Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0182544 METHOD OF PROTECTING A NETWORK COMPUTER SYSTEM FROM THE MALICIOUS ACTS OF HACKERS AND ITS OWN SYSTEM ADMINISTRATORS
A method that protects a network computer system from the malicious acts of hackers and its own system administrators includes a behavior analysis of system...
2016/0182543 SOFTWARE TAMPERING DETECTION AND REPORTING PROCESS
A method is disclosed. The method includes determining, by a security software application on a communication device, that the communication device has been...
2016/0182542 DENIAL OF SERVICE AND OTHER RESOURCE EXHAUSTION DEFENSE AND MITIGATION USING TRANSITION TRACKING
Described is a method and system for determining a suspect in a resource exhaustion attack, for example DDoS (Distributed Denial of Service Attack), against a...
2016/0182541 METHOD FOR DETECTING INTRUSION IN NETWORK
A method for detecting an intrusion in a network is disclosed. The network includes a plurality of nodes for data transmission/reception and switches for...
2016/0182540 METHODS AND APPARATUS FOR APPLICATION ISOLATION
Processor(s) for detecting malicious software. A hardware virtual machine monitor (HVMM) operates under a host OS. Container(s) initialized with network...
2016/0182539 DETECTION OF A MALICIOUS PERIPHERAL
Particular embodiments described herein provide for an electronic device that can be configured to determine when a peripheral is connected to the electronic...
2016/0182538 DETERMINING A REPUTATION THROUGH NETWORK CHARACTERISTICS
Particular embodiments described herein provide for an electronic device that can be configured to monitor network traffic to and from a device, compare the...
2016/0182537 HTML SECURITY GATEWAY
A technique allows a client computing system with a web browser to receive a web page in response to transmitting a request for content. The web page may...
2016/0182536 ADAPTING USER TERMINAL APPLICATION OPERATION RESPONSIVE TO MEASURED USER BEHAVIOR
User profile information is generated which characterizes measured user's interaction with an application program that is encapsulated by the computer readable...
2016/0182535 Equipment And Network Health Monitoring Using Security Systems
A monitoring system is continuously coupled to and in communication with a selected network. The system monitors characteristics of the network, and also...
2016/0182534 RELIABLE SELECTION OF SECURITY COUNTERMEASURES
Among other things, this document describes a computer-implemented security method such as for authenticated selection of security countermeasures and for...
2016/0182533 COMPUTER DEFENSES AND COUNTERATTACKS
A method includes instantiating a first detection agent based on detection criteria, where the first detection agent includes first program code executable by...
2016/0182532 SYSTEMS AND METHODS FOR STERILIZING EMAIL ATTACHMENTS AND OTHER COMMUNICATIONS DELIVERED BY EMAIL
A system for sterilizing data sent through electronic messages includes first computing circuitry configured to receive a first electronic communication...
2016/0182531 INPUT VERIFICATION
In an example, a computing device may an input verification engine (IVE) that provides input verification services within a trusted execution environment...
2016/0182530 Application with Multiple Operation Modes
A method and system for operating an application with multiple modes are described. A plurality of applications may be presented to a user on a mobile device...
2016/0182529 SYSTEMS AND METHODS FOR SECURE LOCATION-BASED DOCUMENT VIEWING
A computer-implemented method, the method being performed in a computerized system incorporating a central processing unit, a localization signal receiver, a...
2016/0182528 SYSTEMS AND METHODS OF GEO-LOCATION BASED COMMUNITY OF INTEREST
The embodiments described herein recite a geo-location based community of interest (COI) system and method which add the capability to configure Network...
2016/0182527 METHOD AND SYSTEM FOR PROVIDING PERMISSIONS MANAGEMENT
Reference architecture pattern role data representing reference architecture pattern roles to be associated with entities taking part in the development,...
2016/0182526 Social network privacy management systems and methods
A first privacy setting notification is provided to a user. Events are monitored to determine satisfaction of a privacy trigger condition based at least in...
2016/0182525 SECURITY AND PERMISSION ARCHITECTURE
When a user inputs an action request, such as a requested command, to be performed on a target machine, a management system receives the request and verifies...
2016/0182524 SYSTEM PLATFORM FOR CONTEXT-BASED CONFIGURATION OF COMMUNICATION CHANNELS
The techniques described herein include configuration of channels between devices and service providers at a connectable system platform. For example, a system...
2016/0182523 UNIFIED IDENTITY VERIFICATION
Apparatus, systems, and methods are disclosed that operate to receiving an authentication request at a server associated with an authenticating entity from a...
2016/0182522 CLOUD-BASED DATA PROVIDING METHOD AND SYSTEM
The present invention relates to a cloud based data providing method and a cloud based data providing system, and more particularly, to a method and a system...
2016/0182521 System and Method for Associating a Universal User Identification and a Domain Specific User Identification
There is presented a system and method for associating a domain transcendent identification (ID) of a user and a domain specific ID of the user, the system...
2016/0182520 METHOD, APPARATUS AND SYSTEM FOR CLIENT ACCESSING AUTHENTICATED WEB ADDRESS
The invention discloses a method, an apparatus and a system for a client accessing an authenticated web address. The method comprises: automatically querying a...
