Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0156657 SIMULATING A BOT-NET SPANNING A PLURALITY OF GEOGRAPHIC REGIONS
Computer systems and methods in various embodiments are configured to test the security of a server computer by simulating a wide range of attacks from one or...
2016/0156656 Methods, Systems and Media for Evaluating Layered Computer Security Products
Methods, systems and media for evaluating layered computer security products are provided. In some embodiments, the method comprises: (a) identifying portions...
2016/0156655 SYSTEM AND METHODS FOR MALWARE DETECTION USING LOG ANALYTICS FOR CHANNELS AND SUPER CHANNELS
Log based analysis systems and methods for protecting computers and networks from malicious communications and malware attacks by analyzing log data obtained...
2016/0156654 STOPPING AND REMEDIATING OUTBOUND MESSAGING ABUSE
Systems and methods are provided for allowing subscriber message sending profiles to be maintained and used in conjunction with behavior-based anomaly...
2016/0156653 Method and Device for Identifying User Behavior
The present disclosure relates to a method and device for identifying user behavior, which identifies malicious behavior more effectively and accurately. The...
2016/0156652 PATTERN DETECTION IN SENSOR NETWORKS
A method of detecting an anomaly in a sensor network for diagnosing a network attack may include receiving a data set comprising a plurality of vector-valued...
2016/0156651 SMART POWER BACKGROUND TO VALIDATE USER
Technologies are generally described to implement intrusion detection based on smart power background. In some examples, upon detection of an attempt to access...
2016/0156650 SYSTEM AND METHOD FOR STATIC DETECTION AND CATEGORIZATION OF INFORMATION-FLOW DOWNGRADERS
A system and method for static detection and categorization of information-flow downgraders includes transforming a program stored in a memory device by...
2016/0156649 System for Testing Computer Application
This document discloses a method, apparatus, and computer program product for testing a computer program application in a server computer. The method...
2016/0156648 TECHNIQUES FOR SEPARATING THE PROCESSING OF CLIENTS' TRAFFIC TO DIFFERENT ZONES IN SOFTWARE DEFINED NETWORKS
A central controller and a method for separation of traffic processing in a software defined network (SDN). The method comprises: identifying, based on at...
2016/0156647 METHOD AND A DEVICE FOR SECURING A SIGNALLING SYSTEM NO. 7 INTERFACE
A method is provided for securing a Signalling System No. 7 interface, SS7 interface, of a system, via which access to a local mobile radiocommunications...
2016/0156646 SIGNAL TOKENS INDICATIVE OF MALWARE
Example embodiments disclosed herein relate to generate signal tokens indicative of malware. A code analysis is performed on known malware application code and...
2016/0156645 METHOD AND APPARATUS FOR DETECTING MACRO VIRUSES
Disclosed are a method and an apparatus for detecting macro viruses. The method includes: if a data file processing program has already performed an opening...
2016/0156644 HEURISTIC BOTNET DETECTION
In some embodiments, heuristic botnet detection is provided. In some embodiments, heuristic botnet detection includes monitoring network traffic to identify...
2016/0156643 APPARATUS AND METHOD FOR GENERATING PROCESS ACTIVITY PROFILE
An apparatus and method for generating a process activity profile are provided. The apparatus includes a basic process profile generator configured to perform...
2016/0156642 SECURITY INFORMATION AND EVENT MANAGEMENT
Systems (100) and methods (400) for universal interception of events. The methods involve: intercepting functions performed by an OS object manager (302) which...
2016/0156641 IDENTIFICATION OF POTENTIAL FRAUDULENT WEBSITE ACTIVITY
Identification of potential fraudulent website activity is performed based on log entry analysis. A log entry representing a user referral from an external...
2016/0156640 SYSTEM TO IDENTIFY MACHINES INFECTED BY MALWARE APPLYING LINGUISTIC ANALYSIS TO NETWORK REQUESTS FROM ENDPOINTS
A method to identify machines infected by malware is provided. The method includes determining whether a universal resource locator in a network request is...
2016/0156639 METHOD FOR EXCHANGING DATA AND ELECTRONIC DEVICE FOR THE SAME
A technique for exchanging data is carried out when an electronic device is operated to execute the method including the following steps. Firstly, a data...
2016/0156638 SMART BEACON DATA SECURITY
A secure beacon-based system includes beacons that may generate dynamic beacon identifiers. A mobile device application may send a request to an application...
2016/0156637 Methods and Systems for Secured Authentication of Applications on a Network
A secured communication network can include a server including an authentication backend, the authentication backend configured to communicate with an...
2016/0156636 METHOD AND SYSTEM FOR CONTROLLING ACCESS TO WIRELESS APPARATUSES
A system for securely controlling access between two wireless (i.e. Bluetooth-enabled) apparatuses, also comprising a supervisor apparatus. The first apparatus...
2016/0156635 METHOD AND SYSTEM FOR FACILITATING WIRELESS NETWORK ACCESS
Methods and systems for facilitating access to a network (e.g., the Internet) are disclosed herein. A server with processor(s) and memory receives a request...
2016/0156634 Subscription Media On Demand VII
An electronic media distribution/play system includes a service facility that has a communications network interface and maintains a data file catalog. The...
2016/0156633 Access Revocation
Systems and apparatuses for revoking access to one or more applications for one or more individuals or users are provided. In some examples, revocation...
