Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,871,811 Identifying security properties of systems from application crash traffic
Most machines in an organization's computer network connect to the Internet and create web traffic logs which allow analysis of HTTP traffic in a simple,...
US-9,871,810 Using tunable metrics for iterative discovery of groups of alert types identifying complex multipart attacks...
Tunable metrics are used for iterative discovery of groups of security alerts that identify complex, multipart attacks with different properties. Alerts...
US-9,871,809 Reversion of system objects affected by a malware
A computerized method of reverting system data affected by a malware. The method comprises monitoring, in run time, a plurality of events of a plurality of...
US-9,871,808 System and method for handling rogue data packets
The present disclosure is directed towards a system and method for handling rogue data packets. The method may include receiving, using one or more processors,...
US-9,871,807 Generic protocol decoder for generic application-level protocol signatures
Described is a generic protocol decoder that analyzes network traffic or file data to look for a signature, and signals an intrusion prevention mechanism/system...
US-9,871,806 Apparatus and method of displaying network security situation
An apparatus and method of displaying a network security situation is provided. The apparatus includes an extraction unit configured to classify a...
US-9,871,805 User authentication
A method, system, server processing system and computer readable medium for authenticating a user attempting to access a secure environment is disclosed. In one...
US-9,871,804 User authentication
Providing a user apparatus access to a computer system including services and authentication levels. A service request is determined for at least one of the...
US-9,871,803 Access control for event data stored in cloud-based data stores based on inherited roles
Embodiments are directed towards a system and method for a cloud-based front end that may abstract and enable access to the underlying cloud-hosted elements and...
US-9,871,802 Maintaining a limited user profile for social networking system users unable to establish a user profile
A social networking system maintains a limited user profile associated with a user of the social networking system who does not satisfy one or more criteria for...
US-9,871,801 Secure computing system record access control
A computing system record security architecture comprises, in one example, a record generation component configured to generate a record in a computing system,...
US-9,871,800 System and method for providing application security in a cloud computing environment
In accordance with an embodiment, described herein is a system and method for providing application security in a cloud computing or other environment. A...
US-9,871,799 Enabling trusted conferencing services
Architecture for providing a superuser privilege in a conferencing environment. A pre-configured entity such as a bot program receives special conferencing...
US-9,871,798 Computerized system facilitating secured electronic communication between and with children
A mail server operative to communicate with external recipients via a gateway to external communication network/s; and to communicate with internal recipient/s...
US-9,871,797 Information security apparatus and methods for credential dump authenticity verification
In some embodiments, an apparatus includes a memory, storing processor-executable instructions, blacklist terms, and credential dump records, and a processor....
US-9,871,796 Multi level decomposition for multi user CAx databases
A system for collaborating on a component a first multi-user CAx environment including a data module. The first multi-user CAx environment corresponds to a...
US-9,871,795 Inactive non-blocking automated agent detection
Online retailers may operate one or more services configured to detect requests generated by automated agents. A CAPTCHA may be transmitted in response to...
US-9,871,794 Domain name system and method of operating using restricted channels
A server system for a domain name system (DNS) which operates to concurrently provide both public-facing and restricted channels for receiving and handling...
US-9,871,793 Diameter signaling for mobile IPv4
The invention consists of a new registration and authentication protocol for between a Mobile Node and a Home Agent. The new protocol uses a novel messaging...
US-9,871,792 Hostless mDNS-SD responder with authenticated host wake service
Conventional wireless interface (WiFi) controllers cannot resolve authentication for trusted client devices without calculation from a host processor. Leaving...
US-9,871,791 Multi factor user authentication on multiple devices
Systems and methods of the present invention provide for a first and second client computer configured to receive and transmit an authentication credential and...
US-9,871,790 Identification method of an entity
The present invention relates to identification method of an entity executed by an identification system from indexed distance data (d.sub.1, . . . , d.sub.n)...
US-9,871,789 Authentication system, authentication method and service providing system
An authentication system comprising an authentication terminal and an authentication server is provided. The authentication terminal comprises an authentication...
US-9,871,788 Authentication terminal
An authentication terminal comprising an authentication apparatus authenticating an authentication subject, an artifact operating in accordance with an input...
US-9,871,787 Authentication processing for a plurality of self-encrypting storage devices
Authentication processing for a plurality of self-encrypting storage devices, e.g. SEDs) of a computer system is provided. The authentication processing for the...
