Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,787,703 Method for vehicle intrusion detection with mobile router
A method of operating a mobile router installed in a vehicle is provided. The vehicle comprises a vehicle network bus coupled to a plurality of electronic...
US-9,787,702 Electronic control unit with vehicle intrusion detection
An electronic control unit is provided for installation in a vehicle. The electronic control unit is operable to provide intrusion detection for the vehicle...
US-9,787,701 Insider attack resistant system and method for cloud services integrity checking
An insider attack resistant system for providing cloud services integrity checking is disclosed. In particular, the system utilizes an automated integrity...
US-9,787,700 System and method for offloading packet processing and static analysis operations
According to one embodiment, a system features analysis circuitry and detection circuitry. The analysis circuitry features a first processing unit and a first...
US-9,787,699 Malware detection
There is provided a malware analysis method including at a computer device having an operating system and a memory: collecting Dynamic Link Library (DLL) data...
US-9,787,698 Method and system to modify function calls from within content published by a trusted web site
A network-based publication system, to publish data over a communications network, includes an interface to receive, via the communications network and from a...
US-9,787,697 Providing security services within a cloud computing environment
Embodiments of the present invention allow for the provisioning of security services within a Cloud computing environment by third parties. Specifically, under...
US-9,787,696 Brute force attack prevention system
A system for preventing a brute force attack includes an output interface, an input interface, and a processor. An output interface is to provide a workfactor,...
US-9,787,695 Methods and systems for identifying malware through differences in cloud vs. client behavior
A computing device may be configured to work in conjunction with another component (e.g., a server) to better determine whether a software application is benign...
US-9,787,694 Method for vehicle electronic system intrusion detection
An embodiment is provided of a mobile router for installation in a vehicle comprising a vehicle network bus coupled to a plurality of electronic control units....
US-9,787,693 Graph caching
In a method and apparatus for analyzing nodes of a Deterministic Finite Automata (DFA), an accessibility ranking, based on a DFA graph geometrical...
US-9,787,692 Network storage system for a download intensive environment
A network storage system for a download intensive environment is provided. The network storage comprises at least a data storage server (DSS) that includes an...
US-9,787,691 Classification of unauthenticated IP users in a layer-2 broadband aggregation network and optimization of...
A network device, method, and computer program product to perform an operation, the operation comprising defining, in a routing device, a data channel for...
US-9,787,690 Security and permission architecture
When a user inputs an action request, such as a requested command, to be performed on a target machine, a management system receives the request and verifies it...
US-9,787,689 Network authentication of multiple profile accesses from a single remote device
A network authentication system and method is described for authenticating multiple profile accesses from a single remote device. A device remote from a web...
US-9,787,688 Identifying roles with similar membership and entitlement information
Techniques are disclosed for identifying roles with similar membership and/or entitlement information in an identity management system of an enterprise. A role...
US-9,787,687 Systems and methods for efficient and secure temporary anonymous access to media content
A method for providing access to media content is performed at a device with a processor and memory storing instructions for execution by the processor. The...
US-9,787,686 On-demand security policy activation
On-demand activation of a security policy may be provided. Upon receiving a selection of a link, a profile identified by a security policy associated with the...
US-9,787,685 Methods, devices and systems for managing authority
A method for a device to connect to a wireless network is provided. The method includes: acquiring authority use data of a user; processing the authority use...
US-9,787,684 Networked access control system
Methods and systems for controlling a network access control system that includes a server encrypting a first identifier that can be related to a registered...
US-9,787,683 Seamless wi-fi subscription remediation
The exemplary embodiments include a method to perform, based on at least one of hypertext transport protocol and non-hypertext transport protocol traffic tests...
US-9,787,682 Method and system for connecting a controller for a machine to a higher-level IT system
In a method for securely connecting a controller for a machine or plant to a higher-level IT system, an integration layer is provided between the controller and...
US-9,787,681 Systems and methods for enforcing access control policies on privileged accesses for mobile devices
Methods and systems described herein relate to enhancing security on a device by enforcing security and access control policies on privileged code execution.
US-9,787,680 Cloud device identification and authentication
Methods and apparatuses for authentication and/or provisioning of wireless network devices, and in particular, methods and apparatuses for authentication and/or...
US-9,787,679 Teleconference system and storage medium storing program for teleconference
In a teleconference system, it is determined whether address information of a terminal apparatus operated by a conference participant is included in a...
