Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,800,605 Risk scoring for threat assessment
Threat risks to an enterprise are detected and assessed by assembling singular threats identified using both direct and behavioral threat indicators into...
US-9,800,604 Apparatus and method for assigning cyber-security risk consequences in industrial process control environments
A method includes identifying multiple devices or groups of devices in an industrial process control and automation system. The method also includes, for each...
US-9,800,603 Self-replicating distributed vulnerability management agent apparatuses, methods, and systems
A controlled vulnerability management agent programmable to arm itself and attempt to propagate and extract vulnerabilities from a target network, without input...
US-9,800,602 Automated hardening of web page content
Methods and apparatus are described for automatically modifying web page source code to address a variety of security vulnerabilities such as, for example,...
US-9,800,601 Systems and methods for detecting and scoring anomalies
Systems and methods for detecting and scoring anomalies. In some embodiments, a method is provided, comprising acts of: (A) identifying a plurality of values of...
US-9,800,600 Device activity and data traffic signature-based detection of mobile device health
The subject matter described herein includes methods, systems, and computer program products for data traffic signature-based detection and protection against...
US-9,800,599 Method and system for detecting restricted content associated with retrieved content
In embodiments of the present invention improved capabilities are described for detecting restricted content associated with retrieved content. The method and...
US-9,800,598 Detecting shared or compromised credentials through analysis of simultaneous actions
A privileged account management system can detect when credentials used to access one or more servers have been shared or otherwise compromised. This detection...
US-9,800,597 Identifying threats based on hierarchical classification
A system and a method are disclosed for identifying network threats based on hierarchical classification. The system receives packet flows from a data network...
US-9,800,596 Automated detection of time-based access anomalies in a computer network through processing of login data
A processing device comprises a processor coupled to a memory and is configured to obtain data characterizing login events for multiple user identifiers. The...
US-9,800,595 Methods, systems, and computer readable media for detecting physical link intrusions
The subject matter described herein relates to method, systems, and computer readable media for detecting physical link intrusions. A method for detecting...
US-9,800,594 Method and system for detecting unauthorized access attack
A method is provided for detecting unauthorized access attack. The detecting method includes obtaining at least one HTTP request and at least one URL address of...
US-9,800,593 Controller for software defined networking and method of detecting attacker
A controller for software defined networking includes a processor. The processor is configured to receive a first request including a first packet from a first...
US-9,800,592 Data center architecture that supports attack detection and mitigation
Described herein are various technologies pertaining to identification of inbound and outbound network and application attacks with respect to a data center....
US-9,800,591 Method and apparatus for processing packet on trill network
The present invention provides a method for processing a packet on a TRILL network, relates to the field of communications, and can effectively defend against a...
US-9,800,590 Systems and methods for threat detection using a software program update profile
The disclosed computer-implemented method for threat detection using a software program update profile may include (1) building an update behavioral model that...
US-9,800,589 Methods and apparatus for detecting malicious attacks
Methods and apparatus for detecting VOIP spoofing attacks in systems that provide communication services over IP networks, for gathering information that can be...
US-9,800,588 Automated analysis pipeline determination in a malware analysis environment
A current selection of previously identified malicious files is identified. The selection includes identified malicious files in multiple formats that are...
US-9,800,587 Image processing apparatus, method for controlling image processing apparatus, and storage medium
An image forming apparatus controls the use of a remote user interface (RUI) by requesting authentication with an RUI access password from a client device in a...
US-9,800,586 Secure identity federation for non-federated systems
Methods and apparatus, including computer program products, implementing and using techniques for providing user credentials over a network to a remote computer...
US-9,800,585 Restricting access by services deployed on an application server
An example method for controlling access to services coupled to an application server includes receiving a set of method calls issued from originator services...
US-9,800,584 Hierarchical policy-based shared resource access control
Access control for shared computing resources in a hierarchical system is provided herein. An as-needed, "lazy evaluation" approach to access control is...
US-9,800,583 System and method for secure machine-to-machine communications
Embodiments of the present invention include a method for providing a secure domain name system (DNS) for machine to machine communications. In one embodiment,...
US-9,800,582 Method and apparatus generating and applying security labels to sensitive data
The disclosure comprises a method, an apparatus, and instructions for controlling a computer to implement a security labeling service (SLS) to tag an electronic...
