Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,838,407 Detection of malicious web activity in enterprise computer networks
A processing device in one embodiment comprises a processor coupled to a memory and is configured to obtain internal log data of a computer network of an...
US-9,838,406 Method and product for providing a predictive security product and evaluating existing security products
A method, product and computer program product for evaluating a generation of malware variants, the method including the steps of: scanning, with one or more...
US-9,838,405 Systems and methods for determining types of malware infections on computing devices
The disclosed computer-implemented method for determining types of malware infections on computing devices may include (1) identifying multiple types of...
US-9,838,404 Method and an apparatus to perform multi-connection traffic analysis and management
A method and an apparatus to perform multi-connection traffic analysis and management are described. In one embodiment, the method includes analyzing data...
US-9,838,402 System, method and computer readable medium for determining users of an internet service
An internet service provider (ISP) is configured to analyze data sent by a user to determine a subscriber account associated with the data and a user associated...
US-9,838,401 Method, client terminal device and system for verifying page information
Examples of the present disclosure provide a method, client terminal device and system for verifying page information, the method includes: verification...
US-9,838,400 System and method for validating users using social network information
A system and method uses any or all of information of a user and/or user's activity at a second web site, information of the user's friends or other connections...
US-9,838,399 Reducing latency
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for reducing latency in network communications and data...
US-9,838,398 Validating the identity of an application for application management
A method of managing access to enterprise resources is provided. An access manager may operate at a mobile device to validate a mobile application installed at...
US-9,838,397 Information processing apparatus and control method thereof
An information processing apparatus which manages identification information of a first user and device identification information of a device of the first user...
US-9,838,396 Controlling content-sharing using a privacy list snapshot
Exemplary methods, apparatuses, and systems receive a request from a first user of a social networking system, during a first time period, to share a content...
US-9,838,395 Enhanced load processing using linked hierarchical data structures
The present disclosure relates to enhancing load processing for facilitated assignment or modification of access-right data. More specifically, the present...
US-9,838,394 Sensor-based human authorization evaluation
A resource-access management system detects whether a user is authorized to access resources. The system may include a user device being configured to include a...
US-9,838,393 Encapsulating commands within a control wrapper for split entry or approval
Methods, systems, and computer-readable media for reviewing inputted commands and preventing the execution of accidentally or maliciously entered adverse...
US-9,838,392 Method and apparatus for providing proxy-based access controls
An approach is provided for proxy-based access controls. A proxy platform causes, at least in part, designation of at least one monitoring client of a proxy...
US-9,838,391 Systems and methods for privately performing application security analysis
Systems and methods for analyzing applications on a mobile device for risk so as to maintain the privacy of the application user are provided. In the example...
US-9,838,390 System and method for automatic wireless network authentication
A system and method are described for connecting an IoT device to a wireless router and/or access point. For example, one embodiment of a system comprises: an...
US-9,838,389 Integrated circuit, code generating method, and data exchange method
An integrated circuit, a code generating method, and a data exchange method are described. The integrated circuit includes a plurality of field effect...
US-9,838,388 System and method for biometric protocol standards
Secure communications are provided between a user computing device and a server computing device. An enrollment request is received from a user computing device...
US-9,838,387 Security token with embedded data
A system and method are presented that provide authentication tokens to a local device from a remote server. The authentication token incorporates standard...
US-9,838,386 Information processing system, information processing device, and device control method
An information processing system includes terminal devices of a first network; and an information processing device of a second network. A first terminal device...
US-9,838,385 Password generation based on dynamic factors
In general, embodiments of the present invention relate to password management. Specifically, a user selects a variable parameter rule from among a set of...
US-9,838,384 Password-based fraud detection
Techniques for marking or flagging an account as potentially being compromised may be provided. Information about the popularity of passwords associated with a...
US-9,838,383 Managing privileged shared accounts
A method includes receiving a target credential object having administrative rights over a first user account located on a target system. The first user account...
US-9,838,382 Establishing trust within a cloud computing system
A cloud computing system includes a cloud system managing unit, a plurality of sets of devices, where a set of devices includes one or more devices having a...
US-9,838,381 Certificate management apparatus and certificate management method
A certificate management apparatus retains an important certificate, while deleting the oldest referenced certificate. An update determination information...
