Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,794,303 Method and system for integrating real time communication features in applications
A computer has a processor and a memory connected to the processor. The memory stores instructions executed by the processor to receive a real time...
US-9,794,302 Method, network and network entity for establishing a communication session to a user equipment roaming in IMS
The invention relates to a method, network ad network entity for establishing a communication session between a calling subscriber residing in a first Visited...
US-9,794,300 Method and system for reducing message passing for contention detection in distributed SIP server environments
A method, a system, and a computer program product are provided for reducing message passing for contention detection in distributed SIP server environments....
US-9,794,299 Passive based security escalation to shut off of application based on rules event triggering
Embodiments of the invention are directed to a system, method, or computer program product for a passive based security escalation to shut off of applications...
US-9,794,298 Method, system, and computer program product for facilitating communication in an interoperability network
Methods and apparatus are described for facilitating communication among a plurality of entities via an interoperability network. Each entity has policy data...
US-9,794,297 Security compliance framework usage
A method and system for improving usage of a security compliance framework is provided. The method includes authenticating a user for: access to the security...
US-9,794,296 Preserving privacy related to networked media consumption activities
Preserving privacy related to networked media consumption activity. Source privacy zones are defined and associated with privacy standards. Privacy standards...
US-9,794,295 Security policy editor
A shared computing infrastructure has associated therewith a portal application through which users access the infrastructure and provision one or more...
US-9,794,294 Managing communications between computing nodes
Techniques are described for managing communications between multiple intercommunicating computing nodes, such as multiple virtual machine nodes hosted on one...
US-9,794,293 System and method for monitoring computing servers for possible unauthorized access
A system is provided that includes one or more computing servers and a processing circuit for monitoring data transactions of the computing servers. Each of the...
US-9,794,292 Providing fine-grained access remote command execution for virtual machine instances in a distributed computing...
A selection of a document that includes a command and a parameter is received, and a user is caused to be associated with a policy that grants permission to...
US-9,794,291 Detecting and managing abnormal data behavior
Methods and systems for providing destination-specific network management are described. One example method includes determining a normal data movement profile...
US-9,794,290 Quantitative security improvement system based on crowdsourcing
The efficacy of security products and practices is quantified, based on monitored activities and conditions on multiple computers over time. A set of metrics is...
US-9,794,289 Applying security policies based on context of a workload
A workload to be provided by one or more network resources may be identified. The workload may be analyzed to determine one or more attributes of the workload....
US-9,794,288 Managing policy
There is disclosed a technique for use in managing policy. The technique comprises storing information relating to at least one previous authentication request....
US-9,794,287 Implementing cloud based malware container protection
A method, and a system are provided for implementing cloud based malware container protection. A container is provisioned for a user. The container is...
US-9,794,286 Network device, and data sending and receiving system
In order to detect and prevent attacks in which the network is infested with unauthorized data to cause malfunction, the invention aims, on the basis of network...
US-9,794,285 System and method for detecting hacked modems
A system, method, and computer program product are provided for detecting hacked modems in a cable network system. A cable Internet service provider can provide...
US-9,794,284 Application spam detector
A search engine includes a network interface that receives a search query and a search module. The search module determines a consideration set of applications...
US-9,794,283 Predicting and preventing an attacker's next actions in a breached network
A method for cyber security, including detecting, by a management server, a breach by an attacker of a resource within a network of resources, wherein access to...
US-9,794,282 Server with queuing layer mechanism for changing treatment of client connections
According to certain non-limiting embodiments disclosed herein, the functionality of a server is extended with a mechanism for identifying connections with...
US-9,794,281 Identifying sources of network attacks
Systems and methods are described to enable identification of computing devices associated with network attacks, such as denial of service attacks. Data packets...
US-9,794,280 Verifying templates for dynamically generated web pages
A system and method for detecting encoding errors in a template used to generate a Web page. The template is analyzed using static analysis in a source code...
US-9,794,279 Threat indicator analytics system
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for analyzing threat intelligence information. One of the...
US-9,794,278 Network-based whitelisting approach for critical systems
A method for modeling or monitoring a control system is provided. The method includes deriving a plurality of message prototypes from a plurality of messages of...
