Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,005,1013 Method and apparatus for streaming multimedia content of server by using cache
A technology for a client streaming content of a server is provided. The technology includes a service installed in the client that receives the content from...
US-1,005,1012 Network entity selection
There are disclosed measures of network entity selection, for example including furnishing an identity of a network entity being pre-selected by a first network...
US-1,005,1011 System and method for integrating session initiation protocol communication in a telecommunications platform
A system and method for facilitating signaling and media communication at a communication platform that includes receiving a communication request to a...
US-1,005,1010 Method and system for automated incident response
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for implementing a response to one or more security incidents in...
US-1,005,1009 User agent to exercise privacy control management in a user-centric identity management system
A client-side user agent operates in conjunction with an identity selector to institute and exercise privacy control management over user identities managed by...
US-1,005,1008 Systems and methods involving aspects of hardware virtualization such as hypervisor, detection and interception...
Systems, methods, computer readable media and articles of manufacture consistent with innovations herein are directed to computer virtualization, computer...
US-1,005,1007 Network traffic control device, and security policy configuration method and apparatus thereof
A network traffic control device, and a security policy configuration method. The network traffic control device identifies a source, a destination, and an...
US-1,005,1006 Latency-based timeouts for concurrent security processing of network packets by multiple in-line network...
Latency-based timeouts are used for concurrent security processing by multiple in-line network security tools. A network system forwards secure network packets...
US-1,005,1005 Systems and methods for utilizing uni-directional inter-host communication in an air gap environment
A request message is generated with a trusted network entity executing trusted code on a first network layer. The request message to target a non-trusted...
US-1,005,1004 Evaluation system
An evaluation system includes a network device, a gateway device, a policy evaluation device, and first and second control devices. The network device copies a...
US-1,005,1003 Privacy enhancements for wireless devices
A wireless device can obtain a network information record from another device operating as a credential source. The network information record can include...
US-1,005,1002 Distributed VPN gateway for processing remote device management attribute based rules
Some embodiments provide novel methods for processing remote-device data messages in a network based on data-message attributes from a remote device management...
US-1,005,1001 Efficient and secure user credential store for credentials enforcement using a firewall
Techniques for an efficient and secure store for credentials enforcement using a firewall are disclosed. In some embodiments, a system, process, and/or computer...
US-1,005,1000 Efficient use of IPsec tunnels in multi-path environment
A system and method is provided for securing network traffic across a plurality of connections to a computing device without requiring each connection to have...
US-1,005,0999 Security threat based auto scaling
Technology is described for auto scaling computing resources in response to a cyber-attack in a service provider environment. The computing resources in the...
US-1,005,0998 Malicious message analysis system
A computerized technique is provided to analyze a message for malware by determining context information from attributes of the message. The attributes are...
US-1,005,0997 Method and system for secure delivery of information to computing environments
A method and system for protecting and repairing a current virtual asset from damage by potential security threats, according to one embodiment. The method and...
US-1,005,0996 Methods and systems for performing dynamic risk analysis using user feedback
A method of verifying an account login request may include identifying one or more Internet Protocol (IP) addresses as potentially malicious and, for each...
US-1,005,0995 Method and system for destroying browser-based memory corruption vulnerabilities
Client-less methods and systems destroy/break the predictive layout of, for example, a client computer memory. The methods and systems operate by injecting a...
US-1,005,0994 Method and computing device for processing data
Disclosed is a method for processing data, which includes: obtaining grade of a plug-in; assigning the plug-in into one of a plurality of categories according...
US-1,005,0993 Non-invasive whitelisting
In an example, there is disclosed a security architecture for enhanced, non-invasive whitelisting of executable objects. When an executable object tries to...
US-1,005,0992 Mitigating the impact from Internet attacks in a RAN using Internet transport
The present disclosure relates to methods and devices for mitigating the impact from Internet attacks in a Radio Access Network, RAN, using Internet transport....
US-1,005,0991 System and method for monitoring network vulnerabilities
A method for managing network vulnerabilities may include obtaining image data regarding a software container located on a network element. The image data may...
US-1,005,0990 Disaster scenario based inferential analysis using feedback for extracting and combining cyber risk information
Various embodiments of the present technology include methods of assessing risk of a cyber security failure in a computer network of an entity. Some embodiments...
US-1,005,0989 Inferential analysis using feedback for extracting and combining cyber risk information including proxy...
Various embodiments of the present technology include methods of assessing risk of a cyber security failure in one or more computer networks for an entity....
