Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0330248 COMMUNICATING STATUS REGARDING APPLICATION OF COMPLIANCE POLICY UPDATES
A set of compliance policy updates are received. The compliance policy updates are sent to workloads for application. A status of the application of the...
2016/0330247 Enforcing Policy-based Application and Access Control in an Information Management System
A method and apparatus for controlling document access and application usage using centrally managed rules. The rules are stored and manipulated in a central...
2016/0330246 SECURITY FOR NETWORK DELIVERED SERVICES
A computer-implemented method for accessing a hosted service on client devices is described. The client devices include client software that uses a remotely...
2016/0330245 SYSTEMS AND METHODS FOR PERFORMING TARGETED SCANNING OF A TARGET RANGE OF IP ADDRESSES TO VERIFY SECURITY...
The present disclosure is directed towards systems and methods for scanning of a target range of IP addresses to verify security certificates associated with...
2016/0330244 Secure Storage of Data Among Multiple Devices
Described herein is a computer implemented method for securely storing a record. Record storage criteria and record access criteria are received and the record...
2016/0330243 Hybrid Engine for Generating a Recommended Security Tier
A computer-implemented method, including receiving, by one or more computer systems, customer characteristic information for a user; applying, by the one or...
2016/0330242 INLINE ARINC DATA AUTHENTICITY INSPECTION MODULE, METHOD AND COMPUTER PROGRAM PRODUCT
An inline ARINC data authenticity inspection module, method and computer program product are provided. In the context of a method, ARINC data that is...
2016/0330241 REMOTE PASSWORD MANAGEMENT USING LOCAL SECURITY POLICIES
Disclosed are various examples for remotely managing passwords using local security policies. A computing device enrolls a client device. The computing device...
2016/0330240 BLOCKING VIA AN UNSOLVABLE CAPTCHA
A security device may receive a request from an attacker device and intended for a server device. The security device may identify the request as being...
2016/0330239 HACKING PREVENTION SYSTEM FOR MOBILE TERMINAL AND METHOD THEREFOR
The present invention is for preventing a mobile terminal from being hacked and relates to a system and method for identifying whether link information is...
2016/0330238 Phishing-as-a-Service (PHaas) Used To Increase Corporate Security Awareness
An enhanced system is provided through a network such as the Internet that provides integrated network security (phishing) testing and training. The current...
2016/0330237 System and Method for Blocking Internet Data Brokers and Networks
The Data Traffic Controller is a system and method that provides users with the ability to view, control and protect themselves during their online browsing....
2016/0330236 COMBINING INTERNET ROUTING INFORMATION WITH ACCESS LOGS TO ASSESS RISK OF USER EXPOSURE
The present disclosure is directed towards systems and methods for evaluating or mitigating a network attack. A device determines one or more client internet...
2016/0330235 INTEGRATED BOT AND CAPTCHA TECHNIQUES
Integrated techniques for computer bot detection and human user based access include determining if a client device has been identified as a computer bot based...
2016/0330234 Secure Coding Framework Based on Cyber Security through Lexical and Symbolic Proxy Technology
The Secure Coding Framework ("SCF") is a class library that wraps and replaces cyber-vulnerable primitives and operators of the underlying programming language...
2016/0330233 Systems and Methods for Detecting and Reacting to Malicious Activity in Computer Networks
Described herein are systems and methods for performing detection operations on secure ticket data to detect potentially malicious activity. Embodiments may...
2016/0330232 MALICIOUS AUTHORIZED ACCESS PREVENTION APPARATUS AND METHOD OF USE THEREOF
The invention comprises a predictive security system apparatus and method of use thereof for predicting a threat level of illicit activity of an actor, the...
2016/0330231 SECURITY RISK MANAGEMENT
Among other things, traces are received of activities of an online user who is associated with an entity. By analysis of the traces a security state of the...
2016/0330230 SYSTEMS AND METHODS FOR IMPROVING SECURITY OF SECURE SOCKET LAYER (SSL) COMMUNICATIONS
The disclosure is directed to a system for improving security of SSL communications. The system can include an device intermediary between one or more servers,...
2016/0330229 IDENTIFYING AND DISABLING A ROGUE ACCESS POINT IN A PUBLIC WIRELESS ENVIRONMENT
A system for identifying a wireless security threat on a vehicle. The system includes a broadband controller including a data processor and memory in which the...
2016/0330228 APPARATUS AND METHOD FOR ASSIGNING CYBER-SECURITY RISK CONSEQUENCES IN INDUSTRIAL PROCESS CONTROL ENVIRONMENTS
A method includes identifying multiple devices or groups of devices in an industrial process control and automation system. The method also includes, for each...
2016/0330227 CONNECTION GATEWAY FOR COMMUNICATING MONITORING AND CONTROL INFORMATION BETWEEN A REMOTELY LOCATED MOBILE...
A home security and control system for monitoring and controlling an external environment such as a home environment comprising: an Internet browser...
2016/0330226 Graph-based Instrusion Detection Using Process Traces
Methods and systems for detecting malicious processes include modeling system data as a graph comprising vertices that represent system entities and edges that...
2016/0330225 Systems, Methods, and Devices for Detecting Anomalies in an Industrial Control System
A method of detecting anomalies in an industrial control system includes analyzing data of correct operational parameters from at least one input device and...
2016/0330224 APPARATUS METHOD AND MEDIUM FOR DETECTING PAYLOAD ANOMALY USING N-GRAM DISTRIBUTION OF NORMAL DATA
A method, apparatus and medium are provided for detecting anomalous payloads transmitted through a network. The system receives payloads within the network and...
