Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,843,612 Voice conference call using PSTN and internet networks
A system and method for supporting a multi-participant voice conference call using PSTN and Internet networks is described. The method for supporting a...
US-9,843,611 Incident data collection for public protection agencies
An approach is provided in which a public protection system sends a data collection request to user devices located within a geographical proximity of an...
US-9,843,610 Social networking and virtual friends for wearable devices
Techniques described herein may be used to provide wearable devices (e.g., a watch, a clip on device, etc.) for children with virtual friend and social...
US-9,843,609 Creation, sharing and embedding of interactive charts
Systems and methods for generating and sharing interactive charts are described. The interactive charts are generated in an online portal that allows users to...
US-9,843,608 Method of synchronous image sharing
A method is provided for synchronous sharing of a document between a first and a second terminal. The method includes: transmission of a message to the second...
US-9,843,606 Systems and methods for conferencing
Systems and methods are provided for establishing a video conference session. The systems and methods may include receiving, from a first conference client...
US-9,843,605 Security compliance framework deployment
A method and system for improving deployment of a security compliance framework is provided. The method includes deploying a data store that includes an...
US-9,843,604 Detecting and modifying security settings for deploying web applications
Various implementations are described herein for detecting and modifying security settings on a computing device to run a web application using a web browser. A...
US-9,843,603 Techniques for dynamic access control of input/output devices
A technique for dynamically controlling access to client input/output devices includes generating, by a client, a connection request to a central repository. In...
US-9,843,602 Login failure sequence for detecting phishing
A login page of an online service is received in a user computer. False credentials, such as a false user identifier (ID) and a false password, are entered into...
US-9,843,601 Analyzing DNS requests for anomaly detection
A computer-implemented method for detecting anomalies in DNS requests comprises receiving a plurality of DNS requests generated within a predetermined period....
US-9,843,600 System for determining effectiveness and allocation of information security technologies
Disclosed is a computerized system for determining the collective effectiveness of information security technologies. The system typically includes a processor,...
US-9,843,599 Context aware threat protection
Methods and systems for dynamic threat protection are disclosed. An example method for dynamic threat protection may commence with receiving real-time...
US-9,843,598 Capture triggers for capturing network data
The disclosed embodiments provide a system that facilitates the processing of network data. During operation, the system provides a risk-identification...
US-9,843,597 Controller area network bus monitor
Techniques for monitoring a controller area network bus are described herein. In one example, a system comprises a processor that is to detect a message from a...
US-9,843,596 Anomaly detection in dynamically evolving data and systems
Detection of abnormalities in multi-dimensional data is performed by processing the multi-dimensional data to obtain a reduced dimension embedding matrix, using...
US-9,843,595 Systems and methods for providing security services during power management mode
Systems and methods for providing security services during a power management mode are disclosed. In some embodiments, a method comprises detecting with a...
US-9,843,594 Systems and methods for detecting anomalous messages in automobile networks
The disclosed computer-implemented method for detecting anomalous messages in automobile networks may include (1) receiving automobile-network messages that are...
US-9,843,593 Detecting encrypted tunneling traffic
Techniques for detecting encrypted tunneling traffic are disclosed. In some embodiments, detecting encrypted tunneling traffic includes monitoring encrypted...
US-9,843,592 Fast multicast messaging encryption and authentication
To prevent legitimate message recipients from forging new messages and to encrypt messages for a specific set of recipients (channel), a root key is encrypted...
US-9,843,591 Beacon-based industrial automation access authorization
Techniques to implement beacon-based access authorization to industrial assets in an industrial automation environment are disclosed herein. In at least one...
US-9,843,590 Method and apparatus for causing a delay in processing requests for internet resources received from client devices
A method and apparatus for causing a delay in processing requests for Internet resources received from client devices is described. A server receives from a...
US-9,843,589 Internet access authorization and regulation systems and methods for controlled environment of an institutional...
Access and regulations systems to facilitate safe and secure access of web content by residents of an institutional facility such as a correctional facility...
US-9,843,588 Systems and methods for lossless compression of data and high speed manipulation thereof
The present disclosure includes a system, method, and article of manufacture for lossless compression of data and high speed manipulation of the data. The...
