Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0248817 SYSTEMS AND METHODS FOR SETTING UP A TELEPHONY COMMUNICATION
When an Internet Protocol (IP) telephony system receives a telephony communication setup request for a user of the IP telephony system, the IP telephony system...
2016/0248816 COMMUNICATION MEDIATION SYSTEM, COMMUNICATION MEDIATION DEVICE, COMMUNICATION MEDIATION METHOD, AND...
A management device connected to the Internet, includes: a first transmitting unit configured to transmit setting information necessary for mediating...
2016/0248815 CONTENT ENABLING SYSTEM
A system and method for remote acquisition of Internet content in a cyber-physical system. A cyber-physical system can include a multitude of electronic...
2016/0248814 INTER-IMS SERVICE SUPPORT IN TELECOMMUNICATION SYSTEMS
A first communication provider supports an IP multimedia subsystem (IMS) having a border session control function (BGCF) that receives SIP requests. The SIP...
2016/0248813 METHOD AND SYSTEM FOR PROPAGATING NETWORK POLICY
A technique for acquiring and disseminating network node characteristics to enable policy decisions including receiving a resolution request from one or more...
2016/0248812 SECURE AND LIGHTWEIGHT TRAFFIC FORWARDING SYSTEMS AND METHODS TO CLOUD BASED NETWORK SECURITY SYSTEMS
A method implemented by an agent operating on a mobile device communicating to a cloud-based system includes opening up local listening sockets on the mobile...
2016/0248811 METHOD AND DEVICE FOR CUSTOMIZING SECURITY SERVICE
The disclosure provides a method for customizing a security service and device, relates to the field of information security and solves the problem of...
2016/0248810 Method and System for Operating and Monitoring Permissions for Applications in a Electronic Device
A method comprising: receiving a request from a second application to access information from a first application, said first and second applications installed...
2016/0248809 METHODS AND APPARATUS TO PROCESS DATA BASED ON AUTOMATICALLY DETECTING A SECURITY ENVIRONMENT
Methods and apparatus to process data based on automatically detecting a security environment are disclosed. An example apparatus includes an input device, an...
2016/0248808 SYSTEMS AND METHODS FOR INHIBITING ATTACKS WITH A NETWORK
Systems and methods for inhibiting attacks with a network are provided. In some embodiments, methods for inhibiting attacks by forwarding packets through a...
2016/0248807 DETECTION AND MITIGATION OF DENIAL-OF-SERVICE ATTACKS IN WIRELESS COMMUNICATION NETWORKS
A method that incorporates teachings of the subject disclosure may include, for example, obtaining data relating to a set of collision events on a shared...
2016/0248806 MANAGING TRAFFIC CONTROL IN A NETWORK MITIGATING DDOS
Embodiments are provided for managing routes of data traffic within a network. The management may be performed via a graphical user interface that interacts...
2016/0248805 NETWORK SECURITY SYSTEM WITH REMEDIATION BASED ON VALUE OF ATTACKED ASSETS
A data processing method comprising obtaining a plurality of computer network security threat feeds from two or more computer threat detection systems; based...
2016/0248804 SECURITY MANAGEMENT IN A NETWORKED COMPUTING ENVIRONMENT
An approach for addressing (e.g., preventing) detected network intrusions in a virtualized/networked (e.g., cloud) computing environment is provided. In a...
2016/0248803 USER INTERFACE FOR EVENT DATA STORE
A processing device receives a query comprising a first field value and a time period and performs a first search of a data store using the first field value...
2016/0248802 SYSTEMS AND METHODS FOR REPORTER-BASED FILTERING OF ELECTRONIC COMMUNICATIONS AND MESSAGES
Methods and apparatuses for filtering electronic communications in a communication system. The method includes receiving a message report from a user in...
2016/0248801 NETWORK ACCOUNTABILITY AMONG AUTONOMOUS SYSTEMS
In one kind of DoS attack, malicious customers may try to send a large number of filter requests against an innocent customer. In one implementation, a Filter...
2016/0248800 Cyber Vulnerability Scan Analyses with Actionable Feedback
Embodiments of the present technology relate to cyber attack vulnerability analyses. In one embodiment, a method includes determining an external...
2016/0248799 Inferential Analysis Using Feedback for Extracting and Combining Cyber Risk Information
Various embodiments of the present technology include methods of assessing risk of a cyber security failure in a computer network of an entity. Various...
2016/0248798 METHOD AND APPARATUS FOR AUTOMATING THREAT MODEL GENERATION AND PATTERN IDENTIFICATION
A method and system for automating threat model generation and pattern identification for an application includes identifying components of an application, and...
2016/0248797 ONLINE PORTAL FOR IMPROVING CYBERSECURITY RISK SCORES
Determining an entity's cybersecurity risk and benchmarking that risk includes non-intrusively collecting one or more types of data associated with an entity....
2016/0248796 SYSTEM AND METHOD FOR DISCOVERING OPTIMAL NETWORK ATTACK PATHS
A computer-implemented method for discovering network attack paths is provided. The method includes a computer generating scoring system results based on...
2016/0248795 EVALUATING A QUESTIONABLE NETWORK COMMUNICATION
Techniques for evaluating a questionable network communication are disclosed. In some implementations, an evaluation module determines whether a network...
2016/0248794 METHOD AND APPARATUS FOR DETERMINING A CRITICALITY SURFACE OF ASSETS TO ENHANCE CYBER DEFENSE
A method and apparatus is provided for determining aggregated value of risk and resilience metrics of critical nodes in a network of computer nodes, comprising...
