Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0197968 Private Interaction Hubs
A mobile device has memory storage to maintain hub data that is associated with a private interaction hub, where the hub data includes multiple types of...
2016/0197967 DISCOVERY PLAYLIST CREATION
One embodiment provides a non-transitory medium containing computer program code that performs an operation that includes retrieving, for each of two or more...
2016/0197966 VIRTUAL PRIVATE MEETING ROOM
A conference session is established. Different unique identifications and persistent dedicated virtual private network conference rooms are assigned to...
2016/0197965 METHOD AND ARRANGEMENT FOR MANAGING SECURITY RECONFIGURATION IN ACELLULAR COMMUNICATION SYSTEM
Methods are discussed of managing security reconfiguration and cell update procedures in a user equipment and in a node in a cellular communication system and...
2016/0197964 System and Method of Generating Verification Code
The present disclosure provides techniques for redrawing a new diagram authentication code. An existing diagram authentication code and a rendering style...
2016/0197963 APPLICATION LAYER-BASED SINGLE SIGN ON
Methods and systems are provided for implementing application layer security. According to one embodiment, security rules applicable to end users of a private...
2016/0197962 Network Access Control with Compliance Policy Check
Embodiments of the present invention include methods involving an authentication application, a client application, or a combination of a network access...
2016/0197961 INTER-DOMAIN REPLICATION OF SERVICE INFORMATION
An automated conversion of service information that includes endpoint addresses of service providers and security policies between independent enterprise...
2016/0197960 IC CHIP, INFORMATION PROCESSING APPARATUS, SYSTEM, METHOD, AND PROGRAM
An IC chip, an information processing apparatus, system, method, and program are provided. An IC chip includes an authentication control unit configured to...
2016/0197959 ASSURED FEDERATED RECORDS MANAGEMENT
A record is managed by obtaining from an external system on which a stored object comprising the record is stored a property of the stored object as stored on...
2016/0197958 ISSUING SECURITY COMMANDS TO A CLIENT DEVICE
Disclosed are various embodiments for ensuring a client device complies with a compliance rule. An application executed by the client device can receive a...
2016/0197957 APPARATUS FOR MEASURING SIMILARITY BETWEEN INTRUSION DETECTION RULES AND METHOD THEREFOR
The present invention relates to an apparatus and method that check similarity between intrusion detection rules used by an Intrusion Detection System. The...
2016/0197956 APPLYING GROUP POLICIES
Information corresponding to a set of signatures is maintained, and for each signature in the set, an associated group policy of a network is maintained. A...
2016/0197955 System and Method for Automatic Detection of Attempted Virtual Function Table or Virtual Function Table Pointer...
System, method and media are shown for automatically detecting an attempted V-table exploit based attack involving receiving crash dump data relating to a...
2016/0197954 DEFENDING AGAINST FLOW ATTACKS
A network device maintains a sharing token bucket for all sessions in a semi-connection state; a packet is received by the network device; a flow control for...
2016/0197953 Apparatus and method for assessing financial loss from cyber threats capable of affecting at least one computer...
Apparatus and method for assessing financial loss posed by cyber threats capable of affecting at least one computer network in which a plurality of systems...
2016/0197952 LOG ANALYSIS SYSTEM
A log analysis system for analyze a detection log detected in a monitoring target system includes an acquisition device for detecting detection target...
2016/0197951 METHOD AND SYSTEM FOR VIRTUAL ASSET ASSISTED EXTRUSION AND INTRUSION DETECTION AND THREAT SCORING IN A CLOUD...
An analysis trigger monitoring system is provided in one or more virtual assets. One or more analysis trigger parameters, including security threat patterns,...
2016/0197950 DETECTION SYSTEM AND METHOD FOR STATICALLY DETECTING APPLICATIONS
Disclosed is a method for statically detecting applications, the method including: intercepting, by an acquisition device of the detection system, at least one...
2016/0197949 SECURE DIGITAL TRAFFIC ANALYSIS
A network monitoring "sensor" is built on initial startup by checking the integrity of the bootstrap system and, if it passes, downloading information from...
2016/0197948 SYSTEM FOR DETECTING ABNORMAL BEHAVIOR BY ANALYZING PERSONALIZED INITIAL USE BEHAVIOR PATTERN
An abnormal behavior detection system includes a context information reception unit receiving a variety of types of context information from a context...
2016/0197947 SYSTEM FOR DETECTING ABNORMAL BEHAVIOR BY ANALYZING PERSONALIZED USE BEHAVIOR PATTERN DURING ENTIRE ACCESS PERIOD
An abnormal behavior detection system includes a context information reception unit receiving a variety of types of context information from a context...
2016/0197946 System and Method for Monitoring a Computer System Using Machine Interpretable Code
A computer implemented method of monitoring a collector computer system includes receiving machine interpretable code that is configured for interpretation by...
2016/0197945 PROTECTING AGAINST THE INTRODUCTION OF ALIEN CONTENT
In one implementation, a computer-implemented method can identify abnormal computer behavior. The method can receive, at a computer server subsystem and from a...
