Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0234239 APPARATUS AND METHOD FOR TYING CYBER-SECURITY RISK ANALYSIS TO COMMON RISK METHODOLOGIES AND RISK LEVELS
This disclosure provides systems and methods for tying cyber-security risk analysis to common risk methodologies and risk levels. A method includes identifying...
2016/0234238 System and method for web-based log analysis
The technology described herein provides a novel system and method for web-based log analysis. The analysis combines the benefits of typical log monitoring...
2016/0234237 System and method for detecting vulnerability state deltas
Described herein is a system and method for detecting vulnerability state deltas, the method comprising the steps of: receiving data related to a network...
2016/0234236 NETWORK INFRASTRUCTURE OBFUSCATION
A shadow network, which can be a virtual reproduction of a real, physical, base computer network, is described. Shadow networks duplicate the topology,...
2016/0234235 MALWARE AND ANOMALY DETECTION VIA ACTIVITY RECOGNITION BASED ON SENSOR DATA
A system for malware and anomaly detection via activity recognition based on sensor is disclosed. The system may analyze sensor data collected during a...
2016/0234234 Orchestrating the Use of Network Resources in Software Defined Networking Applications
Techniques are presented herein that allow for arranging traffic flows in a network, and using the capabilities for inspection, recording, and enforcement...
2016/0234233 Time Zero Classification of Messages
Detecting infectious messages comprises performing an individual characteristic analysis of a message to determine whether the message is suspicious,...
2016/0234232 Protecting Network Devices from Suspicious Communications
According to some aspects, disclosed methods and systems may comprise generating a profile that is based on monitoring a communication pattern associated with...
2016/0234231 Systems And Methods For Securing Network Endpoints
In some embodiments, a network regulator device protects a local network of client systems (e.g. Internet-of-things devices such as smartphones, home...
2016/0234230 SYSTEM AND METHOD FOR PREVENTING DOS ATTACKS UTILIZING INVALID TRANSACTION STATISTICS
A method and network traffic management device to protect a network from network based attacks is disclosed. The method comprises receiving, at a network...
2016/0234229 APPARATUS AND METHOD FOR AUTOMATIC HANDLING OF CYBER-SECURITY RISK EVENTS
This disclosure provides an apparatus and method for automatic handling of cyber-security risk events and other risk events. A method includes detecting, by a...
2016/0234228 FILTERING HIDDEN DATA EMBEDDED IN MEDIA FILES
Systems and methods for filtering unsafe content at a network security appliance are provided. According to one embodiment, a network security appliance...
2016/0234227 SYSTEM, METHOD AND COMPUTER READABLE MEDIUM FOR MESSAGE AUTHENTICATION TO SUBSCRIBERS OF AN INTERNET SERVICE...
An internet service provider (ISP) is configured to provide notification messages such as service updates to subscribers via redirected web pages. In order for...
2016/0234226 System and Method of Preventing Hijacking of Security Systems and Components
A decentralized component is provided as an overly for a centralized system architecture as represented, for example, by a regional monitoring system. The...
2016/0234225 METHOD AND SYSTEM FOR MULTILEVEL SECURE WEB-BASED DIGITAL INFORMATION STORAGE
The invention broadly comprises a system and method for a secure web-based digital storage means comprising multiple user selectable security levels, each...
2016/0234224 SYSTEM AND METHOD FOR SOFTWARE DEFINED DEPLOYMENT OF SECURITY APPLIANCES USING POLICY TEMPLATES
A method includes retrieving, from a memory accessible by a computer, a document comprising a workload definition document that defines an intended virtual...
2016/0234223 RESOURCE MANAGEMENT IN A PRESENTATION ENVIRONMENT
Aspects of the present disclosure are directed toward managing resources in a presentation environment. Aspects are directed toward collecting, using a set of...
2016/0234222 System Allowing Access to Defined Addressee After Check with Access-List
An access control system is configured for data communication with at least a first remote service provider via a wide area telecommunications network and for...
2016/0234221 AUDIO BASED DISCOVERY AND CONNECTION TO A SERVICE CONTROLLER
Techniques for automatically connecting to a service controller are described herein. In one example, a service controller device includes a processor and a...
2016/0234220 DISCOVERY AND CONNECTION TO A SERVICE CONTROLLER
The claimed subject matter includes techniques for discovering to and connecting to a service controller. The claimed subject matter may disclose a processor...
2016/0234219 USER ADAPTIVE METHOD AND SYSTEM FOR CONTROLLING MOBILE DEVICE
The present invention provides a method for controlling a mobile device adaptively to the user by collecting and analyzing the behavior pattern of the users of...
2016/0234218 APPLICATION PERMISSION MANAGEMENT DEVICE AND METHOD THEREFOR
An application permission management method, includes: generating a running request in response to an operation of running an object of a terminal device,...
2016/0234217 Device Ownership Security On A Network
A method for device ownership security is disclosed. The method includes storing an ownership record on a mobile device identifying a home network for the...
2016/0234216 CLIENT SIDE REDIRECTION WITH PLUGGABLE AUTHENTICATION AND AUTHORIZATION
A system and method of client side redirection with pluggable authentication and authorization is disclosed. In a particular embodiment, an operating system of...
2016/0234215 METHOD AND SYSTEM FOR MANAGING DATA ACCESS WITHIN AN ENTERPRISE
A cloud computing service implements a method of securing customer data from access to only authorized administrative elements that are part of the cloud...
