Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0226893 METHODS FOR OPTIMIZING AN AUTOMATED DETERMINATION IN REAL-TIME OF A RISK RATING OF CYBER-ATTACK AND DEVICES THEREOF
This technology extracts threat data in real time from received incident data on each of one or more current cyber-attacks. Classified data associated with one...
2016/0226892 Intrusion Detection and Radio Fingerprint Tracking
A transmitter is configured to change its unique radio signature enough to defeat radio fingerprinting identification without destroying the content of the...
2016/0226891 GEOGRAPHICAL INTRUSION RESPONSE PRIORITIZATION MAPPING THROUGH AUTHENTICATION AND FLIGHT DATA CORRELATION
Preferred systems and methods for geographically mapping intrusions through network or authentication data and flight data correlation are described. In one...
2016/0226890 METHOD AND APPARATUS FOR PERFORMING INTRUSION DETECTION WITH REDUCED COMPUTING RESOURCES
A method and apparatus can be configured to receive, by a first network intrusion detection system, packet data that is transmitted in network traffic. The...
2016/0226889 System and Method for Detecting and Protecting Against Malicious Content
The invention relates to computer security and to systems and methods for detecting and protecting against malicious content such as computer viruses. Gateway...
2016/0226888 WEB MALWARE BLOCKING THROUGH PARALLEL RESOURCE RENDERING
Apparatus and method for transforming Web resources into safe versions such that malicious code on the resources cannot attack the client viewing the...
2016/0226887 COMMUNICATION SYSTEM AND METHOD
A communication analysis method is implemented in a first device that receives communication frames originating from a second device. The first device and the...
2016/0226886 SECURE WIRELESS LOCATION INTERFACE PROTOCOL
Systems and techniques for time-of-flight (ToF) location determination, such as WiFi fine time measurement, with secure connections are described herein. A...
2016/0226885 SYSTEM AND METHOD TO AGGREGATE CONTROL OF MULTIPLE DEVICES VIA MULTICAST MESSAGES AND AUTOMATIC SET UP OF...
A method and apparatus are provided to aggregate control of multiple devices. In some methods, a downstream controller can advertise a service group of the...
2016/0226884 USING CONNECTIONS BETWEEN USERS IN A SOCIAL NETWORKING SYSTEM TO REGULATE OPERATION OF A MACHINE ASSOCIATED...
A social networking system includes information identifying a machine (e.g., a robot, a drone, a computer, a thermostat, etc.) and a connection between the...
2016/0226883 USING A WIRELESS TRANSMITTER AND RECEIVER TO PREVENT UNAUTHORIZED ACCESS TO RESTRICTED COMPUTER SYSTEMS
A method and system for automatically terminating a logout session for a restricted access system by determining that an authorized user has left the vicinity...
2016/0226882 OVER THE AIR MANAGEMENT OF PAYMENT APPLICATION INSTALLED IN MOBILE DEVICE
Systems, apparatus, and methods for managing an application installed on a mobile device, such as a mobile phone are provided, so as to prevent or limit...
2016/0226881 CONFIRMING AN IDENTITY OF A USER OF A SOCIAL NETWORK
In cases where a user of a social network has lost access to one or more email addresses on file with the social network, the social network may confirm an...
2016/0226880 Reconciliation of Access Rights in a Computing System
Systems and methods are provide for reconciling access rights of a computing system are described. Access right information that respectively corresponds to...
2016/0226879 AUTHORIZATION TOKEN CACHE SYSTEM AND METHOD
A system includes one or more processors to request access tokens from a token service computer, cache the access tokens and related information in a token...
2016/0226878 METHOD AND APPARATUS FOR USE WITH DIFFERENT MEMORY MAPS
An apparatus has a data store configured to store access activity information. The access activity information indicates which one or more of a plurality of...
