Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0381057 Customized Network Traffic Models To Detect Application Anomalies
Systems, methods, and devices of the various aspects enable identification of anomalous application behavior. A computing device processor may detect network...
2016/0381056 SYSTEMS AND METHODS FOR CATEGORIZATION OF WEB ASSETS
In a system for determining the state of an asset owned by an entity, a number of scores that are representative of the state of the asset are queried and...
2016/0381055 SYSTEM AND METHOD FOR PROVIDING SECURITY TO A COMMUNICATION NETWORK
A system and method for providing security to a network may include identifying a message sent over a network, the message related to a data transfer from an...
2016/0381054 SYSTEM AND DEVICE FOR PREVENTING ATTACKS IN REAL-TIME NETWORKED ENVIRONMENTS
Disclosed are various embodiments of a system or method for the transparent handling of real-time streaming application-level data. The disclosed embodiments...
2016/0381053 DEVICE AND A METHOD FOR DETECTING AND ANALYZING SIGNALS IN THE ULTRASOUNDS FREQUENCY SPECTRUM FOR ELECTRONIC...
A device and a method for monitoring continuously the activity of a microphone and a speaker of an electronic communications device, filtering any emitted or...
2016/0381052 URL SELECTION METHOD, URL SELECTION SYSTEM, URL SELECTION DEVICE, AND URL SELECTION PROGRAM
A URL selection method disclosed in the present application includes a first extraction step and a second extraction step. The first extraction step extracts...
2016/0381051 DETECTION OF MALWARE
Particular embodiments described herein provide for an electronic device that can be configured to monitor a process, determine if the process is parsing to...
2016/0381050 PROCESSORS, METHODS, SYSTEMS, AND INSTRUCTIONS TO PROTECT SHADOW STACKS
A processor of an aspect includes a decode unit to decode an instruction. The processor also includes an execution unit coupled with the decode unit. The...
2016/0381049 IDENTIFYING NETWORK INTRUSIONS AND ANALYTICAL INSIGHT INTO THE SAME
The present invention collects raw packet data related to network traffic flow over the course of time. By combining metadata from the application layer and/or...
2016/0381048 SYSTEMS AND METHODS FOR AUTOMATICALLY MITIGATING DENIAL OF SERVICE ATTACKS
A method for mitigating a denial of service attack includes determining, for a client, a number of requests being transmitted to a server and determining, for...
2016/0381047 Identifying and Assessing Malicious Resources
Methods, systems, and computer-readable media for analyzing and indicating network resources as potentially malicious are disclosed. Some aspects of the...
2016/0381046 REAL-TIME AGREEMENT ANALYSIS
Techniques for informing a user about an agreement including agreement terms and trustworthiness of data source are described herein. In some examples, a...
2016/0381045 HARDWARE BASED DETECTION DEVICES FOR DETECTING NETWORK TRAFFIC CONTENT AND METHODS OF USING THE SAME
A device for detecting network traffic content is provided. The device includes a first input port configured to receive one or more signatures, each of the...
2016/0381044 UPDATING CONTENT DETECTION DEVICES AND SYSTEMS
A method of updating a content detection module includes obtaining content detection data, and transmitting the content detection data to a content detection...
2016/0381043 DETECTION OF SHELLCODE
Particular embodiments described herein provide for an electronic device that can be configured to monitor code as it executes. The code can include...
2016/0381042 EMULATOR-BASED MALWARE LEARNING AND DETECTION
Methods and systems are described for malware learning and detection. According to one embodiment, an antivirus (AV) engine includes a training mode for...
2016/0381041 ANOMALY DETECTION TO IDENTIFY MALWARE
Particular embodiments described herein provide for an electronic device that can be configured to monitor activities of objects in a system, compare the...
2016/0381040 METHOD OF COMMUNICATING BETWEEN SECURED COMPUTER SYSTEMS AS WELL AS COMPUTER NETWORK INFRASTRUCTURE
A method of communicating between secured computer systems includes supplementing a prepared task file with specified information in a source computer system,...
2016/0381039 METHOD, SYSTEM AND APPARATUS FOR GEO-VERIFICATION
A method, system and apparatus are provided for geo-verification for access to data stored in a memory of a server having a processor and a network interface...
2016/0381038 FRICTIONLESS MULTI-FACTOR AUTHENTICATION SYSTEM AND METHOD
A frictionless multi-factor authentication system and method ("FMFA system") that facilitates verification of the identity of a website user, registrant or...
2016/0381037 DATA LOSS PREVENTION FOR MOBILE COMPUTING DEVICES
System calls to a kernel of a mobile computing device are monitored. A particular system call is intercepted relating to input/output (I/O) functionality of...
2016/0381036 RESOURCE RESTRICTION
In one implementation, a data sharing system can comprise a trust engine to identify an environment that satisfies a level of trust, an access engine to...
2016/0381035 Management of data of user groups and maintenance of communication thereof
Methods and devices for management of group user data and/or maintenance of instant messaging groups. The methods may include receiving, by a computing device,...
2016/0381034 MANAGING DATA PRIVACY AND INFORMATION SAFETY
Automatically screen data associated with a user that may have already been shared on a social network or about to be shared on the social network for a...
2016/0381033 INSTALLING VIRTUAL MACHINES WITHIN DIFFERENT COMMUNICATION PATHWAYS TO ACCESS PROTECTED RESOURCES
A computer-implemented method, system, and/or computer program product controls access to computer resources used by a computer application. One or more...