2016/0330223 Methods and Systems for Using Causal Analysis for Boosted Decision Stumps to Identify and Respond to Non-Benign...
A computing device processor may be configured with processor-executable instructions to implement methods of detecting and responding non-benign behaviors of...
2016/0330222 SYSTEM AND METHODOLOGY PROVIDING AUTOMATION SECURITY ANALYSIS AND NETWORK INTRUSION PROTECTION IN AN ...
Automation security in a networked-based industrial controller environment is implemented. Various components, systems and methodologies are provided to...
2016/0330221 Systems and Methods for Detecting and Reacting to Malicious Activity in Computer Networks
Described herein are systems and methods for performing operations responsive to potentially malicious activity. Embodiments may include receiving an...
2016/0330220 Systems and Methods for Detecting and Reacting to Malicious Activity in Computer Networks
Described herein are systems and methods for performing potentially malicious activity detection operations. Embodiments may include receiving data associated...
2016/0330219 METHOD AND DEVICE FOR MANAGING SECURITY IN A COMPUTER NETWORK
Method and device for managing security in a computer network include algorithms of iterative intelligence growth, iterative evolution, and evolution pathways;...
2016/0330218 METHOD AND SYSTEM TO PROTECT SOFTWARE-BASED NETWORK-CONNECTED DEVICES FROM ADVANCED PERSISTENT THREAT
A method of protecting a network-connected device from an advanced persistent threat cyber-attack is provided. A network-connected device having an operating...
2016/0330217 SECURITY BREACH PREDICTION BASED ON EMOTIONAL ANALYSIS
Various embodiments of the invention allow to detect and protect against a security breach on a computing system carried out by insiders. In certain...
2016/0330216 ATTACK DETECTION THROUGH SIGNAL DELAY MONITORING
The present disclosure is directed to attack detection through signal delay monitoring. An example system may comprise at least one device including a physical...
2016/0330215 DETECTION OF POTENTIALLY MALICIOUS WEB CONTENT BY EMULATING USER BEHAVIOR AND USER ENVIRONMENT
Methods and systems for the detection of receipt of potentially malicious web content by a web clients are disclosed. These methods and systems comprise...
2016/0330214 DATA INTEGRITY VERIFICATION
A system performs cryptographic operations utilizing information usable to verify validity of plaintext. To prevent providing information about a plaintext by...
2016/0330213 Power Line Communication (PLC) Network Nodes Using Cipher Then Segment Security
Embodiments of the invention provide systems and methods for a cipher then segment approach in a Power Line Communication (PLC). A node or device generates...
2016/0330212 SYSTEM FOR SECURE DATA VALIDATION
A network connected secure system for validating electronic certificate codes. The network connected secure computing system is coupled to a network for access...
2016/0330211 VERIFICATION TECHNIQUES FOR ENHANCED SECURITY
In an example, an apparatus includes a biological analysis component and a control component. The biological analysis component is configured to obtain an...
2016/0330210 Systems and Methods for Security Verification in Electronic Learning Systems and Other Systems
The embodiments described herein relate to security verification systems and methods. In some aspects, there is provided a security verification server...
2016/0330209 A DATA SECURING SYSTEM AND METHOD
Embodiments of the present invention provide data securing methods, systems, and computer program products for controlling data distribution in a distributed...
2016/0330208 METHOD AND APPARATUS FOR IMPLEMENTING DOCUMENT SHARING BETWEEN USER GROUPS
Disclosed are a method and an apparatus for implementing document sharing between user groups. The method comprises: receiving document sharing request...
2016/0330207 AUTHENTICATING A REQUEST FOR AN ELECTRONIC TRANSACTION
In an approach for authenticating a request for an electronic transaction, a computer determines whether a request from a user for an electronic transaction is...
2016/0330206 METHOD, DEVICE AND SERVER FOR MANAGING USER LOGIN SESSIONS
The present disclosure provides a method, device and server for managing user login sessions. A session cache list is queried, using a user ID and after a user...
2016/0330205 VIRTUAL MACHINE ACCESS CONTROL
A system is provided and includes a broadcasting device configured to emit a beacon signal over a predefined range and a mobile computing device. The mobile...
2016/0330204 METHOD AND DEVICE FOR ACTIVATING FUNCTIONS OF A CONTROL DEVICE
A method for activating at least one function of a control device of a motor vehicle, which includes the steps: a) generating a random value in the control...
2016/0330203 Bi-directional communication over a one-way link
Apparatus for communication includes a single one-way link, which is physically capable of carrying the communication signals in one direction and incapable of...
2016/0330202 ACCESS CONTROL DEVICE, COMMUNICATION SYSTEM, PROGRAM, AND METHOD FOR CONTROLLING ACCESS
An access control device for controlling an access by a communication terminal to an application includes an authentication method management means configured...
2016/0330201 Systems and Methods for Controlling Access to a Computer Device
A method and system for controlling access to a computer device. The method and system involves operating a computer device to control access to the computer...
2016/0330200 MULTI-SERVICES APPLICATION GATEWAY AND SYSTEM EMPLOYING THE SAME
An intelligent gateway device provided at a premise (home or business) for providing and managing application services associated with use and support of a...
2016/0330199 FALLBACK IDENTITY AUTHENTICATION TECHNIQUES
The presently disclosed subject matter includes a system, a method and a non-transitory program storage device configured for authorizing access of a user...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.