Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,007,5456 Systems and methods for detecting exploit-kit landing pages
The disclosed computer-implemented method for detecting exploit-kit landing pages may include detecting an attempt to access a web page via a computing device....
US-1,007,5455 Zero-day rotating guest image profile
According to one embodiment, a threat detection platform features a housing, a communication interface, a processor coupled to the communication interface, and...
US-1,007,5454 Using telemetry data to detect false positives
Telemetry data concerning multiple samples convicted as malware by different endpoints is tracked over time. During a period of time in which telemetry data...
US-1,007,5453 Detecting suspicious files resident on a network
A device may determine a first set of hash values corresponding to a first set of files stored by a plurality of client devices. The device may analyze...
US-1,007,5452 Distributed content uploading and validation
In accordance with one or more embodiments, aspects of the disclosure provide efficient, effective, and convenient ways of uploading and authenticating content....
US-1,007,5451 Methods and systems for user opt-in to data privacy agreements
A method for controlling access to a user's personal information includes obtaining, from an application executing on a device of a user of the application,...
US-1,007,5450 One time use password for temporary privilege escalation in a role-based access control (RBAC) system
Techniques to facilitate temporary escalation of access privileges for a control program associated with a machine system in an industrial automation...
US-1,007,5449 Reducing latency
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for reducing latency in network communications and data...
US-1,007,5448 Password setup management
A technique is disclosed to manage password setup such as may be integrated within a login authentication setup process. In response to an initiated password...
US-1,007,5447 Secure distributed device-to-device network
An electronic device in a device-to-device network of a user of the electronic device communicates with a group of one or more other instances of the electronic...
US-1,007,5446 Systems and methods for providing an integrated identifier
Embodiments described herein provide systems and methods to streamline the mechanism by which data users access differently regulated data through the use of...
US-1,007,5445 Methods and devices for permission management
Methods and devices are provided for permission management. In the method, the terminal obtains fingerprint information of a user based on a touch operation on...
US-1,007,5444 Information processing system, user terminal, and data processing device
An information processing system, comprising a user terminal that sends a process target data designated by a user to a remote storage system via a network, the...
US-1,007,5443 System, apparatus and method for stateful application of control data in a device
In one embodiment, a system includes a processor having a first logic to execute in a trusted execution environment, and a storage to store a plurality of...
US-1,007,5442 Methods and apparatus to grant access to cloud computing resources
An example method to grant authorization to a user for accessing a cloud computing resource involves receiving a first message from a user via a social media...
US-1,007,5441 Method for transferring authorization information, relay device, and server
Embodiments of the present application provide a method for transferring authorization information, a relay device, and a server. The method includes:...
US-1,007,5440 Multi-party secure global attestation
In authentication in global attestation, a server receives a request for access to a location based service. The server establishes a connection with a first...
US-1,007,5439 Programmable format for securely configuring remote devices
A method is provided in which a development environment sends commands to an on-premises device that are signed by both (a) development environment and by (b)...
US-1,007,5438 Methods and systems for server-initiated activation of device for operation with server
Methods and systems for enabling activation of a wireless communication device to operate with a server on a wireless communication network. An activation...
US-1,007,5437 Secure authentication of a user of a device during a session with a connected server
A computer-implemented method for secure authentication of a user to a service for executing a transaction, the method being implemented in a system including a...
US-1,007,5436 Information processing apparatus, information processing method, and non-transitory computer readable medium
An information processing apparatus includes an authenticating section, a detecting section, and a processor. The authenticating section authenticates a user....
US-1,007,5435 Device deregistration using forward-chaining encryption
A fulfillment service may securely register and deregister third party electronic devices within a fulfillment environment. The fulfillment service may receive...
US-1,007,5434 Authenticating to a network via a device-specific one time password
Generally, this disclosure describes a method and system for authenticating to a network via a device-specific one-time password. A method in an embodiment may...
US-1,007,5433 Allowing a user to easily collaborate with users from outside organizations where the user has visitor status...
A method, system and computer program product for allowing a user to easily collaborate with users from different organizations. In response to authenticating...
US-1,007,5432 Updating stored passwords
A device may include an authentication server and a server. The authentication server may receive a first form of a password from a client device in accordance...
