Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0315957 SAFE CODE FOR SIGNATURE UPDATES IN AN INTRUSION PREVENTION SYSTEM
Described is a technology by which a signature used by network traffic intrusion prevention/detection systems includes logic that helps a prevention/detection...
2016/0315956 DETECTING MAN-IN-THE-MIDDLE ATTACKS IN ADAPTIVE STREAMING
Systems and methods for adaptively streaming video content to a wireless transmit/receive unit (WTRU) or wired transmit/receive unit may comprise obtaining a...
2016/0315955 Network Security Analysis for Smart Appliances
A method and system for detecting malicious behavior from smart appliances within a network. Smart appliances have a certain level of intelligence that allows...
2016/0315954 DETECTING SHARED OR COMPROMISED CREDENTIALS THROUGH ANALYSIS OF SIMULTANEOUS ACTIONS
A privileged account management system can detect when credentials used to access one or more servers have been shared or otherwise compromised. This detection...
2016/0315953 SYSTEMS AND METHODS FOR SECURING REMOTE CONFIGURATION
A system and method for securing remote configurations. The system and method can include, at a monitoring device, connecting to a messaging service for at...
2016/0315952 Detecting Network Address Translation Devices In A Network Based On Network Traffic Logs
Network traffic logs of network traffic to and from host devices connected to a network that were collected over time are accessed. For each host device...
2016/0315951 SYSTEM AND METHOD FOR DETECTING A COMPROMISED COMPUTING SYSTEM
A digital security threat management system is disclosed. The system detects the presence of a computing system, on a network, that has been compromised by an...
2016/0315950 Apparatus and Method for Enabling Safe Handling of Malware
An apparatus for rendering malware files safe for handling may include processing circuitry configured to receive a executable object, divide the executable...
2016/0315949 APPARATUS AND METHOD FOR TRANSMITTING DATA
A method and an apparatus for transmitting data from a transmitter in a first communication network (21) to a receiver in a second, safety-critical application...
2016/0315948 METHOD AND SYSTEM FOR IDENTIFYING A HUMAN OR MACHINE
Identifying a human or machine is disclosed including sending a currently-triggered human or machine identification request to a server, receiving a first...
2016/0315947 DYNAMIC ENTERPRISE SECURITY CONTROL BASED ON USER RISK FACTORS
Aspects dynamically set enterprise-level security rules. Risk values representing likelihoods of loss of enterprise secure data are determined for different...
2016/0315946 SYSTEM AND METHOD FOR ACCESS CONTROL USING NETWORK VERIFICATION
A system for controlling access includes a computing device, configured to: determine a first identifier associated with a first access point being used by the...
2016/0315945 SECURITY TRACKING OF COMPUTER RESOURCES
An allocation system that tracks allocation of computer resources is provided. The allocation system allocates a number of user-periods to an organization for...
2016/0315944 SYSTEM AND METHOD FOR DYNAMIC NETWORK DATA VALIDATION
In general, certain embodiments of the present disclosure provide systems and methods for dynamic network data validation. In various embodiments, a system is...
2016/0315943 TECHNIQUES FOR FINE GRAINED PROTECTION OF RESOURCES IN AN ACCESS MANAGEMENT ENVIRONMENT
In certain embodiments, techniques are provided (e.g., a method, a system, non-transitory computer-readable medium storing code or instructions executable by...
2016/0315942 ELECTRONIC DEVICE WITH ADDICTION-PREVENTION FUNCTION AND METHOD THEREOF
An addiction-prevention method, includes steps: generating a prompt signal to prompt a user to input a biological feature again every a first predetermined...
2016/0315941 ACCESS CONTROL FOR A DOCUMENT MANAGEMENT AND COLLABORATION SYSTEM
A method and apparatus for controlling access to documents retained by a document management and collaboration system is disclosed. The document management and...
2016/0315940 SYSTEM AND METHOD FOR CONTROLLING ACCESS
Systems and methods for controlling access to multiple applications on a computing device are provided. One embodiment of a system includes an access device...
2016/0315939 METHOD, APPARATUS AND COMPUTER PROGRAM
An approach is provided for enabling access to content in a network service. Location information is received, at a server, relating to a first remote...
2016/0315938 APPARATUS, SYSTEM AND METHOD FOR webRTC
There is provided a solution as to how the authentication and thus the authorization of the webRTC IMS Client can be achieved in the IMS of the mobile network...
2016/0315937 Method and System for Securing Data Communicated in a Network
According to a first aspect of the present disclosure, a method is conceived for securing data communicated in a network, the method comprising: receiving, by...
2016/0315936 METHOD FOR BIOMETRIC RECOGNITION OF A USER AMONGST A PLURALITY OF REGISTERED USERS TO A SERVICE, EMPLOYING USER...
A method for recognizing a person by identification codes derivable from biometric data includes registering a user, and recognizing a registered user, among...
2016/0315935 IMAGING PROCESSING SYSTEM AND ELECTRONIC BLACKBOARD
An image processing system includes an electronic blackboard and a data server connected via a network. The electronic blackboard is configured to generate a...
2016/0315934 MANAGING SERVERS BASED ON PAIRING KEYS TO IMPLEMENT AN ADMINISTRATIVE DOMAIN-WIDE POLICY
A server is paired. A pairing request that includes a pairing key is received from an unpaired server. A determination is made regarding whether to approve or...
2016/0315933 WEB BASED SYSTEM THAT ALLOWS USERS TO LOG INTO WEBSITES WITHOUT ENTERING USERNAME AND PASSWORD INFORMATION
Internet user passwords are securely managed. A formation component can enable a user to create a master account on a web server, the master account comprising...
2016/0315932 METHOD AND SYSTEM FOR AUTHENTICATING SERVICE
Embodiments of the present application relate to a method, a system, and a computer program product for authenticating a service. A method for authenticating a...
