Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0285909 CLOUD CHECKING AND KILLING METHOD, DEVICE AND SYSTEM FOR COMBATING ANTI-ANTIVIRUS TEST
A cloud checking and killing method includes, but is not limited to, a cloud server receiving a cloud checking and killing request for performing virus...
2016/0285908 Processing Method for Network Address Translation Technology, NAT Device and BNG Device
Provided are a processing method for a Network Address Translation, NAT, technology, an NAT device and a BNG device, the method includes: the NAT device...
2016/0285907 System and Method for Developing a Cyber-Attack Scenario
A cyber-attack scenario simulation system and method may include an aircraft simulator operable to generate an aircraft simulation, a cyber-attack generator...
2016/0285906 VIRTUAL MACHINE PLACEMENT
Technologies for virtual machine placement within a data center are described herein. An example method may include determining a shared threat potential for a...
2016/0285905 SYSTEM AND METHOD FOR DETECTING MOBILE CYBER INCIDENT
A system for detecting mobile cyber incidents includes: a mobile incident collection server adapted to collect text messages sent through communication company...
2016/0285904 Home Network Intrusion Detection and Prevention System and Method
A home network Intrusion and Detect on Protection System (IDPS) is described. The Home Network IPDS provides a managed client solution that secures client home...
2016/0285903 DETERMINATION OF SENSOR USAGE
Particular embodiments may include a system, apparatus, method, and/or machine readable storage medium for determining sensor usage by: detecting, at a level...
2016/0285902 Security Threat Identification/Testing Using Annotated Sequence Diagrams
Embodiments provide apparatuses and methods supporting software development teams in identifying potential security threats, and then testing those threats...
2016/0285901 MACRO GRID GOVERNANCE AND COMMUNICATION
A governance apparatus and a communication method for communicating within the governance apparatus. The governance apparatus includes a Government. The...
2016/0285900 SCANNING FILES FOR INAPPROPRIATE CONTENT DURING SYNCHRONIZATION
The present invention extends to methods, systems, and computer program products for scanning files for inappropriate content during file synchronization....
2016/0285899 RUNTIME DETECTION OF A BANDWIDTH DENIAL ATTACK FROM A ROGUE INTERCONNECT
For runtime detection of a bandwidth denial attack from a rogue NoC. The apparatus includes a processor and a memory storing code executable by the processor....
2016/0285898 MANAGEMENT PROGRAM, MANAGEMENT APPARATUS, AND MANAGEMENT METHOD
A non-transitory computer-readable storage medium storing therein a management program that causes a computer to execute a process includes acquiring...
2016/0285897 METHODS AND SYSTEMS FOR IDENTIFYING MALWARE THROUGH DIFFERENCES IN CLOUD VS. CLIENT BEHAVIOR
A computing device may be configured to work in conjunction with another component (e.g., a server) to better determine whether a software application is...
2016/0285896 CUSTOM PROTECTION AGAINST SIDE CHANNEL ATTACKS
Embodiments of an invention for custom protection against side channel attacks are disclosed. In one embodiment, a processor includes instruction hardware and...
2016/0285895 CALCULATING CONSECUTIVE MATCHES USING PARALLEL COMPUTING
Methods and systems for determining consecutive matches are provided. According to one embodiment, a class definition and a data stream are received by a...
2016/0285894 MEASURING, CATEGORIZING, AND/OR MITIGATING MALWARE DISTRIBUTION PATHS
Systems and methods for event path traceback may utilize a processor and a path traceback and categorization (ATC) module in communication with the processor....
2016/0285893 SYSTEM AND METHOD FOR ENHANCED DISPLAY-SCREEN SECURITY AND PRIVACY
A security method that includes assigning a sensitivity value for a communication with a sensitivity determining module including at least one hardware...
2016/0285892 PROTECTING A MEMORY
In an embodiment, a processor includes: at least one core to execute instructions; and a memory protection logic to encrypt data to be stored to a memory...
2016/0285891 Creating Three-Party Trust Relationships for Internet of Things Applications
A trust relationship is established at a first network connected device between the first network connected device and a second network connected device. A...
2016/0285890 SHARED FOLDER BACKED INTEGRATED WORKSPACES
Disclosed are systems, methods, and non-transitory computer-readable storage media for shared folder backed integrated workspaces. In some implementations, a...
2016/0285889 METHOD AND SYSTEM FOR DATA COMMUNICATION OVER NETWORK
Embodiments of the present application relate to a method for data communication, a system for data communication, and a computer program product for data...
2016/0285888 GEOGRAPHICAL LOCATION AUTHENTICATION
The method includes identifying a computing device attempting to access content. The method further includes identifying a defined geographical boundary that...
2016/0285887 ENVIRONMENTAL-BASED LOCATION MONITORING
Aspects of the present disclosure are directed towards environmental based location monitoring. Environmental based location monitoring can include collecting,...
2016/0285886 GEOGRAPHICAL LOCATION AUTHENTICATION
The method includes identifying a computing device attempting to access content. The method further includes identifying a defined geographical boundary that...
2016/0285885 CONTEXTUAL CONTACTS FOR HTML5
Various system and methods for selecting a set of contacts for sharing with an application. An apparatus comprises a contact selection module, an application...