2016/0197944 CONTROLLER AREA NETWORK BUS MONITOR
Techniques for monitoring a controller area network bus are described herein. In one example, a system comprises a processor that is to detect a message from a...
2016/0197943 System and Method for Profiling System Attacker
Systems, methods and media are shown for generating a profile score for an attacker involving a detection unit configured to identify one or more malicious...
2016/0197942 COLLABORATIVE CONTENT EVALUATION
In an example embodiment, a system for evaluating published content is provided. The system includes at least one processor and a plurality of components...
2016/0197941 THREAT INTELLIGENCE ON A DATA EXCHANGE LAYER
In an example, a threat intelligence controller is configured to operate on a data exchange layer (DXL). The threat intelligence controller acts as a DXL...
2016/0197940 MULTI-NETWORK VIRUS IMMUNIZATION
An apparatus, device, methods, computer program product, and system are described that determine a virus associated with a communications network, and...
2016/0197939 Segment Authentication for Dynamic Adaptive Streaming
A method including generating a segment signature for a segment of a media content based on the segment, trusted information contained in a media presentation...
2016/0197938 Systems and Methods for Authenticating Digital Content
A digital marking module in a first computer memory receives a data file including original media content. The digital marking module accesses, from a second...
2016/0197937 HARDWARE SECRET USAGE LIMITS
A hardware secret is securely maintained in a computing device. The device operates in accordance with a usage limit corresponding to a limited number of...
2016/0197936 POLICY TRACKING IN A NETWORK THAT INCLUDES VIRTUAL DEVICES
A method performed by a network device includes: receiving an input indicating a change in an auxiliary network from a first configuration to a second...
2016/0197935 SYSTEM FOR AUTHORIZING ELECTRONIC COMMUNICATION OF CONFIDENTIAL OR PROPRIETARY DATA TO EXTERNAL ENTITIES
A platform for providing authorization of electronic communication of secure data to external entities, e.g., vendors, third parties or the like based on an...
2016/0197934 SECURE DATA MANAGEMENT TECHNIQUES
The present disclosure relates generally to secure data management techniques. Techniques are described for pairing devices and using the pairing information...
2016/0197933 SECURE PERSONAL SERVER SYSTEM AND METHOD
A provider computer announces content to the provider computer and establishes a secure connection to a VPN server. Requests for the content are received in...
2016/0197932 VEHICLE MODULE UPDATE, PROTECTION AND DIAGNOSTICS
Updating, protecting, diagnosing and/or otherwise managing a server, module or other analogous device(s) included on a vehicle for the purposes of facilitating...
2016/0197931 Using a File Whitelist
A method and/or system for using a file whitelist may include receiving a request to approve an application for release in an application store. The request...
2016/0197930 CENTRALIZED SELECTIVE APPLICATION APPROVAL FOR MOBILE DEVICES
A system and method for confirming an application change event associated with a device infrastructure of a mobile device, the method comprising: identifying...
2016/0197929 AUTHENTICATED INFORMATION EXCHANGE
An authenticated information exchange for creating value in an agricultural producers' information, the exchange including an electronic information storage...
2016/0197928 Seamless Wi-Fi Subscription Remediation
The exemplary embodiments include a method to perform, based on at least one of hypertext transport protocol and non-hypertext transport protocol traffic tests...
2016/0197927 NETWORK ACCESS METHOD, PROXIMITY COMMUNICATIONS SERVER, RELAY TERMINAL AND TERMINAL
Embodiments of the present invention provide a network access method, a proximity communications server, a relay terminal, and a terminal. The method includes:...
2016/0197926 MULTI-TENANCY GOVERNANCE IN A CLOUD COMPUTING ENVIRONMENT
A cloud computing system includes a plurality of tenants that are permitted to access cloud hosted applications. The system includes an input governance layer...
2016/0197925 INFORMATION PROCESSING APPARATUS AND METHOD, AND PROGRAM
A system includes circuitry that receives a request for, and generates, individual terminal identification information. The individual terminal identification...
2016/0197924 SECURE PERSONAL SERVER SYSTEM AND METHOD
A provider computer announces content to the provider computer and establishes a secure connection to a VPN server. Requests for the content are received in...
2016/0197923 SECURE, UNINTERRUPTED OPERATION OF MOBILE DEVICES
The disclosed embodiments relate to a system and method for secure, uninterrupted operation of a mobile device. The method includes identifying, at repeated...
2016/0197922 METHOD AND APPARATUS FOR PROVIDING BOOTSTRAPPING PROCEDURES IN A COMMUNICATION NETWORK
An approach is provided for performing authentication in a communication system. In one embodiment, a key is established with a terminal in a communication...
2016/0197921 Secure Data Transmission System
A secure messaging system that requires pairing of second and receiving devices via user identification credentials and the associated media access control...
2016/0197920 SCALABLE FULL SPECTRUM CYBER DETERMINING MACHINE
A scalable universal full spectrum cyber determining machine for accurately and reliably determining and reporting any cyber determination from a full spectrum...
2016/0197919 REAL IDENTITY AUTHENTICATION
A real identity biometric authentication device includes a USB thumb drive form factor, with a biometric sensor and designated device processor and stored...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.