2016/0315931 COMMUNICATIONS DEVICE, SYSTEM AND METHOD
A contactless communications device (10) comprises one or more near-field communication (NFC) chips (28) each configured to store information and be read by a...
2016/0315930 CLOUD DATA DISCOVERY METHOD AND SYSTEM FOR PRIVATE INFORMATION PROTECTION AND DATA LOSS PREVENTION IN...
Provided is a cloud data discovery method which includes storing cloud application program interface (API) authentication information for each cloud service...
2016/0315929 SYSTEM AND METHOD FOR ENHANCED CHALLENGE-RESPONSE AUTHENTICATION
Approaches presented herein enable challenge-response authentication of a user based on information captured by a personal internet of things (IoT) device set...
2016/0315928 IDENTITY DATA BASED ON AGGREGATING INPUT DATA
A computing device, a system, and a method are provided to receive a number of inputs associated with one or more sensors of the computing device. One or more...
2016/0315927 METHOD AND SYSTEM FOR ESTABLISHING AND MANAGING PERSONAL BLACK BOX (PBB) IN VIRTUALLY-NETWORKED BIG-DATA (VNBD)...
A Personal Black Box (PBB) of data (and information) in a network (e.g., the Internet) is established and managed. The PBB can utilize both Personally...
2016/0315926 TECHNIQUES FOR SECURITY ARTIFACTS MANAGEMENT
Techniques are provided to manage security artifacts. Specifically, a security management system is disclosed for implementing security artifact archives to...
2016/0315925 METHOD AND SYSTEM FOR DYNAMIC DE-IDENTIFICATION OF DATA SETS
A method for combining disparate data sets using dynamic de-identifiers includes: receiving a first data set from a first external entity, the data set...
2016/0315924 FACSIMILE DEVICE, FACSIMILE COMMUNICATION SYSTEM, AND FACSIMILE DEVICE CONTROL METHOD
A facsimile device includes: an operation part; a storage part for storing therein the same common key as in a reception-side facsimile device; a transmission...
2016/0315923 SECURE COMMUNICATION CHANNELS
A method and system for negotiating a secure device-to-device communications channel between a first computing device and a second computing device, wherein...
2016/0315922 TECHNOLOGIES FOR SECURE EXTENSIBLE INTER-DEVICE I/O REDIRECTION ACROSS A NETWORK
Technologies for secure I/O redirection include a provider device, a consumer device, an authentication server, and a messaging server. The provider device and...
2016/0315921 CUMULATIVE SCHEMES FOR NETWORK PATH PROOF OF TRANSIT
A system and methods are provided for verifying proof of transit of network traffic through a plurality of network nodes in a network. In one embodiment, each...
2016/0315920 METHOD AND APPARATUS FOR AVOIDING DOUBLE-ENCRYPTION IN SITE-TO-SITE IPSEC VPN CONNECTIONS
A system and a method are described that reduce or eliminate inefficiencies caused by double encryption in network tunnel communications. In particular, a set...
2016/0315919 MANAGE ENCRYPTED NETWORK TRAFFIC USING SPOOFED ADDRESSES
Methods and systems for managing encrypted network traffic using spoofed addresses. One example method includes receiving a request to resolve a domain name;...
2016/0315918 SYSTEM AND METHOD FOR ENHANCED DATA PROTECTION
In one embodiment, a method of secure network transmission is performed by a computer system. The method includes encrypting a payload via a first symmetric...
2016/0315917 METHODS AND APPARATUS TO SECURELY SHARE DATA
Methods and apparatus to securely share data are disclosed. An example includes retrieving, by executing an instruction with a processor at a first computing...
2016/0315916 SECURE COMMUNICATION SECRET SHARING
Embodiments are directed to sharing secure communication secrets with a network monitoring device (NMD). The NMD may passively monitor network packets...
2016/0315915 METHOD FOR ACCESSING A DATA MEMORY OF A CLOUD COMPUTER SYSTEM USING A MODIFIED DOMAIN NAME SYSTEM (DNS)
The invention relates to a process for accessing a data storage device (128) of a cloud computer system (102) through a gateway computer system (100) which is...
2016/0315914 METHOD FOR HIDING RECEIVER'S ADDRESS FOR LINK LAYER IN GROUP COMMUNICATION
The present invention relates to a receiver information hiding method of hiding receiver information of a message in a system including a transmitting terminal...
2016/0315913 Scalable Intermediate Network Device Leveraging SSL Session Ticket Extension
An intermediary network device receives a request for a secure communication session between an endpoint server and an endpoint client through the network...
2016/0315912 METHOD AND SYSTEM OF ESTABLISHING A VIRTUAL PRIVATE NETWORK IN A CLOUD SERVICE FOR BRANCH NETWORKING
In one aspect, a computerized system useful for implementing a virtual private network (VPN) including an edge device that automatically establishes an...
2016/0315911 INTELLIGENT FIREWALL ACCESS RULES
A firewall provides improved network security by allowing the use of dynamic objects in firewall rules, where the dynamic objects evaluate to a variable set of...
2016/0315910 Persistent Uniform Resource Locators (URLs) for Client Applications acting as Web Services
Techniques to provide persistent uniform resource locators (URLs) for client applications acting as web services are described herein. In one or more...
2016/0315909 NETWORK SECURITY ANALYSIS FOR SMART APPLIANCES
A method and system for detecting malicious behavior from smart appliances within a network. Smart appliances have a certain level of intelligence that allows...
2016/0315908 Method and Apparatus for Managing MAC Address Generation for Virtualized Environments
MAC addresses are flexibly and dynamically allocated across groups of devices that need MAC addresses. MAC address pools are defined for the groups by...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.