Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,003,3764 Systems and methods for providing supply-chain trust networks
A computer-implemented method for providing supply-chain trust networks may include (1) identifying a computational partnership between a primary computing...
US-1,003,3763 Centralized mobile application management system and methods of use
An application launcher is disclosed for retrieving and permitting launch of multiple mobile applications through a single, secure authentication process, and a...
US-1,003,3762 Threat engagement and deception escalation
Provided are methods, network devices, and computer-program products for a network deception system. The network deception system can engage a network threat...
US-1,003,3761 System and method for monitoring falsification of content after detection of unauthorized access
In an unauthorized access detecting system, authentication information to be leaked outside is generated, and unauthorized access to a content using the...
US-1,003,3760 Secure wireless ranging
Embodiments for securely determining a separation distance between wireless communication devices is provided. These embodiments include receiving a measurement...
US-1,003,3759 System and method of threat detection under hypervisor control
A computing device is described that comprises one or more hardware processors and a memory communicatively coupled to the one or more hardware processors. The...
US-1,003,3758 System and method for operating protection services
A method and system for operating protection services to provide defense against cyber-attacks. The comprises generating a workflow scheme assigned to at least...
US-1,003,3757 Identifying malicious identifiers
Methods and systems for identifying malicious URIs. The system accepts a list of URIs as input and extracts features related to a given URI and uses the...
US-1,003,3756 Methods and systems for holistically attesting the trust of heterogeneous compute resources
A trust management system may be configured to compute a trust level for a compute resource based on a trust manifest corresponding to compute resource. Based...
US-1,003,3755 Securing web page content
Methods and apparatus are described for automatically modifying web page source code to address a variety of security vulnerabilities such as, for example,...
US-1,003,3754 Cyber threat monitor and control apparatuses, methods and systems
The cyber threat monitor and control apparatuses, methods and systems (hereinafter "CTMC") determines risk across a global Internet network graph model for...
US-1,003,3753 System and method for detecting malicious activity and classifying a network communication based on different...
One embodiment of a method for detecting a cyber-attack features first and second analyzes. The first analysis is conducted on content of a communication to...
US-1,003,3752 System for implementing threat detection using daily network traffic community outliers
A method and system for identifying insider threats within an organization is provided. The approach constructs an internal connectivity graph to identify...
US-1,003,3751 Dynamic traffic steering system and method in a network
The invention provides a security system and method for use in a communications network, said network comprising means to allow a plurality of devices to...
US-1,003,3750 Real-time regular expression search engine
In a malware detection device, first characters in a network traffic flow are compared with a plurality of entries within a ternary content addressable memory...
US-1,003,3749 Blocking intrusion attacks at an offending host
A method, apparatus, and program product are provided for protecting a network from intrusions. An offending packet communicated by an offending host coupled to...
US-1,003,3748 System and method employing structured intelligence to verify and contain threats at endpoints
A system and method to detect and contain threatening executable code by employing a threat monitor, verifier, endpoint agent, and a security information and...
US-1,003,3747 System and method for detecting interpreter-based exploit attacks
For one embodiment, a computerized method for detecting exploit attacks on an interpreter comprises configuring a virtual machine including a user mode and a...
US-1,003,3746 Detecting unauthorised changes to website content
Methods, apparatus, systems are provided for use in detecting unauthorized changes to websites of web operators. Authorized content policy sets for each of a...
US-1,003,3745 Method and system for virtual security isolation
A virtual security isolation method includes monitoring security status information of a plurality of virtual machines in a virtual LAN; determining whether the...
US-1,003,3744 System and method for certifying information
A method for certifying information about a subject entity, where the subject entity has trusted information associated with them, which is stored at one or...
US-1,003,3743 Methods and systems for a portable data locker
The embodiments provide for binding files to an external drive, a secured external drive, or portable data locker. The files are bound in order to help restrict...
US-1,003,3742 Information processing apparatus, control method of the information processing apparatus, storage medium, and...
An information processing apparatus for suitably registering policy information by considering an order of priority while reducing the burden on a user has the...
US-1,003,3741 Scalable and dynamic content obfuscation
A communication method and system according to the present invention generates a unique cryptographically secure URI in response to receiving a user post. The...
US-1,003,3740 Inter-application management of user credential data
A system and apparatus for enhancing the functionality and utility of an authentication process for web applications is disclosed.
