Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,781,154 Systems and methods for supporting information security and sub-system operational protocol conformance
Systems and methods are described that support information security and sub-system operational conformance with protocols. In some embodiments, agent access to...
US-9,781,153 Local applications and local application distribution
Concepts and technologies are disclosed herein for local applications and local application distribution. According to one aspect of the concepts and...
US-9,781,152 Methods and systems for performing dynamic risk analysis using user feedback
A method of verifying an account login request may include identifying one or more Internet Protocol (IP) addresses as potentially malicious and, for each...
US-9,781,151 Techniques for identifying malicious downloadable applications
Techniques for identifying malicious downloadable applications are disclosed. In one particular exemplary embodiment, the techniques may be realized as a method...
US-9,781,150 Man in the middle attack detection using active learning
Data is received that includes a plurality of samples that each characterize interception of data traffic to a computing device over a network. Thereafter, the...
US-9,781,149 Method and system for reducing reporting of non-malicious electronic messages in a cybersecurity system
An electronic message analysis system of a cybersecurity network assesses whether a received message is a mock malicious message in response to, receiving a...
US-9,781,148 Methods and systems for sharing risk responses between collections of mobile communications devices
Methods are provided for determining an enterprise risk level, for sharing security risk information between enterprises by identifying a security response by a...
US-9,781,147 Systems and methods for managing data incidents
Systems and methods for managing a data incident are provided herein. Exemplary methods may include providing an external entity interface that receives...
US-9,781,146 Method and device for evaluating security assessment of an application
Embodiments of the present disclosure disclose a method and a device for evaluating security assessment of an application. The method comprises receiving...
US-9,781,145 Persistent cross-site scripting vulnerability detection
A system and program product are described herein for various techniques for detecting a persistent cross-site scripting vulnerability are described herein. In...
US-9,781,144 Determining duplicate objects for malware analysis using environmental/context information
A malware detection system may be configured to enhance analysis of an object when determining whether results for a previously analyzed object may be applied...
US-9,781,143 Systems and methods for detecting near field communication risks
A computer-implemented method for detecting near field communication risks may include (1) identifying a mobile device capable of near field communication, (2)...
US-9,781,142 Scanning files for inappropriate content during synchronization
The present invention extends to methods, systems, and computer program products for scanning files for inappropriate content during file synchronization....
US-9,781,141 Secured automated or semi-automated systems
Secured automated or semi-automated systems are provided herein. In one embodiment, a sensor system includes a sensor, a legacy computing environment that is...
US-9,781,140 High-yielding detection of remote abusive content
Methods, systems, and computer program products for providing high-yielding detection of remote abusive content are disclosed. A computer-implemented method may...
US-9,781,139 Identifying malware communications with DGA generated domains by discriminative learning
Techniques are presented to identify malware communication with domain generation algorithm (DGA) generated domains. Sample domain names are obtained and...
US-9,781,138 Method and device for providing a security breach indicative audio alert
A device for providing a security breach indicative audio alert. The device includes: a security monitor adapted to detect a security breach in device and a...
US-9,781,137 Fake base station detection with core network support
The present invention provides methods, apparatuses and computer program product relating to fake base station detection with core network support. The present...
US-9,781,136 Mitigating the impact from internet attacks in a RAN using internet transport
The present disclosure relates to methods and devices for mitigating the impact from Internet attacks in a Radio Access Network, RAN (10), using Internet...
US-9,781,135 Intelligent web page content blocking
Systems and methods for efficient downloading and rendering of a web page on a network connected processing device are provided. A per-page manifest specifies a...
US-9,781,134 Method and apparatus of identifying user risk
Techniques to identify suspicious user logins may include acquiring, by a computing device, a routing path associated with a user login based on login...
US-9,781,133 Automatic stability determination and deployment of discrete parts of a profile representing normal behavior to...
A system for automatic stability determination and deployment of discrete parts of a profile representing normal behavior to provide fast protection of web...
US-9,781,132 Fraud prevention
As provided herein, a user of a client device may navigate to a webpage using a browser. A browser window, populated with a verification image and/or details...
US-9,781,131 Systems and methods for securing remote configuration
A system and method for securing remote configurations. The system and method can include, receiving configuration payloads as publications from a messaging...
