Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0149962 APPARATUS, SYSTEM, AND METHOD OF DETERMINING DESTINATION FOR STATE INFORMATION, AND RECORDING MEDIUM
A control system includes a plurality of control apparatuses each capable of controlling a first communication terminal connected to the control apparatus....
2016/0149961 ADAPTIVE VOICE COMMUNICATION SYSTEM AND METHOD BASED ON HYPERTEXT TRANSPORT PROTOCOL
A system and method of performing voice communication over a hypertext transport protocol (HTTP)-based network. The adaptive voice communication system...
2016/0149960 INFORMATION PROCESSING APPARATUS AND DETERMINATION RESULT PROVIDING METHOD
An information processing apparatus includes a determination unit configured to determine whether a first communication port used by a first communication...
2016/0149959 Controlling a PBX Phone Call Via a Client Application
In one or more embodiments, a hit test thread which is separate from the main thread, e.g. the user interface thread, is utilized for hit testing on web...
2016/0149958 SHARING DATA ACROSS PROFILES
Systems, methods, and software can be used to share data across profiles. In some aspects, a first request from a first application for application data...
2016/0149957 SYSTEM AND METHOD OF MONITORING AND CONTROLLING APPLICATION FILES
A system and method for updating, monitoring, and controlling applications on a workstation. The workstation includes a workstation management module...
2016/0149956 MEDIA MANAGEMENT AND SHARING SYSTEM
The distribution of media clips stored on one or more servers is controlled using updateable permissions or rules defined by a content owner. The clip is made...
2016/0149955 COMMUNICATIONS SECURITY SYSTEMS
A method of establishing secure communications between a first computer, eg a client computer, and a second computer, eg a web server, whereby the client...
2016/0149954 SECURE DATA REDACTION AND MASKING IN INTERCEPTED DATA INTERACTIONS
A system, and computer program product for modifying intercepted data interactions are provided in the illustrative embodiments. At a security application...
2016/0149953 CLIENT/SERVER POLYMORPHISM USING POLYMORPHIC HOOKS
Computer systems and methods in various embodiments are configured for improving the security and efficiency of client computers interacting with server...
2016/0149952 NETWORK-BASED SECURE INPUT/OUTPUT (I/O) MODULE (SIOM)
A Secure Input/Output (I/O) Module (SIOM) is networked-enabled providing secure communications with terminals and peripherals integrated into the terminals....
2016/0149951 SECURE TRANSMISSION METHOD AND SYSTEM
A secure transmission method and system that can reduce the channel capacity of an eavesdropper even in an environment in which there is no direct path between...
2016/0149950 DYNAMIC SECURITY SANDBOXING BASED ON INTRUDER INTENT
A method of security sandboxing which may include detecting an illicit intrusion to a computer on a first computer system; cloning the intruded computer;...
2016/0149949 SYSTEMS, DEVICES, AND METHODS FOR IMPROVED NETWORK SECURITY
Embodiments relate to systems, devices, and computing-implemented methods for providing DoS mitigation using a list of persistent clients generated using...
2016/0149948 Automated Cyber Threat Mitigation Coordinator
Various computer systems and networks may benefit from an automated cyber threat mitigation coordinator. A related method can include receiving, at a server,...
2016/0149947 PERSISTENT CROSS-SITE SCRIPTING VULNERABILITY DETECTION
Various techniques for detecting a persistent cross-site scripting vulnerability are described herein. In one example, a method includes detecting, via the...
2016/0149946 PERSISTENT CROSS-SITE SCRIPTING VULNERABILITY DETECTION
A system and program product are described herein for various techniques for detecting a persistent cross-site scripting vulnerability are described herein. In...
2016/0149945 DIGITAL DYE PACKS
Embodiments relate to systems and methods for providing digital dye packs in connection with a transaction via a device user interface. In an embodiment, a...
2016/0149944 Method For Intrusion Detection In Industrial Automation And Control System
A method and system for automatic signalling an alert when a possible intrusion occurs in an industrial automation and control system, based on security events...
2016/0149943 SYSTEM AND METHOD FOR NETWORK DATA CHARACTERIZATION
Described herein are embodiments of a system and method for network data characterization and/or classification that overcome the defects of the prior art....
2016/0149942 Unauthorized/Malicious Redirection
Method(s) and apparatus are described for use in preventing unauthorised redirection and/or routing of packets transmitted in a communication network. Packets...
2016/0149941 SECURITY LOG MINING DEVICES, METHODS, AND SYSTEMS
Devices, methods, and systems for security log mining are described herein. One method includes combining, using a data fusion unit of an access control...
2016/0149940 METHOD AND SYSTEM TO MODIFY FUNCTION CALLS FROM WITHIN CONTENT PUBLISHED BY A TRUSTED WEB SITE
A network-based publication system, to publish data over a communications network, includes an interface to receive, via the communications network and from a...
2016/0149939 Detecting the Introduction of Alien Content
A computer-implemented method for identifying abnormal computer behavior includes receiving, at a computer server subsystem, data that characterizes subsets of...
2016/0149938 SYSTEM AND METHOD FOR REAL-TIME REMEDIATION RESPECTIVE OF SECURITY INCIDENTS
A system, an apparatus, and a method thereof identifies at least one security threat in an enterprise's network. The system characterizes sources affected by...