US-1,003,3739 Clinical-path management server and clinical-path management system
A request distribution unit, an SO acquisition request reception unit, a creation request issuance unit, and an authorization unit are added to the...
US-1,003,3738 Methods, systems, and computer program products for providing communications services
An aspect of providing communications services to Internet Protocol-enabled devices includes storing, in an account of the subscriber, a globally unique...
US-1,003,3737 System and method for cross-cloud identity matching
A system and method for cross-cloud identity matching are provided. The method includes receiving at least one user identifier of a user of a client node;...
US-1,003,3736 Methods, systems, and computer readable media for remote authentication dial-in user service (radius) topology...
A method for remote authentication dial-in user service (RADIUS) topology hiding includes, at a RADIUS signaling router including at least one message...
US-1,003,3735 Communication apparatus, communication control method, and computer-readable recording medium
A communication apparatus includes a first communication unit that transmits connection data of a second network to an electronic device by way of a first...
US-1,003,3734 Apparatus management system, apparatus management method, and program
A apparatus management system includes: a forwarding node(s) that supplies identification information that uniquely identifies an individual terminal to a...
US-1,003,3733 Biometric metadata bureau
Biometric markers are seen as a secure and convenient way to control an individual's access to systems. The data that comprise these access controls, however,...
US-1,003,3732 Systems and methods for detecting cloning of security tokens
The disclosed computer-implemented method for detecting cloning of security tokens may include (i) logging, at an authentic security token, one-time-use...
US-1,003,3731 Protection from unfamiliar login locations
In one embodiment, a user authentication server may use geo-location tracking to determine whether to present an enhanced identity challenge. A communication...
US-1,003,3730 Cached credentials for offline domain join and login without local access to the domain controller
Techniques are described for performing an offline domain join and login on behalf of a computing device in order to enable the device to access corporate...
US-1,003,3729 Dynamic phrase base authentication system
Techniques are disclosed for authenticating a user. One technique includes receiving a passphrase at a server. The technique further includes parsing the...
US-1,003,3728 CAPTCHA challenge incorporating obfuscated characters
A method for determining if a user of a computer system is a human. A processor receives an indication that a computer security program is needed and acquires...
US-1,003,3727 Account sharing detection in online education
An education application delivers educational content including videos and documents to any computing device of a user via a student account. Each video or...
US-1,003,3726 Storage medium storing conference setting program and conference setting method
A conference setting method includes: displaying a first setting screen on a particular terminal configured to perform a setting operation of a teleconference,...
US-1,003,3725 Method, device, and system of accessing online accounts
Device, system, and method of accessing electronic mail. For example, a computerized method includes: receiving an identifier of an email account, and a...
US-1,003,3724 System of composite passwords incorporating hints
A system which generates composite passwords which can act to trigger a designated event; said system comprising a database having stored thereon at least first...
US-1,003,3723 Methods, devices, and computer readable storage devices for authenticating devices having non-SIM based clients
A communication device including a non-SIM based client is authenticated for accessing an IMS network. An internet protocol identity is received from the...
US-1,003,3722 Mobile device using shared digital certificate for different managed enterprise applications and related methods
A mobile device may include at least one memory and a processor cooperating with the at least one memory to store a plurality of managed enterprise applications...
US-1,003,3721 Credential translation
Systems and methods for credential translation are described. In some embodiments, an Information Handling System (IHS) may include: a host processor; an...
US-1,003,3720 Method and system for creating a certificate to authenticate a user identity
A method for creating a certificate to authenticate a user identity at a web browser includes receiving a login request including a first user identity for a...
US-1,003,3719 Mobile work platform for remote data centers
Access to an information technology resource may be provided to a user involved in a data center construction project. The information technology resource may...
US-1,003,3718 Pairing of base and detachable device
An apparatus and method for pairing a base and a detachable device. A query module queries a detachable device in response to the detachable device connecting...
US-1,003,3717 Terminal single sign-on configuration, authentication method, and system, and application service system thereof
The present invention provides a terminal single sign-on configuration, authentication method, and system. The terminal single sign-on authentication method...
US-1,003,3716 Method and device for publishing cross-network user behavioral data
The present invention relates to summarizing cross-network user behavioral data. The summarizing cross-network user behavioral data may particularly include...
US-1,003,3715 Password-less authentication system and method
A processor-implemented method for authenticating a login without a password. The method includes: receiving a request to authenticate a login, the request...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.