Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0119390 SYSTEMS AND METHODS FOR INTERACTIVE CONTENT GENERATION
A web content generation platform is provided that is operable to initiate and guide the creation of interactive web content, including video debate content,...
2016/0119389 SYSTEM AND METHOD FOR MANAGING INTERRUPTIONS BY INDICATING AN AVAILABILITY STATUS ON A COMMUNICATION DEVICE
A computer system and computer implemented method for managing interruptions by indicating an availability status on a first communication device. The method...
2016/0119388 SYSTEMS AND METHODOLOGIES PROVIDING COLLABORATION AMONG A PLURALITY OF COMPUTING APPLIANCES, UTILIZING A...
A system provides for collaboration among a plurality of users, each user at one of a plurality of computing appliances. Each computing appliance comprised of...
2016/0119387 SYSTEMS AND METHODS FOR MAKING COMMON SERVICES AVAILABLE ACROSS NETWORK ENDPOINTS
Systems and methods are disclosed for providing access to common services in a communication session. According to certain embodiments, a request to initiate a...
2016/0119386 SELECTING REFRESH PERIODS IN AN IP NETWORK
A registration server in an IP network is provided. The server is configured to act, after receiving a request for an initial registration or for refreshing a...
2016/0119385 METHOD AND APPARATUS FOR INITIATING COMMUNICATION SESSIONS
An aspect of the subject disclosure may include, for example, receiving a request from a communication device to initiate a communication session in a...
2016/0119384 Dynamic Rate Adaptation During Real-Time LTE Communication
Methods and computing systems for dynamic rate adaption during real-time Long Term Evolution (LTE) communication are described. A real-time LTE communication...
2016/0119383 DYNAMIC GENERATION OF POLICY ENFORCEMENT RULES AND ACTIONS FROM POLICY ATTACHMENT SEMANTICS
At least one set of enforceable policy provisions is identified within at least one defined service level policy to be enforced during runtime by a policy...
2016/0119382 Applying Security Policy to an Application Session
Applying a security policy to an application session, includes: recognizing the application session between a network and an application via a security...
2016/0119381 Ensuring Health and Compliance of Devices
A compliance method and associated system is provided. The method includes generating backup devices for devices of a list of devices associated with a data...
2016/0119380 SYSTEM AND METHOD FOR REAL TIME DETECTION AND PREVENTION OF SEGREGATION OF DUTIES VIOLATIONS IN...
A system is configured for real time detection and prevention of segregation of duties violations in business-critical applications. The system includes a...
2016/0119379 SECURITY ORCHESTRATION FRAMEWORK
In an example, there is disclosed a computing apparatus, including: a network interface; one or more logic elements providing a security orchestration server...
2016/0119378 METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR SECURITY PROTOCOL SELECTION IN INTERNET PROTOCOL MULTIMEDIA...
A method includes receiving a first secured registration request message from user equipment at a registration server in an Internet Protocol multimedia...
2016/0119377 Cognitive Honeypot
An electronic communication evaluating device determines a suspicion level for an initial electronic communication. The initial electronic communication is...
2016/0119376 SYSTEM AND METHOD FOR FILTERING ELECTRONIC MESSAGES
A system for filtering electronic messages includes a client machine that includes a security module, wherein the security module has access to at least one...
2016/0119375 CLOUD SECURITY-BASED FILE PROCESSING METHOD AND APPARATUS
The invention discloses a cloud security-based file processing method and apparatus. The method comprises: generating a signature identifier uniquely...
2016/0119374 Intercepting, decrypting and inspecting traffic over an encrypted channel
A network-based appliance includes a mechanism to intercept, decrypt and inspect secure network traffic flowing over SSL/TLS between a client and a server. The...
2016/0119373 SYSTEM AND METHOD FOR AUTOMATIC CALCULATION OF CYBER-RISK IN BUSINESS-CRITICAL APPLICATIONS
A system for calculating cyber-risk in a software application includes a cyber-risk calculator. The cyber-risk calculator receives a security assessment result...
2016/0119372 INTERACTING WITH A REMOTE SERVER OVER A NETWORK TO DETERMINE WHETHER TO ALLOW DATA EXCHANGE WITH A RESOURCE AT...
Provided are a computer program product, system, and method for interacting with a remote server over a network to determine whether to allow data exchange...
2016/0119371 IDENTIFYING BOTS
A method of identifying if a web client has browser capabilities. An originating machine receives a web page request from the web client. The originating...
2016/0119370 PROVIDING ALERTS BASED ON UNSTRUCTURED INFORMATION METHODS AND APPARATUS
A system, method, and apparatus for providing alerts based on unstructured information are disclosed. An example apparatus includes an interface configured to...
2016/0119369 DATA TRANSFER FOR NETWORK INTERACTION FRAUDULENCE DETECTION
Transferring metadata is disclosed. Information about a network interaction is processed to generate metadata describing the network interaction. Based on the...
2016/0119368 SYSTEM AND METHOD FOR TRIGGERING AND PERFORMING SCANS TO PROTECT VIRTUAL ENVIRONMENTS
A system and method in a virtual universe system for triggering scans of virtual items and inventories of virtual items and for scanning the virtual items and...
2016/0119367 METHOD, APPARATUS, AND SYSTEM FOR COOPERATIVE DEFENSE ON NETWORK
The present disclosure provides a method, an apparatus, and a system for cooperative defense on a network. Alarm information sent by a security device of a...
2016/0119366 STRUCTURAL RECOGNITION OF MALICIOUS CODE PATTERNS
Various embodiments include an apparatus comprising a detection database including a tree structure of descriptor parts including one or more root nodes and...
