Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0337404 APPARATUS AND METHOD FOR PROTECTING PROPRIETARY INFORMATION OVER PUBLIC NOTIFICATION INFRASTRUCTURE
A method includes generating an obfuscation of a notification and transmitting the obfuscation to an end-user device via an unsecure notification...
2016/0337403 SYSTEM AND METHOD FOR IDENTITY AUTHENTICATION
A system, comprising includes an orchestration server including a processor, the orchestration server to receive authentication factors. A rules engine...
2016/0337402 METHOD OF SLOWING DOWN A COMMUNICATION IN A NETWORK
Method of forestalling attacks in a network, by slowing down a communication in a network including at least one computer including malware aimed at...
2016/0337401 IDENTIFYING PHISHING COMMUNICATIONS USING TEMPLATES
Methods, apparatus, systems, and computer-readable media are provided for determining whether communications are attempts at phishing. In various ...
2016/0337400 DETECTION OF SQL INJECTION ATTACKS
In an example embodiment, a system detects unauthorized database queries made by a maliciously formed web request. The system captures a web request for a web...
2016/0337399 COMMUNICATIONS SECURITY
A method is provided for detecting an interception of a communications session established by a user over a network, comprising the steps of: (i) monitoring...
2016/0337398 Anti-Replay Checking with Multiple Sequence Number Spaces
Processes and systems to create a plurality of sequence number spaces in a security association at a transmission device. Each sequence number space...
2016/0337397 METHOD AND DEVICE FOR DEFENDING AGAINST NETWORK ATTACKS
Embodiments of the present application relate to a method and device for defending against website attacks. The method includes obtaining a traffic threshold...
2016/0337396 SYSTEM AND METHOD FOR PROVIDING DATA STORAGE REDUNDANCY FOR A PROTECTED NETWORK
A system and method for providing redundancy with remote scrubbing center devices. The system includes an edge detection device and a plurality of scrubbing...
2016/0337395 MITIGATION OF WEBRTC ATTACKS USING A NETWORK EDGE SYSTEM
Embodiments disclosed herein provide systems and methods for mitigating attacks on a WebRTC system at the edge of an enterprise network. In a particular...
2016/0337394 NEWBORN DOMAIN SCREENING OF ELECTRONIC MAIL MESSAGES
An apparatus is provided for implementation of a system for screening electronic mail messages. The apparatus may receive an electronic mail message, and scan...
2016/0337393 INFORMATION PROCESSING APPARATUS THAT PREVENTS UNAUTHORIZED ACCESS THERETO, METHOD OF CONTROLLING THE...
An information processing apparatus which is capable of preventing unauthorized access thereto. The information processing apparatus is capable of...
2016/0337392 WEB PAGE VULNERABILITY DETECTION METHOD AND APPARATUS
A Web page vulnerability detection method and apparatus are described, where the method can receive a vulnerability detection task for performing vulnerability...
2016/0337391 Detecting Domains Generated By A Domain Generation Algorithm
Apparatus and techniques for determining whether a domain name has been generated by a domain generation algorithm (DGA) are disclosed. A first domain name is...
2016/0337390 Methods and Systems for Behavior-Specific Actuation for Real-Time Whitelisting
Various embodiments include methods of evaluating device behaviors in a computing device and enabling white listing of particular behaviors. Various...
2016/0337389 DISCOVERING YET UNKNOWN MALICIOUS ENTITIES USING RELATIONAL DATA
Data is collected from a database arrangement about behavior of observed entities, wherein the collected data includes one or more features associated with the...
2016/0337388 DETECTING WEB EXPLOIT KITS BY TREE-BASED STRUCTURAL SIMILARITY SEARCH
A method of detecting exploit kits includes receiving, at an input port of a computer, indication of HTTP (Hypertext Transfer Protocol) traffic. The HTTP...
2016/0337387 DETECTING WEB EXPLOIT KITS BY TREE-BASED STRUCTURAL SIMILARITY SEARCH
A method of detecting exploit kits includes receiving, at an input port of a computer, indication of HTTP (Hypertext Transfer Protocol) traffic. The HTTP...
2016/0337386 METHODS AND APPARATUS FOR DETECTING REMOTE CONTROL OF A CLIENT DEVICE
A system, method, and apparatus for detecting remote control of a client device are disclosed. An example network security apparatus includes a network switch...
2016/0337385 NETWORK MONITORING METHOD AND NETWORK MONITORING DEVICE
A device includes a processor configured to accumulate a plurality of logs in the memory, by repeating a capturing process and a logging process, the logging...
2016/0337384 THREAT PROTECTION FOR REAL-TIME COMMUNICATIONS GATEWAYS
A system performs threat protection for real-time communications ("RTC"). The system receives, by a signaling engine of a gateway, a request of a client...
2016/0337383 DETECTING DEVIATION FROM A DATA PACKET SEND-PROTOCOL IN A COMPUTER SYSTEM
A determination is made as to whether an attempt to send a data packet from a computer system has deviated from an established protocol for sending data...
2016/0337382 USE OF AN APPLICATION CONTROLLER TO MONITOR AND CONTROL SOFTWARE FILE AND APPLICATION ENVIRONMENTS
In embodiments of the present invention, a framework for an extensible, file-based security system is described for determining an appropriate application,...
2016/0337381 RESISTING THE SPREAD OF UNWANTED CODE AND DATA
A method or system of receiving an electronic file containing content data in a predetermined data format, the method comprising the steps of: receiving the...