US-9,794,277 Monitoring traffic in a computer network
A computer-implemented method, computerized apparatus and computer program product for monitoring traffic in a computer network. The computer network comprises...
US-9,794,276 Protecting against the introduction of alien content
In one implementation, a computer-implemented method can identify abnormal computer behavior. The method can receive, at a computer server subsystem and from a...
US-9,794,275 Lightweight replicas for securing cloud-based services
Methods, computer program products, computer systems, and the like, which provide security in cloud-based services using lightweight replicas, are disclosed....
US-9,794,274 Information processing apparatus, information processing method, and computer readable medium
An attack detection apparatus (6) collects packets a transmission source or a transmission destination of which is a protection target apparatus (5), and...
US-9,794,273 Monitoring control system
In order to deal with security threat in a monitoring control system having a plurality of networks different in security level, the monitoring control system...
US-9,794,272 Method and apparatus for monitoring malicious traffic in communication networks
A method and apparatus for monitoring data traffic in a communication network are provided. A router connected to the communication network monitors information...
US-9,794,271 Restricting communications between subscriber machines
A method of transferring information between subscribers associated with a communication service is disclosed. The method includes receiving a first handle...
US-9,794,270 Data security and integrity by remote attestation
The invention includes a system comprising a device, software installed on the device and coupled to the device's hardware and software stack to execute data...
US-9,794,269 Method and system for validating rights to digital content using a digital token
A computer implemented method for generating a receipt. The method includes, accessing a universal digital fingerprint associated with an item of content,...
US-9,794,268 Privacy policy management method for a user device
An arrangement for enabling users to set and modify privacy policies is described. User attributes and existing privacy policies are used to determine the...
US-9,794,267 Virtual machine access control in mobile computing device based on positional range from beacon signal
A system is provided and includes a broadcasting device configured to emit a beacon signal over a predefined range and a mobile computing device. The mobile...
US-9,794,266 Using multiple credentials for access and traffic differentiation
The disclosure relates in some aspects to establishing connectivity with a network using a first set of credentials and determining whether additional...
US-9,794,265 Authentication and authorization without the use of supplicants
Provided is authentication and authorization without the use of supplicants. Authentication and authorization includes generating a profile for a device based...
US-9,794,264 Privacy controlled network media sharing
A Privacy Controlled Social Network including a first device that shares content with a second device through at least one network, where content is "encoded"...
US-9,794,263 Technologies for access control
Technologies for performing access control include a computing device that parses a network packet received by the computing device to identify an n-tuple of a...
US-9,794,262 Access control list-based port mirroring techniques
Embodiments presented herein describe techniques for selecting incoming network frames to be mirrored using an access control list. According to one embodiment,...
US-9,794,261 Method and apparatus for controlling access to a server
A method for use in a Digital Living Network Alliance (DLNA) server, for controlling access to the DLNA server, includes: receiving an access request sent from...
US-9,794,260 Liveness detection
In a liveness detection system, a first set of one or more parameters of a first liveness test is selected at random. The first parameter set is transmitted to...
US-9,794,259 Security for access to the IP multimedia subsystem (IMS) with web real time communication (WebRTC)
Systems, methods, apparatuses, and computer program products for providing security between WebRTC clients and IMS are provided. One method includes storing, by...
US-9,794,258 Techniques for managing authorization
Techniques for managing authorization are disclosed. In one embodiment, the techniques may be realized as a method including receiving, from a centralized...
US-9,794,257 Managing secure sharing of private information across security domains by individuals having a service...
A system and method of granting a service authorization to a service provider in a regulating or funding agency of a first organization to access one or more...
US-9,794,256 System and method for advanced control tools for administrators in a cloud-based service
A cloud-based platform (e.g., cloud-based collaboration and/or storage platform/service) is described that provides advanced control tools for administrators of...
US-9,794,255 Communication terminal and communication processing method
A processor stores authentication information managed by a native environment of the communication terminal in a first storage region of the storage device. The...
US-9,794,254 System and method for protecting specified data combinations
A method in one example implementation includes extracting a plurality of data elements from a record of a data file, tokenizing the data elements into tokens,...
US-9,794,253 Device security utilizing continually changing QR codes
A method provides device access security via use of periodically changing Quick Response (QR) codes. The method includes: generating (706) a first ...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.