Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0255106 DYNAMIC AND SELECTIVE RESPONSE TO CYBER ATTACK FOR TELECOMMUNICATIONS CARRIER NETWORKS
A response to a cyber attack on a carrier network is provided. The response can be based on inspection of traffic flowing through a carrier network. The...
2016/0255105 SYSTEM AND METHODS FOR COMPUTER NETWORK SECURITY INVOLVING USER CONFIRMATION OF NETWORK CONNECTIONS
Systems and methods for detecting anomalies in network traffic and providing notification to the users of the computers that generated the network traffic for...
2016/0255104 NETWORK INTRUSION DETECTION
A system for identifying a network intrusion includes four modules. The first module monitors network transmissions and creates a model of regular network...
2016/0255103 MALICIOUS VIRTUAL MACHINE ALERT GENERATOR
Technologies are generally described for methods and systems effective to generate an alert in a data center. In some examples, a device may detect an...
2016/0255102 SYSTEMS, METHODS, AND APPARATUS FOR SECURING USER DOCUMENTS
The invention is directed to systems, methods and apparatus for securing documents. The system comprises a server having a processor and a data storage device...
2016/0255101 System and Method for Detection of Malware on a User Device Using Corrected Antivirus Records
Disclose are system, method and computer program product for detection of malware on a user's computing device. An exemplary method comprises: detecting, by an...
2016/0255100 FILTER FOR NETWORK INTRUSION AND VIRUS DETECTION
Methods and apparatus to perform string matching for network packet inspection are disclosed. In some embodiments there is a set of string matching slice...
2016/0255099 A SYSTEM AND METHOD FOR CERTIFYING INFORMATION
A method for certifying information about a subject entity, where the subject entity has trusted information associated with them, which is stored at one or...
2016/0255098 Compact and Efficient Communication Security through Combining Anti-Replay with Encryption
A method of providing anti-replay protection, authentication, and encryption with minimal data overhead is provided. A sender uses an arbitrary-length...
2016/0255097 Providing Geographic Protection To A System
In one embodiment, a method includes determining a location of a system responsive to location information received from at least one of a location sensor and...
2016/0255096 RESOURCE-CENTRIC AUTHORIZATION SCHEMES
A method includes receiving a request of a user to perform an operation with respect to a first resource, in response to the request, determining, in view of a...
2016/0255095 REALIZED TOPOLOGY SYSTEM MANAGEMENT DATABASE
A realized topology system management (RTSM) database, comprising a database, a number of stored realized topologies, and in which the realized topologies...
2016/0255094 DETERMINING VIRTUAL ADAPTER ACCESS CONTROLS IN A COMPUTING ENVIRONMENT
A control component of a computing environment initiates sending of request(s) over a network of the computing environment by an activated virtual adapter. The...
2016/0255093 METHODS, APPARATUSES AND COMPUTER PROGRAM PRODUCTS FOR AUTOMATED LEARNING OF DATA MODELS
An apparatus includes a processor and memory storing executable computer program code causing the apparatus to at least receive requests from communication...
2016/0255092 UNREGISTERED USER ACCOUNT GENERATION FOR CONTENT ITEM SHARING
Various embodiments of the present technology involve the sharing of a content item though a synchronized content management system (CMS) without requiring a...
2016/0255091 SHARING CONTENT IN SOCIAL NETWORKS
The present disclosure relates to systems, methods, and software for sharing content in social networks. A request from a user of the social network to share...
2016/0255090 Method and system for securely updating a website
A computer program product for securely updating a website is installed on a computer, uses a WYSIWYG (What You See Is What You Get) editor, and may be used as...
2016/0255089 METHODS OF ENABLING INTER-ORGANIZATIONAL AND PUBLIC SOCIAL COLLABORATION
Systems and methods for controlling access to electronic collaboration content data associated with a plurality of organizations. The system includes one or...
2016/0255088 APPLICATION-ASSISTED LOGIN FOR A WEB BROWSER
Systems, methods, and computer-readable storage media for authenticating a user account with a synchronized content management system are disclosed. A...
2016/0255087 Method and Apparatus for Providing Network Security Using Role-Based Access Control
A method and apparatus for providing network security using role-based access control is disclosed. A network device implementing such a method can include,...
2016/0255086 ACCESS CONTROL THROUGH DYNAMIC GROUPING
Certain aspects and features of the present disclosure relate to providing access control using groups that can be dynamically controlled by group owners, such...
2016/0255085 RULE-BASED APPLICATION ACCESS MANAGEMENT
A container that manages access to protected resources using rules to intelligently manage them includes an environment having a set of software and...
2016/0255084 GENERATION OF A VISUALLY OBFUSCATED REPRESENTATION OF AN ALPHANUMERIC MESSAGE THAT INDICATES AVAILABILITY OF A...
This disclosure relates to a system and related operating methods. A computer-implemented server device receives a request from a device that includes an...
2016/0255083 Internet Of Things Security
Apparati, methods, and computer-readable media for improving the security of communications networks. An embodiment of the present invention is a system for...
2016/0255082 Identifying & storing followers, following users, viewers, users and connections for user
Various embodiments of a system, methods, platform, social network, database, search engine & device for posting or presenting contents to contextual users of...
2016/0255081 System, Device And Method For Network Authorization Based On No Password Or Random Password
Disclosed are a system, device and method for network authorization based on no password or a random password, the device comprising: a memory having...