2016/0149937 SYSTEMS AND METHODS FOR MALICIOUS CODE DETECTION
There is provided a computer implemented method for detection and prevention of an attempt at establishment of a network connection for malicious...
2016/0149936 METHOD AND SYSTEM FOR DETECTING THREATS USING PASSIVE CLUSTER MAPPING
An approach for detecting network threats is disclosed, that may involve receiving network traffic, plotting the network traffic in a n-dimensional feature...
2016/0149935 DETERMINING A LEGITIMATE ACCESS POINT RESPONSE
A first request is sent from a station to an access point. The station receives a first response from the access point that includes a first sequence number,...
2016/0149934 ILLEGAL MESSAGE DESTROYER
A communication apparatus for preventing the broadcasting of unauthorised messages on a broadcast bus network, the communication apparatus comprising: a...
2016/0149933 COLLABORATIVE NETWORK SECURITY
Security is managed on a collaboration of plural computers that together define a trusted network environment. Each computer presents one or more real services...
2016/0149932 MONITORING USE OF A SENSOR OF A COMPUTING DEVICE
Monitoring use of a sensor of a computing device. A sensor obtains information from an environment of the computing device. A co-processor provides...
2016/0149931 Methods and Systems For Providing Comprehensive Cyber-Security Protection Using An Open Application Programming...
Methods of providing cyber-security services to a plurality of customers include providing a platform that includes a software program that is configured to...
2016/0149930 SYSTEMS AND METHODS FOR PROTECTING AGAINST UNAUTHORIZED NETWORK INTRUSIONS
The disclosed computer-implemented method for protecting against unauthorized network intrusions may include (1) identifying a signal received by one or more...
2016/0149929 Methods, Systems, and Products for Identity Verification
Methods, systems, and products verify an identity claimed by a person. A signature, representing the presence of a device, is acquired. The signature is...
2016/0149928 SECURE GROUP CREATION IN PROXIMITY BASED SERVICE COMMUNICATION
A method of forming a secure group in ProSe communication includes requesting a service request to a ProSe server from a requesting device (21), the service...
2016/0149927 SYSTEM AND METHODS FOR PROTECTING USERS FROM MALICIOUS CONTENT
A method, system and device for allowing the secure collection of sensitive information is provided. The device includes a display, and a user interface...
2016/0149926 Systems and Methods for Facilitating Access to Private Files Using a Cloud Storage System
A method for providing access to objects associated with a particular client in a cloud storage system is disclosed. The method includes the steps of...
2016/0149925 SYSTEMS AND METHODOLOGIES FOR CONTROLLING ACCESS TO A FILE SYSTEM
A method for controlling access to a file system having data elements, including the steps of maintaining a record of respective actual accesses by users of...
2016/0149924 Systems and Methods for Automatic Discovery of Systems and Accounts
In various embodiments, a method comprises scanning a directory structure to generate a scan result comprising a plurality of discovered systems, identifying...
2016/0149923 KEY MANAGEMENT SYSTEM FOR TOLL-FREE DATA SERVICE
A system may receive a network address to be validated to determine whether the network address is associated with a toll-free data service. The system may...
2016/0149922 VISUALIZATION OF ACCESS INFORMATION
A request to access a resource is received from a machine. The request contains machine data. Contextual information is retrieved from the request based on one...
2016/0149921 TRUSTED PERIPHERAL DEVICE FOR A HOST IN A SHARED ELECTRONIC ENVIRONMENT
A trusted peripheral device can be utilized with an electronic resource, such as a host machine, in order to enable the secured performance of security and...
2016/0149920 METHOD AND APPARATUS FOR SPECIFYING TIME-VARYING INTELLIGENT SERVICE-ORIENTED MODEL
A method and an apparatus for specifying a time-varying, intelligent service-oriented model are provided. A method implemented in a computer infrastructure...
2016/0149919 TARGETED USER ACCESS CONTROL SYSTEM
A system includes a network interface, at least one processing device, and at least one memory device. The at least one memory device stores instructions that...
2016/0149918 SECURE INFORMATION INTERACTION METHOD FOR ELECTRONIC RESOURCES TRANSFER
The invention proposes a security information interaction method. In the method, a first security information interaction terminal executes a security...
2016/0149917 SECURITY PROFILE MANAGEMENT IN A MACHINE-TO-MACHINE MESSAGING SYSTEM
Techniques and systems for managing security profiles in a machine-to-machine messaging system are provided. For example, computing device, a method, and a...
2016/0149916 Method and Nodes for Authorizing Network Access
The embodiments herein relate to a method performed by an AAA server (103) for enabling authorization of a wireless device (101) to access a first network...
2016/0149915 METHOD OF PROVIDING FRESH KEYS FOR MESSAGE AUTHENTICATION
The present invention provides a method of operating a mobile unit in a wireless communication system. Embodiments of the method may include providing access...
2016/0149914 User Consent for Generic Bootstrapping Architecture
It is disclosed a method and a bootstrapping client (33) for assuring that a particular user (31) is present at local user authentication. It is also disclosed...
2016/0149913 Access Control in an Information Centric Network
A node (17, 21) in an information centric network (ICN) receives a first identifier associated with an information object. The node (17, 21) causes creation of...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.