Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0241600 LAWFUL INTERCEPTION IN A WI-FI / PACKET CORE NETWORK ACCESS
A method, by an authentication unit of a wireless access network, allows anchoring of a data packet session of a user entity connected to the wireless access...
2016/0241599 Providing A Managed Browser
Methods, systems, computer-readable media, and apparatuses for providing a managed browser are presented. In various embodiments, a computing device may load a...
2016/0241598 Method to Modify Android Application Life Cycle to Control Its Execution in a Containerized Workspace Environment
Methods, devices, and systems are described to modify the life cycle of a Google Android.RTM. application, in its application manifest file and byte code, such...
2016/0241597 ADAPTATION OF ACCESS RULES FOR A DATA INTERCHANGE BETWEEN A FIRST NETWORK AND A SECOND NETWORK
Adapting access rules for a data interchange between a first network and a second network by the second network is provided based on a service-specific...
2016/0241596 Enabling an on-premises resource to be exposed to a public cloud application securely and seamlessly
An application deployed in a public cloud is enabled to access an on-premises resource securely and without requiring additional ports on a firewall. A pair of...
2016/0241595 Advanced asset tracking and correlation
A security management system may be remotely deployed (e.g., using a cloud-based architecture) to add security to an enterprise network. For example, the...
2016/0241594 INTELLIGENT CONTENT GHOSTING ON MOBILE DEVICES
A method includes performing operations as follows on a processor: receiving a request for a content item from a mobile device, determining that the content...
2016/0241593 DYNAMIC PROVISIONING OF PROTECTION SOFTWARE IN A HOST INTRUSION PREVENTION SYSTEM
Methods and apparatus for optimizing security configurations of a set of computers are disclosed. A set of local servers, each functioning as a deep-security...
2016/0241592 IDENTIFICATION OF TRUSTED WEBSITES
This document describes techniques for identifying trusted websites. In one embodiment, a computer system can receive a request from user to access a website...
2016/0241591 System and Method for Identification and Blocking of Unwanted Network Traffic
Network traffic can be prevented from entering a protected network. An alert can be received that can be triggered by network traffic that matches at least one...
2016/0241590 Network Traffic Data Scrubbing With Services Offered via Anycasted Addresses
Novel tools and techniques for filtering network traffic in an anycasting environment includes receiving network traffic addressed to a plurality of anycasted...
2016/0241589 METHOD AND APPARATUS FOR IDENTIFYING MALICIOUS WEBSITE
Disclosed are a method and an apparatus for identifying a malicious website, the method including: acquiring uniform resource locators (URLs) of websites...
2016/0241588 METHODS FOR DETERMINING CROSS-SITE SCRIPTING AND RELATED VULNERABILITIES IN APPLICATIONS
The invention provides computer-implemented methods and computer systems for testing applications such as web-based (HTTP) applications for cross-site...
2016/0241587 Monitoring and Managing User Privacy Levels
Various embodiments pertain to techniques for measuring a user's privacy level as a user interacts with various web services. In various embodiments, entities...
2016/0241586 SYSTEM AND METHOD FOR MONITORING NETWORK TRAFFIC
Described is a method of assigning a network address to a trap, the network address being a dark address of a virtual private network. The network traffic...
2016/0241585 ANALYZE CODE THAT USES WEB FRAMEWORK USING LOCAL PARAMETER MODEL
Example embodiments disclosed herein relate to analyze code of a web application associated with a framework. The code is loaded. Data objects of the framework...
2016/0241584 METHOD AND SYSTEM FOR IDENTIFYING A THREATENING NETWORK
A system and method for identifying a threatening network is provided. The system comprises a network movement before/after algorithm that provides a graphical...
2016/0241583 RISK MANAGEMENT IN AN AIR-GAPPED ENVIRONMENT
This disclosure provides for risk management in an air-gapped environment. A method includes collecting data, by a risk manager system, from a plurality of...
2016/0241582 SECURITY SCANNER
Systems and methods for automated selection of payloads for use in a security scan of a web application by a security scanner are described herein. More...
2016/0241581 System and Method of Cyber Threat Intensity Determination and Application to Cyber Threat Mitigation
A security system comprising a computer, a memory, a data store comprising a plurality of consensus evaluations and a plurality of cyber threat analyst...
2016/0241580 System and Method of Cyber Threat Structure Mapping and Application to Cyber Threat Mitigation
A security system comprising a computer, a memory, a data store comprising a cyber threat intent dictionary and a technology dictionary; and an application...
2016/0241579 APPARATUS AND METHODS FOR DATA COLLECTION, ANALYSIS AND SERVICE MODIFICATION BASED ON ONLINE ACTIVITY
Methods and apparatus for evaluating collected data relating to online activity, and modification of services within a service provider network. In one...
2016/0241578 VOLUMETRIC EVENT FORECASTING TOOL
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for forecasting event volumes. One of the methods includes...
2016/0241577 METHODS FOR ENHANCING RAPID DATA ANALYSIS
A method for enhancing rapid data analysis includes receiving a set of data; storing the set of data in a first set of data shards sharded by a first field;...
2016/0241576 DETECTION OF ANOMALOUS NETWORK ACTIVITY
Access to web services is managed. Metrics associated with accesses to a service are collected, and the metrics include activities associated with a user. A...
2016/0241575 INFORMATION PROCESSING SYSTEM AND INFORMATION PROCESSING METHOD
An information processing system includes circuitry configured to request a mail server to provide mail data addressed to a user, extract link data included in...
