Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0099965 TCP CONNECTION RESOURCE DIVERSITY USING TUNABLE GEOMETRIC SERIES
Disclosed is a computer implemented method and apparatus for handling transport control protocol connections. The local host receives a transport control...
2016/0099964 SYSTEMS AND METHODS TO DETECT AND DEFEND AGAINST DISTRIBUTED DENIAL OF SERVICE ATTACKS
A method, operated by a Software Defined Networking (SDN) controller associated with an Autonomous System (AS) with one or more peering points, each peering...
2016/0099963 METHODS AND SYSTEMS FOR SHARING RISK RESPONSES BETWEEN COLLECTIONS OF MOBILE COMMUNICATIONS DEVICES
Methods are provided for determining an enterprise risk level, for sharing security risk information between enterprises by identifying a security response by...
2016/0099962 SITE SECURITY MONITOR
Techniques for monitoring site security are disclosed herein. Sites are scanned for security metric values associated with one or more security metrics....
2016/0099961 DISTINGUISHING HUMAN-DRIVEN DNS QUERIES FROM MACHINE-TO-MACHINE DNS QUERIES
The present disclosure is related to a computer-implemented method and system for distinguishing human-driven Domain Name System (DNS) queries from...
2016/0099960 System and method for scanning hosts using an autonomous, self-destructing payload
A method for scanning hosts using an autonomous, self-destructing payload, deploying, by a computing device, at least one payload to at least one host, the at...
2016/0099959 REPUTATION-BASED THREAT PROTECTION
Information concerning a plurality of identified threats provided by a plurality of preselected sources is stored in memory. An e-mail message may be received...
2016/0099958 CONTENT REQUEST RATE LIMITING IN A CONTENT DELIVERY SYSTEM
Systems, methods, and software for operating a content delivery node to monitor requests for content transferred by at least an end user device to detect when...
2016/0099957 METHODS AND SYSTEMS FOR DETECTING AN ELECTRONIC INTRUSION
Methods and systems for detecting an electronic intrusion are described. A notification is received, over a network, from a server, the notification reporting...
2016/0099956 Detection of Mutated Apps and Usage Thereof
System, method and product for detection of mutated apps and usage thereof. A method comprises obtaining features of an Application Under Check (AUC);...
2016/0099955 CLOUD BASED REPUTATION SYSTEM FOR BROWSER EXTENSIONS AND TOOLBARS
A method and apparatus for an automated classification rating of browser extensions is provided.
2016/0099954 APPARATUS AND METHOD FOR IDENTIFYING A DOMAIN NAME SYSTEM RESOURCE EXHAUSTION ATTACK
A machine includes a processor and a memory connected to the processor. The memory stores instructions executed by the processor to identify a resource attack...
2016/0099953 APPLICATION ATTACK MONITORING
Implementations of the present disclosure include methods, systems, and computer-readable storage mediums for providing application attack monitoring. Actions...
2016/0099952 METHOD AND SYSTEM FOR TESTING AND VALIDATION OF CRYPTOGRAPHIC ALGORITHMS
A method for testing cryptographic algorithms includes: receiving one or more request files, wherein each request files is associated with a cryptographic...
2016/0099951 CENTRALIZED STORAGE AND MANAGEMENT OF MALWARE MANIFESTS
Updating a central repository with information about malware resident upon a computer system. Upon detecting the malware executing in a virtual machine, a...
2016/0099950 USER AUTHENTICATION
A method, system, server processing system and computer readable medium for authenticating a user attempting to access a secure environment is disclosed. In...
2016/0099949 Systems and Methods for Document-Level Access Control in a Contextual Collaboration Framework
Systems and methods are provided for managing contextual collaborations. User data corresponding to a plurality of users is stored. The plurality of users...
2016/0099948 METHOD AND SYSTEM FOR ENABLING ACCESS OF A CLIENT DEVICE TO A REMOTE DESKTOP
A computer implemented method, computer program product, and systems for enabling access of a client device to a remote desktop. The remote desktop is...
2016/0099947 INFORMATION PROCESSING APPARATUS, COMMUNICATIONS METHOD, AND SYSTEM
An information processing apparatus includes a first communications connector configured to implement first data communications connection between a first...
2016/0099946 CONTROLLING OPERATION OF A MACHINE AND DESCRIBING ACTIONS PERFORMED BY THE MACHINE THROUGH A SOCIAL NETWORKING...
A social networking system includes information identifying a machine (e.g., a robot, a drone, a computer, a thermostat, etc.) and a connection between the...
2016/0099945 DNS SECURITY EXTENSIONS FOR EMULATED APPLICATIONS
The non-emulated interface may determine whether the domain-name-to-be-resolved resides in a zone on a list of secured zones. If so, the DNS query may be...
2016/0099944 Digital Rights Domain Management for Secure Content Distribution in a Local Network
Systems and methods for secure content distribution to playback devices connected to a local network via a residential gateway using secure links are...
2016/0099943 SHUT OFF MECHANISM FOR ALL INTERNET TRAFFIC
A client device providing enhanced network traffic security. The client device includes a processor and a network connection element selectively operable to...
2016/0099942 DATA LEAK PROTECTION
Methods and systems for Data Leak Prevention (DLP) in an enterprise network are provided. According to one embodiment, a data leak protection method is...
2016/0099941 AUTHENTICATING A LIMITED INPUT DEVICE VIA AN AUTHENTICATED APPLICATION
A limited input device, such as a camera, is authenticated based on a request received from an authenticated application. The application can request an...
2016/0099940 Hostless mDNS-SD Responder with Authenticated Host Wake Service
Conventional wireless interface (WiFi) controllers cannot resolve authentication for trusted client devices without calculation from a host processor. Leaving...
