Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0134651 DETECTION OF BEACONING BEHAVIOR IN NETWORK TRAFFIC
A method for detecting beaconing behavior includes preprocessing network records to identify candidate source and destination pairs for detecting beaconing...
2016/0134650 SYSTEM, METHOD, AND APPARTUS FOR PROACTIVE CYBERSECURITY
The present disclosure describes a device, software package, method and system for active scanning, testing, and risk assessment of networks. The present...
2016/0134649 Cognitive Detection of Malicious Documents
An approach is provided in which a knowledge manager identifies document command statements in a document that correspond to requests included in the document....
2016/0134648 DETECTING COMPUTER SECURITY THREATS IN ELECTRONIC DOCUMENTS BASED ON STRUCTURE
In an embodiment, a data processing method providing an improvement in computer security comprises selecting, from a queue identifying a plurality of web...
2016/0134647 Cognitive Detection of Malicious Documents
An approach is provided in which a knowledge manager identifies document command statements in a document that correspond to requests included in the document....
2016/0134646 METHOD AND APPARATUS FOR DETECTING MALICIOUS SOFTWARE USING HANDSHAKE INFORMATION
In one embodiment, a method includes identifying unusual behavior with respect to a handshake between a first endpoint and a second endpoint that are included...
2016/0134645 IDENTIFYING AN IMPOSTER ACCOUNT IN A SOCIAL NETWORK
A method for identifying an imposter account in a social network includes a monitoring engine to monitor user accounts of a social network, an identifying...
2016/0134644 GEOLOCATION SAFETY AWARENESS
A method and/or technique for geolocation safety awareness is provided herein. When a user, having a client device, travels to a location, threats associated...
2016/0134643 Network Protection from Cyber Attacks
Electronic screen shots protect against cyber attacks. When any webpage is received, a screen shot of the webpage may be generated. Should the webpage be from...
2016/0134642 SECURE CONTENT AND ENCRYPTION METHODS AND TECHNIQUES
In order to capture electronic information provided by a user to another user different third parties seek to download tracking software, viruses etc. to the...
2016/0134641 DETECTION OF BEACONING BEHAVIOR IN NETWORK TRAFFIC
A method for detecting beaconing behavior includes preprocessing network records to identify candidate source and destination pairs for detecting beaconing...
2016/0134640 SYSTEMS AND METHODS TO SECURELY INSTALL NETWORK CONTROLLERS
Multi-network systems and methods to securely install communication information on a network controller for communications between the network controller and...
2016/0134639 METHOD FOR USER AUTHENTICATION USING DNSSEC
This invention leverages DNSSEC to makes post-password technologies work against endpoints across the globe, rather than solely within company walls. It...
2016/0134638 SYSTEMS AND METHODS FOR CONSUMER DIGITAL PRIVILEGES
Systems and methods are described for limiting access to digital content based on a privileged access model. In one implementation, a consumer identification...
2016/0134637 SYSTEMS AND METHODS FOR ENABLING COLLABORATION AND COORDINATION OF SUPPORT
The present invention relates to systems and methods for enabling collaboration and coordination of support within a controlled electronic environment. In...
2016/0134636 Remote trust attestation and geo-location of servers and clients in cloud computing environments
Methods and systems may provide for selecting a hypervisor protocol from a plurality of hypervisor protocols based on a communication associated with a remote...
2016/0134635 SYSTEMS, COMMUNICATION ENDPOINTS, AND RELATED METHODS FOR DISTRIBUTING IMAGES CORRESPONDING TO COMMUNICATION...
Systems and methods are disclosed for distributing images corresponding to communication endpoints. A system includes one or more servers configured to...
2016/0134634 METHOD AND SYSTEM PROTECTING AGAINST IDENTITY THEFT OR REPLICATION ABUSE
A method, implemented by a computer-implemented authentication system, for authenticating a user attempting to access a target component of a computer system,...
2016/0134633 MECHANISM FOR REPUTATION FEEDBACK BASED ON REAL TIME INTERACTION
A method for confirming that a user interacted with a resource provider before allowing the user to submit feedback associated with the resource provider is...
2016/0134632 SECURE INSTALLATION OF NETWORK DEVICES USING BEACONING SYSTEMS AND METHODS
Secure installation of a new device onto a home-control network uses pairing with an intelligent device. An intelligent device, such as a smartphone, receives...
2016/0134631 ENABLING ENFORCEMENT OF LICENSING TERMS IN DISTRIBUTING CONTENT IN CONTAINERS BY INCLUDING A KEY IN THE...
A method, system and computer program product for enforcing licensing terms when distributing content via a container image running in a container. Upon...
2016/0134630 OPEN CONNECTION MANAGER VIRTUALIZATION AT SYSTEM-ON-CHIP
Resource and memory use by applications used by user equipment (UE) can be adaptively controlled. A UE comprises a connection-manager kernel (CMKC) that can be...
2016/0134629 BINDING MOBILE DEVICE SECURE SOFTWARE COMPONENTS TO THE SIM
Various embodiments include a method for binding a secure software application to a mobile device wherein the mobile device includes a processor and a...
2016/0134628 INTEGRITY PROTECTION FOR DATA STORAGE
A system for protecting the integrity of a memory system maintains an age counter and an opportunity counter for each of multiple memory blocks; maintains an...
2016/0134627 SYSTEM FOR ESTABLISHING OWNERSHIP OF A SECURE WORKSPACE
The present application is directed to establishing ownership of a secure workspace (SW). A client device may provide a SW data structure (SWDS) to a SW...
