Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0269434 Threat Indicator Analytics System
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for analyzing threat intelligence information. One of the...
2016/0269433 METHOD AND SYSTEM FOR CHECKING SECURITY OF URL FOR MOBILE TERMINAL
A method for checking security of a URL for a mobile terminal includes: receiving a URL security check request sent by a mobile terminal, where the URL...
2016/0269432 MALICIOUS ATTACK DETECTION METHOD AND APPARATUS
A malicious attack detection method includes: receiving, by a controller, a Packet-in message sent by a switch, where the Packet-in message includes a source...
2016/0269431 PREDICTIVE ANALYTICS UTILIZING REAL TIME EVENTS
A method and system for providing predictive analytics which include calculating forecast trend curves utilizing historical events, determining which of the...
2016/0269430 SECURITY ACTION OF NETWORK PACKET BASED ON SIGNATURE AND REPUTATION
Example embodiments disclosed herein relate to perform a security action, (e.g., filtering) based on reputation and a signature match. A reputation is...
2016/0269429 SOFTWARE PROGRAM IDENTIFICATION BASED ON PROGRAM BEHAVIOR
Operations performed by a software application instance executed by a computing device are monitored. A determination is made that a particular operation...
2016/0269428 DATA PROCESSING
A service logic layer module receives an application message forwarded by a network device, classifies and identifies an application type of the application...
2016/0269427 Scalable Network Security Detection And Prevention Platform
This disclosure provides a network security architecture that permits installation of different software security products as virtual machines (VMs). By...
2016/0269426 DEPLOYING A SECURITY APPLIANCE SYSTEM IN A HIGH AVAILABILITY ENVIRONMENT WITHOUT EXTRA NETWORK BURDEN
A security appliance system routing strings of data packets in a high availability environment. The security appliance system contains a plurality of intrusion...
2016/0269425 METHODS AND SYSTEMS FOR PROVIDING SECURITY TO DISTRIBUTED MICROSERVICES
Systems for providing security to distributed microservices are provided herein. In some embodiments, a system includes a plurality of microservices, each of...
2016/0269424 Large Scale Malicious Process Detection
Identify a set or session of processes as having certain characteristics. A method obtains a known set or session of processes, wherein the known set or...
2016/0269423 Methods and systems for malware analysis
Methods, system, and media for analyzing a potential malware sample are disclosed. A sample for malware analysis may be received. The sample may be received...
2016/0269422 SYSTEMS AND METHODS FOR MALWARE NULLIFICATION
Generally discussed herein are systems, devices, and methods for malware nullification. A system can include a detect module to identify a file type of an...
2016/0269421 Method for network security using statistical object identification
Methods to enforce network policy based on identity authentication at a network endpoint device by offloading the authentication to a network attached...
2016/0269420 APPARATUS FOR VERIFYING SAFETY OF RESOURCE, SERVER THEREOF, AND METHOD THEREOF
According to an exemplary embodiment, an apparatus for verifying safety of a resource may include: a resource requester to request a resource to an origin...
2016/0269419 APPLICATION PLATFORM WITH FLEXIBLE PERMISSIONING
Systems and methods are provided for an application platform with flexible permissioning according to one or more embodiments. In one embodiment, an...
2016/0269418 METHOD, SYSTEM, AND APPARATUS FOR MANAGING AND STORING DATA BASED ON INFORMATION SENSITIVITY
Methods, systems, and devices for managing and storing sensitive sensor data received at a storage server. The system includes a storage server and a sensor...
2016/0269417 DYNAMIC DATA MASKING FOR MAINFRAME APPLICATION
This disclosure relates generally to data masking, and more particularly to method and system for dynamic data masking for mainframe application. In one...
2016/0269416 ANONYMOUSLY SHARING RESOURCES BASED ON SOCIAL NETWORK USER DATA
"A method for controlling access to a resource of an owner of the resource is provided. The owner can be a user of a resource computer system. The access...
2016/0269415 TRANSACTION AUTHORIZATION USING A VOCALIZED CHALLENGE
A method of transaction authorization, includes, at a server: receiving, from a computerized transaction system, transaction request data responsive to a user...
2016/0269414 Wireless Communication Apparatus, Information Processing Apparatus, Communication System, and Method of...
Provided is a wireless communication apparatus including an accepting unit that accepts a transfer operation to transfer a connection right from a first...
2016/0269413 Venue-Specific Wi-Fi Connectivity Notifications
A method includes receiving a wireless connection request at a backend computing device from a user device to allow wireless connection of the user device to a...
2016/0269412 SYSTEMS AND METHODS FOR CLOUD-BASED NETWORK CONTROL
A method is described. The method includes receiving an access request from a router, the router having received the access request from a client device, the...
2016/0269411 System and Method for Anonymous Biometric Access Control
A database stored in a server includes records of biometric templates associated with non-personally identifiable information about of individuals, used for...
2016/0269410 METHOD, SYSTEM AND DEVICE FOR NETWORK AUTHORIZATION BASED ON NO PASSWORD OR RANDOM PASSWORD
Disclosed are a method, system and device for network authorization based on no password or a random password, the method comprising: a network access device...
