Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0212175 Administration of a context-based cloud security assurance system
A cloud infrastructure is enhanced to provide a context-based security assurance service to enable secure application deployment. The service inspects network...
2016/0212174 SECURITY TECHNIQUES FOR DEVICE ASSISTED SERVICES
A wireless end-user device has a wireless wide-area network (WWAN) modem and multiple execution environments. Applications execute in an application execution...
2016/0212173 PREVALENCE-BASED REPUTATIONS
In an example, there is disclosed a method and system for calculating an object's trust level for security purposes based on prevalence in a context-aware...
2016/0212172 VISUALLY INTUITIVE INTERACTIVE NETWORK MANAGEMENT
Network security management technology as disclosed herein generates and dynamically updates an intuitive, interactive visualization of a computer network in...
2016/0212171 VISUALLY INTUITIVE INTERACTIVE NETWORK CYBER DEFENSE
Network security management technology as disclosed herein generates and dynamically updates an intuitive, interactive visualization of a computer network in...
2016/0212170 GENERALIZED SECURITY POLICY USER INTERFACE
A management entity displays a plurality of icons, each icon representing an actor or a resource in a networking environment. The management entity defines...
2016/0212169 SECURITY POLICY UNIFICATION ACROSS DIFFERENT SECURITY PRODUCTS
A management entity receives from multiple security devices corresponding native security policies each based on a native policy model associated with the...
2016/0212168 CREATION OF SECURITY POLICY TEMPLATES AND SECURITY POLICIES BASED ON THE TEMPLATES
A management entity generates selectable security policy classifications each identifying security policies that share common security rules. Each of the...
2016/0212167 CLASSIFICATION OF SECURITY POLICIES ACROSS MULTIPLE SECURITY PRODUCTS
A management entity connects with multiple security devices across a network. Each security device operates in accordance with one or more security policies....
2016/0212166 MANAGEMENT OF SECURITY POLICIES ACROSS MULTIPLE SECURITY PRODUCTS
A management entity discovers security devices connected to a network. Each security device controls access to resources by devices associated with the...
2016/0212165 HIERARCHICAL THREAT INTELLIGENCE
A device for providing hierarchical threat intelligence includes a non-transitory machine-readable storage medium storing instructions that cause the device to...
2016/0212164 VERIFICATION OF COMPUTER SYSTEM PRIOR TO AND SUBSEQUENT TO COMPUTER PROGRAM INSTALLATION
Embodiments of the present invention provide a method, system, and computer program product for debugging a computer environment. In an embodiment of the...
2016/0212163 Method and Apparatus to Identify the Source of Information or Misinformation in Large-Scale Social Media Networks
A system and method of detecting a source of a rumor in a social media network is disclosed. The social media network includes a plurality of node clusters,...
2016/0212162 INTRUSION DETECTION MECHANISM
In one embodiment, a method implemented on a node connected to a network bus includes: storing one or more message identifiers, the one or more identifiers...
2016/0212161 STATISTICAL ANALYTIC METHOD FOR THE DETERMINATION OF THE RISK POSED BY FILE BASED CONTENT
A system and method for calculating a risk assessment for an electronic file is described. A database of checks, organized into categories, can be used to scan...
2016/0212160 METHOD, DEVICE AND SYSTEM FOR ALERTING AGAINST UNKNOWN MALICIOUS CODES
A method, a device, and a system for alerting against unknown malicious codes are disclosed. The method includes: detecting characteristics of a packet;...
2016/0212159 AUTOMATED RUNTIME DETECTION OF MALWARE
One example method and correspond apparatus extracts a model of a computer application during load time and stores the model of the computer application in a...
2016/0212158 DISTRIBUTED PATTERN DISCOVERY
Example embodiments disclosed herein relate to distributed pattern discovery. Single item itemsets are received. A new candidate item set is built for the...
2016/0212157 SYSTEM AND METHOD FOR ANALYZING LARGE-SCALE MALICIOUS CODE
A system for analyzing large-scale malicious codes includes a malicious code management server dividing suspected malicious traffic collected into a plurality...
2016/0212156 SYSTEM AND METHOD FOR DETECTING MALICIOUS CODE BASED ON APPLICATION PROGRAMMING INTERFACE
A system for detecting malicious codes based on API includes: a malicious code management server storing first suspected malicious executable files extracted...
2016/0212155 SYSTEM AND METHOD FOR BLOCKING ELEMENTS OF APPLICATION INTERFACE
A method, system and computer program product for blocking access to restricted elements of application interface and covering the restricted elements by...
2016/0212154 METHOD AND SYSTEM FOR HANDLING MALWARE
Systems, methods, and software products prevent malware attacks on networks, which include endpoint devices, by providing an environment to the endpoint device...
2016/0212153 Code Labeling Based on Tokenized Code Samples
Disclosed herein are systems and methods for detecting script code malware and generating signatures. A plurality of script code samples are received and...
2016/0212152 Method and Apparatus of Identifying User Risk
The present disclosure provides techniques to identify suspicious user logins. These techniques may include acquiring, by a computing device, a routing path...
2016/0212151 SERVICE PROVISION METHOD
A service providing method using a server that controls an electronic device from a terminal through a network, includes a first registration step of...