2016/0285884 CONFIGURABLE SHARING OF USER INFORMATION
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for sharing information. The methods, systems, and apparatus...
2016/0285883 ACCESS-LEVEL CONTROL APPARATUS
An access-level control apparatus includes an NC machine tool, an RFID that is held by an operator and stores an ID given to the operator, a reader unit that...
2016/0285882 PREVIEW SERVING FROM AN EXTERNAL PREVIEW SERVICE
Embodiments relate to preview serving of content previews from a preview service for a component having associated content. A filter of a layered preview...
2016/0285881 ACCESS CONTROL LISTS AND PROFILES TO MANAGE FEMTO CELL COVERAGE
Access to femto cell service can be managed through access control list(s) (e.g., white list(s), or black list(s)). White list(s) includes a set of subscriber...
2016/0285880 MASHUP METHOD, COMPUTER-READABLE RECORDING MEDIUM, AND TERMINAL
A mashup method is disclosed. The Web APIs which the Web application uses are specified by analyzing descriptions of drivers used to access the multiple Web...
2016/0285879 SYSTEMS AND METHODS FOR ACCESS CONTROL
The disclosure describes various systems and methods for access control. One such method includes providing an access control module that includes a base...
2016/0285878 PERMISSION-BASED UPDATING OF CONTACT INFORMATION
A system for automatically updating personal consumer and business contact information is disclosed. A server located "in the cloud" automatically controls a...
2016/0285877 SYSTEMS AND METHODS FOR ENABLING OUTPUT DEVICE FEATURES
Methods and systems for enabling a function based on location information for a mobile device are provided. The location information is provided from a sensor...
2016/0285876 PROVIDING NOTIFICATIONS TO AUTHORIZED USERS
A method and system for initiating message listening and routing message content to authorized user devices is disclosed. For a second user device to receive...
2016/0285875 TECHNOLOGIES FOR SECURE SERVER ACCESS USING A TRUSTED LICENSE AGENT
Technologies for secure server access include a client computing device that loads a license agent into a secure enclave established by a processor of the...
2016/0285874 DEVICES FOR PROVIDING SECURE REMOTE ACCESS
A method for providing secure remote access by a controller is described. The method includes establishing a link through a security service to a client device...
2016/0285873 SECURE SIMPLE ENROLLMENT
A first device having a first public key receives an identifier associated with a second device, and a second public key associated with the second device. The...
2016/0285872 INTELLIGENT ELECTRONIC DEVICES, SYSTEMS AND METHODS FOR COMMUNICATING MESSAGES OVER A NETWORK
Intelligent electronic devices (IEDs), systems and methods for communicating messages over a network is provided. The IED of the present disclosure implements...
2016/0285871 DECLARATIVE TECHNIQUES FOR TRANSACTION-SPECIFIC AUTHENTICATION
Techniques are disclosed for providing and/or implementing utilizing declarative techniques for transaction-specific authentication. Certain techniques are...
2016/0285870 DIGITAL RIGHTS MANAGEMENT PLAYBACK GLITCH AVOIDANCE
Various embodiments are generally directed to the provision re-provision of encryption keys to access encrypted media. Encryption keys may be provisioned and...
2016/0285869 METHODS AND SYSTEMS FOR SERVER-INITIATED ACTIVATION OF DEVICE FOR OPERATION WITH SERVER
Methods and systems for enabling activation of a wireless communication device to operate with a server on a wireless communication network. An activation...
2016/0285868 METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR PROVIDING MEDIA MANAGEMENT
An aspect of media management services includes allocating a portion of a storage system to a user, storing media files received from the user in the allocated...
2016/0285867 METHODS AND SYSTEMS FOR ENHANCING THE ACCURACY PERFORMANCE OF AUTHENTICATION SYSTEMS
A method for enhancing the accuracy performance of authentication systems includes determining an authentication data requirement for a desired transaction and...
2016/0285866 BIOMETRIC IDENTITY VERIFICATION
Methods and apparatuses for providing biometric authentication of a test user using a registration process where a reference data sample representative of one...
2016/0285865 AUTHENTICATION SYSTEM FOR A MOBILE DATA TERMINAL
The invention relates to an authentication system (14) comprising a data terminal (1) with a data terminal device, a communication network (15), and an...
2016/0285864 AUTHENTICATED MESSAGES BETWEEN UNMANNED VEHICLES
An unmanned vehicle communicates with other unmanned vehicles. When the unmanned vehicle receives a message from another unmanned vehicle, the unmanned vehicle...
2016/0285863 UNMANNED VEHICLE MESSAGE EXCHANGE
Two unmanned vehicles come within communication range of one another. The unmanned vehicles exchange logs of messages each has received. Each of the unmanned...
2016/0285862 METHODS AND SYSTEMS FOR HANDLING TRUSTED CONTENT FROM VARIOUS SERVICE PROVIDERS
A method including authenticating one or more service providers that provide one or more services to users, the one or more service providers being...
2016/0285861 A system and method for authenticating the legitimacy of a request for a resource by a user
A method of authenticating the legitimacy of a request for a resource from a resource provider by a user, including providing an authentication process in...
2016/0285860 ROLE-BASED ACCESS TOOL
The tool to provide a role-based access tool is configured to receive a single sign-on login from a user; determine an identity of the user based on the single...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.