Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,749,345 Reporting security vulnerability warnings
A computer-implemented method, computer program product, and computing system is provided for reporting security vulnerabilities. In an embodiment, a method may...
US-9,749,344 System and method of cyber threat intensity determination and application to cyber threat mitigation
A security system comprising a computer, a memory, a data store comprising a plurality of consensus evaluations and a plurality of cyber threat analyst ratings,...
US-9,749,343 System and method of cyber threat structure mapping and application to cyber threat mitigation
A security system comprising a computer, a memory, a data store comprising a cyber threat intent dictionary and a technology dictionary; and an application...
US-9,749,342 System and method for detecting unauthorized device access by comparing multiple independent spatial-time data...
An authentication procedure utilizes multiple independent sources of data to determine whether usage of a device, such as a desktop computer, is authorized....
US-9,749,341 Method, device and system for recognizing network behavior of program
The present disclosure discloses a method, device and system for recognizing network behavior of a program. The method comprises: during the program's access to...
US-9,749,340 System and method to detect and mitigate TCP window attacks
A computer system and method for monitoring traffic for determining denial of service attacks in a network. Data packets are monitored which are attempting to...
US-9,749,339 Proactive emerging threat detection
A system creates a dynamic stochastic network using data relating to events. The dynamic stochastic network includes super nodes, local nodes, and agents....
US-9,749,338 System security monitoring
A computing device may receive netflow data that includes information corresponding to network-side activity associated with a target device. The computing...
US-9,749,337 System and apparatus for rogue VoIP phone detection and managing VoIP phone mobility
A method and a system track network access information for authorized network devices. The access information facilitates tracking movement of the device...
US-9,749,336 Malware domain detection using passive DNS
Techniques for malware domain detection using passive Domain Name Service (DNS) are disclosed. In some embodiments, malware domain detection using passive DNS...
US-9,749,335 Secure, non-disruptive firmware updating
Firmware updates for, e.g., thin client devices may be achieved in a seamless, non-disruptive manner using a two-stage firmware loader, including a base loader...
US-9,749,334 Controlling access to ideograms
In one embodiment, a method includes receiving, from a client device of an author of a message, a request for a restricted ideogram to be inserted into a...
US-9,749,333 Shared access appliance, device and process
A shared access user appliance having a client component; a server component; interactive user components providing functions to a first user; an interactive...
US-9,749,332 Electronic device with addiction-prevention function and method thereof
An addiction-prevention method, includes steps: generating a prompt signal to prompt a user to input a biological feature again every a first predetermined time...
US-9,749,331 Context based conditional access for cloud services
A cloud service access and information gateway receives a first authentication factor for a user in a single sign-on system. The single sign-on system provides...
US-9,749,330 Method and system for data session establishment
A method and system for data session establishment from a mobile device in a multiple networks scenario, the method including, checking whether an identifier...
US-9,749,329 Network connection managing device, system and method
The present disclosure provides a device and a method for managing network connection. The device is used to connect a number of external devices to a network,...
US-9,749,328 Access control list-based port mirroring techniques
Embodiments presented herein describe techniques for selecting incoming network frames to be mirrored using an access control list. According to one embodiment,...
US-9,749,327 System and method for secure content sharing and synchronization
A flexible content sharing system may comprise a network based application built on a client device using information from dissociated user experience component...
US-9,749,326 System and method for data center security enhancements leveraging server SOCs or server fabrics
A data center security system and method are provided that leverage server systems on a chip (SOCs) and/or server fabrics. In more detail, server interconnect...
US-9,749,325 Device ownership security on a network
A method for device ownership security is disclosed. The method includes storing an ownership record on a mobile device identifying a home network for the...
US-9,749,324 System, device and method for network authorization based on no password or random password
Disclosed are a system, device and method for network authorization based on no password or a random password, the device comprising: a memory having...
US-9,749,323 Technologies for secure server access using a trusted license agent
Technologies for secure server access include a client computing device that loads a license agent into a secure enclave established by a processor of the...
US-9,749,322 Information sharing system and information sharing method
An information sharing system according to an embodiment includes an information processing system and a terminal and display device connected to the...
US-9,749,321 System for multi-point publication syndication
Embodiments of methods, systems and storage media associated with publication of message content may be described. In embodiments, a content creator may provide...
