Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0261647 METHOD, SYSTEM AND APPARATUS FOR INVITING USERS TO PARTICIPATE IN AN INTERACTIVE SESSION
A method for inviting users to participate in an interactive session comprises receiving a request, from a client device, wherein the request specifies...
2016/0261646 System and method for communications
A system, tool, device, method, are provided to allow for two parties to communicate with a third party observing. A communication with a specific entity is...
2016/0261645 MOBILE APPLICATION LOCAL TIME ZONE SHIFTING
Systems, methods, and devices of the various embodiments enable a distributed activity reporting system, such as a billing system, with geographically...
2016/0261644 Performing an Action on Certain Media Streams in a Multimedia Communications Network
The invention proposes controlling a media session involving a plurality of media streams within a communications network, wherein the communications network...
2016/0261643 SIGNALLING ASSYMETRIC MEDIA CAPABILITIES
There are provided mechanisms for signalling asymmetric media capabilities using session description protocol, SDP, signalling. Media capabilities for at least...
2016/0261642 Applying a Network Traffic Policy to an Application Session
Embodiments of the present technology relate to a method for applying a security policy to an application session, comprising: determining, by a security...
2016/0261641 INDUSTRIAL NETWORK SECURITY
A private overlay network is introduced into an existing core network infrastructure to control information flow between private secure environments. Such a...
2016/0261640 SECURITY THREAT INFORMATION ANALYSIS
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for analyzing data that includes security threat information....
2016/0261639 CLOUD-BASED SECURITY POLICY CONFIGURATION
Systems and methods for configuring security policies based on security parameters stored in a public or private cloud infrastructure are provided. According...
2016/0261638 Network Security Method and Device
A network security method and a device relating to the field of network communication where the method includes, recording a correspondence between an Internet...
2016/0261637 End-To-End Secure Cloud Computing
A method includes receiving, at a control node of a cloud computing network, a first enterprise policy specific to the first enterprise and a second enterprise...
2016/0261636 DEVICE MANAGEMENT APPARATUS, DEVICE MANAGEMENT SYSTEM, AND SECURITY SETTING METHOD
A device management apparatus includes a setting information acquisition unit that acquires setting information of one or more security setting items from a...
2016/0261635 TRIGGER EVENTS AND CONFIRMATION IN DIGITAL ASSET MANAGEMENT
Trigger events and confirmation in digital asset management are provided. A service such as a management service monitors digital assets of an asset owner and...
2016/0261634 SECURE CONTROL OF INSECURE DEVICE
A computer system for securely controlling an insecure computer is provided. The system comprises an insecure computer, a secure computer and a unidirectional...
2016/0261633 ENHANCED THREAD HANDLING IN SECURITY HANDSHAKING
Disclosed herein are methods, systems, and software for handling threaded processes in security handshaking between end users and content delivery nodes are...
2016/0261632 Methods and Arrangements for Cloud Caching
In a method in a primary network node for providing a web-service to clients, performing the steps of verifying (S1) a TCP session with a client node and...
2016/0261631 EMULATING SHELLCODE ATTACKS
A system includes one or more "BotMagnet" modules that are exposed to infection by malicious code. The BotMagnets may include one or more virtual machines...
2016/0261630 System and Method for Anti-Phishing Authentication
A method and system for providing security against phishing attacks. The method can include receiving a login ID from a client, and providing an encrypted...
2016/0261629 INTERCEPTING AND SUPERVISING CALLS TO TRANSFORMED OPERATIONS AND OBJECTS
In an embodiment, a method comprises intercepting a first set of instructions from a server computer that define one or more objects and one or more original...
2016/0261628 SYSTEM AND METHOD THEREOF FOR MULTI-TIERED MITIGATION OF CYBER-ATTACKS
A method and system for controlling multi-tiered mitigation of cyber-attacks. The method comprises monitoring at least availability and load of each protection...
2016/0261627 METHOD AND SYSTEM FOR PROCESSING NOTIFICATION MESSAGES OF A WEBSITE
A method and system for secure notification message presentation are disclosed. A device with one or more processors and memory detects a trigger to display a...
2016/0261626 IDENTIFYING MALICIOUS WEB INFRASTRUCTURES
Identifying malicious servers is provided. Malicious edges between server vertices corresponding to visible servers and invisible servers involved in network...
2016/0261625 ZERO DAY THREAT DETECTION BASED ON FAST FLUX DETECTION AND AGGREGATION
A method in a cloud-based security system includes operating a Domain Name System (DNS) resolution service, proxy, or monitor in the cloud-based security...
2016/0261624 Computer Implemented Techniques for Detecting, Investigating and Remediating Security Violations to IT...
A method includes collecting system calls and call parameters invoked by monitored applications for target computer systems. The system calls and call...
2016/0261623 Detecting Malware In Content Items
Disclosed are various systems, methods, and other embodiments directed to detection of malware in content items. To detect the malware, for example, one or...
2016/0261622 ANOMALY DETECTION BASED ON CLUSTER TRANSITIONS
Systems and methods may include receiving first data of components, which may represent performance characteristics of the components at a first time. The...