US-1,005,0988 Computer program product and apparatus for multi-path remediation
A system, method, and computer program product are provided for a database associating a plurality of device vulnerabilities to which computing devices can be...
US-1,005,0987 Real-time anomaly detection in a network using state transitions
Real-time anomaly detection in a network using state transitions. In one embodiment, a method may include identifying a sequence of messages sent between a...
US-1,005,0986 Systems and methods for traffic classification
Systems and methods of classifying network traffic may monitor network traffic. Monitored traffic may be compared with a control protocol template (CPT). When a...
US-1,005,0985 System for implementing threat detection using threat and risk assessment of asset-actor interactions
Disclosed is an approach to detect insider threats, by tracking unusual access activity for a specific user or computer with regard to accessing key assets over...
US-1,005,0984 Identifying requests that invalidate user sessions
An illustrative embodiment of a computer-implemented process for identifying a request invalidating a session excludes all marked logout requests of a Web...
US-1,005,0983 Communication system, receiving apparatus, receiving method, and computer program product
According to an embodiment, a communication system includes a transmitting apparatus and a receiving apparatus. The transmitting apparatus generates a...
US-1,005,0982 Systems and methods for reverse-engineering malware protocols
The disclosed computer-implemented method for reverse-engineering malware protocols may include (1) decrypting encrypted network traffic generated by a malware...
US-1,005,0981 Attack detection through signal delay monitoring
The present disclosure is directed to attack detection through signal delay monitoring. An example system may comprise at least one device including a physical...
US-1,005,0980 Enterprise reputations for uniform resource locators
There is disclosed in an example a computing apparatus configured to operate as an enterprise threat intelligence server, and including: a network interface...
US-1,005,0979 Executing a process based on validity information indicating one of validity and invalidity
The validity/invalidity of a credit card, an IC card storing electronic money, or the like is appropriately determined based on a blacklist. A terminal device...
US-1,005,0978 Systems and methods for securing command and data interfaces to sensors and devices through the use of a...
Various embodiments of the invention increase security of a network of interoperable devices. In certain embodiments, this is accomplished by a security module...
US-1,005,0977 Preventing misuse of code signing certificates
A method of authenticating or controlling a software application on an end user device. The method includes, at the end user device, downloading software...
US-1,005,0976 Frictionless multi-factor authentication system and method
A frictionless multi-factor authentication system and method ("FMFA system") that facilitates verification of the identity of a website user, registrant or...
US-1,005,0975 System and method for transaction security enhancement
A detection is made that a first entity residing on a mobile device is requesting authentication. The first entity resides in a first portion of the mobile...
US-1,005,0973 Implementing user-specified transaction parameters for transferring digital content items amongst users
The disclosure relates to a system and a method for implementing user-specified transaction parameters for transferring digital content items amongst users. The...
US-1,005,0972 Authority management system, server system, non-transitory computer-readable storage medium having stored...
A storage device of an example shop server stores, with respect to each of users of an information processing apparatus, user authority information indicating...
US-1,005,0971 Portal authentication method and access controller
In a portal authentication method, a DHCP request message sent by a terminal is received by an AC. In response to finding that a user of the terminal is an...
US-1,005,0970 System and method for data center security enhancements leveraging server SOCs or server fabrics
A data center security system and method are provided that leverage server systems on a chip (SOCs) and/or server fabrics. In more detail, server interconnect...
US-1,005,0969 Credential-free identification and authentication
A method of authenticating a user so that the user can access a website without entering a unique user credential. A user accesses a target and is presented...
US-1,005,0968 Method, apparatus, and system for access control of shared data
A method for access control of shared data includes a data access requester transmitting a request for accessing a shared data to a data storage dealer,...
US-1,005,0967 User identification based access control
A user's access to software applications installed on a device is limited by evaluating the context in which the user requests access to the application and...
US-1,005,0966 Systems and methods for providing a single click access to enterprise, SaaS and cloud hosted application
The present disclosure is directed to methods and systems of providing a user-selectable list of disparately hosted applications. A device intermediary to a...
US-1,005,0965 Confirming data accuracy in a distributed control system
A control network communication arrangement includes a second protocol embedded into a first protocol in a way that modules supporting the second protocol may...
US-1,005,0964 Method and system for securing data communicated in a network
According to a first aspect of the present disclosure, a method is conceived for securing data communicated in a network, the method comprising: receiving, by a...
US-1,005,0963 Securing remote authentication
Authenticating a secure session between a first user entity and an identity provider using a second user entity. The method includes receiving a request for a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.