US-9,800,581 Automated wireless device provisioning and authentication
Automated provisioning and/or authentication of a device to a wireless access point is contemplated. The automated provisioning may be performed in a manner...
US-9,800,579 Network-based client side encryption
A device may provide an upload request to upload a file. The device may receive, based on the upload request, a unique identifier associated with the device....
US-9,800,578 Handling authentication failures in wireless communication systems
A method for handling authentication failures in a wireless communication system includes transmitting, by a user equipment (UE) and via a first cell, a first...
US-9,800,577 Method and apparatus for controlling communications terminal and corresponding communications terminal
Embodiments of the present invention disclose a method and an apparatus for controlling a communications terminal and a corresponding communications terminal,...
US-9,800,576 Authentication for over the top broadcast streaming using automated content recognition
An authenticator in a second user device captures a media sample comprising at least one of an audio portion, a video portion or an image portion. The media...
US-9,800,575 Assigning storage responsibility in a distributed data storage system with replication
A data location table master system generates a master data location table storing associations of tokens with storage nodes for varying responsibility levels....
US-9,800,574 Method and apparatus for providing client-side score-based authentication
Methods, apparatus, and systems for generating and verifying one time passwords in connection with a risk assessment are disclosed. The risk assessment may...
US-9,800,573 Authentication on a computing device
Systems and/or methods provide a user of a first computing device with the ability to authenticate themselves on a remotely provided process or service using a...
US-9,800,572 System and method for providing limited access to data
A system and computer-implemented method for providing access to data of a first party including receiving information for identifying the first party,...
US-9,800,571 Web based extranet architecture providing applications to non-related subscribers
An extranet includes a network which couples a plurality of non-related participants and a server coupled to the network. The server stores a plurality of...
US-9,800,570 Method of persistent authentication with disablement upon removal of a wearable device
The invention relates to a method and wearable device for persistent authentication using the wearable device. The wearable device is activated in response to...
US-9,800,569 Data protection backup agent management
During a data protection operation, a system exploits a virtual hierarchy to centralize the configuration and management of operating system credentials of...
US-9,800,568 Methods for client certificate delegation and devices thereof
Methods, non-transitory computer readable media, and network traffic management apparatuses that receive a request from a client device to access an...
US-9,800,567 Authentication of network nodes
Various embodiments of systems and methods of network nodes authentication are described herein. In one aspect, a provisioning of an application in a specified...
US-9,800,566 Method of using server, server reservation control apparatus and program storage medium
In a content supply system, in order to use a streaming server to perform a live distribution, a user PC used makes a reservation for a time zone, etc. to a...
US-9,800,565 Method and apparatus of providing messaging service and callback feature to mobile stations
Disclosed are an apparatus and method of performing automated administrative operations on a mobile device. One example method may include determining via a...
US-9,800,564 Methods, apparatuses and computer program products for utilizing visual authentication tokens as cross-platform...
An apparatus is provided for facilitating cross-platform authentication. The apparatus may include at least one memory and at least one processor configured to...
US-9,800,563 Method and device for processing data security channel
Embodiments of the present invention provide a method and a device for processing a data security channel of a tunnel, where the method includes: receiving an...
US-9,800,562 Credential recovery
In a credential recovery process, a user is authenticated using an application running on a mobile communications device, and requests recovery of a credential....
US-9,800,561 Secure sharing of user annotated subscription media with trusted devices
Generally, this disclosure provides systems, methods and computer readable media for secure sharing of user annotated subscription media content with trusted...
US-9,800,560 Systems and methods for monitoring encrypted data transmission
The disclosed computer-implemented method for monitoring encrypted data transmission may include (1) detecting a data transmission session between an...
US-9,800,559 Securing service control on third party hardware
Techniques for hosting components of provider services within secure execution environments are described herein. Information associated with a request received...
US-9,800,558 Frequency-hiding order-preserving encryption
Methods, systems, and computer-readable storage media for encrypting data to provide encrypted data for storage in a database. Implementations include actions...
US-9,800,557 Processing of restricted data
Embodiments relate to operating a data processing system. An aspect includes receiving a request for data storage by an application server, said request...
US-9,800,556 Systems and methods for providing data security services
Embodiments described herein provide enhanced computer- and network-based systems and methods for providing data security with respect to computing services,...
US-9,800,555 Attribute-based encryption
A system for attribute-based encryption comprises a first encrypter (11) and a second encrypter (12). The first encrypter (11) comprises an input unit (1) for...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.