US-9,749,320 Method and system for wireless local area network user to access fixed broadband network
A method and system for a wireless local area network user accessing a fixed broadband network, the method includes: a broadband network gateway (BNG) device...
US-9,749,319 Address validation using signatures
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for generating signed addresses. One of the methods includes...
US-9,749,318 Key management in a communication network
A method and apparatus for key management in a communication network. A Key Management Server (KMS) receives from a first device a request for a token...
US-9,749,317 Nullifying biometrics
Artificial biometric traits self-nullify due to natural physiological processes. Biometric enrollment and authentication may then be based on a life associated...
US-9,749,316 Method for data access using a dynamic SIM credential
A method and apparatus provide access to communication services using dynamically assigned user credentials. The method includes establishing a communication...
US-9,749,315 Mobile root trust device
A method of conferring security trust and privileges between proximally positioned devices in the presence of a root trust device includes configuring a...
US-9,749,314 Recovery mechanism for fault-tolerant split-server passcode verification of one-time authentication tokens
A recovery mechanism is provided for split-server passcode verification systems. An exemplary token-centric recovery scheme comprises at least one token and a...
US-9,749,313 Protection from unfamiliar login locations
In one embodiment, a user authentication server may use geo-location tracking to determine whether to present an enhanced identity challenge. A communication...
US-9,749,312 Systems and methods for secure password entry
Systems and methods for secure password entry are provided. A request to authenticate a user is received from a user device. A sequence of characters is...
US-9,749,311 Policy based compliance management and remediation of devices in an enterprise system
The present disclosure relates generally to managing compliance of remote devices that access an enterprise system. More particularly, techniques are disclosed...
US-9,749,310 Technologies for authentication and single-sign-on using device security assertions
Technologies for remote device authentication include a client computing device, an identity provider, and an application server in communication over a...
US-9,749,309 Identity management system
A system comprising an IMS network (104), an adapter module (106), an identity provider (108) and an application (110) is described. The adapter module (106) is...
US-9,749,308 System for assessing network authentication requirements based on situational instance
Embodiments of the invention are directed to a system, method, or computer program product for assessing network authentication requirements based on...
US-9,749,307 DNSSEC signing server
Systems and methods for performing DNSSEC signing are described in which digital signature operations may be performed by a network accessible signing server...
US-9,749,306 Method, device and communications system for network convergence
Embodiments of the present invention provide a method, a device and a communications system for network convergence, which can support a charging manner of a...
US-9,749,305 Malicious client detection based on usage of negotiable protocols
A destination server receives an application layer request, including a user-agent and one or more cipher suites, from a user client to initiate a secure...
US-9,749,304 System and methods for accessing multiple resources via one identifier
Systems and methods for accessing multiple resources via one identifier are described, including receiving an input that includes at least an authentication...
US-9,749,303 Method for personalizing a secure element, method for enabling a service, secure element and computer program...
According to an aspect of the invention, a method for personalizing a secure element for a mobile device is conceived, wherein an application is stored in the...
US-9,749,302 Secure collection of sensitive data
In a method for securely collecting sensitive information, a first key entry made via a user interface is detected. Moreover, information is received via a...
US-9,749,301 Cryptographic web service
A system that supports cryptographic web services is provided. A program running on program computing equipment may call a local cryptographic function. A web...
US-9,749,300 Method and system for immediate recovery of virtual machines encrypted in the cloud
Example embodiments of the present invention relate to a method and a system for immediate recovery of virtual machines encrypted in the cloud. The method...
US-9,749,299 Systems and methods for image-based encryption of cloud data
The disclosed computer-implemented method for image-based encryption of cloud data may include (1) identifying a user account for a cloud data store, wherein...
US-9,749,298 Recovery from decryption errors in a sequence of communication packets
A method in a receiver includes receiving from a transmitter a sequence of communication packets, which carry data encrypted with an encryption scheme. The...
US-9,749,297 Manicoding for communication verification
Verifiable, secure communications between a sender and a receiver on at least one shared communication channel is provided. A manicoded key encoder produces an...
US-9,749,296 Method and apparatus for modifying address information in signaling messages to ensure in-path devices remain...
Contact information in SIP signaling messages is modified at each in-path network device during the signaling process (along with storage of mapping...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.