2016/0182519 METHOD AND SYSTEM RELATED TO AUTHENTICATION OF USERS FOR ACCESSING DATA NETWORKS
The present invention relates to a system and method for authenticating a user that requests access to services of a computer network, comprising using a...
2016/0182518 Self-Organizing Trusted Networks
Organizing a trusted network includes receive, by a local device, a message from a first remote trusted device identifying a first service hosted by the first...
2016/0182517 WEB FORM PROTECTION
A request for a web page is received and the requested web page is retrieved. The web page is modified to obfuscate a set of form attribute values into a...
2016/0182516 PRESENTING AUTHORIZED DATA TO A TARGET SYSTEM
Embodiments of the invention are directed to systems, methods, and computer program products for presenting authorized data to a target system. The system is...
2016/0182515 MULTI-SOURCE CONTENT GENERATION
As may be implemented in accordance with one or more embodiments, specific electronic magazines are generated based on user interests as follows. Respective...
2016/0182514 WLAN AUTHENTICATION ACCESS CONTROL
Authentication control for devices within a cellular network is provided. The authentication between a device and an authenticating entity within the cellular...
2016/0182513 Automatic Configuration of Household Playback Devices
An example implementation involves a first playback device receiving, from a remote server over a wide area network, a configuration table corresponding to a...
2016/0182512 APPARATUS AND METHOD FOR SECURE PROVISIONING OF A COMMUNICATION DEVICE
A system that incorporates the subject disclosure may perform, for example, receiving an over-the-air programming message that includes programming data for...
2016/0182511 AUTOMATED SECURITY TOKEN ADMINISTRATIVE SERVICES
This invention provides a system, method and computer program product to allow a user to access administrative security features associated with the use of a...
2016/0182510 APPARATUS MANAGEMENT SYSTEM, APPARATUS MANAGEMENT METHOD, AND PROGRAM
A apparatus management system includes: a forwarding node(s) that supplies identification information that uniquely identifies an individual terminal to a...
2016/0182509 TECHNIQUES FOR LOAD BALANCING IN A PACKET DISTRIBUTION SYSTEM
Various embodiments are generally directed to techniques to distribute encrypted packets among multiple cores in a load-balanced manner for further processing....
2016/0182508 IDENTITY ATTESTATION OF A MINOR VIA A PARENT
A technique allows a parentally attested security token to serve as authentication for a minor using identifying attributes of the minor child. The security...
2016/0182507 Wireless Pairing and Communication Between Devices Using Biometric Data
In a first implementation, a host determines to pair with a device and transmits biometric data for a user to the device. The device receives the transmitted...
2016/0182506 SYSTEM AND METHOD FOR GENERATING A BIOMETRIC IDENTIFIER
Systems and methods are provided for recording a user's biometric features and generating an identifier representative of the user's biometric features using...
2016/0182505 SYSTEM AND METHOD FOR DETERMINING LIVENESS
Systems and methods are provided for recording a user's biometric features and generating an identifier representative of the user's biometric features and...
2016/0182504 METHOD AND APPARATUS FOR PROCESSING A RTCWEB AUTHENTICATION
Systems and methods of processing a real-time communication in web-browsers (RTCWEB) authentication by a first server are disclosed. These include receiving a...
2016/0182503 CONTINUOUS AUTHENTICATION OF MOBILE DEVICE USERS
Technology for performing continuous authentication of a mobile device utilizes user activity context data and biometric signature data related to the user. A...
2016/0182502 USER PROFILE SELECTION USING CONTEXTUAL AUTHENTICATION
In embodiments, apparatuses, methods and storage media (transitory and non-transitory) are described that are associated with user profile selection using...
2016/0182501 MOBILE USER INTERFACE SYSTEM AND METHODS THEREFOR
A system. At least some embodiments are a system including a first processor and a non-volatile random access memory coupled to the first processor, the...
2016/0182500 SYSTEMS AND METHODS FOR ANONYMOUS AUTHENTICATION USING MULTIPLE DEVICES
A system and method of anonymous authentication is described. In operation, the authenticator receives a request to access a resource from one of the user...
2016/0182499 TRUST ESTABLISHMENT BETWEEN A TRUSTED EXECUTION ENVIRONMENT AND PERIPHERAL DEVICES
Technologies are provided in embodiments to establish trust between a trusted execution environment (TEE) and a peripheral device. Embodiments are configured...
2016/0182498 SEPARATED USE MOBILE DEVICES
Separated use mobile devices may be provided having multiple memories associated respectively with multiple operating environments that are managed by a common...
2016/0182497 TRUSTED EPHEMERAL IDENTIFIER TO CREATE A GROUP FOR A SERIVCE AND/OR TO PROVIDE THE SERVICE
Devices and methods may provide for generating and/or using a trusted ephemeral identifier (TEID) to create a group for a service, and/or to provide the...
2016/0182496 EXTENSION OF TRUST IN A BODY AREA NETWORK
Systems and techniques for extension of trust in a body area network are described herein. A device that may be a potential participant of the body area...
2016/0182495 AUTHENTICATOR DEVICE FACILITATING FILE SECURITY
Disclosed are various embodiments for facilitating the encryption of files as well as facilitating requiring a user to employ an authenticator device in order...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.