Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,005,1003 Privacy enhancements for wireless devices
A wireless device can obtain a network information record from another device operating as a credential source. The network information record can include...
US-1,005,1002 Distributed VPN gateway for processing remote device management attribute based rules
Some embodiments provide novel methods for processing remote-device data messages in a network based on data-message attributes from a remote device management...
US-1,005,1001 Efficient and secure user credential store for credentials enforcement using a firewall
Techniques for an efficient and secure store for credentials enforcement using a firewall are disclosed. In some embodiments, a system, process, and/or computer...
US-1,005,1000 Efficient use of IPsec tunnels in multi-path environment
A system and method is provided for securing network traffic across a plurality of connections to a computing device without requiring each connection to have...
US-1,005,0999 Security threat based auto scaling
Technology is described for auto scaling computing resources in response to a cyber-attack in a service provider environment. The computing resources in the...
US-1,005,0998 Malicious message analysis system
A computerized technique is provided to analyze a message for malware by determining context information from attributes of the message. The attributes are...
US-1,005,0997 Method and system for secure delivery of information to computing environments
A method and system for protecting and repairing a current virtual asset from damage by potential security threats, according to one embodiment. The method and...
US-1,005,0996 Methods and systems for performing dynamic risk analysis using user feedback
A method of verifying an account login request may include identifying one or more Internet Protocol (IP) addresses as potentially malicious and, for each...
US-1,005,0995 Method and system for destroying browser-based memory corruption vulnerabilities
Client-less methods and systems destroy/break the predictive layout of, for example, a client computer memory. The methods and systems operate by injecting a...
US-1,005,0994 Method and computing device for processing data
Disclosed is a method for processing data, which includes: obtaining grade of a plug-in; assigning the plug-in into one of a plurality of categories according...
US-1,005,0993 Non-invasive whitelisting
In an example, there is disclosed a security architecture for enhanced, non-invasive whitelisting of executable objects. When an executable object tries to...
US-1,005,0992 Mitigating the impact from Internet attacks in a RAN using Internet transport
The present disclosure relates to methods and devices for mitigating the impact from Internet attacks in a Radio Access Network, RAN, using Internet transport....
US-1,005,0991 System and method for monitoring network vulnerabilities
A method for managing network vulnerabilities may include obtaining image data regarding a software container located on a network element. The image data may...
US-1,005,0990 Disaster scenario based inferential analysis using feedback for extracting and combining cyber risk information
Various embodiments of the present technology include methods of assessing risk of a cyber security failure in a computer network of an entity. Some embodiments...
US-1,005,0989 Inferential analysis using feedback for extracting and combining cyber risk information including proxy...
Various embodiments of the present technology include methods of assessing risk of a cyber security failure in one or more computer networks for an entity....
US-1,005,0988 Computer program product and apparatus for multi-path remediation
A system, method, and computer program product are provided for a database associating a plurality of device vulnerabilities to which computing devices can be...
US-1,005,0987 Real-time anomaly detection in a network using state transitions
Real-time anomaly detection in a network using state transitions. In one embodiment, a method may include identifying a sequence of messages sent between a...
US-1,005,0986 Systems and methods for traffic classification
Systems and methods of classifying network traffic may monitor network traffic. Monitored traffic may be compared with a control protocol template (CPT). When a...
US-1,005,0985 System for implementing threat detection using threat and risk assessment of asset-actor interactions
Disclosed is an approach to detect insider threats, by tracking unusual access activity for a specific user or computer with regard to accessing key assets over...
US-1,005,0984 Identifying requests that invalidate user sessions
An illustrative embodiment of a computer-implemented process for identifying a request invalidating a session excludes all marked logout requests of a Web...
US-1,005,0983 Communication system, receiving apparatus, receiving method, and computer program product
According to an embodiment, a communication system includes a transmitting apparatus and a receiving apparatus. The transmitting apparatus generates a...
US-1,005,0982 Systems and methods for reverse-engineering malware protocols
The disclosed computer-implemented method for reverse-engineering malware protocols may include (1) decrypting encrypted network traffic generated by a malware...
US-1,005,0981 Attack detection through signal delay monitoring
The present disclosure is directed to attack detection through signal delay monitoring. An example system may comprise at least one device including a physical...
US-1,005,0980 Enterprise reputations for uniform resource locators
There is disclosed in an example a computing apparatus configured to operate as an enterprise threat intelligence server, and including: a network interface...
