Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0127409 WEB SERVICE TESTING
Disclosed is a computer-implemented method and system of inferring a web service infrastructure from a web service hosted on a web server. The method includes:...
2016/0127408 DETERMINING VULNERABILITY OF A WEBSITE TO SECURITY THREATS
Provided are methods and systems for determining a vulnerability of a website to at least one security threat. An example method can comprise providing a user...
2016/0127407 CERTIFICATION OF CORRECT BEHAVIOR OF CLOUD SERVICES USING SHADOW RANK
Determining potential harm associated with a network endpoint external to an enterprise includes receiving information about a network-based communication by a...
2016/0127406 IDENTIFYING A POTENTIAL DDOS ATTACK USING STATISTICAL ANALYSIS
Embodiments can identify requests that may be tied to a DDOS attack. For example, the primary identifiers (e.g., a source address) of requests for a network...
2016/0127405 INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING APPARATUS, AND INFORMATION PROCESSING METHOD
An information processing system, having one or more information processing apparatuses, includes a data input unit configured to take as input first data...
2016/0127404 COMPUTATIONAL SIGNAL PROCESSING ARCHITECTURES FOR ELECTROMAGNETIC SIGNATURE ANALYSIS
Systems and methods can support a computational signal processing architecture for electromagnetic signature analysis and threat detection. A plurality of...
2016/0127403 SENSOR MESH AND SIGNAL TRANSMISSION ARCHITECTURES FOR ELECTROMAGNETIC SIGNATURE ANALYSIS
Systems and methods can support a sensor mesh and signal transmission architecture for electromagnetic signature analysis and threat detection. Sensor antennas...
2016/0127402 METHOD AND APPARATUS FOR IDENTIFYING AND DETECTING THREATS TO AN ENTERPRISE OR E-COMMERCE SYSTEM
Methods and apparatuses for identifying and detecting threats to an enterprise or e-commerce system are disclosed, including grouping log lines belonging to...
2016/0127401 CAPTURE TRIGGERS FOR CAPTURING NETWORK DATA
The disclosed embodiments provide a system that facilitates the processing of network data. During operation, the system provides a risk-identification...
2016/0127400 MANAGING INFECTIOUS FORWARDED MESSAGES
Systems and methods for managing forwarded infectious messages are provided. Managing electronic message comprises receiving a message, forwarding the message,...
2016/0127399 Malicious Message Detection and Processing
Malicious message detection and processing systems and methods are provided herein. According to various embodiments, a method includes detecting, via an...
2016/0127398 Apparatus and Method for Efficient Identification of Code Similarity
A method for identifying similarity between query samples and stored samples in an efficiently maintained reference library may include receiving a first...
2016/0127397 SYSTEMS, DEVICES, AND METHODS FOR SEPARATING MALWARE AND BACKGROUND EVENTS
Embodiments relate to systems, devices, and computing-implemented methods for separating malware and background events to classify malware based on traffic...
2016/0127396 INFORMATION PROCESSING APPARATUS AND IDENTIFYING METHOD
An information processing apparatus includes an adding unit and an identifying unit. The adding unit adds, to data received from a communication destination...
2016/0127395 System and method for network intrusion detection of covert channels based on off-line network traffic
A network intrusion detection system and method is configured to receive off-line network traffic. The off-line network traffic with a predefined format, PCAP...
2016/0127394 Action Response Framework for Data Security Incidents
An incident manager application (IM) for responding to data security incidents in enterprise networks is disclosed. An IM tracks the incidents in an enterprise...
2016/0127393 Electronic Message Analysis For Malware Detection
An electronic message is analyzed for malware contained in the message. Text of an electronic message may be analyzed to detect and process malware content in...
2016/0127392 ELECTROMAGNETIC SIGNATURE ANALYSIS FOR THREAT DETECTION IN A WIRELESS ENVIRONMENT OF EMBEDDED COMPUTING DEVICES
Systems and methods can support detecting and identifying threats associated with wireless devices. A radio receiver can collect radio frequency signals from...
2016/0127391 ENTERPRISE INTRUSION DETECTION AND REMEDIATION
Events are securely packaged and transmitted from peripherals of terminals and from secure input/out modules (SIOMs) of terminals. The events are collected and...
2016/0127390 METHOD AND APPARATUS FOR DETECTING PORT SCANS IN A NETWORK
A method and an apparatus for detecting a port scan in a network are disclosed. For example, the method extracts statistics from a message, detects the port...
2016/0127389 PREVENTING URL CONFUSION ATTACKS
Methods and apparatus are disclosed for detecting illegitimate or spoofed links on a web page. Illegitimate links can be detected by receiving a web link that...
2016/0127388 SIMILARITY SEARCH AND MALWARE PRIORITIZATION
Methods, system, and media for determining similar malware samples are disclosed. Two or more malware samples are received and analyzed to extract information...
2016/0127387 Method for Combining Multiple Signal Values in the Dendritic Cell Algorithm
Artificial Immune Systems (AIS) including the Dendritic Cell Algorithm (DCA) are an emerging method to detect malware in computer systems. A DCA module may...
2016/0127386 Restricting Communications Between Subscriber Machines
A method of transferring information between subscribers associated with a communication service is disclosed. The method includes receiving a first handle...
2016/0127385 METHOD AND APPARATUS FOR SYNCHRONIZING AN ADAPTABLE SECURITY LEVEL IN AN ELECTRONIC COMMUNICATION
A method of communicating in a secure communication system, comprises the steps of assembling as message at a sender, then determining a security level, and...