2016/0248793 DATA TREND ANALYSIS
According to an example, a method for data trend analysis may include retrieving data from data sources, associating the data with a time, and identifying...
2016/0248792 EVENT CONTEXT MANAGEMENT SYSTEM
A processing device receives a plurality of discrete log entries from a first data store and generates an event for each discrete log entry that satisfies a...
2016/0248791 NON-HOMOGENOUS STORAGE OF EVENTS IN EVENT DATA STORE
A processing device receives a plurality of discrete log entries from a first data store and generates an event for each discrete log entry that satisfies a...
2016/0248790 METHOD AND SYSTEM FOR DETECTING AND MITIGATING ATTACKS PERFORMED USING CRYPTOGRAPHIC PROTOCOLS
A method and system for detecting attacks performed using a cryptographic protocol are presented. The method includes upon receiving an indication about a...
2016/0248789 CALL CONTROL DEVICE, CALL CONTROL METHOD, AND CALL CONTROL SYSTEM
A call control device including: a memory, and a processor coupled to the memory and configured to: receive a call request from a communication device, a...
2016/0248788 MONITORING APPARATUS AND METHOD
A monitoring apparatus, includes a memory configured to store history information regarding a login attempt to a system by a communication apparatus in a state...
2016/0248787 PROACTIVE EMERGING THREAT DETECTION
A system creates a dynamic stochastic network using data relating to events. The dynamic stochastic network includes super nodes, local nodes, and agents....
2016/0248786 Dynamic Remote Malware Scanning
There are provided measures for enabling dynamic remote malware scanning. Such measures could exemplarily comprise include identification of an electronic file...
2016/0248785 SECURE ANALYSIS APPLICATION FOR ACCESSING WEB RESOURCES
Embodiments described herein may be directed to systems, methods, apparatuses, devices, computer program products, computer-executable instructions, and/or...
2016/0248784 AUTHENTICATING APPARATUS, AUTHENTICATING SYSTEM AND STORAGE MEDIUM
In authentication based on an image region read from a surface of a target object, authentication based on a position corresponding to the image region is...
2016/0248783 INTELLIGENT NETWORK ACCESS CONTROL
A method for controlling wireless communication access by wireless devices to wireless communications networks includes establishing, using an intelligent...
2016/0248782 ACCESS CONTROL USING PORTABLE ELECTRONIC DEVICES
An access control system is configured to detect the presence of a portable electronic device carried by a user in a first area. The access control system...
2016/0248781 SELF-SELECTED USER ACCESS BASED ON SPECIFIC AUTHENTICATION TYPES
Embodiments of the invention are directed to a system, method, and a computer program product self-selected user access based on specific authentication types....
2016/0248780 ACCESSING THIRD-PARTY COMMUNICATION SERVICE VIA A SOCIAL NETWORKING SYSTEM
A user interface in a social networking system enables users to connect to and interact with each other using a third-party communication service, such as a...
2016/0248779 SYSTEM AND METHOD FOR DATA TRANSFER AUTHENTICATION
A transaction initialization system serving first and second devices, interconnected by a communication network, each having a speaker and a microphone, which...
2016/0248778 TRUSTED SOCIAL NETWORK
A trust management engine maintains transferable files in a file data store of a data server accessible to users in a trust list of trusted users authorized to...
2016/0248777 POLICY ACCESS CONTROL LISTS ATTACHED TO RESOURCES
Methods, storage systems and computer program products implement embodiments of the present invention that include defining, for an entity, a policy access...
2016/0248776 SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR SHARING TENANT INFORMATION UTILIZING A MULTI-TENANT ON-DEMAND...
In accordance with embodiments, there are provided mechanisms and methods for sharing tenant information utilizing a multi-tenant on-demand database service....
2016/0248775 PROVIDING SAFE OPERATION OF A SUBSYSTEM WITHIN A SAFETY-CRITICAL SYSTEM
A safety apparatus for providing a safe operation of a subsystem within a safety critical system, SCS is disclosed herein. The safety apparatus includes: a...
2016/0248774 COMMUNICATION DEVICE, COMMUNICATION METHOD, AND COMMUNICATION SYSTEM
A communication device includes a first communication unit configured to execute radio communication by using a first communication method, the first...
2016/0248773 Authorizations For Computing Devices To Access A Protected Resource
Authorization technology queries a user of an authorizing computing device for permission to allow another user of a requesting computing device to have access...
2016/0248772 ACCESS CONTROL INTERFACES FOR ENHANCED WIRELESS ROUTER
A wireless router provides access control to information resources stored at the wireless router. The wireless router supports user profiles and/or device...
2016/0248771 METHODS, APPARATUS, AND SYSTEMS FOR IDENTITY AUTHENTICATION
An identity authentication method is provided. The method comprises receiving request information transmitted by an online terminal device for determining...
2016/0248770 NETWORKED DEVICE ACCESS CONTROL
A computer apparatus is remotely initiated. Confirmation of a detected and authenticated presence of a user remote from the computer apparatus is detected and...
2016/0248769 BIOMETRIC CAPTURE FOR UNAUTHORIZED USER IDENTIFICATION
A computing device may determine to capture biometric information in response to the occurrence of one or more trigger conditions. The trigger condition may be...
2016/0248768 Joint Speaker Authentication and Key Phrase Identification
A spoken command analyzer computing system includes technologies configured to analyze information extracted from a speech sample and, using a joint speaker...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.