2016/0337380 SYSTEMS AND METHODS FOR MALWARE DETECTION AND SCANNING
Systems and methods are provided for malware scanning and detection in a computing system. In one exemplary embodiment, the method includes launching, in a...
2016/0337379 MALWARE WARNING
A malware warning system, including a client sending requests to and receiving replies from a server, and a server, including a first warning generator sending...
2016/0337378 METHOD AND APPARATUS FOR DETECTING SECURITY OF ONLINE SHOPPING ENVIRONMENT
Embodiments of the invention disclose a method and apparatus for detecting security of an online shopping environment. The method comprises: triggering a...
2016/0337377 ACCESS POLICY UPDATES IN A DISPERSED STORAGE NETWORK
A method for execution in a dispersed storage network operates to determine one or more slice names of one or more slices and determine whether to establish a...
2016/0337376 POLICY-BASED ACCESS IN A DISPERSED STORAGE NETWORK
A method for execution by a dispersed storage and task (DST) execution unit operates to receive a slice retrieval request from a requester that includes a...
2016/0337375 ESTABLISHING AND USING A TRUST LEVEL IN MOBILE PHONES
Automatically establishing and/or modifying a trust relationship between devices, including mobile devices, in communication, and customizing a user interface...
2016/0337374 ACCESS OF A SERVICE
In some examples, a messaging service facility receives a message from a spoke device requesting a service provided by a target device. The messaging service...
2016/0337373 Network Access Based on Social-Networking Information
In one embodiment, a method includes receiving a request at a wireless access point from a client system to access a network through the wireless access point....
2016/0337372 NETWORK SYSTEM, CONTROLLER AND PACKET AUTHENTICATING METHOD
A controller managing a switch receives from the switch, a notice of an unknown packet sent from an access source host that is used by a plurality of users...
2016/0337371 APPARATUS AND METHODS FOR ADMINISTERING ONLNE CONTENT ACCESED BY A MINOR
The present disclosure relates to apparatus and methods that allow a Parent or other designated guardian to screen, intercept and monitor messages sent to and...
2016/0337370 PORTABLE PROFILE ACCESS TOKEN
A user's portable device (e.g., wireless mobile device or standalone connector device) can be used to store a profile data set associated with the profile of...
2016/0337369 CONTROLLING USER ACCESS TO CONTENT
Methods and systems for controlling access to content include an authentication process that provides for increased speed by reducing, or eliminating in some...
2016/0337368 CONTENT PERMISSION PLATFORM
Methods and systems for managing permission controls are disclosed. A method can comprise receiving a request to perform one or more restricted activities. The...
2016/0337367 Online Privacy Management System with Enhanced Automatic Information Detection
A privacy management system (PMS) is disclosed for a Chief Privacy Officer (CPO) or other user to use in monitoring and/or controlling in realtime the flow of...
2016/0337366 DATA STORE ACCESS PERMISSION SYSTEM WITH INTERLEAVED APPLICATION OF DEFERRED ACCESS CONTROL FILTERS
Described are methods, systems and computer readable media for a permissions system including relationships of partitioning, grouping, and the application of...
2016/0337365 DETERMING A PERMISSION OF A FIRST TENANT WITH RESPECT TO A SECOND TENANT
A first representation is provided of privileges among a plurality of tenants of a system. The tenants have relationships according to a hierarchy that...
2016/0337364 SYSTEM AND METHOD FOR AUTOMATICALLY MODERATING COMMUNICATIONS USING HIERARCHICAL AND NESTED WHITELISTS
Disclosed are systems and methods for automatically moderating communications using hierarchical and nested whitelists. An example method comprises receiving a...
2016/0337363 System and Method for Secure Control of Resources of Wireless Mobile Communication Devices
Systems and methods for secure control of a wireless mobile communication device are disclosed. Each of a plurality of domains includes at least one wireless...
2016/0337362 REMOTE ACCESS AUTHORIZATION FOR USE OF VAPOR DEVICE
An electronic vapor device is disclosed comprising a vapor outlet, a first container for storing a first vaporizable material, wherein the first container is...
2016/0337361 SYSTEM AND METHOD TO USE A CLOUD-BASED PLATFORM SUPPORTED BY AN API TO AUTHENTICATE REMOTE USERS AND TO PROVIDE...
A security system for authenticating users and protecting content that provides an application program interface (API) with a Cloud Platform integration...
2016/0337360 Correctional Postal Mail Contraband Elimination System
A method and system for eliminating contraband in postal mail at a correctional facility comprising a central processing facility and a network of inmate email...
2016/0337359 SECURING A CONTROL SYSTEM APPLICATION LAYER PROTOCOL
Devices, methods, and systems for securing a control system application layer protocol are described herein. One method includes receiving a request at a...
2016/0337358 METHOD FOR ENCODING AN ACCESS TO A COMPUTER RESOURCE
A method for coding an access to a computer resource comprises, in a physical representation of a code, first information encoded with a first coding type...
2016/0337357 ELECTRONIC DEVICE AND METHOD FOR MONITORING THE TAKING OF PHOTOS
A method for monitoring the usage of an electronic device, which is executed in the electronic device. When the electronic device is in a monitoring mode and a...
2016/0337356 DEPLOYMENT TEMPLATES WITH EMBEDDED PERMISSIONS
Systems and methods for authorizing execution of actionable data by receiving a request to enable third-party use of the actionable data, the request...
2016/0337355 Method and Apparatus for Sending Authentication Request Message in a Social Network
The present disclosure describes a method and an apparatus for sending an authentication request message in a social network. In order to resolve the problem...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.