2016/0156632 SYSTEM ON CHIP AND METHOD THEREFOR
A system on chip comprises a responder unit comprising a set of responder elements and an access control unit 484 associated with an authorization list and the...
2016/0156631 METHODS AND SYSTEMS FOR SHARED FILE STORAGE
Systems and Methods for providing access control to files stored on a shared file storage platform in a multi-user environment are described herein. According...
2016/0156630 Cross-Enterprise Workflow
Example systems, methods and storage media to provide a cross-enterprise workflow among clinical systems are disclosed. An example cross-enterprise enabled...
2016/0156629 INFORMATION PROCESSING METHOD, INFORMATION PROCESSING APPARATUS, AND STORAGE MEDIUM
An information processing method executed in a computer, the processing method including: starting a network application that belongs to a specified network...
2016/0156628 AUTOMATIC SHARING OF EVENT CONTENT BY LINKING DEVICES
Embodiments enable content sharing using event notifications that include a global identifier and a private identifier. The event notifications are sent to...
2016/0156627 MUTUAL AUTHENTICATION OF A USER AND SERVICE PROVIDER
The present invention relates to a method and system for mutual authentication of a user and service provider, said method comprising acts of: authenticating...
2016/0156626 MUTUAL AUTHENTICATION WITH SYMMETRIC SECRETS AND SIGNATURES
A client and server negotiate a secure communication channel using a pre-shared key where the server, at the time the negotiation initiates, lacks access to...
2016/0156625 Electronic Messaging Exchange
A computer-implemented system and method for secure electronic message exchange including coupling a control platform to a workstation of a plurality of...
2016/0156624 USER MODE CONTROL METHOD AND SYSTEM BASED ON IRIS RECOGNITION FOR MOBILE TERMINAL
A user mode control method and system based on iris recognition for mobile terminal are provided. When the mobile terminal receives an operation instruction of...
2016/0156623 Method and System for Transmitting and Receiving Data, Method and Device for Processing Message
The disclosure provides a method and system for transmitting and receiving data, and a method and device for processing message. In the method, a relay server...
2016/0156622 SYSTEM AND METHOD FOR PROVIDING A SERVICE TO END TERMINAL THAT USES AUTHENTICATION INFORMATION OF ANOTHER...
The present invention relates to an end-point terminal that uses authentication information of another mobile communication terminal comprising a communication...
2016/0156621 Utilizing a Trusted Platform Module (TPM) of a Host Device
Techniques for utilizing a trusted platform module of a host device are described. According to various embodiments, a client device that does not include a...
2016/0156620 METHOD FOR SECURE USER AND TRANSACTION AUTHENTICATION AND RISK MANAGEMENT
To provide a user signature on a network transaction, a security server receives transaction information representing a transaction between a network user and...
2016/0156619 ONE-TIME-PASSWORD GENERATED ON READER DEVICE USING KEY READ FROM PERSONAL SECURITY DEVICE
An authentication system is provided using one-time passwords (OTPs) for user authentication. An OTP key may be stored on a different device than the device on...
2016/0156618 AUTHENTICATION USING PHYSICAL INTERACTION CHARACTERISTICS
User physical interaction characteristics information or the way a user physically interacts with a device is analyzed to aid in authenticating a user of a...
2016/0156617 SYSTEMS AND METHODS FOR PROVIDING A COVERT PASSWORD MANAGER
The present invention relates to an application that is configured to provide secure access to confidential information. To protect the confidential...
2016/0156616 CLOUD AGENT DEVICE, CLOUD STORAGE AND FILE TRANSFERRING METHOD
A cloud agent device including, determines whether the size of the file is less than the size of the remaining capacity of the second cloud storage, validating...
2016/0156615 Storage Medium Storing Conference Setting Program and Conference Setting Method
A conference setting method includes: displaying a first setting screen on a particular terminal configured to perform a setting operation of a teleconference,...
2016/0156614 PROVISIONING A DEVICE OVER AN INTERNET OF THINGS
Disclosed is a method and system for provisioning a device over an Internet of Things (IoT) platform for establishing a bidirectional communication between the...
2016/0156613 PASS THROUGH SERVICE LOGIN TO APPLICATION LOGIN
Pass through service login for an application can include receiving, within a client system, a credential from a Web-based service responsive to a successful...
2016/0156612 Smartphone and Computer Application for Personal Meetings Documentation that Enables Access to the...
An application that enables documentation of meetings using a Smartphone or internet-based communication programs installed on a computer whereby the...
2016/0156611 MULTIPARTY SECRET PROTECTION SYSTEM
A secret protection method operative on a user's device with a group of servers includes concealing a secret on the user's device with the user's password, the...
2016/0156610 Message Pushing System And Method
A message pushing system and method are provided, where a message pushing server receives a push message and generates a message identification corresponding...
2016/0156609 DETERMINING USER AUTHENTICATION REQUIREMENTS BASED ON THE CURRENT LOCATION OF THE USER BEING WITHIN A...
Systems, apparatus, methods, and computer program products are provided for determining a user's authentication requirements/credentials for a specific network...
2016/0156608 DETERMINING USER AUTHENTICATION REQUIREMENTS BASED ON THE CURRENT LOCATION OF THE USER BEING WITHIN A...
Systems, apparatus, methods, and computer program products are provided for determining a user's authentication requirements/credentials for a specific network...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.