Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,832,239 Sending snippets of media content to a computing device
Techniques include: providing media content to a computing device; waiting a period of time; determining that the media content has not been used; sending a...
US-9,832,237 Collaborative online document editing
A technique for facilitating online collaboration among users of client machines allows multiple users to work together and concurrently on a set of documents....
US-9,832,236 Collaborative session control transfer and inter-device transfer in internet protocol multimedia subsystem
An Internet Protocol (IP) multimedia subsystem (IMS) network node receives a first collaborative session control signaling from a first wireless...
US-9,832,235 Method and apparatus for extending the use of an IMS oriented handling of telecommunications services
A method for extending IP Multimedia Subsystem (IMS)-oriented handling of telecommunications services within a telecommunications network for a subscriber using...
US-9,832,234 IMS inbound roamer and short number dialing
Network nodes for an access network and a home network of a first UE are described for use when routing an originating call from the first UE in the access...
US-9,832,233 Secure social network
Systems and methods for facilitating and securing the exchange of digital information between individuals within the social network of a person or group of...
US-9,832,232 System and method for on-line and off-line streaming application isolation
Providing streaming of applications from streaming servers onto clients. The applications are contained within isolated environments, and the isolated...
US-9,832,231 Unified generation of policy updates
User input mechanisms are displayed for defining a compliance policy update. A unified compliance policy update is generated according to a unified schema that...
US-9,832,230 IC chip, information processing apparatus, system, method, and program
An IC chip, an information processing apparatus, system, method, and program are provided. An IC chip includes an authentication control unit configured to...
US-9,832,229 Multi-tiered protection platform
A multi-tier platform supports a messaging platform. An intermediate layer interacts with a web layer and registered sources of data components, where a...
US-9,832,228 Methods, systems, and computer program products for managing firewall change requests in a communication network
A method of managing firewall change requests for a communication network includes providing a change request interface comprising a plurality of change request...
US-9,832,227 System and method for network level protection against malicious software
A method in one example implementation includes receiving information related to a network access attempt on a first computing device with the information...
US-9,832,226 Automatic curation and modification of virtualized computer programs
In an embodiment, a data processing method comprises receiving a first instance of computer program data at a security unit having one or more processors;...
US-9,832,225 Identity theft countermeasures
In some embodiments, techniques for computer security comprise preventing and/or mitigating identity theft such as phishing.
US-9,832,224 Dynamic throttling of scan requests for multiple scanners a cluster of nodes
Techniques for dynamic throttling of scan requests for multiple scanners in a cluster of nodes are described. An apparatus may comprise a dynamic throttling...
US-9,832,223 Technologies for protecting systems and data to prevent cyber-attacks
Technologies for protecting systems and data of an organization from malware include a data integrity server configured to receive a data file for import from...
US-9,832,222 Anti-malware mobile content data management apparatus and method
There is provided an anti-malware mobile content data management apparatus, for use in managing content data within an input electronic file containing content...
US-9,832,221 Systems and methods for monitoring the activity of devices within an organization by leveraging data generated...
A computer-implemented method for monitoring the activity of devices within an organization by leveraging data generated by an existing security solution...
US-9,832,220 Security method for allocation of virtual machines in a cloud computing network
A method for enhancing security in a cloud computing system by allocating virtual machines over hypervisors, in a cloud computing environment, in a ...
US-9,832,219 System for tracking data security threats and method for same
An incident response system and method for tracking data security incidents in enterprise networks is disclosed. An Incident Manager application (IM) stores...
US-9,832,218 Interacting with a remote server over a network to determine whether to allow data exchange with a resource at...
Provided are a computer program product, system, and method for interacting with a remote server over a network to determine whether to allow data exchange with...
US-9,832,217 Computer implemented techniques for detecting, investigating and remediating security violations to IT...
A method includes collecting system calls and call parameters invoked by monitored applications for target computer systems. The system calls and call...
US-9,832,216 System and method for network data characterization
Described herein are embodiments of a system and method for network data characterization and/or classification that overcome the defects of the prior art....
US-9,832,215 Automatic content inspection system for exploit detection
A method of inspecting content intended for a workstation to detect content that performs malicious exploits, including receiving the content for inspection at...
US-9,832,214 Method and apparatus for classifying and combining computer attack information
A method and apparatus for classifying and combining computer attack information identifying as malicious events, events in a network that cause...
