Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,813,448 Secured network arrangement and methods thereof
A high density network arrangement for managing an integrated secured multiple networks arrangement is provided. The arrangement includes a power module for...
US-9,813,447 Device and related method for establishing network policy based on applications
A function is provided in a network system for adjusting network policies associated with the operation of network infrastructure devices of the network system....
US-9,813,446 Systems and methods for matching and scoring sameness
Systems and methods for matching and scoring sameness. In some embodiments, a computer-implemented method is provided, comprising acts of: identifying a...
US-9,813,445 Taint injection and tracking
An embodiment or embodiments of an electronic device can comprise an input interface and a hardware component coupled to the input interface. The input...
US-9,813,444 Reliable selection of security countermeasures
Among other things, this document describes a computer-implemented security method such as for authenticated selection of security countermeasures and for...
US-9,813,443 Systems and methods for remediating the effects of malware
The disclosed computer-implemented method for remediating the effects of malware may include (1) identifying a file on a client device, (2) determining, using a...
US-9,813,442 Server grouping system
In one embodiment, a method includes receiving client-server connection data for clients and servers, the data including IP addresses corresponding to the...
US-9,813,441 Detecting and breaking CAPTCHA automation scripts and preventing image scraping
A security device may receive a request from a client device and intended for a server device. The security device may identify the request as being associated...
US-9,813,440 Polymorphic treatment of annotated content
A computer-implemented method includes receiving content and annotation information that describe a structure of the content, the annotation information having...
US-9,813,439 Evaluation node for reporting status via a secure link
An evaluator node may obtain an IP address within a network to be tested, the network having multiple testable addresses other than the IP address. The...
US-9,813,438 Anomaly prediction method and system for heterogeneous network architecture
An anomaly prediction method and system for heterogeneous network architecture are provided. A gateway receives a packet and converts the packet to conform to a...
US-9,813,437 Systems and methods for determining malicious-download risk based on user behavior
The disclosed computer-implemented method for determining malicious-download risk based on user behavior may include (1) identifying a set of users that are at...
US-9,813,436 Method for vehicle intrusion detection with electronic control unit
A method of operating a predetermined electronic control unit is provided for a vehicle comprising: a vehicle network bus and one or more electronic control...
US-9,813,435 Network security analysis using real-time and batch detection engines
A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security...
US-9,813,433 System and method for embedded mobile (EM)/machine to machine (M2M) security, pattern detection, mitigation
The invention provides a security system and method for use in a communications network, said network comprising means to allow a plurality of devices to...
US-9,813,432 Tracking anomaly propagation at the network level
In one embodiment, a device in a network monitors one or more metrics regarding network traffic associated with a particular application. The device detects an...
US-9,813,431 Browser initiated reporting of fraud
A method and apparatus for providing safety feedback to web browsers. A web browser contacts a remote server that monitors web site safety and provides a...
US-9,813,430 Tracking data in an online environment
To detect potentially malicious behavior or fraud, online environments maintain counts of a variety of data items received via a webpage or an application. A...
US-9,813,429 Method for secure web browsing
The invention relates to a computer-implemented method for secure web browsing. The method includes: receiving a request submitted from a browser, the browser...
US-9,813,428 Apparatus and method for securely managing the accessibility to content and applications
A system that incorporates the subject disclosure may perform, for example, receive secret information and non-secret information from a secure download...
US-9,813,427 Method for detecting security error in mobile telecommunications system and device of mobile telecommunications
According to one embodiment, a method of performing a re-establishment procedure in a mobile communication system includes: receiving at least one packet data...
US-9,813,426 Managing temporal aspects of accounts and entitlements
A method and system for managing temporal aspects of accounts and entitlements in target systems in an organization is provided. In an embodiment, an identity...
US-9,813,425 System, method and computer program product for managing access to systems, products, and data based on...
In accordance with embodiments, there are provided mechanisms and methods for managing access to data based on information associated with a physical location...
US-9,813,424 Communication system, server, and client device
A communication system includes: a client device and a server. The server can store first address information specifying at least one first global IP address...
US-9,813,423 Trust-based computing resource authorization in a networked computing environment
A trust-based approach for authorizing computing resources in a networked computing environment is provided. Specifically, in a typical embodiment, a candidate...
