Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,000,3614 Method, device, and storage medium for deep packet inspection control
The present disclosure discloses a Deep Packet Inspection (DPI) control method and device, and a storage medium. The method includes that: a traffic collection...
US-1,000,3613 Security inspection of massive virtual hosts for immutable infrastructure and infrastructure as code
A method and system are provided for performing a security inspection of a set of virtual images in a cloud infrastructure. The method includes merging the...
US-1,000,3612 Protection for computing systems from revoked system updates
A computing system may be protected from revoked system updates. A computing system receives an object and scans it for revocation updates to a security...
US-1,000,3610 System for tracking data security threats and method for same
An incident response system and method for tracking data security incidents in enterprise networks is disclosed. An Incident Manager application (IM) stores...
US-1,000,3608 Automated insider threat prevention
Techniques for automated insider threat prevention are disclosed. In some embodiments, a system, process, and/or computer program product for automated insider...
US-1,000,3607 Automated detection of session-based access anomalies in a computer network through processing of session data
A processing device in one embodiment comprises a processor coupled to a memory and is configured to obtain data characterizing a plurality of network sessions...
US-1,000,3606 Systems and methods for detecting security threats
The disclosed computer-implemented method for detecting security threats may include (1) detecting, by a software security program, a security incident at a...
US-1,000,3605 Detection of clustering in graphs in network security analysis
A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security...
US-1,000,3604 Authenticated communication between security devices
Apparatuses, computer readable media, and methods establishing and maintaining trust between security devices for distributing media content are provided. Two...
US-1,000,3603 Computer security based on hierarchical cache latency signature authentication
A processor is coupled to a hierarchical memory structure which includes a plurality of levels of cache memories that hierarchically cache data that is read by...
US-1,000,3602 Determining email authenticity
Monitoring across multiple-channels, used by multiple devices, to determine which email messages being sent to a user are solicited by the user. A broad...
US-1,000,3601 Security management application providing proxy for administrative privileges
Accessing a security enabled application may require certain access privileges that are not readily available or associated with the application at the time a...
US-1,000,3599 Method and terminal device for kid mode
The disclosure relates to a method and a terminal device for processing an application in a kid mode, and the disclosure belongs to the field of Internet...
US-1,000,3598 Model framework and system for cyber security services
Systems, computer program products, and methods are described herein for a model framework and system for cyber security services. The present invention is...
US-1,000,3597 Managing hardware reboot and reset in shared environments
In an environment such as a cloud computing environment where various guests can be provisioned on a host machine or other hardware device, it can be desirable...
US-1,000,3596 Device and method of setting or removing security on content
A device for removing security on content using biometric information includes a memory configured to store content on which security has been set based on...
US-1,000,3595 System and method for one time password authentication
An authentication system for providing an authentication service for a user accessing the same through a communication network includes a seed server for...
US-1,000,3594 Bank speech authentication
Authentication mechanisms are disclosed. For example, an enterprise associated number or a social security number (SSN) can be provided to enter a first level....
US-1,000,3593 Authentication apparatus, authentication method, and authentication system
Provided is an authentication apparatus easily realizing a one-time password system ensuring the security of a password without new equipment. The apparatus...
US-1,000,3592 Active directory for user authentication in a historization system
A user authentication system enables control of access to historian data through a historian application. The user authentication system creates a user...
US-1,000,3591 Secure permissioning of access to user accounts, including secure deauthorization of access to user accounts
A permissions management system is disclosed for enabling a user to securely authorize a third-party system to access user account data and initiate...
US-1,000,3590 Methods and systems for linking untrusted applications to server systems
An electronic device with a display detects an input in a user interface for a second application not associated with a server system. In response to detecting...
US-1,000,3589 Authentication and/or identification method in a communication network
The invention relates to a method for authenticating and/or identifying a device, a service, a person and/or money in a communication network, consisting of a...
US-1,000,3587 Authority transfer system, method, and authentication server system by determining whether endpoints are in...
An authority transfer system includes a determination unit configured to determine whether a domain of a service and a domain of an endpoint for allowing a...
US-1,000,3586 Method and device for generating a secret key
A method for generating a secret key via a reciprocal communication channel connecting a first communication node and a second communication node, wherein the...
