Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,002,7711 Situational intelligence
A method and apparatus is provided that includes techniques for providing complete solutions for role-based, rules-driven access enforcement, the techniques...
US-1,002,7710 NAT traversal for local IP access
A node is provided that includes a home base station collocated with a local gateway (L-GW) providing access to a local Internet Protocol (IP) network. The node...
US-1,002,7709 Generating a honey network configuration to emulate a target network environment
Techniques for generating a honey network configuration to emulate a target network environment are disclosed. In some embodiments, techniques for generating a...
US-1,002,7708 Login failure sequence for detecting phishing
A login page of an online service is received in a user computer. False credentials, such as a false user identifier (ID) and a false password, are entered into...
US-1,002,7707 System and method for anti-phishing authentication
A method and system for providing security against phishing attacks. The method can include receiving a login ID from a client, and providing an encrypted...
US-1,002,7706 Anti-spoofing protection in an automotive environment
To automatically identify an attempt at presenting falsified vehicle identifiers to portable devices, (i) a vehicle identifier reported by a vehicle with which...
US-1,002,7705 Apparatuses, methods and systems for a real-time cyber threat indicator verification mechanism
The real-time cyber threat indicator verification mechanism technology (hereinafter "TIVM") instantiates one or more virtual client emulators to access a source...
US-1,002,7704 Malicious program finding and killing device, method and server based on cloud security
Disclosed are a malicious program finding and killing device, method and server. The device comprises: one or more non-transitory computer readable medium...
US-1,002,7703 Managing rogue devices through a network backhaul
Managing rogue devices in a network through a network backhaul. A rogue device is detected in a network and a rogue device message that includes the rogue...
US-1,002,7702 Identification of malicious shortened uniform resource locators
Malicious shortened uniform resource locators are identified by collecting online messages in a computer. Senders and uniform resource locators are extracted...
US-1,002,7701 Method and system for reducing reporting of non-malicious electronic messages in a cybersecurity system
A client electronic device of an electronic message analysis system receives a user activation action indicating that a user has reported a message received at...
US-1,002,7700 Secure analysis application for accessing web resources via URL forwarding
Embodiments described herein may be directed to systems, methods, apparatuses, devices, computer program products, computer-executable instructions, and/or...
US-1,002,7699 Production process knowledge-based intrusion detection for industrial control systems
A system for threat detection in an industrial production environment comprises a programmable logic controller. This programmable logic controller includes a...
US-1,002,7698 Network protection system using linkographs
A method and apparatus for managing an attack on a computer system. A computer identifies actions taken by an adversary in the computer system and links...
US-1,002,7697 Detection of counterfeit and compromised devices using system and function call tracing techniques
Frameworks, methods, and systems for securing a smart grid are provided. A framework can include data collection, call tracing techniques, and preparing call...
US-1,002,7696 System and method for determining a threat based on correlation of indicators of compromise from other sources
According to one embodiment, an electronic device features processing circuitry and memory that includes a first logic and a second logic. When executed by the...
US-1,002,7695 Distributed traffic pattern analysis and entropy prediction for detecting malware in a network environment
Technologies are provided in embodiments to detect malware. Embodiments are to receive context information related to a potentially affected system, create a...
US-1,002,7694 Detecting denial of service attacks on communication networks
Systems and methods are described to enable detection of network attacks in communication networks. An attack detection system receives information regarding...
US-1,002,7693 Method, device and system for alerting against unknown malicious codes within a network environment
A method, a device, and a system for alerting against unknown malicious codes includes judging whether any suspicious code exists in the packet, recording a...
US-1,002,7692 Modifying evasive code using correlation analysis
An example computer-implemented method includes receiving, via a processor, an application to be tested, a set of intrusive monitoring capabilities, and a set...
US-1,002,7691 Apparatus and method for performing real-time network antivirus function
An apparatus and method for performing a real-time network antivirus function, which can perform, at high speed, real-time antivirus scanning on a transmission...
US-1,002,7690 Electronic message analysis for malware detection
An electronic message is analyzed for malware contained in the message. Text of an electronic message may be analyzed to detect and process malware content in...
US-1,002,7689 Interactive infection visualization for improved exploit detection and signature generation for malware and...
According to one embodiment, a malware detection and visualization system comprises one or more processors; and a storage module communicatively coupled to the...
US-1,002,7688 Method and system for detecting malicious and/or botnet-related domain names
A method and system of detecting a malicious and/or botnet-related domain name, comprising: reviewing a domain name used in Domain Name System (DNS) traffic in...
