Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,003,8716 System and method for regulating barcode data injection into a running application on a smart device
A system and method for regulating the injection of barcode scan data into an application running on a smart device is provided. The system includes a running...
US-1,003,8715 Identifying and mitigating denial of service (DoS) attacks
A server receives a SYN packet and generates a SYN packet signature from the SYN packet. The server generates multiple aggregate signatures for the SYN packet...
US-1,003,8714 Data center redundancy in a network
Aspects of the present disclosure involve systems, methods, computer program products, and the like, for data center redundancy in relation to a computer...
US-1,003,8713 Predicted attack detection rates along a network path
In one embodiment, attack detectability metrics are received from nodes along a path in a network. The attack detectability metrics from the nodes along the...
US-1,003,8712 Method and apparatus for dynamic detection of geo-location obfuscation in client-server connections through an...
Methods and systems are disclosed for dynamic detection of fraudulent client connections to a server, in which, for example, the connection is made using an...
US-1,003,8711 Penetration testing of a networked system
Methods and systems for penetration testing of a networked system comprising a set of network-nodes by a penetration testing system (e.g. to enforce first...
US-1,003,8710 Efficient identification of log events in enterprise threat detection
A first set of log entries is identified. A plurality of log entry classes occurring in the first set of log entries is determined. Each log entry in a given...
US-1,003,8709 Computer network defense system employing multiplayer gaming functionality
A computerized network defense system includes a user interface component for displaying an interactive landscape to an agent, including a graphical...
US-1,003,8708 Geo-mapping system security events
A particular security event is identified that has been detected as targeting a particular computing device included in a particular computing system. A...
US-1,003,8707 Rarity analysis in network security anomaly/threat detection
A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security...
US-1,003,8706 Systems, devices, and methods for separating malware and background events
Embodiments relate to systems, devices, and computing-implemented methods for separating malware and background events to classify malware based on traffic data...
US-1,003,8705 System and method for performing intrusion detection in an information handling system
A method and information handling system (IHS) for identifying communication threats in an IHS. The method includes triggering a board management controller...
US-1,003,8704 Systems and methods for correlating and distributing intrusion alert information among collaborating computer...
Systems and methods for correlating and distributing intrusion alert information among collaborating computer systems are provided. These systems and methods...
US-1,003,8703 Rating network security posture and comparing network maliciousness
Embodiments are disclosed for profiling network-level malicious activity. Profiling embodiments include observing malicious activity, representing such activity...
US-1,003,8702 Server drift monitoring
Threat detection is improved by monitoring variations in observable events and correlating these variations to malicious activity. The disclosed techniques can...
US-1,003,8701 Method for detecting security error in mobile telecommunications system and device of mobile telecommunications
According to one embodiment, a method of performing a re-establishment procedure in a mobile communication system includes: receiving at least one packet data...
US-1,003,8700 Establishing trustworthiness of devices in the internet of things (IoT) to control inter-device communication
Technology for establishing trustworthiness of devices in the Internet of Things (IoT), and for controlling communications between devices based on the...
US-1,003,8699 Management device, management system, and management method
A management device manages information of a task having been executed by users cooperatively. An electronic data access unit accesses electronic data by using...
US-1,003,8698 External platform extensions in a multi-tenant environment
Methods and systems are described for allowing third party developers to add extensions to a cloud service provider's software as a service (SaaS) services by...
US-1,003,8697 Determining similarity between security rules based on weighted comparisons of their rule parameters
First and second security rules are accessed in a configuration file. Comparison points for comparing the first and second security rules are determined. Each...
US-1,003,8696 System and method for controlling access to enterprise networks
A method in an access control server of controlling access to an enterprise network includes: receiving, at the access control server from a client computing...
US-1,003,8695 Remotely deauthenticating a user from a web-based application using a centralized login server
Provided is a process including: relaying, with a server at a first domain, at least part of a plurality application-layer messages between a client web browser...
US-1,003,8694 System and method for security mode-based authorization for data management operations in a multi-tenant...
According to one embodiment, a request is received from a remote device of a user for performing a data management operation from source data represented by a...
US-1,003,8693 Facilitating secure network traffic by an application delivery controller
Facilitation of secure network traffic by an application delivery controller is provided herein. In some examples, a method includes: (a) receiving a data...
US-1,003,8692 Characteristics of security associations
Authentication of a user or a wireless transmit/receive unit may be based on an obtained measure of authentication strength, which may referred to as an...