2016/0261621 NETWORK THREAT DETECTION AND MANAGEMENT SYSTEM BASED ON USER BEHAVIOR INFORMATION
A device may receive behavior information that identifies a first user, of a first set of users, in association with a behavior. The behavior may relate to one...
2016/0261620 SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR DYNAMICALLY CONFIGURING A VIRTUAL ENVIRONMENT FOR IDENTIFYING...
A system, method, and computer program product are provided for dynamically configuring a virtual environment for identifying unwanted data. In use, a virtual...
2016/0261619 SHIP GATEWAY APPARATUS AND STATUS INFORMATION DISPLAYING METHOD THEREOF
Provided are a ship gateway apparatus and a status information displaying method thereof. The ship gateway apparatus includes a network interface configured to...
2016/0261618 SYSTEM AND METHOD FOR SELECTIVELY EVOLVING PHISHING DETECTION RULES
System and method for automatically developing phishing detection rules. Based on detected phishing indicia, a quantitative score is computed for each of a...
2016/0261617 Protection Method and Computer System thereof for Network Interface Controller System
A protection method, which releases an attack of a malware to a network interface controller (NIC) system, includes processing a microbatching operation in a...
2016/0261616 DATA ACCESS VERIFICATION FOR ENTERPRISE RESOURCES
According to one embodiment, a method in a computing device for responding to a determination that a verification with a user is desired responsive to...
2016/0261615 CROSS-LAYER CORRELATION IN SECURE COGNITIVE NETWORK
A communication network is defended using a distributed infrastructure that leverages coordination across disparate abstraction levels. At each node computing...
2016/0261614 NEUTRALIZING PROPAGATION OF MALICIOUS INFORMATION
One embodiment provides a method including identifying malicious information spreading in an information-exchange network; classifying at least one topic of...
2016/0261613 REAL-TIME ASYNCHRONOUS EVENT AGGREGATION SYSTEMS
A real-time asynchronous event aggregation system, method, and network device are configured to capture real-time asynchronous events, and to pass them as...
2016/0261612 FUZZY HASH OF BEHAVIORAL RESULTS
A computerized method for classifying objects in a malware system is described. The method includes detecting behaviors of an object for classification after...
2016/0261611 IDENTIFYING MALWARE-INFECTED NETWORK DEVICES THROUGH TRAFFIC MONITORING
The present invention generally relates to detecting malicious network activity coming from network devices such as routers and firewalls. Specifically,...
2016/0261610 METHOD AND DEVICE FOR TRANSMITTING AND RECEIVING INSTRUCTION INFORMATION
The present application discloses a method and device for transmitting and receiving instruction information. The method for transmitting instruction...
2016/0261609 SYSTEM AND A METHOD FOR INTELLIGENT VERIFICATION MANAGEMENT
The invention relates to a computer-implemented system and a corresponding method for intelligent verification management between a browser and a web server....
2016/0261608 IDENTIFYING MALICIOUS WEB INFRASTRUCTURES
Identifying malicious servers is provided. Malicious edges between server vertices corresponding to visible servers and invisible servers involved in network...
2016/0261607 TECHNIQUES FOR IDENTITY-ENABLED INTERFACE DEPLOYMENT
Techniques for providing identity-enabled interfaces for deployment are presented. Specifically, an agent of an enterprise infrastructure authenticates and...
2016/0261606 LOCATION-BASED NETWORK SECURITY
Methods and systems for a location-aware network security device are provided. According to one embodiment, a resource access request is received at a network...
2016/0261605 LOCATION SENSITIVE SOLID STATE DRIVE
A data storage system including a SSD includes a capability to detect whether its location is acceptable for function, and a capability to self-disable in the...
2016/0261604 PASSWORD AUTHENTICATION
A user credential comprising a user password and a one-time password (OTP) may be provided to access a computing system. The user password is authenticated and...
2016/0261603 CONTENT FILTERING FOR PERSONAL PRODUCTIVITY APPLICATIONS
A set of context profiles containing profile content rules for filtering which content within a set of personal productivity applications (such as e-mail,...
2016/0261602 Device-to-Device Network Membership Confirmation
An electronic device k a device-to-device network of a user of tire electronic device communicates with a group of one or more other instances of the...
2016/0261601 WIRELESS ROUTER, FAST ACCESS CONTROL METHOD AND AUTHENTICATION CONNECTION METHOD OF WIRELESS ROUTERS
The present provides a fast access control method of a wireless router based on a message authentication code (MAC) white list, which includes following steps:...
2016/0261600 METHOD AND APPARATUS FOR MULTI-USERS REGISTERING HOME NETWORK SUPPORTING APPLICATION BASED DEVICE
Provide is a device and a method for registering the device supporting home networking, by a server. The method includes receiving a registration request for...
2016/0261599 DIGITAL MANAGEMENT OF CONTENT ASSETS IN THE CLOUD
Aspects of the present disclosure relate to systems and methods for sharing assets of applications between users. A user may share an application or certain...
2016/0261598 METHOD AND SYSTEM FOR ALLOWING INCOMING EMERGENCY COMMUNICATIONS ON A DISABLED DEVICE
A system and method to allow a disabled device to receive an incoming communication after the termination of an emergency communication session with a service...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.