US-1,007,5431 Image capture to enforce remote agent adherence
A method, a system, and computer readable medium comprising instructions for image capture to enforce remote agent adherence. The method comprises a first...
US-1,007,5430 Method and system for efficient password input
Embodiments of the present application disclose a method for receiving password input from a user. During operation, the system receives, by a computing device,...
US-1,007,5429 Policy-based compliance management and remediation of devices in an enterprise system
The present disclosure relates generally to managing compliance of remote devices that access an enterprise system. More particularly, techniques are disclosed...
US-1,007,5428 Time check method and base station
A time check method and a base station are provided. The base station receives an authentication interaction message sent by an authentication interaction...
US-1,007,5427 Resetting authentication tokens based on an implicit credential in response to an authentication request...
For resetting authentication tokens based on implicit credentials, a method is disclosed that includes receiving, by use of a processor, an authentication...
US-1,007,5426 Web-based single sign-on with form-fill proxy application
Web-based single sign-on can enable a user to log in to a single interface (such as through a web browser or thin client) and then provide SSO services to the...
US-1,007,5425 Verifiable log service
A logging service maintains an interdependent series of hash values for log entries submitted to the logging service by one or more clients. The logging service...
US-1,007,5424 Application authentication wrapper
Disclosed are various approaches for implementing an application authentication wrapper. An authentication request, such as a Kerberos request, is created for...
US-1,007,5423 Provisioning for smart navigation services
Techniques for provisioning a smart navigation service are presented. The provisioning can be performed by a name owner, by the smart navigation service itself,...
US-1,007,5422 Device communication environment
A computing environment is disclosed that receives from devices requests directed toward services accessible in the environment, and that forwards ...
US-1,007,5421 Vehicle wireless internet security
Methods, systems, and computer program products for vehicle wireless internet security are provided. A connection request is received from a mobile device. A...
US-1,007,5420 Shared circuit switched security context
Creation of update of a security context between user equipment and MSC/VLR (Mobile Switching Centre/Visitor Location Register) for circuit switched domain...
US-1,007,5419 Method and device to protect a decrypted media content before transmission to a consumption device
A method to protect a media content encrypted by a media content key, said method being carried out by a security module embedded into a reception device and...
US-1,007,5418 Modular encryption device
A modular encryption device includes a chassis configured to mount in a rack with a networking device and sets of ports mounted on the chassis. Encryption cards...
US-1,007,5417 Verifying trustworthiness of redirection targets in a tiered web delivery network
Embodiments for verifying trustworthiness of redirection targets in a tiered delivery computing network by at least a portion of a processor. A degree of...
US-1,007,5416 Network session data sharing
In general, techniques for sharing of network session data are described. The techniques may enable security devices to leverage application classification...
US-1,007,5415 Content-aware firewalling, policy regulation, and policy management for industrial automation,...
In one embodiment, a processor-implemented method for controlling network traffic to and/or from at least one industrial machine, including: (a) receiving, as...
US-1,007,5414 Method and apparatus for providng push service in communication system
A method and a system are provided for a push service in a communication system. The method comprises: if there is data that is directed from an application...
US-1,007,5413 Adaptive overlay networking
An adaptive overlay network and method of operating the same. A location table is used to directly map logical addresses of machines (e.g., virtual or physical)...
US-1,007,5412 Client aware DHCP lease managment
Managing DHCP address leases based on client properties. A DHCP server may allocate a short DHCP lease to a client device based on client properties. These...
US-1,007,5411 Method and system for processing a geographical internet protocol (IP) lookup request
Various aspects of a method and a system to process a geographical internet protocol (IP) lookup request of an IP address are disclosed herein. The method is...
US-1,007,5410 Apparatus and methods for assigning internetwork addresses
According to an aspect, an access point data processing apparatus includes: a cache memory to store internetwork addresses of an internetwork in association...
US-1,007,5409 Terminal and application synchronization method therefor
A method and apparatus for application synchronization are provided. The method for application synchronization in a terminal includes receiving a first alarm...
US-1,007,5408 Managing messaging sessions among multiple participants
A method of managing a multi participant messaging session among session participants. The method comprises detecting electronic mails and instant messaging...
US-1,007,5407 Method of aggregating business and social networks
A method and system for facilitating relationships across multiple networks is described. The meta-network includes relationship information describing users,...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.