US-9,838,380 Visualization of trust in an address bar
Described are a system and method for presenting security information about a current site or communications session. Briefly stated, a browsing software is...
US-9,838,379 Security tiering in a mobile communication device application framework
A user equipment (UE) comprising a processor, a non-transitory memory, a mobile application installed in the memory, and a mobile application framework (MAF)...
US-9,838,378 Securing a server before connecting the server to a data communications network
Securing a server before connecting the server to a data communications network in a data center may include: establishing a proximity-based communications...
US-9,838,377 Task segregation in a multi-tenant identity and data security management cloud service
A system provides cloud-based identity and access management. The system receives a request to perform an identity management service, and accesses a...
US-9,838,376 Microservices based multi-tenant identity and data security management cloud service
A system provides cloud-based identity and access management. The system receives a request for performing an identity management service, where the request...
US-9,838,375 RESTlike API that supports a resilient and scalable distributed application
An application distributed amongst plurality of computing devices leverages an application programming interface that conforms to a representational state...
US-9,838,374 Method and computer-based system for anonymously authenticating a service user
A computer-implemented method of and a first web service system for anonymously authenticating a service user having an account associated with a first web...
US-9,838,373 System, device, and method of detecting a remote access user
Devices, systems, and methods of detecting user identity, differentiating between users of a computerized service, and detecting a possible attacker. The...
US-9,838,372 Identifying service providers for integrating a secure element into a short-range wireless communication apparatus
A particular authentication-based service is implemented via a physical authentication device. A service description of the particular authentication-based...
US-9,838,371 Method and system for securely transmitting volumes into cloud
A first computing device is provided for transmitting one or more volumes via a secured connection. The first computing device includes a controller that is...
US-9,838,370 Business attribute driven sizing algorithms
A cloud infrastructure system includes one or more computing devices and is configured to receive subscription order information related to one or more services...
US-9,838,369 Restricting broadcast and multicast traffic in a wireless network to a VLAN
Traffic broadcast to a VLAN is restricted. To do so, a plurality of stations are associated with a BSSID (basic service set identifier). A first VLAN is...
US-9,838,368 Port scrambling for computer networks
A method, system and computer program product providing port scrambling for securing communications in internal computer networks are disclosed. A...
US-9,838,367 Binding a trusted input session to a trusted output session
According to an embodiment provided herein, there is provided a system that binds a trusted output session to a trusted input session. The system includes a...
US-9,838,366 Secure shell public key audit system
A system for auditing authorized key files associated with secure shell (SSH) servers is disclosed. In an example, the system may include a purpose-built SSH...
US-9,838,365 Peer to peer identifiers
In an ad hoc peer-to-peer type network during peer discovery, information relating to users of various devices is broadcast to other devices in the network,...
US-9,838,364 Media storage and playback of encrypted content
A content distribution system is disclosed that supports verification of transmission. In some embodiments, a remote probe device captures content and sends the...
US-9,838,363 Authentication and initial key exchange in ethernet passive optical network over coaxial network
A method comprising generating an updated security key upon expiration of a key exchange timer, transferring the updated security key to a Coaxial Network Unit...
US-9,838,362 Method and system for sending a message through a secure connection
The method and system enable secure forwarding of a message from a first computer to a second computer via an intermediate computer in a telecommunication...
US-9,838,361 Secure migration of virtual machines from source to target and transfer of VM descriptor and keys between...
Systems, methods, and non-transitory computer-readable medium are provided to secure data centers and cloud computing. A method receives network identifiers for...
US-9,838,360 Data transmission security improvements
A method of securely transmitting communication information from a first terminal operating in a first coordinate measurement domain to a second ...
US-9,838,359 Separation of IoT network thing identification data at a network edge device
A method includes performing operations as follows on a processor of an edge device of a network: receiving a data record from a thing, the record comprising a...
US-9,838,358 E-mail firewall with policy-based cryptosecurity
An e-mail firewall applies policies to e-mail messages between a first site and second sites in accordance with administrator selectable policies. The firewall...
US-9,838,357 Non RFC-compliant protocol classification based on real use
A firewall system determines whether a protocol used by an incoming data packet is a standard protocol compliant with Request For Comment (RFC) standards. In...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.