2016/0127384 METHOD AND SYSTEM FOR GEOLOCATION VERIFICATION OF RESOURCES
A method of geolocation verification, including obtaining the geolocation of an operating system, generating a unique system ID for an installed operating...
2016/0127383 AGGREGATE SERVICE WITH FILE SHARING
One embodiment provides a method, including: sending, from a device, input from a user requesting access to data retrievable by an aggregate service device;...
2016/0127382 DETERMINING VARIABLE WAIT TIME IN AN ASYNCHRONOUS CALL-BACK SYSTEM BASED ON CALCULATED AVERAGE SUB-QUEUE WAIT TIME
A method includes a workload management (WLM) server that receives a first CHECK WORKLOAD command for a workload in a queue of the WLM server. It may be...
2016/0127381 NETWORK CONNECTION METHOD, HOTSPOT TERMINAL AND MANAGEMENT TERMINAL
Embodiments of the disclosure provide a network connection method, a hotspot terminal, and a management terminal. A hotspot terminal receives an Internet...
2016/0127380 SYSTEM AND METHOD TO VERIFY PREDETERMINED ACTIONS BY A COMPUTER ON A NETWORK
A system, a method, and a computer program for identifying a device on a network that participates in communication sessions, where the device may rotate its...
2016/0127379 SUPERVISED ONLINE IDENTITY
Technologies to facilitate supervision of an online identify include a gateway server to facilitate and monitor access to an online service by a user of a...
2016/0127378 INTERNET ACCESS AUTHORIZATION AND REGULATION SYSTEMS AND METHODS FOR CONTROLLED ENVIRONMENT OF AN INSTITUTIONAL...
Access and regulations systems to facilitate safe and secure access of web content by residents of an institutional facility such as a correctional facility...
2016/0127377 POLICY PARTIAL RESULTS
Technology for policies with reduced associated costs is disclosed. A policy may include an ordered rule set. When evaluated, the highest priority rule in the...
2016/0127376 METHOD, SYSTEM AND APPARATUS FOR NETWORK MANAGEMENT BASED ON BUSINESS RELATIONSHIP INFORMATION
A method for providing a dynamic business network and data management service system includes defining an account for a co-operation organization for accessing...
2016/0127375 METHOD AND APPARATUS FOR SECURE WIRELESS SHARING
A method for generating a secure one-time network for a new device includes receiving an instruction at an access point for generation of a one-time network. A...
2016/0127374 Using Third Party Information To Improve Predictive Strength for Authentications
Embodiments of the present invention are directed to methods and systems for utilizing the history of previous authentications and authorizations related to...
2016/0127373 AUTOMATIC CONNECTED VEHICLE DEMONSTRATION PROCESS
The present invention is directed toward an automatic connected vehicle demonstration method and system for automatically designating any registered vehicle as...
2016/0127372 HIERARCHICAL AUTHENTICATION AND AUTHORIZATION SYSTEM
A method for controlling access to a system for supporting home control activities includes hierarchical authorization of the user. Access in an online mode,...
2016/0127371 SYSTEM AND METHOD FOR PROVIDING ERROR HANDLING IN AN UNTRUSTED NETWORK ENVIRONMENT
An example method is provided and may include receiving a DIAMETER-based error over an SWm interface by a first evolved packet data gateway (ePDG) for a user...
2016/0127370 TECHNIQUES FOR CALL-BASED USER VERIFICATION
Techniques for call-based user verification are described. In one embodiment, for example, an apparatus may comprise a processor circuit and a storage...
2016/0127369 METHOD, DEVICE AND SYSTEM FOR USER AUTHENTICATION
A method of user authentication is disclosed. The method is performed at a server device having one or more processors and memory for storing programs to be...
2016/0127368 Method, Apparatus, and System for Controlling Access of User Terminal
A method, an apparatus, and a system for controlling access of a user terminal, where the method includes receiving, by a controller, an authentication packet...
2016/0127367 SYSTEMS AND METHODS FOR PRIVATELY PERFORMING APPLICATION SECURITY ANALYSIS
Systems and methods for analyzing applications on a mobile device for risk so as to maintain the privacy of the application user are provided. In the example...
2016/0127366 ANONYMOUS SIGNATURE SCHEME
Technologies are generally described for providing an anonymous signature scheme. In some examples, a method performed under control of an end device ma 320...
2016/0127365 AUTHENTICATION TOKEN
The disclosed invention is a system and method that allows for authentication of a user to a network using a token. The token interacts with a device and...
2016/0127364 Apparatus and Method for Host Abstracted Networked Authorization
An information handling system includes a host processing system and an authentication processing system. The authentication processing system authenticates to...
2016/0127363 Method and System for Verifying the Identity of a User of an Online Service
A method for verifying the identity of a user of an online service, with the steps of: when a user is connected (A1) to an online service (2), sending (A2) an...
2016/0127362 AUTHENTICATION SYSTEM, AUTHENTICATION METHOD AND SERVICE PROVIDING SYSTEM
An authentication system comprising an authentication terminal and an authentication server is provided. The authentication terminal comprises an...
2016/0127361 AUTHENTICATION TERMINAL
An authentication terminal comprising an authentication apparatus authenticating an authentication subject, an artifact operating in accordance with an input...
2016/0127360 SYSTEMS AND METHODS FOR AUTHENTICATING A USER BASED ON SELF-PORTRAIT MEDIA CONTENT
Systems, methods, and non-transitory computer-readable media can receive an indication that a user is attempting to authenticate as a particular identity. A...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.