Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,004,4755 Integrated security management
A system for configuring a plurality of security devices is provided. The system is configured to automatically generate one or more policy definition files and...
US-1,004,4754 Polluting results of vulnerability scans
A security device may receive, from a server device, a response to a request. The request may be provided by an attacker device and may include a plurality of...
US-1,004,4753 Intercepting and supervising calls to transformed operations and objects
In an embodiment, a method comprises intercepting a first set of instructions from a server computer that define one or more objects and one or more original...
US-1,004,4752 Null-byte injection detection
A single system for detecting and blocking all cases of null-byte injection in all text data received for a network, before the text reaches potentially...
US-1,004,4751 Using recurrent neural networks to defeat DNS denial of service attacks
A system for mitigating network attacks is provided. The system includes a protected network including a plurality of devices. The system further includes one...
US-1,004,4750 Code labeling based on tokenized code samples
Disclosed herein are systems and methods for detecting script code malware and generating signatures. A plurality of script code samples are received and...
US-1,004,4749 System and method for cyber-physical security
A system and method is provided that facilitates cyber-physical security. The system may comprise a controller including at least one first processor; a monitor...
US-1,004,4748 Methods and systems for detecting compromised computers
A system and method for detecting a first network of compromised computers in a second network of computers, comprising: collecting Domain Name System (DNS)...
US-1,004,4747 Method, system, and computer program product for automatically mitigating vulnerabilities in source code
A method for automatically mitigating vulnerabilities in a source code of an application is provided in the present invention. The method includes the following...
US-1,004,4746 Synthetic cyber-risk model for vulnerability determination
A system, method, and device are presented for assessing a target network's vulnerability to a real cyberthreat based on determining policy-based synthetic...
US-1,004,4745 Systems for computer network security risk assessment including user compromise analysis associated with a...
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for computer network security risk assessment. One of the...
US-1,004,4744 Covert storage channel communication between computer security agent and security system
A processing device in one embodiment comprises a processor coupled to a memory and is configured to intercept a storage communication directed over a storage...
US-1,004,4743 Security scanning system and method
The present disclosure provides a computer-readable medium, method and system for determining security vulnerabilities for a plurality of application programs...
US-1,004,4742 Verification of computer system prior to and subsequent to computer program installation
Embodiments of the present invention provide a method, system, and computer program product for debugging a computer environment. In an embodiment of the...
US-1,004,4741 Information reporting for anomaly detection
In one embodiment, a first device in a network receives traffic flow data from a plurality of devices in the network. The traffic flow data from at least one of...
US-1,004,4740 Method and apparatus for detecting security anomalies in a public cloud environment using network activity...
The disclosed computer-implemented method for detecting security anomalies in a public cloud environment using network activity monitoring, application...
US-1,004,4739 Frequency-based reputation
In an example embodiment, there is disclosed an anti-malware system and method that analyzes applications and other executable objects at the subroutine level....
US-1,004,4738 Integrated network intrusion detection
Intrusion preludes may be detected (including detection using fabricated responses to blocked network requests), and particular sources of network ...
US-1,004,4737 Detection of beaconing behavior in network traffic
A method for detecting beaconing behavior includes preprocessing network records to identify candidate source and destination pairs for detecting beaconing...
US-1,004,4736 Methods and apparatus for identifying and characterizing computer network infrastructure involved in malicious...
In some embodiments, an apparatus includes a memory and a processor operatively coupled to the memory. The processor is configured to receive a set of domain...
US-1,004,4735 System and method for authentication of electronic communications
A system and method is disclosed for validating the authenticity of communications between users using message transmission systems. The system is configured to...
US-1,004,4734 Provisioning work environments on personal mobile devices
A virtual business mobile device can be provisioned on a personal mobile device, by binding a mobile application for provisioning the business mobile device to...
US-1,004,4733 System and method for controlling a rendering device based upon detected user proximity
A method is disclosed for generating a media playlist by a media rendering device having a proximity detector. The proximity detector detects a first...
US-1,004,4732 System and method for targeted messaging, workflow management, and digital rights management for geofeeds
The disclosure relates to systems and methods for targeted messaging, workflow management, and digital rights management for geofeeds, including content that is...
US-1,004,4731 System and method for validating users using social network information
A system and method uses any or all of information of a user and/or user's activity at a second web site, information of the user's friends or other connections...