2016/0241574 SYSTEMS AND METHODS FOR DETERMINING TRUSTWORTHINESS OF THE SIGNALING AND DATA EXCHANGE BETWEEN NETWORK SYSTEMS
A method of determining real-time operational integrity of an application or service operating on a computing device, the method including inspecting network...
2016/0241573 SECURITY EVENT DETECTION THROUGH VIRTUAL MACHINE INTROSPECTION
Methods and apparatus are disclosed for security event detection through virtual machine introspection. Example methods involve monitoring usage of a plurality...
2016/0241572 MAINTAINING DYNAMIC CONFIGURATION INFORMATION OF A MULTI-HOST OFF-CLUSTER SERVICE ON A CLUSTER
Techniques for maintaining dynamic configuration information of a multi-host off-cluster service on a cluster are described. An apparatus may comprise a...
2016/0241571 SYSTEM AND METHOD FOR AUTHENTICATION OF A COMMUNICATION DEVICE
A system and method for authentication of a communication device is disclosed. A system that incorporates teachings of the present disclosure may include, for...
2016/0241570 DECODING OF ENCRYPTED FILE
A method and system for decoding an encrypted file. A recipient computer of a recipient: extracts an encoded address from a filename of the encrypted file,...
2016/0241569 INFORMATION SHARING FOR THIRD PARTY APPLICATIONS IN CELLULAR TELECOMMUNICATION INFRASTRUCTURES
A method, system and computer program product are disclosed for providing content to a communications device. In an embodiment of the invention, a ...
2016/0241568 VALIDATION OF A LOCATION RESOURCE BASED ON RECIPIENT ACCESS
Aspects of the present disclosure relate to a method, a system, and a computer program product for validating a location resource, e.g., a hyperlink, embedded...
2016/0241567 CONTROLLING OPERATION OF A MACHINE AND DESCRIBING ACTIONS PERFORMED BY THE MACHINE THROUGH A SOCIAL NETWORKING...
A social networking system includes information identifying a machine (e.g., a robot, a drone, a computer, a thermostat, etc.) and a connection between the...
2016/0241566 SYSTEM OF THIRD PARTY CONTROL OF NETWORK CONNECTED DEVICES
A system of controlling one or more building control devices. The system may incorporate receiving from a third party a request for access to a user account at...
2016/0241565 CONVEYING REQUESTS TO SERVICE PERSONS USING AVATARS ACTING AS PROXIES
In accordance with an exemplary embodiment of the present invention, an avatar object is presented which is well-suited for the NewWave service platform. An...
2016/0241564 DEVICE WITH EMBEDDED NETWORK SUBSCRIPTION AND METHODS
An electronic device with a network subscription is provided. The device comprises an embedded secure element including a subscription identification code for...
2016/0241563 MANAGING LIMITED NETWORK ACCESS CONFIGURATION
A system, a method, and a computer program product for managing network configuration by a controller. A request to connect a device to a network is received....
2016/0241562 PORTABLE ELECTRONIC DEVICE WITH USER-CONFIGURABLE API DATA ENDPOINT
In various example embodiments, systems, devices, methods, and media for configurable data endpoints are presented. In one example, a system comprises a...
2016/0241561 Identifying a Measure of Online Security
A computer-implemented method includes retrieving, by one or more processing devices and from one or more data repositories, user information; generating,...
2016/0241560 CLIENT-SITE DOM API ACCESS CONTROL
A method of restricting usage of a Document Object Model (DOM) application programming interfaces (API) is disclosed. A DOM virtualization layer intercepts a...
2016/0241559 Method and System for Credential Management
A security system comprises an access control node broadcasting a beacon including a time stamp and user devices generating replies to the beacon that are...
2016/0241558 Automatic Key Management Using Enterprise User Identity Management
A method forms a key pair for a user. The key pair has a public key and a private key that is unique to the user and that is encrypted using a passphrase...
2016/0241557 METHOD FOR SECURED COMMUNICATION BETWEEN AN OPERATING SYSTEM OF A TERMINAL AND A DEVICE DISTINCT FROM THE TERMINAL
Disclosed are methods, systems, and devices for secure communication between an operating system of a terminal and a device distinct from the terminal, the...
2016/0241556 MUTUAL AUTHENTICATION WITH INTEGRATED USER MUSCLE MEMORY
A method for mutual authentication between a client device and authentication server is provided whereby an account identifier is sent from the client device...
2016/0241555 TOGGLING BIOMETRIC AUTHENTICATION
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for receiving user input indicating a first user selection...
2016/0241554 LOCAL USER AUTHENTICATION WITH NEURO AND NEURO-MECHANICAL FINGERPRINTS
In accordance with one embodiment, a method for locally verifying the identification of a user with an electronic device is disclosed. The method includes...
2016/0241553 WEARABLE DEVICE AND OPERATING METHOD THEREOF
A wearable device is provided. The wearable device including a sensor configured to detect a wearing state of the wearable device and to obtain authentication...
2016/0241552 SYSTEM AND METHOD FOR BIOMETRIC AUTHENTICATION WITH DEVICE ATTESTATION
A system, apparatus, method, and machine readable medium are described for biometric device attestation. For example, one embodiment of an apparatus includes:...
2016/0241551 SYSTEM AND A METHOD FOR VALIDATING AN IDENTIFICATION TOKEN
An Identification Device (10) for providing validation information comprising: a Token (11) and a Validator (20); wherein the display (17) is adapted to...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.