCESSING APPARATUS, SECURITY SYSTEM, AND NON-TRANSITORY COMPUTER READABLE MEDIUM
An information processing apparatus includes a signing unit and first and second obtaining units. The signing unit signs a document by using a certificate used...
2018/0026966 METHOD AND SYSTEM FOR CREATING A VIRTUAL SIP USER AGENT BY USE OF A WEBRTC ENABLED WEB BROWSER
A method for creating a virtual SIP user agent by use of a webRTC enabled web browser (200) comprises a user logging in to a web application server (400) via a...
2018/0026965 Live Tiles Without Application-Code Execution
Techniques enabling live tiles without application-code execution are described. These techniques permit live content to be presented in tiles without...
2018/0026964 LOGIN PROXY FOR THIRD-PARTY APPLICATIONS
Users of organizations use many different third-party applications. The organizations use the services of a server to manage and interact with the third-party...
2018/0026963 AUTHORIZED CONTROL OF AN EMBEDDED SYSTEM USING END-TO-END SECURE ELEMENT COMMUNICATION
A connected device includes an application processor, a secure element, and a control module. The application processor is configured to receive a control...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.