2016/0212150 METHOD AND APPARATUS FOR VERIFYING SOURCE ADDRESSES IN A COMMUNICATION NETWORK
In one embodiment, a method includes receiving a packet from an end node, the packet comprising an authenticated source MAC (Media Access Control) address and...
2016/0212149 PROCEDURE FOR THE PREPARATION AND PERFORMING OF A POST ISSUANCE PROCESS ON A SECURE ELEMENT
The invention relates to a method for enabling post issuance operation on a secure element connectable to a communication device. The method allows an SE...
2016/0212148 NETWORK-LAYER APPLICATION-SPECIFIC TRUST MODEL
A data verification system facilitates verifying whether a CCN Content Object is authentic or trustworthy on behalf of an application. During operation, the...
2016/0212147 METHOD, APPARATUS, AND COMPUTER PROGRAM PRODUCT FOR A SERVER CONTROLLED DEVICE WAKEUP
In an example embodiment, a method includes receiving, by an apparatus, from a remote server, a message including information about at least one device, the...
2016/0212146 PEDDaL Blockchaining for Document Integrity Verification Preparation
Systems and methods are disclosed which use a block chain ("blockchain") to enable the establishment of file dates and the absence of tampering, even for...
2016/0212145 SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR MANAGING ACCESS TO SYSTEMS, PRODUCTS, AND DATA BASED ON...
In accordance with embodiments, there are provided mechanisms and methods for managing access to data based on information associated with a physical location...
2016/0212144 Authenticating Customers and Managing Authenticated Sessions
Methods, systems, and computer-readable media for authenticating customers of an organization and managing authenticated sessions of various customers are...
2016/0212143 METHOD AND SYSTEM FOR COMPILING MAP DATA
In compiling map data, a server communicates with a programmable device and determines an authorization level of the device or a user of the device by...
2016/0212142 PURPOSE-SPECIFIC PACKAGES
Embodiments are provided for grouping documents into purpose-specific packages according to package settings, such as provided in a set of purpose-specific...
2016/0212141 INVISIBLE PASSWORD RESET PROTOCOL
Techniques are disclosed herein for facilitating invisible password reset protocols. More specifically, the techniques described herein eliminate the need for...
2016/0212140 ZEROCONF PROFILE TRANSFERRING TO ENABLE FAST ROAMING
Example embodiments relate to zeroconf profile transferring to enable fast roaming. In example embodiments, user identification is received from a user...
2016/0212139 Session Security Splitting and Application Profiler
Intelligent methods of providing online security against hackers, which prevents the hackers from obtaining unauthorized access to secure resources. A first...
2016/0212138 CONTEXTUALLY AWARE SHARING RECOMMENDATIONS
A profile is configured with permissions that may be shared with other profiles. Contextual data defining user activity, preferences, and/or other contextual...
2016/0212137 METHODS AND RESOURCES FOR CREATING PERMISSIONS
A method of creating, at a permissions management resource, access permissions relating to a subject device for at least one data processing device, the method...
2016/0212136 REMOTE ACCESS TO RESOURCES OVER A NETWORK
Systems and techniques are provided for controlling requests for resources from remote computers. A remote computer's ability to access a resource is...
2016/0212135 CLINICAL-PATH MANAGEMENT SERVER AND CLINICAL-PATH MANAGEMENT SYSTEM
A request distribution unit, an SO acquisition request reception unit, a creation request issuance unit, and an authorization unit are added to the...
2016/0212134 ONE STEP SECURITY SYSTEM IN A NETWORK STORAGE SYSTEM
This is directed to providing access to content stored on a local cloud. In particular, a device can direct a librarian service overseeing the operation of a...
2016/0212133 SYSTEM AND METHODS FOR POLICY-BASED ACTIVE DATA LOSS PREVENTION
A system and method for policy-based active Data Loss Prevention (DLP) using a two-step process to first determine if an attempt to access a data object is...
2016/0212132 CONTEXT-BASED POSSESSION-LESS ACCESS OF SECURE INFORMATION
Systems, software, techniques and apparatuses are disclosed herein for facilitating context-based possession-less access to secure information. More...
2016/0212131 INFORMATION PROCESSING SYSTEM, USER TERMINAL, AND DATA PROCESSING DEVICE
An information processing system, comprising a user terminal that sends a process target data designated by a user to a remote storage system via a network,...
2016/0212130 INFORMATION PROCESSING APPARATUS, POLICY MANAGEMENT APPARATUS, SECURITY POLICY MANAGEMENT METHOD, AND STORAGE...
When an expanded application (AP) is installed, an information processing apparatus analyzes port control information relating to a unique port to be used by...
2016/0212129 System for Accessing Data from Multiple Devices
A method of accessing data at a device, wherein the data is stored remotely from the device or in removable storage, comprises the following steps: (i) sending...
2016/0212128 Rolling Security Platform
A method of rolling security for a system that includes multiple server groups, such as a first server group of one or more servers and a second server group...
2016/0212127 VERIFYING AN APPLICATION IDENTIFIER ON A MOBILE DEVICE THROUGH A TELECOMMUNICATION NETWORK
A system for verifying an association between an application and a mobile computing device. The application is identified by an application instance...
2016/0212126 SECURE IDENTITY AUTHENTICATION IN AN ELECTRONIC TRANSACTION
An approach is provided for securely authenticating an identity of a user participating in an electronic transaction. A request is received from a mobile...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.