US-9,781,130 Managing policies
A method, system and computer program product for use in managing policies is disclosed. Policies associated with a communications device are correlated with...
US-9,781,129 Authenticating an entity
There is disclosed a method and system for use in authenticating an entity. An authentication request is received from the entity. An input signal is received...
US-9,781,128 Client-side integration framework of services
Systems and methods for providing client-side integration of apps and services is provided. An integration framework execution upon a computing device provides...
US-9,781,127 Method and apparatus to regulate a digital security system that controls access to a resource
A method and system to regulate a digital security system that controls access to a resource is disclosed. The system controls access to the resource according...
US-9,781,126 Export control and clearance authorization for a multi-user CAx environment
A system for authorization level verification includes a host computer having a processor and a memory. The processor and memory are configured to operate a...
US-9,781,125 Enrollment in a device-to-device network
An electronic device in a device-to-device network of a user of the electronic device communicates with a group of one or more other instances of the electronic...
US-9,781,124 Container-based system administration
Methods, computing systems and computer program products implement embodiments of the present invention that include defining a first multiple of software...
US-9,781,123 Methods of providing social network service and server performing the same
Methods and apparatuses for sharing content through a chatting space of a social networking service (SNS) are provided. The method includes detecting an access...
US-9,781,122 Multi-tenant identity and data security management cloud service
A system provides cloud-based identity and access management. The system receives a request from a client for an identity management service, authenticates the...
US-9,781,121 Managing security restrictions on a resource in a defined environment
Approaches described herein manage security restrictions on a resource in a defined environment to provide authorization and access. Specifically, a security...
US-9,781,120 System on chip and method therefor
A system on chip comprises a responder unit comprising a set of responder elements and an access control unit associated with an authorization list and the...
US-9,781,119 Contextual device locking/unlocking
Particular embodiments of a computing device associated with a user may detect an event using a sensor of the computing device. The event may be a...
US-9,781,118 Differentiated containerization and execution of web content based on trust level and other attributes
Systems and methods may provide for receiving web content and determining a trust level associated with the web content. Additionally, the web content may be...
US-9,781,117 Multinode hubs for trusted computing
Embodiments of multinode hubs for trust operations are disclosed herein. In some embodiments, a multinode hub may include a plurality of memory regions, a...
US-9,781,116 Authority transfer system, method that is executed by authority transfer system, and storage medium
An authority transfer system enables omitting authorization of a user belonging to a tenant based on an authorization operation being performed at least once on...
US-9,781,115 Systems and methods for authenticating nodes
To authenticate nodes, a connection between a first node and a second node may be identified. A first set of nodes having connections with the first node and...
US-9,781,114 Computer security system
A method of packet management for restricting access to a resource of a computer system. The method includes identifying client parameters and network...
US-9,781,113 Technologies for supporting multiple digital rights management protocols on a client device
Technologies for supporting and implementing multiple digital rights management protocols on a client device are described. In some embodiments, the...
US-9,781,112 Data access privilege processing method and apparatus
An information processing method and apparatus are provided. The method is applicable to a first electronic device, where information about a first preset...
US-9,781,111 Operation apparatus, content parental lock setting method, and electronic apparatus
An operation apparatus includes a communication section to communicate with an electronic apparatus capable of communicating, through a first transmission...
US-9,781,110 Computerized methods for location-based service provision
Computerized methods useful for causing provision of user-specific services via one or more data network apparatus and user mobile device. In one embodiment,...
US-9,781,109 Method, terminal device, and network device for improving information security
A method, a terminal device, and a network device are provided. The method of the present invention includes acquiring, by a terminal device, a key, an identity...
US-9,781,108 System and method of secure encryption for electronic data transfer
A system for secure transfer of encrypted data involves a sender client, a recipient client, a main server, and a key server. The sender client receives...
US-9,781,107 Methods and systems for authenticating users
A method of authenticating users to reduce transaction risks includes indicating a desire to conduct a transaction and determining whether the transaction...
US-9,781,106 Method for modeling user possession of mobile device for user authentication framework
Method and systems for modeling user possession of a mobile device for a user authentication framework are provided. The method includes analyzing sensor data...
US-9,781,105 Fallback identity authentication techniques
The presently disclosed subject matter includes a system, a method and a non-transitory program storage device configured for authorizing access of a user...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.