Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0219079 AUTONOMOUS CONTROL SYSTEMS AND METHODS FOR PROTECTING INFRASTRUCTURE
A system for autonomous enforcement of rules may comprise a protected system, including infrastructure, operative in response to input signals and an...
2016/0219078 MULTIMODAL HELP AGENT FOR NETWORK ADMINISTRATOR
Network management technology as disclosed herein generates and dynamically updates an intuitive, interactive visualization of a computer network in live...
2016/0219077 INTEGRATED SECURITY MANAGEMENT
A system for configuring a plurality of security devices is provided. The system is configured to automatically generate one or more policy definition files...
2016/0219076 HARDWARE TRUST FOR INTEGRATED NETWORK FUNCTION VIRTUALIZATION (NFV) AND SOFTWARE DEFINED NETWORK (SDN) SYSTEMS
A data communication system has data processing circuitry to transfer data communications. Trust modules establish and maintain network trust of the data...
2016/0219075 POLICY CONFLICT RESOLUTION ENGINE FOR MOBILE APPLICATION MANAGEMENT
A method includes performing operations as follows on a processor: receiving a notification from a mobile application management server in an enterprise...
2016/0219074 SHARED MAC BLOCKING
For enhancing security in a complex network by a computer processor device, a processor collaborates with at least one additional processor device in a higher...
2016/0219073 ENCRYPTION LEVELS FOR SECURE APPLICATION CONTAINERS
Systems, methods, and software described herein provide encryption configurations for secure application containers. In one example, a method of operating a...
2016/0219072 NETWORK ATTACK DETECTION ON A MOBILE API OF A WEB SERVICE
Techniques to validate web service requests from applications executing on wireless communication devices are disclosed herein. In at least one implementation,...
2016/0219071 DATA VISUALIZATION IN SELF LEARNING NETWORKS
In one embodiment, a first device in a network maintains raw traffic flow information for the network. The first device provides a compressed summary of the...
2016/0219070 ANOMALY DETECTION USING NETWORK TRAFFIC DATA
In one embodiment, a device in a network receives traffic metrics for a plurality of applications in the network. The device populates a feature space for a...
2016/0219069 METHOD FOR DETECTING ANOMALIES IN NETWORK TRAFFIC
The invention concerns a method for detecting anomalies in network traffic, said traffic being transmitted by a server (10) in response to requests from at...
2016/0219068 METHOD AND APPARATUS FOR AUTOMATICALLY IDENTIFYING SIGNATURE OF MALICIOUS TRAFFIC USING LATENT DIRICHLET ALLOCATION
A method and apparatus for automatically identifying the signature of malicious traffic using latent Dirichlet allocation. A signature identification apparatus...
2016/0219067 METHOD OF DETECTING ANOMALIES SUSPECTED OF ATTACK, BASED ON TIME SERIES STATISTICS
Disclosed is a method of detecting anomalies suspected of an attack based on time series statistics according to the present invention. The method of detecting...
2016/0219066 EVENT CORRELATION IN A NETWORK MERGING LOCAL GRAPH MODELS FROM DISTRIBUTED NODES
In one embodiment, a device in a network receives an indication of a network anomaly detected by a first graph-based anomaly detection model hosted by a first...
2016/0219065 PACKET CAPTURE FOR ANOMALOUS TRAFFIC FLOWS
In one embodiment, a first device in a network identifies an anomalous traffic flow in the network. The first device reports the anomalous traffic flow to a...
2016/0219064 Method and Product for Providing a Predictive Security Product and Evaluating Existing Security Products
A method, product and computer program product for building a malware detector, the method including the steps of: receiving at least one characteristic for...
2016/0219063 CONTEXT-AWARE NETWORK ON A DATA EXCHANGE LAYER
In an example, a context-aware network is disclosed, including threat intelligence services provided over a data exchange layer (DXL). The data exchange layer...
2016/0219062 ANTI-MALWARE DETECTION AND REMOVAL SYSTEMS AND METHODS
An anti-malware system including at least one database, remote from a plurality of computers to be protected, which stores identification of computer...
2016/0219061 CONDITIONAL PROXIMITY BASED EQUIPMENT AUTHORIZATION KEY
An device for conditional, proximity based authorization for the use of equipment. The apparatus can comprise a key device capable of determining a position of...
2016/0219060 IDENTITY PROXY TO PROVIDE ACCESS CONTROL AND SINGLE SIGN ON
Techniques to provide secure access to a cloud-based service are disclosed. In various embodiments, a request is received from a client app on a device to...
2016/0219059 METHOD OF PROVIDING TELEMATICS SERVICE AND REGISTERING VEHICLE AND APPARATUS THEREFOR
A method of providing a telematics service and registering a vehicle may acquire member information, create an account using the member information, log in to...
2016/0219058 SYSTEM AND METHOD FOR FILE SHARING
A file sharing system may comprise a server configured to store a sharing file having one or more versions and an identifier of the sharing file, receive the...
2016/0219057 PRIVACY CONTROLLED NETWORK MEDIA SHARING
A Privacy Controlled Social Network including a first device that shares content with a second device through at least one network, where content is "encoded"...
2016/0219056 METHODS, APPARATUS, AND SYSTEMS FOR RESOURCE ACCESS PERMISSION MANAGEMENT
A resource permission management method is disclosed. The method includes monitoring, by a processor, a sensitivity of a target resource, and when the...