US-1,002,7687 Security level and status exchange between TCP/UDP client(s) and server(s) for secure transactions
According to one embodiment, a method includes informing a second peer about a security issue in one or more secure transmission control protocol/user datagram...
US-1,002,7686 Parameter adjustment for pattern discovery
Pattern discovery performed on event data may include selecting an initial set of parameters for the pattern discovery. The parameters may specify conditions...
US-1,002,7685 System for providing behavior information notification service and method for providing behavior information...
The present invention has the aim of providing a method of an activity information notification service in which a server can receive activity information from...
US-1,002,7684 Method and system for user credential security
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for receiving first user input by a primary device from a...
US-1,002,7683 Shared symmetric key encryption
A method for encrypting a message is described in which a public key and a private key are generated. The public key is encrypted using a shared symmetric key...
US-1,002,7682 Apparatus and method for detecting a cloned base station
Communications are established between a base station and a mobile unit. The mobile unit analyzes the content of at least some information received from the...
US-1,002,7681 Trusted device control messages
Two endpoint devices communicate with one another in a secure session using a secure protocol. Trusted control messages are passed upstream from one of the...
US-1,002,7680 Third-party authorization of user credentials
In one implementation, a client device receives a request from a user to output a representation for a credential of the user. In response to receiving the...
US-1,002,7679 Secondary asynchronous background authorization (SABA)
A system for identify threats to the security of an owner's electronic information by performing a secondary background authorization (SABA) that is transparent...
US-1,002,7678 Location-aware security configuration of peripheral devices
Provided are systems and methods for location-aware security configuration of peripheral devices. In various implementations, a location-aware peripheral device...
US-1,002,7677 Security access for a switch device
A method for providing user access to a network switch appliance, includes: receiving from a user a request to access configuration item for the network switch...
US-1,002,7676 Method and system for multi-user, multi-device login and content access control and metering and blocking
A method and system for multi-user, multi-device content access metering and control is provided. In one embodiment, a system implements a method such that in...
US-1,002,7675 Determining virtual adapter access controls in a computing environment
A control component of a computing environment initiates sending of request(s) over a network of the computing environment by an activated virtual adapter. The...
US-1,002,7674 Determining virtual adapter access controls in a computing environment
A control component of a computing environment initiates sending of request(s) over a network of the computing environment by an activated virtual adapter. The...
US-1,002,7673 System for controlled data exchange in a file hosting service environment
The present invention provides for managing and controlling data file transfer exchange to and from file hosting services, such as cloud-based file hosting...
US-1,002,7672 Access restriction device, on-board communication system and method for communication restriction
An access restriction device as well as an on-board communication system and a method for communication restriction, which prevent outside leakage of...
US-1,002,7671 Restricting access to content based on a posterior probability that a terminal signature was received from a...
A method by a content server includes maintaining a historical repository of terminal signature tuples received from computer terminals. Each of the terminal...
US-1,002,7670 Distributed authentication
A method can include receiving a request from a requestor to a given resource, which requestor is registered to access a set of one or more resources. The...
US-1,002,7669 Authorization to access a server in the cloud without obtaining an initial secret
A method and system provides access control for sensitive data. An access control system defines a plurality of access policies for gaining access to the...
US-1,002,7668 Information protecting apparatus
An information protecting apparatus includes: a storage configured to store data; a communication device configured to perform communication over a network by...
US-1,002,7667 Methods and apparatus for provisioning services which require a device to be securely associated with an account
Methods and apparatus for provisioning and providing services to devices on a local network are described. The methods and apparatus allow for the provisioning...
US-1,002,7666 Address validation using signatures
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for generating signed addresses. One of the methods includes...
US-1,002,7665 Method and system for tracking machines on a network using fuzzy guid technology
A method for querying a knowledgebase of malicious hosts numbered from 1 through N. The method includes providing a network of computers, which has a plurality...
US-1,002,7664 Secure simple enrollment
A first device having a first public key receives an identifier associated with a second device, and a second public key associated with the second device. The...
US-1,002,7663 Anonymizing biometric data for use in a security system
An anonymized biometric representation of a target individual is used in a computer based security system. A detailed input biometric signal associated with a...
US-1,002,7662 Dynamic user authentication
Systems, methods, and devices for dynamically authenticating a user are disclosed. A speech-controlled device captures a spoken command, and sends audio data...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.