US-1,005,0979 Executing a process based on validity information indicating one of validity and invalidity
The validity/invalidity of a credit card, an IC card storing electronic money, or the like is appropriately determined based on a blacklist. A terminal device...
US-1,005,0978 Systems and methods for securing command and data interfaces to sensors and devices through the use of a...
Various embodiments of the invention increase security of a network of interoperable devices. In certain embodiments, this is accomplished by a security module...
US-1,005,0977 Preventing misuse of code signing certificates
A method of authenticating or controlling a software application on an end user device. The method includes, at the end user device, downloading software...
US-1,005,0976 Frictionless multi-factor authentication system and method
A frictionless multi-factor authentication system and method ("FMFA system") that facilitates verification of the identity of a website user, registrant or...
US-1,005,0975 System and method for transaction security enhancement
A detection is made that a first entity residing on a mobile device is requesting authentication. The first entity resides in a first portion of the mobile...
US-1,005,0973 Implementing user-specified transaction parameters for transferring digital content items amongst users
The disclosure relates to a system and a method for implementing user-specified transaction parameters for transferring digital content items amongst users. The...
US-1,005,0972 Authority management system, server system, non-transitory computer-readable storage medium having stored...
A storage device of an example shop server stores, with respect to each of users of an information processing apparatus, user authority information indicating...
US-1,005,0971 Portal authentication method and access controller
In a portal authentication method, a DHCP request message sent by a terminal is received by an AC. In response to finding that a user of the terminal is an...
US-1,005,0970 System and method for data center security enhancements leveraging server SOCs or server fabrics
A data center security system and method are provided that leverage server systems on a chip (SOCs) and/or server fabrics. In more detail, server interconnect...
US-1,005,0969 Credential-free identification and authentication
A method of authenticating a user so that the user can access a website without entering a unique user credential. A user accesses a target and is presented...
US-1,005,0968 Method, apparatus, and system for access control of shared data
A method for access control of shared data includes a data access requester transmitting a request for accessing a shared data to a data storage dealer,...
US-1,005,0967 User identification based access control
A user's access to software applications installed on a device is limited by evaluating the context in which the user requests access to the application and...
US-1,005,0966 Systems and methods for providing a single click access to enterprise, SaaS and cloud hosted application
The present disclosure is directed to methods and systems of providing a user-selectable list of disparately hosted applications. A device intermediary to a...
US-1,005,0965 Confirming data accuracy in a distributed control system
A control network communication arrangement includes a second protocol embedded into a first protocol in a way that modules supporting the second protocol may...
US-1,005,0964 Method and system for securing data communicated in a network
According to a first aspect of the present disclosure, a method is conceived for securing data communicated in a network, the method comprising: receiving, by a...
US-1,005,0963 Securing remote authentication
Authenticating a secure session between a first user entity and an identity provider using a second user entity. The method includes receiving a request for a...
US-1,005,0962 Determining user authentication requirements along a continuum based on a current state of the user and/or the...
Systems, apparatus, methods, and computer program products are provided for determining a user's authentication requirements/credentials for function requiring...
US-1,005,0961 Network device authentication based on hashing content of sequential messages
A method, performed by an authentication processor of a first network device, includes receiving a first message through a network interface circuit from a...
US-1,005,0960 Methods and systems of adding a user account to a device
A method of adding a user account to an unassociated device may include detecting, by an associated device that is associated with a user account, an audio...
US-1,005,0959 Synthetic genomic variant-based secure transaction devices, systems and methods
Various devices, systems, structures and methods are disclosed related to securely authorizing a transaction by synchronizing digital genomic data with...
US-1,005,0958 Validating biometrics without special purpose readers
To validate a user's identity a network validation server receives a smartphone image of a preexisting user credential, including both a user biometric and a...
US-1,005,0957 Smart card redirection
A processing device of a server executing an application establishes a network connection to a client device having a smart card, detects a program call...
US-1,005,0956 System architecture and method for guaranteeing network information security
Disclosed is a system architecture and method for guaranteeing network information security, the system architecture including the Internet, a program...
US-1,005,0955 Efficient start-up for secured connections and related services
One embodiment of the present invention includes an approach for efficient start-up for secured connections and related services. A client machine receives, via...
US-1,005,0954 Secure automated device configuration and management
A method may include performing secure device configuration, via a configuration service manager device, for a SIP user device. The method includes monitoring,...
US-1,005,0953 Extending a federated graph with third-party data and metadata
Technologies are described herein for extending a federated graph with third-party data or metadata. A federated facet provider service registers with a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.