2016/0219055 AUTHORIZING ACCESS TO AN APPLICATION LIBRARY
To prevent malicious code from accessing security sensitive functions implemented in a private portion of an application, accesses to the private portion are...
2016/0219054 PROGRAMMABLE DISPLAY
A programmable display for connection to a control device includes: a user management unit configured to identify a user accessing the programmable display; a...
2016/0219053 INTELLIGENT TERMINAL AND INTERACTIVE CONTROL SYSTEM AND INTERACTIVE CONTROL METHOD USING SAME
An interactive control method is provided. The method is applied to an intelligent terminal. The intelligent terminal includes a storage unit. The method...
2016/0219052 PROXY AUTHENTICATION FOR A MULTIPLE CORE NETWORK DEVICE
The present invention is generally related to a network computing device including a first processor communicating with a second processor as a proxy for a...
2016/0219051 RELAY APPARATUS, TERMINAL APPARATUS, AND COMMUNICATION METHOD
In a communication system in which a relay apparatus, a terminal apparatus, and other apparatuses, which can communicate with an authentication apparatus, are...
2016/0219050 DYNAMICALLY GENERATED SSID
A plurality of beacons that do not include any service set identifiers may be broadcast from an access point. A request concerning association with the access...
2016/0219049 User Authentication for Social Networks
Systems and methods are provided for social networks that can verify that enrolled users are not misrepresenting facts about themselves such as age and gender....
2016/0219048 NATURAL LANGUAGE DIALOG-BASED SECURITY HELP AGENT FOR NETWORK ADMINISTRATOR
Network management technology as disclosed herein conducts conversational natural language dialog with a user to facilitate the user's analysis of network...
2016/0219047 SECURE DATA COMMUNICATION
A system and a method for secure data communication over a network are described. In one embodiment, a method comprises generating a visual flashing code...
2016/0219046 SYSTEM AND METHOD FOR MULTI-MODAL BIOMETRIC IDENTITY VERIFICATION
In one example of a system and method for multi-modal biometric identity verification, a system receives a request from a device to verify a user's identity....
2016/0219045 Method and System for Authenticating a User of a Device
A method for authenticating a user of a device may utilize standard HTTP authentication challenge methods in combination with standard encryption algorithms to...
2016/0219044 SECURE ACCESS TO CLOUD-BASED SERVICES
Techniques to provide secure mobile access to a cloud-based service are disclosed. In various embodiments, a request to access the cloud-based service is...
2016/0219043 SYSTEM AND METHOD FOR ESTABLISHING TRUST USING SECURE TRANSMISSION PROTOCOLS
A system, apparatus, method, and machine readable medium are described for establishing trust using secure communication protocols. For example, one embodiment...
2016/0219042 METHOD AND APPARATUS FOR PROVIDING AUTHENTICATION SESSION SHARING
An approach is provided for providing authentication session sharing between browsers and run time environments in network communication. An interface receives...
2016/0219041 SHARING USB KEY BY MULTIPLE VIRTUAL MACHINES LOCATED AT DIFFERENT HOSTS
A system for sharing a USB Key by multiple virtual machines located at different hosts including at least two virtual machine managers, each virtual machine...
2016/0219040 SINGLE SIGN-ON BETWEEN MULTIPLE DATA CENTERS
Systems and methods are disclosed for a single sign-on (SSO) enterprise system with multiple data centers that use a lightweight cookie on a user's client...
2016/0219039 Mobile Authentication Method and System for Providing Authenticated Access to Internet-Sukpported Services and...
This invention relates to a system comprising a unified identity management system (2) for the users (3) within a certain area on which it is centered intended...
2016/0219038 Secure Network Access Using Credentials
Example embodiments include systems and methods for establishing secure wireless communications, including receive from a mobile user equipment (UE), via the...
2016/0219037 SECURE DATA ENTRY VIA AUDIO TONES
In one embodiment, a cloud client device identifies one or more devices within a predetermined range of the cloud client device operable to communicate with...
2016/0219036 SYSTEM AND METHOD FOR IMAGE BASED LOCATION SPECIFIC PASSWORD CONSTRUCTION AND AUTHENTICATION
A computer implemented system and method for image based location specific password construction and authentication is provided. The system helps users to...
2016/0219035 METHODS FOR PROVIDING SECURE ACCESS TO NETWORK RESOURCES AND DEVICES THEREOF
A method, non-transitory computer readable medium, and network traffic management apparatus that receives an authentication request from a user of a client...
2016/0219034 PROVIDING DATA SECURITY WITH A TOKEN DEVICE
A computer-implemented method for providing security to access and store data may include transferring first information for display from a token device having...
2016/0219033 PROVIDING DATA SECURITY WITH A TOKEN DEVICE
A computer-implemented method for providing security to access and store data may include transferring first information for display from a token device having...
2016/0219032 METHOD AND APPARATUS FOR CONTROLLING ACCESS TO SURVEILLANCE VIDEO
A method and an apparatus for controlling access to a surveillance video are provided. The method includes: acquiring from a user account a view request for...
2016/0219031 SYSTEMS AND METHODS FOR AUTHENTICATING AN AVATAR
Systems and methods for authenticating an avatar are provided. This system is useful with an avatar having an identifier, virtual environments, and a user who...
2016/0219030 Service Request Authentication Method and Apparatus
Methods and apparatuses for service request authentication are disclosed to prevent a terminal or a first server that does not sign an agreement with a gateway...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.