Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,894,108 Synchronization based on device presence
The disclosed subject matter relates to an architecture that can facilitate initiation of an automatic synchronization operation based upon presence information...
US-9,894,107 Control module for a call management system
A control module arranged to manage a hosted communications platform, the hosted communications platform being located between a telecommunications network and...
US-9,894,106 Method for managing fixed and mobile terminals in an environment comprising a mobile network including IMS...
A method of managing fixed and mobile terminals in an environment comprising a mobile network including an IMS network, and an enterprise network including...
US-9,894,105 Method and systems for identifying faulty communication calls
This disclosure relates generally to call monitoring techniques, and more particularly to method and system for identifying faulty communication calls. In one...
US-9,894,104 Systems and methods for providing context to SIP messages
Systems, methods, and computer program products are provided for providing context through a scripting-type programming language to data included in a SIP...
US-9,894,103 Performing source network address translation based on remote device management attributes
Some embodiments provide novel methods for processing remote-device data messages in a network based on data-message attributes from a remote device management...
US-9,894,102 System and method for priority-based rule generation with consistency check and policy enforcement
A network node receives rules from a plurality of different domain entities. Each domain entity has a different priority level, and each rule defines an action...
US-9,894,101 Autonomous and adaptive methods and system for secure, policy-based control of remote and locally controlled...
An autonomous and adaptive method and system for secure, policy-based control of remote and locally controlled computing devices. The invention uses a...
US-9,894,100 Dynamically optimized security policy management
Methods and systems for dynamically optimized rule-based security policy management are provided. A request is received by a network security management device...
US-9,894,099 Automatically configuring mobile devices and applying policy based on device state
Techniques for network-based security for mobile devices based on device state are disclosed. In some embodiments, automatically configuring mobile devices and...
US-9,894,098 Cloud protection techniques
Cloud protection techniques are provided. A security breach is detected in a source cloud environment. An enterprise system processing in the source cloud...
US-9,894,097 Method and device for identifying abnormal application
A method and device for identifying an abnormal application are provided. The method includes executing abnormal applications, obtaining dynamic behavior...
US-9,894,096 Behavioral scanning of mobile applications
Behavioral analysis of a mobile application is performed to determine whether the application is malicious. During analysis, various user interactions are...
US-9,894,095 Network of electronic appliances and a semiconductor device in the network
A technology precluding attacks through peripheral devices thefts to a network of electronic appliance, by utilizing physical chip identification devices, is...
US-9,894,094 Method, server, and system for automatically rating reputation of a web site
The present disclosure discloses a method, server, and system for automatically rating the reputation of a web site, wherein the method comprises: when a web...
US-9,894,093 Structuring data and pre-compiled exception list engines and internet protocol threat prevention
Blocking high-risk IP connections in real-time while allowing tailoring of an acceptable risk profile to match the security requirements of network resources....
US-9,894,092 Systems and methods for performing or creating simulated phishing attacks and phishing attack campaigns
A method for establishing a campaign for a simulated phishing attack includes receiving, via a campaign manager, specification of a plurality of parameters for...
US-9,894,091 Network with intelligent network jack
An intelligent jack provides a physical port identifier (PPID) to an upstream device, such as a network switch. The network switch receives the PPID on a...
US-9,894,090 Penetration test attack tree generator
Implementations of the present disclosure include methods, systems, and computer-readable storage mediums for receiving goal data and start-up information, the...
US-9,894,089 Emoji frequency detection and deep link frequency
Systems and methods are disclosed for generating term frequencies of known terms based on crowdsourced differentially private sketches of the known terms. An...
US-9,894,088 Data mining to identify malicious activity
Systems and methods may determine suspicious network traffic. A monitoring system comprising a processor in communication with a network may monitor network...
US-9,894,087 System and method for uploading and verifying a document
A computer implemented method may allow for the upload and verification of a document. In one aspect, the method may receive a file at a data server associated...
US-9,894,086 Managing security breaches in a networked computing environment
Approaches for managing security breaches in a networked computing environment are provided. A method includes detecting, by at least one computer device, a...
US-9,894,085 Systems and methods for categorizing processes as malicious
The disclosed computer-implemented method for categorizing processes as malicious may include (1) storing, in a security application that tracks event data for...
