Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,769,205 Systems and methods for SSL session management in a cluster system
The present invention is directed towards systems and methods for managing one or more SSL sessions. A first node from a cluster of nodes intermediary between a...
US-9,769,204 Distributed system for Bot detection
A system includes one or more "BotMagnet" modules that are exposed to infection by malicious code. The BotMagnets may include one or more virtual machines...
US-9,769,203 Methods, systems, and apparatus for mitigating network-based attacks
Methods, systems, computer program products, and articles of manufacture for mitigating a network-based attack are described. A first request associated with a...
US-9,769,202 Event driven route control
Embodiments provide system and methods for a DDoS service using a mix of mitigation systems (also called scrubbing centers) and non-mitigation systems. The...
US-9,769,201 System and method thereof for multi-tiered mitigation of cyber-attacks
A method and system for controlling multi-tiered mitigation of cyber-attacks. The method comprises monitoring at least availability and load of each protection...
US-9,769,200 Method and system for detection of malware that connect to network destinations through cloud scanning and web...
A method for detecting malware includes the steps of identifying a one or more open network connections of an electronic device, associating one or more...
US-9,769,199 Centralized storage and management of malware manifests
Updating a central repository with information about malware resident upon a computer system. Upon detecting the malware executing in a virtual machine, a...
US-9,769,198 Malware detection using internal and/or external malware detection operations
A system may determine to perform an internal and an external malware detection operation to detect a malware infection associated with a client device. The...
US-9,769,197 Malware detection using external malware detection operations
A system may determine to perform an external malware detection operation to detect malware executing on a client device. The system may perform the external...
US-9,769,196 Method and apparatus for providing notification of detected error conditions in a network
Methods for managing a communication session in a communication network are disclosed. For example, a method includes detecting, by a first endpoint comprising...
US-9,769,195 Systems and methods for efficiently allocating resources for behavioral analysis
A computer-implemented method for efficiently allocating resources for behavioral analysis may include (1) determining a file type of a first file subject to...
US-9,769,194 Accessible content reputation lookup
Implementations of accessible content reputation lookup are described. In one implementation, before a user activates a link in a document, such as a hyperlink...
US-9,769,193 Advanced security for domain names
Various techniques for improving security of domain name records are disclosed herein. In one embodiment, a method includes receiving a request to modify a...
US-9,769,192 Security evaluation systems and methods
A system may be broken down into one or more components. Each of the components may be evaluated to ascribe a security score to each of the components. A...
US-9,769,191 Measuring robustness of web services to denial of service attacks
A method for measuring robustness of web services includes selecting a web-service method for testing. The request pattern with the slowest response by the...
US-9,769,190 Methods and apparatus to identify malicious activity in a network
Example network monitoring methods disclosed herein include iteratively adjusting respective weights assigned to respective types of network activity features...
US-9,769,189 Systems and methods for behavior-based automated malware analysis and classification
Embodiments relate to systems and methods for behavior-based automated malware analysis and classification. Aspects relate to platforms and techniques which...
US-9,769,188 Method and product for providing a predictive security product and evaluating existing security products
A method, product and computer program product for building a malware detector, the method including the steps of: receiving at least one characteristic for...
US-9,769,187 Analyzing network traffic based on a quantity of times a credential was used for transactions originating from...
A device may receive network traffic information, associated with multiple transactions, that indicates, for each transaction of the multiple transactions, a...
US-9,769,186 Determining a reputation through network characteristics
Particular embodiments described herein provide for an electronic device that can be configured to monitor network traffic to and from a device, compare the...
US-9,769,185 Method and system for managing suspicious devices on network
A method and system for managing suspicious devices on a network. The method includes, setting based on a manager's input or selection a suspicious group...
US-9,769,184 Method and system for misuse detection
A method and system for discovering inappropriate and/or illegitimate use of Web page content, comprising: monitoring access to a first Web page by a user;...
US-9,769,183 Information processing apparatus, information processing system, and image processing method
An information processing apparatus includes a first communication circuit that communicates with a memory that stores address information of an image...
US-9,769,182 System and method of preventing hijacking of security systems and components
A decentralized component is provided as an overly for a centralized system architecture as represented, for example, by a regional monitoring system. The...
US-9,769,181 Mobile device storage volume encryption with geography correlated key management and mount operations
A method, system and computer-usable medium are disclosed for protecting data stored on a mobile device, based upon its location. Data stored on a mobile device...