US-9,787,678 Multifactor authentication for mail server access
A proxy device intercepts requests from client devices to access message data through a message data device, such as accessing e-mail messages through a mail...
US-9,787,677 Method of authenticating can packets using mixture of MACs and apparatus for implementing the same
A method and apparatus for authenticating packets in a controller area network (CAN) are disclosed. The method includes transmitting messages using a mixture of...
US-9,787,676 Multi-modal biometric identification
At least two biometric measurement signals are generated by contact with a single individual. At least one feature is extracted from each signal of the at least...
US-9,787,674 Trusted and confidential remote TPM initialization
Techniques are provided to allow remote initialization of a Trusted Platform Module. The results may be trusted and confidential even if the target device has...
US-9,787,673 Computing device with integrated authentication token
Disclosed are various embodiments for a computing device with an integrated authentication token. The computing device includes first circuitry having a...
US-9,787,672 Method and system for smartcard emulation
A method and system for emulating a smartcard which includes receiving a one time password and a container PIN for a container, validating the container PIN,...
US-9,787,671 Highly available web-based database interface system
Techniques are provided for a highly available web-based database interface system (WDIS) processing database requests that target one or more databases managed...
US-9,787,670 Apparatus and method for authentication between devices based on PUF over machine-to-machine communications
Terminal devices that perform machine-to-machine (M2M) communication may autonomously perform password authentication by autonomously generating a personal...
US-9,787,669 Identity authentication using credentials
A method and system may allow for authenticating a computing device. A computing device may send an authentication request over a network to an authentication...
US-9,787,668 Sensitive user information management system and method
Sensitive user information management system and method. In accordance with some embodiments of the subject innovations, a RESTful "custodial" web service is...
US-9,787,667 Attested sensor data reporting
A apparatus and a method for attested sensor data reporting, wherein a challenge is received from an online service; sensor data is read; and a sensor data...
US-9,787,666 Single sign-on processing for associated mobile applications
Systems, methods and computer-readable media are disclosed for performing single sign-on processing between associated mobile applications. The single sign-on...
US-9,787,665 System and method for providing single sign on interface for applications on mobile devices
A system for and method of providing a mobile device user with a mobile single sign-on (MSSO) platform that can interface with multiple mobile applications on...
US-9,787,664 Methods systems and articles of manufacture for implementing user access to remote resources
Methods, systems, and articles of manufacture for implementing user access to remote resources residing on an external domain. Various implementations include...
US-9,787,663 Replaying a batch of secure commands in a secure channel
An intermediary third-party receives, from a master device, a batch of pre-generated secure commands; plays it so as to send sequentially, to a slave device,...
US-9,787,662 Dynamic presentation of user account information for a social network
In an embodiment, a method and system for responding to receipt of an identifier of a first member having an account in an online social network is disclosed...
US-9,787,661 Communication between a communication device and a network device
A first network device of a first communication network obtains a challenge, generates a first PFS parameter, obtains a first verification code for the first...
US-9,787,660 Method, apparatus, and system for providing a security check
Embodiments of the present application relate to a method, apparatus, and system for providing a security check. The method includes receiving a security...
US-9,787,659 Techniques for secure access management in virtual environments
Techniques for secure access management to virtual environments are provided. A user authenticates to a portal for purposes of establishing a virtual machine...
US-9,787,658 Login system based on server, login server, and verification method thereof
A method performed by a login server with memory and one or more processors are described. The method includes receiving a login request from a computer system;...
US-9,787,657 Privileged account plug-in framework--usage policies
Techniques for managing privileged accounts via a privileged access management service are provided. In some examples, the service may be configured with a...
US-9,787,656 Intelligent facility device
Embodiments of intelligent facility devices for use in controlled facility environments are described. In various embodiments, the intelligent facility devices...
US-9,787,655 Controlling access to resources on a network
Disclosed are various embodiments for controlling access to data on a network. Upon receiving a request comprising a device identifier and at least one user...
US-9,787,654 Resolving authenticating issues with a second device
Authenticating issues involving the re-authenticating of a first device that was previously authenticated are resolved by use of a second device which receives...
US-9,787,653 Encrypted cached content system
An encrypted cached content system includes a user IHS, a content provider IHS, and a caching IHS. The caching IHS includes a caching engine that is configured...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.