US-9,894,084 Illegal message destroyer
A communication apparatus for preventing the broadcasting of unauthorized messages on a broadcast bus network, the communication apparatus comprising: a first...
US-9,894,083 System for providing a secure video display
A system for providing a secure video display using a one-way data link. An input interface for receives a video stream signal. The one-way data link has an...
US-9,894,082 Method, apparatus, and computer program product for managing unwanted traffic in a wireless network
Various methods for unwanted traffic control in a wireless network are provided. One example method may include detecting an occurrence of unwanted content as...
US-9,894,081 Method and device for avoiding manipulation of a data transmission
A method and device for avoiding manipulation of a data transmission. A message containing a message authentication code is received at a processing unit, the...
US-9,894,080 Sequence hopping algorithm for securing goose messages
Embodiments of the present invention include methods and apparatuses for securing data transfer in power-system automation and smart grids. Embodiments of the...
US-9,894,079 Data loss prevention for mobile computing devices
System calls to a kernel of a mobile computing device are monitored. A particular system call is intercepted relating to input/output (I/O) functionality of the...
US-9,894,078 Location-based regulation of access
Generally, access to content may be regulated by receiving a content request initiated at a jukebox for access to a content selection, identifying a jukebox...
US-9,894,077 Situational awareness system security features
Security features a situational awareness system using location tracking information including requiring a security identifier, such as a password or a bio...
US-9,894,076 Data protection and sharing
In an approach to data protection and sharing, a computer retrieves social network data of a first user, and obtains a relationship grade between the first user...
US-9,894,075 Service to provide notification of mailing address changes
A method of managing access to a physical mailing address using a virtual mailing address is presented. The method includes: setting up a proxy system as a...
US-9,894,074 Method and system for extracting access control list
A method and system for extracting an access control list having a predetermined format from packets collected for a predetermined period of time, without...
US-9,894,073 Tracking management system for devices
A method for managing data consumption for a device. The method comprises a processor unit that monitors for a consumption request for data generated by the...
US-9,894,072 Inter-application management of user credential data
A system and apparatus for enhancing the functionality and utility of an authentication process for web applications is disclosed.
US-9,894,071 Visualization of access permission status
Queries regarding access permissions of users and rights to directories in a complex enterprise are executed in near real-time, using lookups to tables that...
US-9,894,070 Method and system for controlling access to shared devices
A non-transitory computer readable medium includes computer readable program code including instructions for snooping a message from a client device addressed...
US-9,894,069 Method and system for automatically managing secret application and maintenance
Secret application and maintenance policy data is generated for different classes of data. The class of data to be protected is determined and the secret...
US-9,894,067 Cross-region roles
Techniques for using short-term credentials with access roles across regions are described herein. A request to assume a role associated with resources in a...
US-9,894,066 Wireless firmware updates
Disclosed are methods and devices for securely updating firmware of locking devices. One method includes receiving a lock identifier from a locking device;...
US-9,894,065 Security management method and apparatus for group communication in mobile communication system
The present invention relates to a security management method and an apparatus for group communication when a terminal interacts and communicates with a mobile...
US-9,894,064 Biometric authentication
A biometric authentication system is disclosed that provides a trusted third party biometric authentication capability for independent confirmation of identity...
US-9,894,063 Anonymizing biometric data for use in a security system
An anonymized biometric representation of a target individual is used in a computer based security system. A detailed input biometric signal associated with a...
US-9,894,062 Object management for external off-host authentication processing systems
Systems and methods for providing object management for external off-host authentication processing systems are described. In some embodiments, a method may...
US-9,894,061 Method for booting and dumping a confidential image on a trusted computer system
A method for booting and dumping a confidential image on a trusted computer system. Embodiments of the present invention disclose deploying a secure boot image...
US-9,894,060 Machine-to-machine device and smartcard for use in the device
There is provided a method device for facilitating remote access capability. An exemplary device comprises a connection module for connecting the device to a...
US-9,894,059 Device association
A method of associating a first device with a second device is disclosed. The first device through a connected speaker broadcasts a request for association...
US-9,894,058 System and method of secure personal identification
A system and method for securely and automatically identifying users to an inquirer for purposes of obtaining user identifying information is described. The...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.