2016/0134626 DEVICE NOTARIZATION
Methods and systems for device notarization and verification are provided. In one implementation, various integrity values are concatenated to generate a...
2016/0134625 METHOD AND APPARATUS FOR CONTROLLING COMMUNICATIONS TERMINAL AND CORRESPONDING COMMUNICATIONS TERMINAL
Embodiments of the present invention disclose a method and an apparatus for controlling a communications terminal and a corresponding communications terminal,...
2016/0134624 MOBILE AUTHENTICATION IN MOBILE VIRTUAL NETWORK
Systems, methods, and non-transitory computer-readable storage media for using mobile network authentication factors to authenticate a mobile device.
2016/0134623 SECURE EXECUTION ENVIRONMENT SERVICES
Techniques for managing secure execution environments provided as a service to computing resource service provider customers are described herein. A request to...
2016/0134622 Restricted Certificate Enrollment For Unknown Devices In Hotspot Networks
A network access system, e.g. a network hotspot, requires a mobile network access device, e.g. a smart phone or WiFi only device, to provide a network access...
2016/0134621 CERTIFICATE PROVISIONING FOR AUTHENTICATION TO A NETWORK
A method for authenticating a device to a network using a device certificate is described. The method includes generating a private-public key pair on a...
2016/0134620 LOADING USER DEVICES WITH LISTS OF PROXIMATELY LOCATED BROADCAST BEACONS AND ASSOCIATED SERVICE IDENTIFIERS
A user device transmits a location update message, indicating a location of the user device, to a network server. Responsive to the location update message,...
2016/0134619 System and Method for Single Sign-On Technical Support Access to Tenant Accounts and Data in a Multi-Tenant...
Shown is single sign-on support access to tenant accounts in a multi-tenant service platform involving a proxy user account in an identity provider for a...
2016/0134618 ANTICIPATORY SINGLE SIGN-ON (SSO) FOR PROXIED WEB APPLICATIONS
One embodiment provides a method, including: receiving, from an end user device, authentication data of a user of a web service; storing, in a single sign-on...
2016/0134617 SENDING SESSION TOKENS THROUGH PASSIVE CLIENTS
A session token can be requested to be sent to a first computing service from a second computing service, and a first computing service can receive the...
2016/0134616 DESKTOP APPLICATION FULFILLMENT PLATFORM WITH MULTIPLE AUTHENTICATION MECHANISMS
A service provider system may include an application fulfillment platform that delivers desktop applications to desktops on physical computing devices or...
2016/0134615 Computer-Implemented Method for Mobile Authentication and Corresponding Computer System
In one embodiment of the present invention a computerized method includes receiving at a personal-mobile device a first communication, which includes...
2016/0134614 USER AUTHENTICATION BASED ON OTHER APPLICATIONS
The present invention includes a system for authenticating a second action based on a first action, wherein the system is configured to: receive a first...
2016/0134613 Wireless Local Area Network WLAN Access Method, Terminal, and Server
A wireless local area network (WLAN) access method, a terminal, and a server implement intelligentization and simplify a user operation. The method includes...
2016/0134612 User Authentication
A user may be authenticated using credentials associated with online retailers. A username and password associated with an online retailer, for example, may be...
2016/0134611 SKILL-BASED SECURE DYNAMIC CONTACT CENTER AGENT ACCESS
Methods, systems and computer readable media for providing skill-based, secure and dynamic contact center agent network access are described.
2016/0134610 PRIVACY DURING RE-AUTHENTICATION OF A WIRELESS STATION WITH AN AUTHENTICATION SERVER
Methods, systems, apparatuses, and devices are described for privacy during re-authentication of a wireless station with an authentication server. The wireless...
2016/0134609 USER AUTHENTICATION CONFIDENCE BASED ON MULTIPLE DEVICES
The present application is directed to user authentication confidence based on multiple devices. A user may possess at least one device. The device may...
2016/0134608 NODAL RANDOM AUTHENTICATION
Systems, methods, and computer program products related to transaction application security are disclosed. In a particular embodiment, application nodes are...
2016/0134607 METHOD OF RSVP AUTHENTICATION WITH NON-DIRECTLY CONNECTED NEIGHBOR
A method is executed by a network device for authenticating resource reservation protocol (RSVP) messages between a sending node and a receiving node where the...
2016/0134606 CHANGING GROUP MEMBER REACHABILITY INFORMATION
In an embodiment, a method comprises obtaining a second network address at a computer node, which has been already associated with a first network address and...
2016/0134605 SYSTEMS AND METHODS TO SECURELY INSTALL NETWORK DEVICES USING PHYSICAL CONFIRMATION
A cloud server communicates with a network controller over communication channels of a communication network to securely install a new device having a unique...
2016/0134604 SYSTEMS AND METHODS TO SECURELY INSTALL NETWORK DEVICES USING INSTALLED NETWORK DEVICES
Secure installation of a new device onto a home-control network uses pairing with an existing network device. The new device receives a private key for secure...
2016/0134603 INSTALLATION OF NETWORK DEVICES USING SECURE BROADCASTING SYSTEMS AND METHODS FROM REMOTE INTELLIGENT DEVICES
Secure installation of a new device onto a home-control network uses pairing with an intelligent device. The new device receives a private key for secure...
2016/0134602 SECURE SHARING OF USER ANNOTATED SUBSCRIPTION MEDIA WITH TRUSTED DEVICES
Generally, this disclosure provides systems, methods and computer readable media for secure sharing of user annotated subscription media content with trusted...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.