US-1,000,3585 Systems, devices, and methods for preventing unauthorized access to storage devices
Embodiments include a storage device, comprising: a communication interface; data storage media; key storage media; and control logic configured to: receive a...
US-1,000,3584 Durable key management
Data is durably backed up for a limited amount of time. The data may be encrypted under a key and the key may be encrypted under a backup key. The backup key...
US-1,000,3583 Method and system for the supply of data, transactions and electronic voting
A method for supply of data, including generating a first digital certificate referred (empowerment certificate) signed with a first signing entity's electronic...
US-1,000,3582 Technologies for synchronizing and restoring reference templates
Generally, this disclosure describes technologies for restoring and/or synchronizing templates such as biometric templates to/among one or more client devices....
US-1,000,3581 Secure connection establishment
A wireless device implementing secure connection establishment may include at least one processor circuit. The at least one processor circuit may be configured...
US-1,000,3580 System and method for controlling features on a device
Trust between entities participating in an upgrade or enablement/disablement process is established and, to facilitate this remotely and securely, a highly...
US-1,000,3579 Method for making friends anonymously under instant messaging communications in order to protect a real...
After a friendship pairing process is executed according to a phone directory, send a friendship request message, create at least one first platform identity by...
US-1,000,3578 Anonymous sharing of microblog publication
Anonymity and confidentiality of information published from a microblogging platform, are preserved using randomly chosen relays (not related to the publisher...
US-1,000,3577 Secure transmission of local private encoding data
A method of secure transfer of local private encoding data between a first communication device and a second communication device, the first communication...
US-1,000,3576 Rule-based routing to resources through a network
Techniques for determining which resource access requests are handled locally at a remote computer, and which resource access requests are routed or...
US-1,000,3575 Network management system
There is provided a network management system using wireless network management devices each having a plurality of security policies. With the network...
US-1,000,3574 Probabilistic duplicate detection
A first unclassified uniform resource locator (URL) is received. An originally primary bloom filter is initialized. A second bloom filter is initialized. In...
US-1,000,3573 Behavior-based filters for signaling system number 7 networks
Concepts and technologies disclosed herein are directed to behavior-based filters for signaling system number 7 ("SS7") networks. According to one embodiment...
US-1,000,3572 Information processing apparatus and recording medium
An information processing apparatus includes plural network interfaces, a specifying unit, a setting unit, and an assigning unit. The plural network interfaces...
US-1,000,3571 Method and apparatus for implementing communication between virtual machines
In a method and an apparatus provided for implementing communication between virtual machines, a first switch receives an ARP response from an SDN controller,...
US-1,000,3570 Method and device for informing user address
A method and device for informing user address are disclosed. The method comprises: a defined network allocating, according to a user address prefix provided by...
US-1,000,3568 Dynamically assigning network addresses
Dynamically assigning network addresses provided by a server in a network to virtual network adapters in virtual machines, in which a reassignment of the...
US-1,000,3567 Systems and methods for providing DNS services
A system for providing a Domain Name System (DNS) service may include providing an agent for installation on a subscriber device. The subscriber device may be...
US-1,000,3566 Method and apparatus for assigning a logical address in a communication system
A method and a system for assigning a unique logical address to a mobile station in a cloud cell are provided. The method includes selecting, by the master base...
US-1,000,3565 Use of DNS information as trigger for dynamic IPV4 address allocation
A first request, to access a web site associated with a domain name, is obtained at a gateway router interposed between a local area network and an internet...
US-1,000,3564 Social networking media system and application
A system and method of regulating the display of digital content media in a social media platform is described. The method includes processing digital content...
US-1,000,3563 Integrated telephone applications on online social networks
In one embodiment, a method includes receiving, from a client system of a first user of an online social network, an unique identifier associated with a second...
US-1,000,3562 Electronic mail-based vehicle crew messaging
A system for exchanging messages between crews stationed on a vehicle and staff or 3.sup.rd parties stationed within at least one or more travel points. A...
US-1,000,3561 Conversation modification for enhanced user interaction
Technologies are described for modification of conversation presentation for enhanced user experience. Parts of the conversation may be detected and analyzed...
US-1,000,3560 Method and system for correlating social media conversations
A conversation correlation system is configured to associate social signals with conversations and group the conversations into topic clusters. The topic...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.