2016/0381032 CONTROLLING USER ACCESS TO COMMAND EXECUTION
Techniques are described for providing users with access to perform commands on network-accessible computing resources. In some situations, permissions are...
2016/0381031 FAST USER KIOSK ACCESS IN A NON-PERSISTENT DESKTOP ENVIRONMENT
Techniques for improving logon time for remote desktops a user has not logged onto before. In general, these techniques involve utilizing a pre-logon script to...
2016/0381030 Router Based Securing of Internet of Things Devices on Local Area Networks
IoT devices are secured on multiple local area networks. Each local network contains a router which monitors activities of IoT devices, and transmits...
2016/0381029 OFF-SITE USER ACCESS CONTROL
Systems and methods are described for off-site user access control to communications services via a site-based communications network. Embodiments operate in...
2016/0381028 INSTALLING VIRTUAL MACHINES WITHIN DIFFERENT COMMUNICATION PATHWAYS TO ACCESS PROTECTED RESOURCES
One or more processors fractionate a computer application into disparate components, and assign two or more of the disparate components to different...
2016/0381027 SYSTEM AND METHOD FOR DETECTING AND REPORTING SURREPTITIOUS USAGE
A system and method for determining access and use of sensor and communication peripheral subsystems on a wireless device using resource consumption for the...
2016/0381026 METHOD FOR PROVIDNG A SECURE MODE FOR MOBILE DEVICE APPLICATIONS
Method for providing a secure mode for mobile applications including: configuring which applications should be available in secure mode; defining in the mobile...
2016/0381025 AD HOC END-TO-END AUTHENTICATION AND AUTHORIZATION OF LOGISTICS NETWORK SERVICES
Using a mobile solution as described, external logistics providers can be readily on-boarded into a logistics network and identified as trusted providers at a...
2016/0381024 TEMPORARY PROCESS DEPRIVILEGING
There is disclosed in an example a computing apparatus, including: a process deprivilging engine operable for: recognizing that a process has an undetermined...
2016/0381023 DETECTION OF COMPROMISED UNMANAGED CLIENT END STATIONS USING SYNCHRONIZED TOKENS FROM ENTERPRISE-MANAGED CLIENT...
Techniques related to detecting compromised unmanaged client end stations using synchronized tokens placed on enterprise-managed client end stations are...
2016/0381022 END POINT REPUTATION CREDENTIAL FOR CONTROLLING NETWORK ACCESS
In an approach for controlling access to a resource a processor monitors a first set of traffic of a computing device. A processor calculates reputation based...
2016/0381021 USER MANAGED ACCESS SCOPE SPECIFIC OBLIGATION POLICY FOR AUTHORIZATION
A method sends a request for a delegated authorization grant data set, receives a delegated authorization grant data set that defines the delegated...
2016/0381020 COMBINED KEY SECURITY
Embodiments of the present invention disclose a method, system, and computer program product for a combined key security program. A computer receives an access...
2016/0381019 Diameter Redirect Between Client and Server
A technique redirects a Diameter client command from a first server that has become unavailable to a second server consistent with a Diameter protocol. A...
2016/0381018 TECHNIQUES FOR CALL-BASED USER VERIFICATION
Techniques for call-based user verification are described. In one embodiment, for example, an apparatus may comprise a processor circuit and a storage...
2016/0381017 MANAGEMENT SYSTEM, COMMUNICATION SYSTEM, DATA MANAGEMENT METHOD AND RECORDING MEDIUM
A management system includes an authentication information management unit configured to manage authentication information used in authentication of a request...
2016/0381016 SIMPLE TRUSTED TRANSFER TO INTERNET OF THINGS DEVICES
A system and method for updating multiple devices that are coupled to a network by a hub provides a trusted platform module in each of the devices, sends...
2016/0381015 Authentication for VLAN Tunnel Endpoint (VTEP)
A first network device configured as a first Virtual Local Area Network (VLAN) Tunnel Endpoint (VTEP) may receive a packet from a second network device. The...
2016/0381014 FOLDABLE DEVICE AND METHOD OF CONTROLLING THE SAME
A foldable device includes: a display; a touch panel configured to detect a touch input; a sensing interface configured to detect an angle of the foldable...
2016/0381013 METHODS AND APPARATUS FOR ALLOWING USERS TO CONTROL USE AND/OR SHARING OF IMAGES AND/OR BIOMETRIC DATA
Methods and apparatus for allowing an individual to preserve his/her privacy and control the use of the individual's images and/or personal information by...
2016/0381012 HUMAN BODY COMMUNICATION DEVICE WITH SECURE ACCESS
Systems, apparatuses, and methods may include a human body communication data storage device having at least first and second electrodes and a human body...
2016/0381011 NETWORK SECURITY METHOD AND NETWORK SECURITY SYSTEM
Disclosed are a network security method and a network security system. The method comprises steps: a third-party server, an application server, a mobile...
2016/0381010 HOST CARD EMULATION SYSTEMS AND METHODS
A system is configured for detecting a point of sale, receiving a personal identification number (PIN), generating a PIN based key using a message digest of...
2016/0381009 Systems and Methods for Authenticating Devices Using Single Factor Dynamic Authentication
A computer-implemented method comprising: receiving, by a client device, a username, password and binding code from a user; transmitting, by the client device,...
2016/0381008 METHOD, SYSTEM, AND PROGRAM PRODUCT FOR REMOTELY ATTESTING TO A STATE OF A COMPUTER SYSTEM
A method, system, and program product for remotely attesting to a state of computing system is provided. Specifically, the present invention allows a remote...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.