US-9,871,786 Authenticating communications
The method of authenticating the source of a communication is disclosed. The method includes executing a clock for an operation period. The method also includes...
US-9,871,785 Forward secure one-time authentication tokens with embedded time hints
Forward-secure one-time authentication tokens are provided with embedded time hints. A token generates a passcode for presentation to an authentication server...
US-9,871,784 System and method for image based location specific password construction and authentication
A computer implemented system and method for image based location specific password construction and authentication is provided. The system helps users to...
US-9,871,783 Universal enrollment using biometric PKI
A system may obtain identification information for a user for obtaining a form of access using universal enrollment. The system may obtain a digital certificate...
US-9,871,782 Wireless communication systems and methods
Embodiments of the invention provide methods, devices and computer programs arranged to control provisioning of device-to-device (D2D) communication services in...
US-9,871,781 Systems and methods for path maximum transmission unit discovery
An information handling system is provided. The information handling system includes a plurality of network devices. One of the plurality of network devices is...
US-9,871,780 System and method for preventing unauthorized access to restricted computer systems through the use of a...
A method and system for automatically terminating a logout session for a restricted access system by determining that an authorized user has left the vicinity...
US-9,871,779 Continuous authentication confidence module
Generally, this disclosure describes a continuous authentication confidence module. A system may include user device including processor circuitry configured to...
US-9,871,778 Secure authentication to provide mobile access to shared network resources
Techniques to perform secure authentication to provide mobile access to shared content are disclosed. In various embodiments, a user credential associated with...
US-9,871,777 Web-based data and instrument management solution
A data and instrument management and interface system comprises a web server hosted on an intranet network having a wireless range. The web server has a...
US-9,871,776 Local area network
A method and system for distributed security for a plurality of devices in a communication network, each of the devices being responsible for generating,...
US-9,871,775 Group membership block chain
A system and method for achieving authorization in confidential group communications in terms of an ordered list of data blocks representing a tamper-resistant...
US-9,871,774 Secured file transfer management on augmented reality (AR) and virtual reality (VR) devices
In one embodiment, a system includes a processing circuit and logic integrated with the processing circuit, executable by the processing circuit, or integrated...
US-9,871,773 Method and system for digital rights management of documents
A method and system for transmission of digital content via e-mail with point of use digital rights management is disclosed. The secured access rights to the...
US-9,871,772 Cryptographic system for secure command and control of remotely controlled devices
A system and method operate on a first electronic device and a second electronic device. The first device has a control system and a cryptographic...
US-9,871,771 Cryptographic security profiles
Two endpoint devices communicate with one another in a secure session by negotiating encrypted communications at initial establishment of the session. Each...
US-9,871,770 Secure data parser method and system
A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser parses data...
US-9,871,769 Relationship management system and method of operation thereof
A communication method to publish a user message suitable for one or more vendors. The communication method may be performed by one or more controllers and may...
US-9,871,768 IPv6 to IPv4 data packet migration in a trusted security zone
Systems and methods discussed herein relate to enabling communications between IPv4 and IPv6 hosts using a communication channel in a trusted security zone...
US-9,871,766 Secure path determination between devices
Methods, network controllers, and machine-readable and executable instructions are provided to determine a secure path between a source device and a destination...
US-9,871,765 DIAMETER firewall using reception IP address or peer identity
Various exemplary embodiments relate to a method performed by a DIAMETER network node, the method including: receiving a first DIAMETER message; determining...
US-9,871,764 Method to enable deep packet inspection (DPI) in openflow-based software defined network (SDN)
The present invention relates to a method and system for performing deep packet inspection of messages transmitted through a network switch in a Software...
US-9,871,763 Method and system for dynamic application layer gateways
A method and system are disclosed for providing functionality on a network. A mobile agent moves from a first node to a target node and, at the target node,...
US-9,871,762 Translating network address
In a process of establishing a tunnel between a Hub device and a Spoke device, the Hub device in a DVPN obtains a public address and port information of a...
US-9,871,761 Methods and apparatus for implementing a fibre channel zone policy
In some embodiments, an apparatus includes a first network switch configured to be within a Fiber Channel over Ethernet (FCoE) network, which has a set of...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.