Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0323309 METHOD AND SYSTEM FOR BLOCKING MALICIOUS THIRD PARTY SITE TAGGING
The present teaching relates to blocking malicious third party site tagging using content security policy (CSP). A request to access a web page is first...
2016/0323308 Information Technology Security Assessment System
A method and system for creating a composite security rating from security characterization data of a third party computer system. The security...
2016/0323307 SYSTEMS AND METHODS FOR EVALUATING CONTENT PROVIDED TO USERS VIA USER INTERFACES
The disclosed computer-implemented method for evaluating content provided to users via user interfaces may include (1) monitoring, as part of a security...
2016/0323306 AUTOMATICALLY GENERATING ALERTS BASED ON INFORMATION OBTAINED FROM SEARCH RESULTS IN A QUERY-PROCESSING SYSTEM
The disclosed embodiments relate to a system that generates an alert based on information extracted from search results generated by a query. During operation,...
2016/0323305 INFORMATION PROCESSING APPARATUS, METHOD FOR DETERMINING ACTIVITY AND COMPUTER-READABLE MEDIUM
An information processing apparatus is provided with: a comparison unit that compares a communication by a terminal connected to a network with a pattern held...
2016/0323304 INFORMATION PROCESSING APPARATUS, METHOD AND COMPUTER-READABLE MEDIUM
An information processing apparatus includes: a specification unit that specifies a phase of activity of terminals by comparing communication between terminals...
2016/0323303 ADVANCED PERSISTENT THREAT DETECTION
A variety of techniques are disclosed for detection of advanced persistent threats and similar malware. In one aspect, the detection of certain network traffic...
2016/0323302 SYSTEMS AND METHODS FOR MONITORING AND MITIGATING NETWORK ATTACKS
In a system for detecting and optionally blocking packets from an attacker, an improved multi-hash process, in which rate information for one or more packet...
2016/0323301 DATA PROTECTION IN A NETWORKED COMPUTING ENVIRONMENT
Approaches for providing data protection in a networked computing environment are provided. A method includes detecting, by at least one computer device, a...
2016/0323300 SYSTEM CONVERSION IN A NETWORKED COMPUTING ENVIRONMENT
Approaches for providing security in a networked computing environment are provided. The method includes detecting, by at least one computer device, a breach...
2016/0323299 SYSTEM AND METHOD TO DETECT AND MITIGATE TCP WINDOW ATTACKS
A computer system and method for monitoring traffic for determining denial of service attacks in a network. Data packets are monitored which are attempting to...
2016/0323298 APPLYING GROUP POLICIES
Information corresponding to a set of signatures is maintained, and for each signature in the set, an associated group policy of a network is maintained. A...
2016/0323297 METHOD, APPARATUS, SYSTEM, AND COMPUTER READABLE MEDIUM FOR PROVIDING APPARATUS SECURITY
Technologies are provided in embodiments for receiving policy information associated with at least one security exception, the security exception relating to...
2016/0323296 Preventing Execution of Programs that are Embedded in Email Messages
Systems and methods are presented which generate modified email messages, which are largely devoid of embedded functions, from original email messages, which...
2016/0323295 Computer Imposed Countermeasures Driven by Malware Lineage
A system to identify and counter computer malware. The system comprises a processor, a memory, a data store comprising information about known computer...
2016/0323294 Authenticated Communication Between Security Devices
Apparatuses, computer readable media, and methods establishing and maintaining trust between security devices for distributing media content are provided. Two...
2016/0323293 SEALING SECRET DATA WITH A POLICY THAT INCLUDES A SENSOR-BASED CONSTRAINT
Technologies pertaining to limiting access to secret data through utilization of sensor-based constraints are described herein. A sensor-based constraint is a...
2016/0323292 SYSTEMS AND METHODS FOR PROFILING CLIENT DEVICES
Systems and methods are provided for providing generating and managing profiles. Such systems and methods may be implemented to control access to a function of...
2016/0323291 Remote Processing of Mobile Applications
In an example implementation of the disclosed technology, a method includes accessing, by a management agent associated with a client device, a profile...
2016/0323290 Network Authentication Of Multiple Profile Accesses From A Single Remote Device
A network authentication system and method is described for authenticating multiple profile accesses from a single remote device. A device remote from a web...
2016/0323289 Network System and Control Method of a Network System, and a Control Device
In a system having a control server and a control device that connects to the control server through a global network, the control device can appropriately...
2016/0323288 DETECTING UNAUTHORIZED RISKY OR INEFFICIENT USAGE OF PRIVILEGED CREDENTIALS THROUGH ANALYSIS OF TASK COMPLETION...
A privileged account management system can maintain a database that defines a normal amount of time that it takes to perform a task associated with a reason...
2016/0323287 METHOD FOR DETECTING AND DEALING WITH UNAUTHORIZED FRAMES IN VEHICLE NETWORK SYSTEM
A method for dealing with unauthorized frames that makes it possible to take appropriate measures when an unauthorized data frame is detected in a vehicle...
2016/0323286 SECURE ACCESS TO REMOTE RESOURCES OVER A NETWORK
A client computer hosts a virtual private network tool to establish a virtual private network connection with a remote network. Upon startup, the virtual...
2016/0323285 System and Method for Secure Control of Resources of Wireless Mobile Communication Devices
Systems and methods for secure control of a wireless mobile communication device are disclosed. Each of a plurality of domains includes at least one wireless...