2016/0119365 SYSTEM AND METHOD FOR A CYBER INTELLIGENCE HUB
A method for defining and forming a cyber intelligence channel communicating with consumers is facing cyber threats in real time. The method includes...
2016/0119364 SYSTEMS AND METHODS FOR DYNAMICALLY SELECTING MODEL THRESHOLDS FOR IDENTIFYING ILLEGITIMATE ACCOUNTS
Systems, methods, and non-transitory computer-readable media can determine a plurality of model scores for a set of accounts. Each model score in the plurality...
2016/0119363 System and Method for 4D Signature with Intelligent Mobile Cloud Device
A system and its methods using 4D signature to verify ones' online transaction through mobile projector is disclosed for the first time; the purpose is to...
2016/0119362 DATA PROCESSING SYSTEM, METHOD OF INITIALIZING A DATA PROCESSING SYSTEM, AND COMPUTER PROGRAM PRODUCT
A data processing system is conceived, which comprises at least two security levels and key material stored at a specific one of said security levels, wherein...
2016/0119361 Social Network Based Mobile Access
In one embodiment, a method includes retrieving and storing settings of a first user account of a plurality of accounts of a social network. The method also...
2016/0119360 Method and System for Remote Data Access Using a Mobile Device
A system and method for securely storing, retrieving and sharing data using PCs and mobile devices and for controlling and tracking the movement of data to and...
2016/0119359 SYSTEM AND METHOD FOR PROVIDING A SECURE ACCESS IN AN ORGANIZATION SYSTEM
The present invention integrates user, application and server level security with standard operating procedures, thus providing an end to end security blanket...
2016/0119358 TECHNIQUES FOR MANAGING ACCESS TO HARDWARE RESOURCES ON MULTIPLE-PERSONA MOBILE TECHNOLOGY PLATFORMS
Techniques for managing access to hardware resources on a multiple-persona mobile technology platform (MTP). The method comprises: detecting an access event...
2016/0119357 Automated and Policy Driven Optimization of Cloud Infrastructure Through Delegated Actions
A system and method for optimizing a cloud environment using a workflow.
2016/0119356 REMOTE MONITORING SYSTEM AND REMOTE MONITORING APPARATUS
In one embodiment, a remote monitoring system includes a monitoring apparatus displaying a screen for monitoring a power plant, a remote monitoring apparatus...
2016/0119355 CONTROLLING ADMINISTRATION RIGHTS
A computer in a network has an operating system. The operating system is configured to prevent running of software not identified in a list of approved...
2016/0119354 MULTI-TIERED AUTHENTICATION METHODS FOR FACILITATING COMMUNICATIONS AMONGST SMART HOME DEVICES AND CLOUD-BASED...
Apparatus, systems, methods, and related computer program products for synchronizing distributed states amongst a plurality of entities and authenticating...
2016/0119353 PROXIMITY BASED WIRELESS SECURITY SYSTEM
A wireless security system is provided. The system includes a first wireless device, a second wireless device, an uninstalled wireless device, and an access...
2016/0119352 METHOD AND SYSTEM FOR ACCOUNT MANAGEMENT
A method and system for managing accounts that control access to resources of different providers. The account management system allows providers to use a...
2016/0119351 AUTHORITY TRANSFER SYSTEM, METHOD THAT IS EXECUTED BY AUTHORITY TRANSFER SYSTEM, AND STORAGE MEDIUM
An authority transfer system enables omitting authorization of a user belonging to a tenant based on an authorization operation being performed at least once...
2016/0119350 DATA COUNTER MEASURES
Techniques to block unwanted third party calls are disclosed. In various embodiments, an indication is received that third party code included on a web page is...
2016/0119349 ACCESS CONTROL FOR DATA BLOCKS IN A DISTRIBUTED FILESYSTEM
A method for access control of data in a filesystem is provided. The method includes storing a map in a server, the map coupled to an agent, the map...
2016/0119348 SYSTEMS AND METHODS FOR SECURE RESOURCE ACCESS AND NETWORK COMMUNICATION
Systems and methods for secure resource access and network communication are provided. A plurality of policies are received on a client device, each policy...
2016/0119347 Method for Updating Identity Information about Packet Gateway, AAA Server and Packet Gateway
A method for updating identity information of a packet gateway, an authentication, authorization, and accounting (AAA) server and a packet gateway. The method...
2016/0119346 METHOD, APPARATUS, AND SYSTEM FOR AUTHENTICATING FULLY HOMOMORPHIC MESSAGE
Embodiments of the present disclosure provide a method, an apparatus, and a system for authenticating a fully homomorphic message, where the method includes:...
2016/0119345 STORAGE COUNT VERIFICATION SYSTEM
A storage count verification system is provided in which a client can verify the number of identical data items stored by a server without the server being...
2016/0119344 SYSTEM AND METHOD FOR WEB APPLICATION SECURITY
A system for detection and mitigation of client-side initiated security attack(s) to a web application is disclosed. A server component (SC) of the system is...
2016/0119343 Gateway, Client Device and Methods for Facilitating Communication between a Client Device and an Application Server
According to a first aspect, it is presented a method, executed in a gateway, the gateway being arranged to facilitate communication between a client device...
2016/0119342 SYSTEMS AND METHODS FOR SECURE RESOURCE ACCESS AND NETWORK COMMUNICATION
Systems and methods for secure resource access and network communication are provided. A plurality of policies are received on a client device, each policy...
2016/0119341 SYSTEM AND METHODS FOR EXCHANGING IDENTITY INFORMATION AMONG INDEPENDENT ENTERPRISES
A system and method for exchanging identity information and for correlating protected data across independent data systems connected through a network is...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.