2016/0226877 METHODS AND APPARATUS FOR LARGE SCALE DISTRIBUTION OF ELECTRONIC ACCESS CLIENTS
Methods and apparatus for large scale distribution of electronic access control clients. In one aspect, a tiered security software protocol is disclosed. In...
2016/0226876 PASSWORD ENTRY THROUGH TEMPORALLY-UNIQUE TAP SEQUENCE
Embodiments replace a password with a tap sequence. Systems and methods receive tapping signals at an input sensor. A learned sequence of taps and correlation...
2016/0226875 DEVICE AUTHENTICATION WITHIN DEPLOYABLE COMPUTING ENVIRONMENT
A deployable computing environment may facilitate interaction and data sharing between users and devices. Users, devices, and relationships between the users...
2016/0226874 Secure Shell (SSH) Proxy for a Platform-as-a-Service System
Implementations provide for a secure shell (SSH) proxy for a Platform-as-a-Service (PaaS) system. A method of the disclosure includes receiving, by a...
2016/0226873 NON-TRANSITORY COMPUTER READABLE STORAGE MEDIUM FOR STORING APPLICATION PROGRAM FOR NETWORK CERTIFICATION
A non-transitory computer readable storage medium for storing an application program for network certification is disclosed. The application program is...
2016/0226872 SYSTEM AND METHOD FOR VERIFYING STATUS OF AN AUTHENTICATION DEVICE
A system and method that includes receiving a first device profile and associating the first device profile with a first application instance that is assigned...
2016/0226871 HIGHLY SCALABLE, FAULT TOLERANT REMOTE ACCESS ARCHITECTURE AND METHOD OF CONNECTING THERETO
Systems and methods for providing a remote access to a service in a client-server remote access system. The method includes selecting, by a scheduler, an...
2016/0226870 INTERNET OF THINGS SYSTEM AND CONTROL METHOD THEREOF
A system includes first electronic devices and a digital signature carrier. Each of the first electronic devices has a network identifier distinct from...
2016/0226869 SYSTEM AND METHOD OF CONTROLLING NETWORK ACCESS
A method of accessing an enterprise network is provided. A request to access the enterprise network is received at a network access node from a user device....
2016/0226868 OUT-OF-BAND BIOMETRIC ENROLLMENT AND VERIFICATION USING INTERACTIVE MESSAGING
A system and method for enabling out of band biometric verification is disclosed. The system includes a biometric engine coupled with an interactive messaging...
2016/0226867 CLOUD-BASED BIOMETRIC ENROLLMENT, IDENTIFICATION AND VERIFICATION THROUGH IDENTITY PROVIDERS
A system and method for cloud-based biometric enrollment, identification and verification are disclosed. More specifically, a cloud-based system and method is...
2016/0226866 AUTHENTICATION USING INDIVIDUAL'S INHERENT EXPRESSION AS SECONDARY SIGNATURE
A method and system are provided. The method includes training for one or more secondary signatures of a user. The method further includes identifying one or...
2016/0226865 MOTION BASED AUTHENTICATION SYSTEMS AND METHODS
A motion-based authentication method of authenticating a user with a mobile device is provided. A pre-training routine is conducted to detect an orientation...
2016/0226864 METHOD AND SYSTEM FOR IMPROVED SECURITY
An improved authentication method and system is provided where a user securely accesses a variety of target servers for online email, online banking, credit...
2016/0226863 AUTHORITY TRUSTED SECURE SYSTEM COMPONENT
One embodiment is in the form of a Self-Service Terminal (SST), such as an automated teller machine (ATM). The SST includes a peripheral device, such as a cash...
2016/0226862 WIRELESS AUTHENTICATION SYSTEM AND WIRELESS AUTHENTICATION METHOD FOR ONE TIME PASSWORD OF MOBILE COMMUNICATION...
Provided is a one time password (OTP) authentication system and an OTP authentication method using a mobile communication terminal having a near field...
2016/0226861 TERMINAL DEVICE AND INFORMATION PROCESSING DEVICE
There is provided a terminal device including a mobile communication unit configured to perform mobile communication of a mobile communication network, an...