2016/0099939 METHOD OF AUTHENTICATING CAN PACKETS USING MIXTURE OF MACS AND APPARATUS FOR IMPLEMENTING THE SAME
A method and apparatus for authenticating packets in a controller area network (CAN) are disclosed. The method includes transmitting messages using a mixture...
2016/0099938 Authenticating Method and Apparatus Using Electronic Device
An authentication method and apparatus for an electronic device. A first electronic device transmits a mutual authentication request for the first electronic...
2016/0099937 METHODS AND SYSTEMS FOR AUTHENTICATING USERS
A method of authenticating users to reduce transaction risks includes indicating a desire to conduct a transaction and determining whether the transaction...
2016/0099936 BLUETOOTH LOW ENERGY HOSTLESS PRIVATE ADDRESS RESOLUTION
Conventional Bluetooth low energy (or like personal wireless network) controllers cannot resolve private addresses without some calculation from a host...
2016/0099935 SECURE ACCESS TO INDIVIDUAL INFORMATION
A facility for accessing information relating to a person is described. In a reader device, the facility accesses first credentials stored in a first storage...
2016/0099934 AUTHENTICATED SESSION ESTABLISHMENT
Methods, devices, and machine-readable media are provided to provide secure communications between entities. As provided in this disclosure, this may include...
2016/0099933 DISTRIBUTED SINGLE SIGN ON TECHNOLOGIES INCLUDING PRIVACY PROTECTION AND PROACTIVE UPDATING
Technologies for distributed single sign-on operable to provide user access to a plurality of services via authentication to a single entity. The distributed...
2016/0099932 PROCESSING APPARATUS, AUTHORITY SETTING METHOD, AND STORAGE MEDIUM STORING PROGRAM
A processing apparatus performs: in response to reception of first information by one of the network interface and the user interface, identifying, as a first...
2016/0099931 Single Sign Off Handling by Network Device in Federated Identity Deployment
In one implementation, a network device provides a single signoff service to one or more endpoints in software as a service (SaaS) sessions. The network device...
2016/0099930 RESTRICTION OF IP ACCESS BASED ON PERSONAL PERFORMANCE
An application on a computing device communicatively coupled to a communications network for receiving restriction input from a parent user of the application....
2016/0099929 USER AUTHENTICATION BASED ON SELF-SELECTED PREFERENCES
Embodiments of the invention are directed to a system, method, and a computer program product for a user authentication based on self-selected preferences. The...
2016/0099928 SYSTEMS AND METHODS FOR MANAGING CONNECTIONS FOR UNIVERSAL PLUG-AND-PLAY DEVICES
Systems and methods of managing network connections are disclosed. The method includes receiving a communication from a media device that requests permission...
2016/0099927 HACKER SECURITY SOLUTION FOR PACKAGE TRANSFER TO AND FROM A VEHICLE
A cloud based system for a package exchange with a vehicle service is discussed. The system can have servers having processors, ports, and databases and a...
2016/0099926 METHOD OF SEQUENTIALLY AUTHENTICATING CAN PACKETS USING DIVIDED MACS AND APPARATUS FOR IMPLEMENTING THE SAME
A method of transmitting K messages using divided message authentication codes (MACs) in a controller area network (CAN) includes: generating a MAC using a...
2016/0099925 SYSTEMS AND METHODS FOR DETERMINING DIGITAL DEGREES OF SEPARATION FOR DIGITAL PROGRAM IMPLEMENTATION
This disclosure relates generally to enterprise software management, and more particularly to systems and methods for determining digital degrees of separation...
2016/0099924 USING CREDENTIALS STORED IN DIFFERENT DIRECTORIES TO ACCESS A COMMON ENDPOINT
A global endpoint may be associated with an organization name and a plurality of directories located in different geographic regions. The global endpoint may...
2016/0099923 CLIENT ACCESSIBLE SECURE AREA IN A MOBILE DEVICE SECURITY MODULE
A security module has an assigned unique electronic identifier. The security module has a communication interface, a non-volatile memory, and a processing unit...
2016/0099922 SECURE SHARED KEY SHARING SYSTEMS AND METHODS
Systems and methods used to securely communicate a shared key to devices. One embodiment describes a method to securely communicate a shared key to a first...
2016/0099921 FINE GRAIN RIGHTS MANAGEMENT OF STREAMING CONTENT
The present invention provides methods, apparatuses, and systems for delivering protected streaming content to a receiving device. In an aspect of the present...
2016/0099920 METHOD FOR ESTABLISHING A CRYPTOGRAPHICALLY PROTECTED COMMUNICATION CHANNEL
Some embodiments are directed to a cryptographic method for providing an electronic first device, an electronic second device and an electronic intermediary...
2016/0099919 SYSTEM AND METHOD FOR PROVIDING A SECURE ONE-TIME USE CAPSULE BASED PERSONALIZED AND ENCRYPTED ON-DEMAND...
A secure one-time use capsule based personalized and encrypted on-demand communication platform enables encrypted personalized secure on-demand stateless...
2016/0099918 SYSTEM AND METHOD TO PROVIDE BUILT-IN AND MOBILE VPN CONNECTIVITY
A system and method for facilitating the establishment of a virtual private network between a network and a remote computer, the system having: a mobile device...
2016/0099917 MULTI-TUNNELING VIRTUAL NETWORK ADAPTER
Among other things, embodiments of the present disclosure allow multiple virtual private network connections to be created without the need for administrative...
2016/0099916 SYSTEMS AND METHODS FOR PROTECTING NETWORK DEVICES
Embodiments of the present disclosure help protect network devices from unauthorized access. Among other things, embodiments of the disclosure allow full...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.