2016/0269409 Meeting Join for Meeting Device
Various embodiments enable an application on a first device to log into an online meeting in association with a trusted entity, such as a trusted user. Once...
2016/0269408 METHODS AND SYSTEMS FOR MANAGING A NODE
The present invention discloses methods and systems for managing a node through a management server. The management server verifies whether a management...
2016/0269407 BROADCAST-BASED TRUST ESTABLISHMENT
A method and apparatus for device authentication are provided. In the method and apparatus, authentication data for a first device is received. The first...
2016/0269406 Range Based User Identification and Profile Determination
An embodiment includes a main compute node that detects the physical presence of a first user and subsequently loads a profile for the first user. The main...
2016/0269405 COMMUNICATION APPARATUS, COMMUNICATION CONTROL METHOD, AND COMPUTER-READABLE RECORDING MEDIUM
A communication apparatus includes a first communication unit that transmits connection data of a second network to an electronic device by way of a first...
2016/0269404 DYNAMIC DISTRIBUTION OF AUTHENTICATION SESSIONS
This disclosure relates to authenticating and providing transport security over unsecured IP networks to network subscribers. The system includes an...
2016/0269403 MULTI-FACTOR USER AUTHENTICATION
Embodiments of the present invention relates to a multi-factor authentication system and method using an authentication device, a browsing device and an...
2016/0269402 METHODS AND SYSTEMS FOR MANAGING NETWORK ACTIVITY USING BIOMETRICS
The present disclosure describes systems and methods for managing network traffic using biometrics. A server may store a first value N, a primitive root modulo...
2016/0269401 PERSON AUTHENTICATION METHOD
According to one embodiment, a person authentication method includes obtaining, from a medium carried by a person who passes through a first position, first...
2016/0269400 Methods of Tracking and Utilizing Location Data, Biometric Data, Multibiometric Data and Other Associated Data...
The present invention provides enhanced security through multi-biometrics, collected from the same object where each species of biometric is correlated to the...
2016/0269399 SYSTEM AND APPARATUS FOR BIOMETRIC IDENTIFICATION OF A UNIQUE USER AND AUTHORIZATION OF THE UNIQUE USER
A verification device provides an approach to identification and authorization by requiring an authorized biometric presence before permitting the input of a...
2016/0269398 ON DEMAND PASSWORDS
In one embodiment, a user password is received in relation to a user identifier, wherein the user identifier and user password are associated with a user...
2016/0269397 REISSUE OF CRYPTOGRAPHIC CREDENTIALS
Effecting reissue in a data processing system of a cryptographic credential certifying a set of attributes, the credential being initially bound to a first...
2016/0269396 Methods and Systems for Controlling Mobile Terminal Access to a Third-Party Server
The present disclosure includes an exemplary method for controlling access to a third-party server by a mobile terminal. The method comprises: acquiring, at...
2016/0269395 DETECTING SHARING OF PASSWORDS FOR PASSWORD PROTECTED USER ACCOUNTS
A method for detecting the sharing of a password related to a password protected user account provided by an organization, by multiple entities of the...
2016/0269394 Method for Connecting to Wi-Fi Hotspot Device, Wi-Fi Hotspot Device, and User Equipment
A method for connecting to a Wi-Fi hotspot device, the Wi-Fi hotspot device, and a user equipment (UE), where the method includes generating, by the Wi-Fi...
2016/0269393 PROTECTING PASSWORDS AND BIOMETRICS AGAINST BACK-END SECURITY BREACHES
A method and system are provided for authenticating a user to an application back-end using a key pair and one or more bearer tokens such as a password, a...
2016/0269392 SYSTEM AND METHOD FOR MANAGING OFFLINE AND ONLINE PASSWORD BASED AUTHENTICATION
A method and system has been provided in which the security of passwords in general and offline passwords in particular can be enhanced and which can enable...
2016/0269391 METHODS AND SYSTEMS FOR PROVIDING A LOW VALUE TOKEN BUFFER
Embodiments of the present invention are directed at methods and systems for providing a low value token buffer using only low value tokens (i.e., tokens that...
2016/0269390 DISPLAY APPARATUS AND CONTROL METHOD FOR DISPLAY APPARATUS
A display apparatus includes a display section configured to display an image on a display surface, a storing section configured to store a first code and...
2016/0269389 INFORMATION SHARING SYSTEM AND PROGRAM
An information sharing system suitable for sharing golf-related information among a plurality of golf players enables mutual communication between a server...
2016/0269388 EXTENSION OF AUTHORIZATION FRAMEWORK
To provide better administrative access control for allowing access to network applications, an authorization framework is extended by dynamically adding...
2016/0269387 Location And Device Based Student Access Control
Techniques are described for controlling access to an online service by a one or more authentication mechanisms based on device, browser, or location, or a...
2016/0269386 Network Supporting Two-Factor Authentication for Modules with Embedded Universal Integrated Circuit Cards
A network with a set of servers can support authentication from a module, where the module includes an embedded universal integrated circuit card (eUICC). The...
2016/0269385 LOCATION SERVICE FOR USER AUTHENTICATION
A method and apparatus for location authentication of the user are disclosed. In the method and apparatus, the location of the user is authenticated if one or...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.