2016/0234214 Establishing a Secure Connection between a Master Device and a Slave Device
A method (200) of establishing a secure connection (213) between a master device (101) and a slave device (102), sharing at least a first communication...
2016/0234213 APPARATUS AND METHOD BY WHICH USER DEVICE IN HOME NETWORK SYSTEM TRANSMITS HOME-DEVICE-RELATED INFORMATION
An apparatus and method by which a user device in a home network system transmits home-device-related information is provided. The method includes acquiring,...
2016/0234212 Network Access Control Method and Apparatus
A network access control method and apparatus. The network access control method includes configuring network access permission of a first application, where...
2016/0234211 METHOD AND APPARATUS FOR ASSIGNING DEVICE FINGERPRINTS TO INTERNET DEVICES
A method for assigning a device fingerprint to a target device is provided. The method includes acquiring first attributes of the target device, the first...
2016/0234210 CONFIGURATION DATA BASED FINGERPRINTING FOR ACCESS TO A RESOURCE
A method for providing a user system access to a resource includes obtaining configuration data identifying devices at the user system; receiving a request...
2016/0234209 SECURE USER CREDENTIAL ACCESS SYSTEM
A proxy server mitigates security risks of user credentials sent across a network in clear text. The proxy server encrypts user credentials within a client...
2016/0234208 SYSTEMS AND METHODS FOR MUTUAL AUTHENTICATION OF ELECTRONIC DEVICES
Embodiments are provided for mutually authenticating a pair of electronic devices. According to certain aspects, the electronic devices may connect to each...
2016/0234207 VIRTUAL VERIFICATION
An automatic machine implemented identification and data processing, gathering and storage system and method. A system, method and computer program product for...
2016/0234206 Distributed Method and System to Improve Collaborative Services Across Multiple Devices
A distributed system and method to improve collaborative service across multiple sensors on various devices. According to one embodiment, multiple devices may...
2016/0234205 METHOD FOR PROVIDING SECURITY SERVICE FOR WIRELESS DEVICE AND APPARATUS THEREOF
Disclosed are a method for providing a security service for a wireless device and an apparatus thereof. The method includes obtaining a wireless fingerprint of...
2016/0234204 TECHNIQUES FOR PREVENTING VOICE REPLAY ATTACKS
Technologies for authenticated audio login by a user of a computing device include generating a security token having a plurality of token characters. The...
2016/0234203 ANONYMOUS CROSS-DEVICE LINKING USING TEMPORAL IDENTIFIERS
Methods, systems, and apparatus include computer programs encoded on a computer-readable storage medium, including a method for providing content. Login...
2016/0234202 System and Method for Providing an Authentication Certificate for a Wireless Handheld Device a Data Center...
A system includes an access controller including a short range wireless communication controller to couple to a mobile device, and an access point including a...
2016/0234201 SIGN-ON SERVICE AND CLIENT SERVICE INFORMATION EXCHANGE INTERACTIONS
Techniques are described for providing customizable sign-on functionality, such as via an access manager system that provides single sign-on functionality and...
2016/0234200 DELEGATION OF AUTHORITY FOR USERS OF SIGN-ON SERVICE
Techniques are described for providing customizable sign-on functionality, such as via an access manager system that provides single sign-on functionality and...
2016/0234199 METHOD AND APPARATUS FOR PROVIDING AUTHENTICATION BASED ON AGGREGATED ATTRIBUTE IN FEDERATED IDENTITY MANAGEMENT
Disclosed herein are a method and apparatus for providing authentication based on aggregated attributes in federated identity management. A federated identity...
2016/0234198 SUPER-SESSION ACCESS TO MULTIPLE TARGET SERVICES
A method of establishing privileged communication sessions to target services unifies multiple sub-sessions into a single super-session. The user client...
2016/0234197 LAWFUL INTERCEPTION OF ENCRYPTED COMMUNICATIONS
A method and apparatus for providing access to an encrypted communication between a sending node and a receiving node to a Law Enforcement Agency (LEA). A Key...
2016/0234196 CENTRALIZED PLUGGABLE AUTHENTICATION AND AUTHORIZATION
In particular embodiments, a first computing device may receive a request from a second computing device to access a first entity of an infrastructure, the...
2016/0234195 PLUGGABLE AUTHENTICATION AND AUTHORIZATION
In particular embodiments, a client device may established a first connection to a ticket server of a gateway, wherein the gateway couples the client device to...
2016/0234194 2FA AUTHENTICATION WITH QR ON HMD
A method is provided for displaying confidential information, such as a cash-card secret code and/or a credit-card secret code. If the information transmitted...
2016/0234193 SERVICE IMPLEMENTATION METHOD, PAYMENT METHOD AND APPARATUS
A service implementation method, a payment method and an apparatus are disclosed. The service implementation method includes a sending client initiating an...
2016/0234192 SERVICE IMPLEMENTATION
A method including, when a first extraction request that includes a primary password and is initiated by a first user is received, acquiring an object set...
2016/0234191 METHOD FOR TRANSMITTING AUTHENTICATION PASSWORD AND METHOD FOR ACQUIRING AUTHENTICATION PASSWORD BY MOBILE TERMINAL
The present invention discloses a method for transmitting an authentication password by a mobile terminal, a method for acquiring an authentication password by...
2016/0234190 SECURE USER INPUT MODE USING RANDOMIZED MAPPING BETWEEN ORDERED SETS OF SYMBOLS
An electronic device generates mapping information that maps individual symbols of a defined order set of symbols to individual symbols of a random order set...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.