US-9,832,213 System and method for network intrusion detection of covert channels based on off-line network traffic
A network intrusion detection system and method is configured to receive off-line network traffic. The off-line network traffic with a predefined format, PCAP...
US-9,832,212 Electronic message analysis for malware detection
An electronic message is analyzed for malware contained in the message. Text of an electronic message may be analyzed to detect and process malware content in...
US-9,832,211 Computing device to detect malware
Disclosed is an apparatus and method for a computing device to determine if an application is malware. The computing device may include: a query logger to log...
US-9,832,210 Multi-core browser and method for intercepting malicious network address in multi-core browser
The disclosure discloses a multi-core browser and a method for intercepting a malicious network address in a multi-core browser, wherein a malicious network...
US-9,832,209 Systems and methods for managing network security
A computer-implemented method for managing network security may include identifying a set of trusted Internet domains, identifying traffic information that...
US-9,832,208 System and methods of providing secure messaging environment
A method for providing a secure messaging environment includes providing a messaging environment in which two or more devices are connected via a network, each...
US-9,832,207 Input verification
In an example, a computing device may an input verification engine (IVE) that provides input verification services within a trusted execution environment (TEE),...
US-9,832,206 System, method and authorization device for biometric access control to digital devices
A system and method for authenticating and continuously verifying authorized users of a digital device includes an authentication device attached to an arm or...
US-9,832,205 Cross provider security management functionality within a cloud service brokerage platform
Implementation of cross provider security in accordance with the disclosures made herein enables users of a system (e.g., a cloud services brokerage platform)...
US-9,832,204 Method and system for managing security compatibility of electronic content
There is provided a method and system for managing security compatibility of electronic content. The method includes: receiving electronic content; parsing the...
US-9,832,203 Application permission management device and method therefor
An application permission management method, includes: generating a running request in response to an operation of running an object of a terminal device,...
US-9,832,202 System and method for communicating with inmates in a privileged communication
A system and method for with an inmate in a privileged communication are disclosed. a communication system includes a portal subsystem that determines whether a...
US-9,832,201 System for generation and reuse of resource-centric threat modeling templates and identifying controls for...
Systems, computer program products, and methods are described herein for creating reusable resource-centric threat models and identifying controls for securing...
US-9,832,200 Multi-tiered protection platform
A multi-tier platform provides additional security at a perimeter of a computer system, where an intermediate layer interacts with a web layer and controls data...
US-9,832,199 Protecting access to hardware devices through use of a secure processor
A computer-implemented method, system, and/or computer program product protects access to hardware devices through use of a secure processor. A security...
US-9,832,198 Service-based message access layer frame and implementation method thereof
A message access layer frame and an implementation method thereof are provided, relating to a technical field of software. After initiating a system, a...
US-9,832,197 Generating link information to access a file stored in a storage area associated with user identification...
An information processing apparatus includes a memory that includes a first storage area and a second storage area and a processor that generates link...
US-9,832,196 Network monitoring device
A network monitoring device for improved filtering of access, from a secure internal network, to an unsecured network is provided. The network monitoring device...
US-9,832,195 Developer based document collaboration
Organizations maintain and generate large amounts of documentation and entities of these organizations often need to collaborate on generating and reviewing...
US-9,832,194 Generating and using ephemeral identifiers and message integrity codes
Systems and methods for generating and using ephemeral identifiers are provided. One example method includes determining, by one or more computing devices, a...
US-9,832,193 Device validation using device fingerprint
Embodiments of the invention are directed to apparatuses, methods and computer program products for validating a device. An exemplary apparatus is configured...
US-9,832,192 Computer implemented method to prevent attacks against authorization systems and computer programs products thereof
A computer implemented method and computer program products to prevent attacks against authorization systems The computer implemented method comprising...
US-9,832,191 Systems and methods for authenticating a user based on a biometric model associated with the user
Systems and methods as provided herein may create a biometric model associated with a user. The created biometric model may be used to generate challenges that...
US-9,832,190 Managing user data for software services
User-specific data for use with a software service may be stored in an encrypted form, where the encryption and/or decryption keys used are associated with a...
US-9,832,189 Automatic association of authentication credentials with biometrics
A computing device may receive authentication information. Within a time-out period, a fingerprint may also be received. The computing device may assign one or...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.