2016/0255080 Authenticating Cloud Computing Enabling Secure Services
Authenticating cloud computing enabling secure services (ACCESS) offloads "client authentication" activity onto a third-party authenticating cloud computing...
2016/0255079 METHODS AND SYSTEMS FOR PERFORMING SECURE AUTHENTICATED UPDATES OF AUTHENTICATION CREDENTIALS
A method of updating an authentication credential may include, by a client device, receiving an authentication credential from a user, generating an access key...
2016/0255078 METHOD AND SYSTEM FOR VERIFYING AN ACCOUNT OPERATION
Method and server system for user login verification are disclosed. The method includes: obtaining a verification request from a first device for an account...
2016/0255077 SYSTEM FOR MANAGING MULTI-USER SIGN-ON IN A SEGMENTED NETWORK
Disclosed is a system for providing multi-user management for personal computing devices over an entity network. The system is typically configured to (i)...
2016/0255076 MULTI USER DEVICE MANAGEMENT SYSTEM
Disclosed is a personal device container system. The personal device container system typically includes a processor, a memory, and an access management module...
2016/0255075 System and Method for a Generic Single Sign-On Function
A system and method are presented for providing generic single sign-on in an electronic device. Information is received that identifies one or more ...
2016/0255074 SINGLE SIGN-ON SERVICE SECURITY PROTECTIONS
One embodiment provides a method, including: receiving, from an end user device, authentication data of a user of a web service; storing, in a single sign-on...
2016/0255073 TRUSTED PIN MANAGEMENT
An apparatus and method for securing a personal identification number (PIN) on a mobile device are provided. The method may include receiving a request for the...
2016/0255072 INSTRUCTION INFORMATION TRANSMISSION AND RECEPTION METHODS AND DEVICES THEREOF
This application discloses a method and device for sending and receiving instruction information. The method for sending instruction information includes:...
2016/0255071 COMPUTERIZED METHOD AND SYSTEM FOR MANAGING AN EMAIL INPUT FACILITY IN A NETWORKED SECURE COLLABORATIVE...
In embodiments of the present invention improved capabilities are described for managing an email input facility in a networked secure collaborative computer...
2016/0255070 COMMUNICATION BETWEEN A COMMUNICATION DEVICE AND A NETWORK DEVICE
A first network device of a first communication network obtains a challenge, generates a first PFS parameter, obtains a first verification code for the first...
2016/0255069 CONTEXT SENSITIVE DYNAMIC AUTHENTICATION IN A CRYPTOGRAPHIC SYSTEM
A system for performing authentication of a first user to a second user includes the ability for the first user to submit multiple instances of authentication...
2016/0255068 CALIBRATING PROXIMITY DETECTION FOR A WEARABLE PROCESSING DEVICE
Proximity of a wearable processing device to a data processing apparatus is detected based on wireless signals received by the data processing apparatus from...
2016/0255067 METHODS, SYSTEMS, AND MEDIA FOR AUTHENTICATING USERS USING MULTIPLE SERVICES
Methods, systems, and media for automatically authenticating a user account using multiple services are provided. In accordance with some embodiments of the...
2016/0255066 METHOD AND APPARATUS FOR DETERMINING INTEGRITY OF DATA FEED FOR INTERNET OF THINGS
Methods and registrar computers for determining the integrity of a data feed provided by a virtual device. In an example, the method includes maintaining a...
2016/0255065 COMMUNICATION SYSTEM AND COMMUNICATION DEVICE
Devices between which packets are transmitted and received include mutually corresponding packet counters. The same random number value is given to the packet...
2016/0255064 COMMUNICATION BETWEEN A COMMUNICATION DEVICE AND A NETWORK DEVICE
A first network device of a first communication network obtains a challenge, generates a first PFS parameter, obtains a first verification code for the first...
2016/0255063 IN SITU DEVICE AUTHENTICATION AND DIAGNOSTIC REPAIR IN A HOST ENVIRONMENT
Apparatus and method for in situ authentication and diagnostic repair of a data storage device in a multi-device user environment. In accordance with some...
2016/0255062 METHOD AND SYSTEM FOR IPSEC SECURITY FOR IPP-USB DATA
A method of providing security for data being transferred over a Universal Serial Bus (USB) connection, the method comprising: setting an IPsec policy...
2016/0255061 ADAPTIVE AND EFFICIENT DATABASE PROTECTION AND MIGRATION WITH DEVICE STATE CHANGES
A method and apparatus for data security incorporating device state. The method includes encrypting sensitive data written to an electronic device while the...
2016/0255060 AUTHORIZATION OF COMMUNICATION LINKS BETWEEN END USER DEVICES USING INTERMEDIARY NODES
Systems, methods, and software for operating communication systems are provided herein. In one example, method of operating a communication system to establish...
2016/0255059 SECURE RANDOMIZED INPUT
A user inserts a received random sequence into the user's password or PIN. The user enters and transmits this randomized password to a service provider. The...
2016/0255058 SYSTEM AND METHOD FOR POLICY DRIVEN PROTECTION OF REMOTE COMPUTING ENVIRONMENTS
A system that incorporates teachings of the subject disclosure may include, for example, determining examination results based on sensory information obtained...
2016/0255057 SYSTEM AND METHOD FOR SECURING TELECOMMUNICATIONS TRAFFIC DATA
A method and system are provided for securing telecommunications traffic data. A method is provided for transmitting messages via a telecommunications network...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.