US-1,003,8691 Authorization of a financial transaction
An iris biometric recognition module includes technology for capturing images of an iris of an eye of a person, whether the person is moving or stationary. The...
US-1,003,8690 Multifactor authentication processing using two or more devices
A first user request may be received to access a particular resource. A first authentication credential from a first client device may be received based on a...
US-1,003,8689 Dynamic password generation
Aspects of the present disclosure relate to dynamically generating a security challenge and corresponding password. A set of user activity data may be obtained...
US-1,003,8688 Web based system that allows users to log into websites without entering username and password information
Internet user passwords are securely managed. A formation component can enable a user to create a master account on a web server, the master account comprising...
US-1,003,8687 Devices and control method thereof and application login system
The present invention relates to a terminal and a control method thereof which automatically log in to an application, which is installed on a common smart...
US-1,003,8686 Hybrid device and person based authorization domain architecture
This invention relates to a system and a method of generating an Authorized Domain (AD) by selecting a domain identifier, and binding at least one person (P1,...
US-1,003,8685 Service request authentication method and apparatus
Methods and apparatuses for service request authentication are disclosed to prevent a terminal or a first server that does not sign an agreement with a gateway...
US-1,003,8684 Relationship-based authorization
Methods and apparatus, including computer program products, related to relationship-based authorization. In general, data characterizing a request for...
US-1,003,8683 Authentication of service requests using a communications initiation feature
Described are computer-based methods and apparatuses, including computer program products, for facilitating communications initiated through a social networking...
US-1,003,8682 System and method for communicating between distributed applications and databases
A JBoss application may allow for a distributed application hosted on a JBoss application server to connect to a hierarchical type database. Additionally, the...
US-1,003,8681 Method for managing an access from a remote device to data accessible from a local device and corresponding system
The invention relates to a method for managing an access from a remote device to data and/or at least one resource accessible from a local device. The local...
US-1,003,8679 Centralized secure device pairing
Various embodiments are generally directed to pairing computing devices for collaborative interaction via a network through a centralized secure device pairing...
US-1,003,8678 System and method to enable PKI- and PMI- based distributed locking of content and distributed unlocking of...
A central server configured with an Attribute Authority ("AA") acting as a Trusted Third Party mediating service provider and using X.509-compatible PKI and...
US-1,003,8677 Digital security bubble
A digital security bubble encapsulation is disclosed. A public key and a device identifier of at least one recipient is requested from a first server. A message...
US-1,003,8676 Call encryption systems and methods
Techniques described herein may be used to encrypt a telephone call between users. User devices (e.g., smart phones) may be connected to encryption relay...
US-1,003,8675 Storing decrypted body of message and key used to encrypt and decrypt body of message
A non-transitory computer-readable storage medium comprising instructions stored thereon. When executed by at least one processor, the instructions may be...
US-1,003,8674 Secure mobile data sharing
Implementations of the present disclosure include methods, systems, and computer-readable storage mediums for providing secure mobile data sharing. Actions can...
US-1,003,8673 On-premises data access and firewall tunneling
A system and method for tunneling through a network separation device such as a firewall or a Network Address Translator including a first server receiving an...
US-1,003,8672 Virtual private network sessions generation
A system for generating virtual private network (VPN) sessions from VPN server log messages uses and displays a VPN sessions table in which each row contains...
US-1,003,8671 Facilitating enforcement of security policies by and on behalf of a perimeter network security device by...
Systems and methods for managing network traffic by a perimeter network security device based on internal network traffic or configuration information are...
US-1,003,8670 System and method for controlling access to a plant network
A system for centrally controlling access by computers in a corporate network to a plant network that runs plant applications. The system includes an access...
US-1,003,8669 Path control system, control device, and path control method
To provide a path control system, a control device and a path control method that can achieve reduction of the load on a gateway device, there are included a...
US-1,003,8668 Computerized system and method for handling network traffic
Methods and systems for processing network content associated with multiple virtual domains are provided. According to one embodiment, a service daemon process...
US-1,003,8667 Method and system of authentication and OTA registration of a new user without a SIM card in multi-operator...
In a preferred aspect of the present invention there is disclosed method of authentication and over-the-air (OTA) registration of a new user without a...
US-1,003,8666 Configuration services
Measures, including methods, systems and non-transitory computer-readable storage mediums, for providing a Domain Name Service (DNS) configuration service for...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.