US-9,843,587 Method of managing role-based digital rights in a computer system
A computer system manages role-based digital rights by creating a chain of trust that originates with a user who purports to act as a registration authority...
US-9,843,586 Compliance validator for restricted network access control
A method, system, and computer program product for detecting and enforcing compliance with access requirements for a computer system in a restricted computer...
US-9,843,585 Methods and apparatus for large scale distribution of electronic access clients
Methods and apparatus for large scale distribution of electronic access control clients. In one aspect, a tiered security software protocol is disclosed. In one...
US-9,843,584 Protecting privacy in an online setting
Systems, methods, and computer program products to perform an operation comprising receiving digital content associated with an account identifier, parsing the...
US-9,843,583 System and method for authentication across devices
An authentication approach simplifies the process of authentication across devices, while increasing security. An authentication code is supplied through...
US-9,843,582 Identity verification systems and methods
Systems and methods for authenticating the identity of a user prior to giving access to confidential data at a user interface via a network are described. In an...
US-9,843,581 Hardware root of trust (HROT) for software-defined network (SDN) communications
A Software-Defined Network (SDN) determines hardware trust for SDN communications. A probe system transfers probe packets having an originating address,...
US-9,843,580 RFID authentication architecture and methods for RFID authentication
A method for mutual authentication in an RFID system comprising an RFID reader and an RFID tag, the method comprising requesting an identification from the tag,...
US-9,843,579 Dynamically generated SSID
A plurality of beacons that do not include any service set identifiers may be broadcast from an access point. A request concerning association with the access...
US-9,843,578 Mobile security fob
A computer-implemented method comprising: receiving, from a primary factor authentication device by one or more computer systems, a request to enroll a mobile...
US-9,843,577 Revoking sessions using signaling
Embodiments are directed to revoking user sessions using signaling. In one scenario, an identity platform operating on a computer system receives an indication...
US-9,843,576 Secure injection of context information in browsers
Systems and methods are directed to enabling a client device to insert customized content from a first server into a webpage received from a second server...
US-9,843,575 Wireless network authentication method and wireless network authentication apparatus
Embodiments of the present application provide a wireless network authentication method and wireless network authentication apparatuses, and relate to the field...
US-9,843,574 Methods and apparatus for generating chaff passwords for use in a password-hardening system
Static and dynamic embodiments are presented for generating chaff passwords for use in a password-hardening system. Chaff passwords are generated by obtaining a...
US-9,843,573 Determining website secure certificate status via partner browser plugin
Methods of the present inventions allow for determining website secure certificate status via a partner browser plugin. An exemplary method may comprise...
US-9,843,572 Distributing an authentication key to an application installation
Disclosed are various examples for facilitating distribution of an authentication code to installation of managed applications. An identity certificate is sent...
US-9,843,571 Identity confirmation method and identity confirmation system
An identity confirmation method and an identity confirmation system which do not require users to remember passwords, and which automatically update credentials...
US-9,843,570 System and method for providing security monitoring
The present disclosure describes systems and methods for processing security sensor data that enhances the ability of a user to quickly and efficiently review...
US-9,843,569 Method and apparatus for access credential provisioning
A method and apparatus are provided for access credential provisioning. A method may include receiving, at a first mobile apparatus, information about a second...
US-9,843,568 Method and apparatus for generating an intelligent primary key facilitating faster object retrieval
Various methods are provided for facilitating a reduction in the number of required search operations during account creation. One example method may comprise...
US-9,843,567 Wireless network service provision method and system
Provision of a wireless network service is described in relation to network security. Automatic authentication is performed on an object entering a first area,...
US-9,843,566 Networked security system
A method of securing communications between a security device and a security server include receiving, at the security server, a registration request from the...
US-9,843,565 Web form protection
A request for a web page is received and the requested web page is retrieved. The web page is modified to obfuscate a set of form attribute values into a...
US-9,843,564 Securing data using integrated host-based data loss agent with encryption detection
A method and system for securing data in a computer system provides the capability to secure information even when it leaves the boundaries of the organization...
US-9,843,563 Securing relayed email communication
Disclosed are systems and methods that facilitate encryption of email messages that are transported between mail servers. In some cases, email messages may be...
US-9,843,562 Private anonymous electronic messaging
Private anonymous electronic messaging between a message originator and a message recipient within an organization encourages open communication which can...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.