US-9,813,422 Detecting unauthorized risky or inefficient usage of privileged credentials through analysis of task completion...
A privileged account management system can maintain a database that defines a normal amount of time that it takes to perform a task associated with a reason...
US-9,813,421 Systems and methods for secure resource access and network communication
Systems and methods for secure resource access and network communication are provided. A plurality of policies are received on a client device, each policy...
US-9,813,420 Priority resolution for access control list policies in a networking device
Access control lists (ACLs) permit network administrators to manage network traffic flowing through a networking element to optimize network security,...
US-9,813,419 Systems and methods for securing social media for users and businesses and rewarding for enhancing security
The disclosed system and method enhances security of people, organizations, and other entities that use what has been termed "social media." Recent trends have...
US-9,813,418 Method and system for visibility and control over access transactions between clouds using resource...
A computing system detects an access transaction based on one or more resource authorization messages transmitted via a resource authorization protocol. The...
US-9,813,417 Systems and methods for creating and displaying an electronic communication digest
Systems and methods are disclosed for creating an electronic communication digest. In one implementation, a system receives a first electronic communication...
US-9,813,416 Data security system with encryption
A data security system, and method of operation thereof, is provided that includes: an electronic authentication subsystem for verifying a user identification...
US-9,813,415 System and method of generating and using bilaterally generated variable instant passwords
Implementations of a system and method of generating and using bilaterally generated variable instant passwords are provided. In some implementations, the...
US-9,813,414 Password-based management of encrypted files
Embodiments include methods for managing encrypted files by storing a user password hash including a predetermined function of the user password associated with...
US-9,813,413 Domain joined virtual names on domainless servers
Services from domainless machines are made available in a security domain under a virtual name. Each machine is not joined to the domain but can reach a...
US-9,813,412 Scanning of password-protected e-mail attachment
A computer analyzes a message attachment protected by a password. The message is intercepted from a sender before the message reaches the recipient. The...
US-9,813,411 Method and system of providing a picture password proof of knowledge as a web service
A server provides a picture password proof of knowledge. The server includes a processor creating a user identifier when communicating with a relying party (RP)...
US-9,813,410 Information processing apparatus, information processing method, and information processing program
It is an object to allow for simplification of authentication information to be input by a user while ensuring security. An information processing apparatus...
US-9,813,409 Method of dynamically adapting a graphical password sequence by executing computer-executable instructions...
A method of dynamically adapting a graphical password sequence provides a secure means to access a restricted account through a dynamic password defined by...
US-9,813,408 Asset guardian
An asset guardian system may comprise a server including a processor with memory and a database. The processor may be configured to receive asset information...
US-9,813,407 Rule based device enrollment
Techniques for providing enrollment services for various types of electronic devices in a communication network is disclosed. The electronic devices may include...
US-9,813,406 Device authentication in ad-hoc networks
Technologies are generally described for methods and systems effective to authenticate an invited device. In some examples, a method for authenticating an...
US-9,813,404 Content URL authentication for dash
Technology for content uniform resource locator (URL) authentication for dynamic adaptive streaming over hypertext transfer protocol (HTTP) (DASH) is disclosed....
US-9,813,403 Securing communications with enhanced media platforms
Various methods and systems for securing communications with enhanced media platforms, are provided. In particular, an enhanced media platform is authenticated...
US-9,813,402 User authentication based on probabilistic inference of threat source
Aspects of the present disclosure are directed to authenticating a user requesting access to a computing resource. To authenticate the user, activity data...
US-9,813,401 Accessing network services using a network access service
A network access service operates as an intermediary between client applications and network services. The network access service is configured to perform one...
US-9,813,400 Computer-implemented systems and methods of device based, internet-centric, authentication
Systems and computer-implemented methods for authorizing respective access by each of a plurality of Internet users to a respective one or more Internet...
US-9,813,399 Secure remote user device unlock for carrier locked user devices
System and method of unlocking a user device. A carrier unlock request is received for a user device that may have an unlock application that has been...
US-9,813,398 Method and system for Internet of things capability integration
Disclosed is an Internet of things capability integration system, which relates to the field of Internet of things, and the field of telecommunication network...
US-9,813,397 Communication system, communication apparatus, communication method, and computer program
Content is transmitted within a range of the user's legitimate use while limiting the number of equipment to which the content is transmitted at the same time....
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.