US-9,769,180 Computer implemented methods and apparatus for sharing data of an information feed of an online social network
Methods, apparatus, systems, and computer program products are disclosed for sharing data of an online social network. In some implementations, a selection of...
US-9,769,179 Password authentication
A user credential comprising a user password and a one-time password (OTP) may be provided to access a computing system. The user password is authenticated and...
US-9,769,178 Group user experience
Disclosed is a method, system and computer programs to provide emergent behavior in a network of connected mobile user devices. The method includes advertising...
US-9,769,177 Role-based access control to computing resources in an inter-organizational community
A method for controlling access to a plurality of computing resources in a distributed computing environment can comprise the steps of: an application role...
US-9,769,176 Multiple data store authentication
Systems and methods for authenticating access to multiple data stores substantially in real-time are disclosed. The system may include a server coupled to a...
US-9,769,175 Accessing privileged objects in a server environment
Accessing privileged objects in a server environment. A privileged object is associated with an application comprising at least one process resource and a...
US-9,769,174 Systems and methods for creating and modifying access control lists
Embodiments of the present disclosure can present information on services hosted and used by various assets on a network, and allow users to control access to...
US-9,769,173 System, method, and computer program for allowing users access to information from a plurality of external...
A system, method, and computer program product are provided for allowing users to access information from a plurality of external systems utilizing a user...
US-9,769,172 Method of accessing a network securely from a personal device, a personal device, a network server and an...
A method of accessing a network securely using a personal device which can only access the network via one or more authorized access points, the method...
US-9,769,171 Management apparatus, membership managing method, service providing apparatus, and membership managing system
A management apparatus stores a usable or non-usable state representing whether a right is usable or non-usable by a user in a facility in which a service is...
US-9,769,170 Synchronizing credential hashes between directory services
The subject disclosure is directed towards securely synchronizing passwords that are changed at a source location (e.g., an on-premises directory service) to a...
US-9,769,169 Secure sensor data transport and processing
The present disclosure is directed to secure sensor data transport and processing. End-to-end security may prevent attackers from altering data during the...
US-9,769,168 Mobile device and method
According to authentication by an external authentication system, a mobile device according to the present invention appropriately controls a start or a stop of...
US-9,769,167 Authentication and authorization using device-based validation
A method includes authenticating a user of a client device and sending a response to the client device. The response includes browser code configured to...
US-9,769,166 Wearable sensor based system for person identification
A system, method and computer program product for real-time recognition of individuals. The method comprises: receiving at a hardware processor, a first sensor...
US-9,769,165 Devices, systems and methods for security using magnetic field based identification
Devices, systems and methods are disclosed for determining an electromagnetic signature for authenticating a device, a user, and/or a location. In exemplary...
US-9,769,164 Universal validation module for access control systems
A validation module provides for the upgrading of a physical access control system (PACS) to full HSPD-12 compliance without requiring modification or...
US-9,769,163 System integrating an identity selector and user-portable device and method of use in a user-centric identity...
A combination includes a user-portable computing device, and an identity selector adapted for interoperable use with the user device. The user computing device...
US-9,769,161 Event driven second factor credential authentication
A reader configured to perform dual-factor authentication is provided. The reader is configured to analyze credential data as well as event-based user inputs....
US-9,769,160 Method and apparatus for controlling access to electronic devices
According to an aspect of the present disclosure, a method for controlling access to a plurality of electronic devices is disclosed. The method includes...
US-9,769,159 Cookie optimization
Disclosed herein is a system and method for optimizing a cookie or token in a web service or other claims based domain system. A user presents an identity token...
US-9,769,158 Guided enrollment and login for token users
Embodiments of the present invention provide an automated process for enrolling and logging in with a token. In particular, a security client detects when the...
US-9,769,157 Systems and methods for secure one-time password validation
A system may generate a seed one-time password (OTP). The system may also perform steps including transmitting the seed OTP to a user device, receiving a...
US-9,769,156 Image based key derivation function
Embodiments of the invention relate to methods of generating and using an image-based derived key. In various embodiments, the image-based derived key may be...
US-9,769,155 Login method and apparatus, and open platform system
The present disclosure is applicable to the field of network communications, and provides a login method and apparatus, and an open platform system. The method...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.