2016/0226860 VIRTUAL SUBSCRIBER IDENTITY MODULE
A mobile trusted platform (MTP) configured to provide virtual subscriber identify module (vSIM) services is disclosed. In one embodiment, the MTP includes: a...
2016/0226859 USING REPRESENTATIONAL STATE TRANSFER (REST) FOR CONSENT MANAGEMENT
Techniques are disclosed for sending, from an application executing on a device associated with a user, through a Representational State Transfer (REST)-based...
2016/0226858 SYSTEM AND METHOD FOR SECURE ACCESS OF A REMOTE SYSTEM
A system and method for providing a user with secure access to devices operatively connected to a network comprising at least one processing device that has...
2016/0226857 Methods and Apparatus of Key Pairing for D2D Devices under Different D2D Areas
Methods and apparatus are provided for key pairing between peer D2D UEs in different eNBs or D2D areas. A method may comprise: receiving at a first access...
2016/0226856 INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND COMPUTER PROGRAM
[Object] To provide an information processing apparatus through which a safe and convenient user authentication mechanism is implemented according to a public...
2016/0226855 IMAGE FORMING SYSTEM HAVING USER AUTHENTICATION FUNCTION, IMAGE FORMING APPARATUS, METHOD OF CONTROLLING IMAGE...
An image forming system capable of preventing a change in the data structure of information other than information included in a command transmitted to an...
2016/0226854 SYSTEMS AND METHODS FOR THE SECURE SHARING OF DATA
In various embodiments, a computer-implemented method for sharing tasks over one or more computer networks is disclosed. The method includes providing a task...
2016/0226853 Secret Supplemental Username
Methods for a secret supplemental username are provided. In one example, a method includes the steps of detecting a threat to an account with a primary...
2016/0226852 SYSTEMS AND METHODS FOR DEPLOYING RICH INTERNET APPLICATIONS IN A SECURE COMPUTING ENVIRONMENT
Systems and methods for deploying rich internet applications in a secure computing environment. An example computer system comprises: a hardware processor and...
2016/0226851 SYSTEM AND METHOD FOR POOL-BASED IDENTITY AUTHENTICATION FOR SERVICE ACCESS WITHOUT USE OF STORED CREDENTIALS
A computer-implemented system and method for pool-based identity authentication for service access without use of stored credentials is disclosed. The method...
2016/0226850 COMMUNICATION APPARATUS
A communication apparatus includes a holding unit, an updating unit, an authentication unit, a mode controller, and a mode acquisition unit. The holding unit...
2016/0226849 Portal authentication method, broadband network gateway, portal server and system
Disclosed is a portal authentication method including: sending, by a portal server, an information query message to the Broadcast Network Gateway (BNG)...
2016/0226848 AUTHENTICATION SURVIVABILITY FOR ASSIGNING ROLE AND VLAN BASED ON CACHED RADIUS ATTRIBUTES
A system and method is described that allows the assignment of roles and/or VLANs to an authenticated client device even when an external remote authentication...
2016/0226847 METHODS AND SYSTEMS FOR COMMUNICATING WITH AN M2M DEVICE
Method, apparatus and system for communicating between a machine to machine, M2M, device 110 and a device management, DM, server 420 over SMS, comprising:...
2016/0226846 METHOD, APPARATUS, AND SYSTEM FOR QUANTUM KEY DISTRIBUTION
A quantum key distribution system includes a quantum security key management (QSKM) device, a plurality of quantum security key distribution (QSKD) devices,...
2016/0226845 Key Exchange Through a Trusted Proxy
Techniques for exchanging security keys via a trusted proxy are provided. For example, a method may include receiving, at a computing device, a communication...
2016/0226844 MULTIPLE RECIPIENT MESSAGE ENCRYPTION
A method performed by a computing system includes receiving instructions from a user to divide content of a message into a plurality of parts, associating a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.