US-1,004,4730 Methods, systems, and articles of manufacture for implementing adaptive levels of assurance in a financial...
Disclosed are methods, systems, and articles of manufacture for implementing adaptive levels of authentication assurance according to sensitivity or criticality...
US-1,004,4729 Analyzing requests to an online service
Computerized methods enable automatic monitoring of requests to an online service and apply access restrictions, as appropriate, to servicing of requests in...
US-1,004,4728 Endpoint segregation to prevent scripting attacks
A secure and efficient technique to prevent cross-site scripting attacks based on segregating the content within a given content page among independent...
US-1,004,4727 Authenticating a request for an electronic transaction
In an approach for authenticating a request for an electronic transaction, a computer determines whether a request from a user for an electronic transaction is...
US-1,004,4726 Systems and methods for detecting and reacting to malicious activity in computer networks
Described herein are systems and methods for performing potentially malicious activity detection operations. Embodiments may include receiving data associated...
US-1,004,4725 Controlling access to online resources using device validations
Systems and methods of verifying a user are provided. In particular, a request to engage in a verification process to gain access to an online resource can be...
US-1,004,4724 Automatic internet activation for registered user device upon detecting its device identifier on network of...
A service controller includes a network interface for coupling to a local area network of a hospitality establishment, and one or more processors coupled to the...
US-1,004,4723 Principal/user operation in the context of a tenant infrastructure
A user is authenticated based on user credentials obtained from a request in response to the request received from a client device. A plurality of tenants is...
US-1,004,4722 Behavioral multi-level adaptive authorization mechanisms
Implementations of the present disclosure include methods, systems, and computer-readable storage mediums for receiving a support request from a requester, and...
US-1,004,4721 Communication device authentication in small cell network
A technique is provided for authenticating a first communication device located in a coverage area of a base station. The base station receives a localization...
US-1,004,4720 Mashup method, computer-readable recording medium, and terminal
A mashup method is disclosed. The Web APIs which the Web application uses are specified by analyzing descriptions of drivers used to access the multiple Web...
US-1,004,4719 Client application based access control in cloud security systems for mobile devices
Systems and methods, implemented by one or more nodes in a cloud-based security system, for enforcing application-based control of network resources include...
US-1,004,4718 Authorization in a distributed system using access control lists and groups
In a method of controlling sharing of an object between entities in a distributed system, a processor will identify an object and generate an access control...
US-1,004,4717 Dynamic extensible application server management
A real-time plugin command-driven administrative control interface is provided that implements direct real-time command-driven control of operational...
US-1,004,4716 Authorizing access to an application library
To prevent malicious code from accessing security sensitive functions implemented in a private portion of an application, accesses to the private portion are...
US-1,004,4714 Device authentication with mac address and time period
In an approach to device authentication, one or more processors receive a security policy comprising at least a first media access control ("mac") address and a...
US-1,004,4713 OpenID/local openID security
Identity management, user authentication, and/or user access to services on a network may be provided in a secure and/or trustworthy manner, as described...
US-1,004,4712 Authentication based on gaze and physiological response to stimuli
A user may be authenticated to access an account, computing device, or other resource based on the user's gaze pattern and neural or other physiological...
US-1,004,4711 User middle finger--wrist biometric authentication apparatus
Disclosed herein is a user authentication apparatus that captures images of the back and/or the palm of a hand using both a mobile camera, such as a smart phone...
US-1,004,4710 Device and method for validating a user using an intelligent voice print
A method of validating a user for accessing a secure system comprising selecting a picture that is prompted to the user, generating, through the user, an...
US-1,004,4709 Multi-device single network sign-on
Methods, systems and computer readable media for multi-device single network sign-on are described. For example, a method can include authenticating a first...
US-1,004,4708 Method and apparatus for controlling authentication state of electronic device
A method for controlling an authentication state of an electronic device according to various embodiments of the present disclosure includes authenticating user...
US-1,004,4707 Token-based access control
Implementations of the present disclosure relate to methods, systems and products for access control. In one implementation, a computer-implemented method is...
US-1,004,4706 Encryption methods and apparatus
The embodiments discussed herein relate to updating and encrypting passwords for one or more computing devices. The computing devices can be associated with a...
US-1,004,4705 Session management for internet of things devices
The disclosure is directed to security management in communications involving computing devices, e.g. Internet of Things (IoT) devices. An IoT device can...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.