2016/0323284 MULTINODE HUBS FOR TRUSTED COMPUTING
Embodiments of multinode hubs for trust operations are disclosed herein. In some embodiments, a multinode hub may include a plurality of memory regions, a...
2016/0323283 SEMICONDUCTOR DEVICE FOR CONTROLLING ACCESS RIGHT TO RESOURCE BASED ON PAIRING TECHNIQUE AND METHOD THEREOF
A method of operating a hub includes the hub receiving a pairing request from an Internet of Things (IoT) device, the hub performing pairing with the IoT...
2016/0323282 METHODS AND DEVICES FOR PERMISSION MANAGEMENT
Methods and devices are provided for permission management. In the method, the terminal obtains fingerprint information of a user based on a touch operation on...
2016/0323281 Filtering Content In An Online System Based On Text And Image Signals Extracted From The Content
The disclosure relates (a) a method and computer program product for training a content classifier and (b) a method and computer program product for using the...
2016/0323280 PRIVILEGED ACCESS TO TARGET SERVICES
A method of providing a client with a privileged access ticket (PAT) to access a target service is performed at a credentials management service (CMS) in...
2016/0323279 Automated Device Provisioning and Activation
A message link server maintains secure message links with device link agents on each of a plurality of wireless end-user devices. Plural network elements send...
2016/0323278 SYSTEM, METHOD, AND APPARATUS FOR SECURE IDENTITY AUTHENTICATION
A method for authentication is disclosed. The method may be implemented by a terminal device. The method may comprise generating, by a starting unit of the...
2016/0323277 ACCESS NETWORK ASSISTED BOOTSTRAPPING
The Generic Bootstrapping Architecture is used in a method for assigning the bootstrapping transaction ID so that a machine-to-machine server or other device...
2016/0323276 SELF-SERVICE TERMINAL SECURE BOOT DEVICE ORDER MODIFICATION
Various embodiments herein each include at least one of systems, methods, and software for SST secure boot device order modification. One such embodiment, in...
2016/0323275 MUTUAL AUTHENTICATION METHOD AND SYSTEM WITH NETWORK IN MACHINE TYPE COMMUNICATION
The present invention discloses a method for a Mobile Mobility Entity (MME) to carry out mutual authentication with a group of Machine Type Communication (MTC)...
2016/0323274 Facial Profile Password to Modify User Account Data for Hands-Free Transactions
An account management system establishes an account for a user. The user enters user account information into the account and the account management system...
2016/0323273 CONTROLLED SUBSTANCE TRACKING SYSTEM AND METHOD
The present disclosure provides a controlled substance tracking system and method that can be used in the management and transfer of controlled substances in a...
2016/0323272 METHOD USING A SINGLE AUTHENTICATION DEVICE TO AUTHENTICATE A USER TO A SERVICE PROVIDER AMONG A PLURALITY OF...
A method for authenticating a user to a provider, among a plurality of providers. The method uses an authentication device comprising, for each of provider, a...
2016/0323271 DIGITAL CHARMS SYSTEM AND METHOD
A system and method for controlling access to a digital asset. A first host device is provided to a first host device owner and rights are determined to a...
2016/0323270 OFFLINE ACCESS CONTROL FOR AN APPLICATION
Techniques to facilitate offline access control for an application associated with an industrial automation environment are disclosed herein. In at least one...
2016/0323269 SECURITY TOKEN WITH EMBEDDED DATA
A system and method are presented that provide authentication tokens to a local device from a remote server. The authentication token incorporates standard...
2016/0323268 Trusted Container
A secure identifier is derived, using a secured microcontroller of a computing device, that is unique to a pairing of the computing device and a particular...
2016/0323267 METHOD AND SYSTEM FOR ONE-TIME PASSWORD GENERATION AND DISPLAY
A system and method are provided for the on-demand generation and display of a one-time password (OTP). A display is coupled to a computing device having at...
2016/0323266 METHOD, MANAGEMENT APPARATUS AND DEVICE FOR CERTIFICATE-BASED AUTHENTICATION OF COMMUNICATION PARTNERS IN A DEVICE
A certificate-based authentication of communication partners in a device is provided and has the first method step of identification of a target frame for the...
2016/0323265 MULTI-FACTOR AUTHORIZATION FOR IEEE 802.1X-ENABLED NETWORKS
The present disclosure discloses a system and method for providing multi-factor authorization for IEEE 802.1x-enabled networks. Specifically, a network device...
2016/0323264 Secure Import and Export of Keying Material
An embodiment includes a method executed by at least one processor of a first computing node comprising: generating a key pair including a first public key and...
2016/0323263 UPDATING STORED PASSWORDS
A device may include an authentication server and a server. The authentication server may receive a first form of a password from a client device in accordance...
2016/0323262 DIGITAL CERTIFICATION ANALYZER TEMPORARY EXTERNAL SECURED STORAGE
A digital certification analyzer (or "analyzer") provides protection for digital content stored on servers, file sharing systems, hard drives and USB enabled...
2016/0323261 Location Determination for User Authentication
User authentication techniques based on geographical locations associated with a client device is provided. A network connection can be established between two...
2016/0323260 OBTAINING DATA FOR CONNECTION TO A DEVICE VIA A NETWORK
Method for managing data for connection to a device via a network. The method includes: receiving, by a referencing server, originating from the device, data...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.