Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0324196 System and Article of Manufacture to Analyze Twitter Data to Discover Suspicious Users and Malicious Content
The invention comprises a system and article of manufacture to discover potential cyber threats on Twitter. The invention provides a unified framework for...
2018/0324195 Automated Runtime Detection Of Malware
One example method and correspond apparatus extracts a model of a computer application during load time and stores the model of the computer application in a...
2018/0324194 SYSTEM AND METHOD FOR DETECTING A DISTURBANCE ON A PHYSICAL TRANSMISSION LINE
In certain embodiments, location of a disturbance event on a physical transmission line may be identified. In some embodiments, first and second sensor data...
2018/0324193 NON-PROTOCOL SPECIFIC SYSTEM AND METHOD FOR CLASSIFYING SUSPECT IP ADDRESSES AS SOURCES OF NON-TARGETED ATTACKS...
A system for detecting a non-targeted attack by a first machine on a second machine is provided. The system includes an application that includes instructions...
2018/0324192 SYSTEMS AND METHODS FOR PROVIDING SECURITY SERVICES DURING POWER MANAGEMENT MODE
Systems and methods for providing security services during a power management mode are disclosed. In some embodiments, a method comprises detecting with a...
2018/0324191 CONFIGURATION MANAGEMENT FOR VIRTUAL MACHINE ENVIRONMENT
A computer-implemented method for controlling a connection between a virtual machine and a physical device comprises receiving a connection request for...
2018/0324190 GLOBAL ATTESTATION PROCEDURE
A method, computer program product, and system for authenticating a computing device by geographic attestation includes a processor utilizing executing an...
2018/0324189 UNIVERSAL SUBSCRIBER IDENTITY RECOGNITION AND DATA CLASSIFICATION
An aspect includes storing data elements in a storage space of a memory device. The storage space is allocated for an account of a subscriber of a universal...
2018/0324188 TIERED DEVELOPER UNLOCK OF NETWORK HUB WITH SOFTWARE DEFINED RADIO PROTECTION
A network hub may be unlockable into a development environment at various levels of access to implement tiered unlocking. A network hub may send a request to a...
2018/0324187 DEVICE FOR USE IN A NETWORK
A method and device are provided for use in a network including at least one existing device. At least one virtual sub-network is established within the...
2018/0324186 PERSON-TO-PERSON NETWORK ARCHITECTURE FOR SECURE AUTHORIZATION AND APPROVAL
A system for configuring and executing a secure communication network for authorizing access to safeguarded resources is provided. In particular, the system...
2018/0324185 TECHNIQUES FOR DETECTING UNAUTHORIZED ACCESS TO CLOUD APPLICATIONS BASED ON VELOCITY EVENTS
A system and method for detecting unauthorized access to a cloud application hosted in a cloud-computing platform are presented. The method comprising:...
2018/0324184 SYSTEM AND METHOD USING INTERACTION TOKEN
A communication device may receive input from a user and initiate generation of an interaction token in response. This interaction token can be used by the...
2018/0324183 METHODS AND APPARATUS FOR PROVISIONING SERVICES WHICH REQUIRE A DEVICE TO BE SECURELY ASSOCIATED WITH AN ACCOUNT
Methods and apparatus for provisioning and providing services to devices on a local network are described. The methods and apparatus allow for the provisioning...
2018/0324182 NETWORK ACCESS CONTROL METHOD AND APPARATUS
The present invention provides a network access control method. The network access control method includes: configuring network access permission of a first...
2018/0324181 ADDRESS VALIDATION USING SIGNATURES
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for generating signed addresses. One of the methods includes...
2018/0324180 ACCESS CONTROL SYSTEM
To provide an access control system for performing access control, etc., in a case of detecting irregular behavior in a network, an access control system...
2018/0324179 METHOD FOR PREVENTING BADUSB ATTACK
A method for preventing BadUSB attack from an external USB device to a host computer is disclosed. The method includes the steps of: a) obtaining a device...
2018/0324178 SYSTEM AND METHOD FOR PROVIDING WEARABLE AUTHENTICATION AND MANAGEMENT
A system for wearable authentication and management is disclosed. In particular, the system may include identifying and authenticating a user through biometric...
2018/0324177 Smart wearable devices
A method and apparatus for registering a user uses biometric authentication and authenticating the identities of interacting parties in real time. The method...
2018/0324176 GENERATION OF SHARED SECRETS USING PAIRWISE IMPLICIT CERTIFICATES
Two parties to a communication establish public and private keys through the use of implicit certificates. Each party establishes a new static key pair, and...
2018/0324175 IMPLICIT CERTIFICATES USING RING LEARNING WITH ERRORS
An implicit certificate is based on a ring learning with errors ("RLWE") public keys that are, in some examples, resistant to quantum-based computing attacks....
2018/0324174 SAML SSO UX IMPROVEMENTS
Improving a security configuration may include receiving a request to assign a single sign-on configuration for a user profile, present a user interface...
2018/0324173 STATEFUL SESSION MANAGER
Computer processors are configured to verify a unique user identification credential for a requesting user of a first client in response to receiving request...
2018/0324172 SINGLE SIGN-ON FOR REMOTE APPLICATIONS
The present disclosure is directed to a method and system for obtaining or allowing single sign-on capability for remote applications. The system receives a...
2018/0324171 ESTABLISHING ACCESS TO A SECURE NETWORK BASED ON USER-CREATED CREDENTIAL INDICIA
In various aspects, code-based indicia contain secured network access credentials. In some aspects, a computer processor receives user input that specifies...
2018/0324170 METHOD AND APPARATUS FOR ALLOCATING DEVICE IDENTIFIERS
A method and an apparatus for allocating device identifiers is provided. The method includes receiving a first request, the first request comprising terminal...
2018/0324168 REGISTRY APPARATUS, AGENT DEVICE, APPLICATION PROVIDING APPARATUS AND CORRESPONDING METHODS
A registry apparatus is provided for maintaining a device registry of agent devices for communicating with application providing apparatus. The registry...
2018/0324167 SECURE ACCESS TO VIRTUAL MACHINES IN HETEROGENOUS CLOUD ENVIRONMENTS
Systems, methods, and computer-readable media provide for secure access to virtual machines in heterogeneous cloud environments. In an example embodiment,...
2018/0324166 PRESENCE-BASED CREDENTIAL UPDATING
Methods, systems, and devices for updating access permissions of users in an access control system are described. The access permissions are capable of being...
2018/0324165 MULTI-LEVEL AUTHENTICATION FOR ONBOARD SYSTEMS
Described herein is a platform and method for providing multi-level authentication by an onboard system in relation to a transaction. In response to receiving...
2018/0324164 RELATIONSHIP-BASED AUTHORIZATION
Methods and apparatus, including computer program products, related to relationship-based authorization. In general, data characterizing a request for...
2018/0324163 METHOD FOR VERIFYING IDENTITY DURING VIRTUALIZATION
A method of verifying identity of a user of an object virtualized in a memory connected to a terminal of the user. The object includes an identification data...
2018/0324162 System and Method to Remotely Secure a Compromised Information Handling System
In one or more embodiments, one or more systems, methods, and/or processes may receive, independently of a processor of the information handling system (IHS),...
2018/0324161 DOMAIN AUTHENTICATION
Various systems and methods for domain authentication are described herein. In an example, the method may include detecting a domain from a request of a tenant...
2018/0324160 A RADIO ACCESS NODE AND A METHOD OF OPERATING THE SAME
According to an aspect, there is provided a method of operating a first radio access node in a communication network, the first radio access node supporting a...
2018/0324159 EFFICIENT CENTRALIZED CREDENTIAL STORAGE FOR REMOTELY MANAGED NETWORKS
An example embodiment may involve receiving, by a server device that stores a plurality of access credentials for computing devices that are disposed within a...
2018/0324158 ASSURING EXTERNAL ACCESSIBILITY FOR DEVICES ON A NETWORK
Methods and apparati for permitting Computing Devices 200 to safely accept Payloads 220 from External Access Entity Devices 260, and to safely access external...
2018/0324157 DECENTRALIZED AND DISTRIBUTED SECURE HOME SUBSCRIBER SERVER DEVICE
A decentralized and distributed secure home subscriber server is provided. First data can be sent representing a first nonce string to a mobile device; and in...
2018/0324156 VIRTUAL DESKTOP CLIENT CONNECTION CONTINUITY
Techniques are described for enabling a client device having an established virtual desktop session to seamlessly handoff the virtual desktop session to other...
2018/0324155 Decentralized Authoritative Messaging
A secure chat client is described that allows users to exchange encrypted communications via secure chat rooms, as well as one-to-one communications. In...
2018/0324154 SYSTEM AND METHODS FOR DYNAMIC GEOSPATIALLY-REFERENCED CYBER-PHYSICAL INFRASTRUCTURE INVENTORY AND ASSET MANAGEMENT
A system and method for dynamic geospatially-referenced cyber-physical infrastructure inventory and asset management, including a business operating system,...
2018/0324153 CLIENT FINGERPRINTING FOR INFORMATION SYSTEM SECURITY
Client fingerprints can be used to detect and defend against malware and hacking into information systems more effectively than using IP addresses. A unique...
2018/0324152 SECURELY RECOGNIZING MOBILE DEVICES
Systems, methods and articles of manufacture to perform an operation comprising receiving, from one of a plurality of stations, a message which includes at...
2018/0324151 Method and system for protecting and utilizing Internet Identity, using smartphone.
The present invention enables secure identification, transactions or access using smartphones. The present invention presents a method and a system for secure...
2018/0324150 INTEGRATED PCS FUNCTIONAL COMPETENCY ASSESSMENT
A system and method for centrally controlling access by computers in a corporate network to a plant network that runs plant applications, and for gauging...
2018/0324149 CLOUD BASED VIRTUAL COMPUTING SYSTEM WITH VIRTUAL NETWORK TUNNEL
A method includes establishing a remote desktop connection between a first computing device and a first virtual machine executed by a second computing device....
2018/0324148 INTERNET OF THINGS (IOT) DEVICE FIREWALLING
A network hub may be configured to implement a firewall policy in order to restrict access by designated applications executing on the network hub to...
2018/0324147 REDUCING REDUNDANT OPERATIONS PERFORMED BY MEMBERS OF A COOPERATIVE SECURITY FABRIC
Systems and methods for coordinating security operations among members of a cooperative security fabric (CSF) are provided. According to one embodiment, a...
2018/0324146 ZERO LATENCY GATEWAY
Broadly speaking, embodiments of the present technique provide apparatus, systems and methods to enable secure communication between devices. In particular,...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.