Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2017/0013017 DATA PROCESSING METHOD AND SYSTEM
A data processing method and system, providing a data transmitting interface to a parallel computing system, are provided. The parallel computing system...
2017/0013016 Managing Network Resource Access Using Session Context
A computing device providing a network service to a service area may receive a connection request from a user device and generate a session start request to...
2017/0013015 KERNEL MODE ACCELERATOR
A system and method for disposing, in kernel space, a data plane having instructions operable to encrypt and transfer data over a network. The data plane is...
2017/0013014 Identification of Vulnerability to Social Phishing
A computer-implemented method includes generating, by one or more processors, a hyperlink targeting a Uniform Resource Locator (URL), detecting a selection of...
2017/0013013 TECHNIQUES FOR RELIABLE NETWORK AUTHENTICATION
Disclosed are various embodiments of techniques that may be used to improve the reliability of network authentication. A communication session is established...
2017/0013012 Asymmetrical Challenges for Web Security
This document describes, among other things, a computer-implemented method for improving the security of one or more computing systems. The method can include...
2017/0013011 SYSTEM FOR THE MEASUREMENT AND AUTOMATED ACCUMULATION OF DIVERGING CYBER RISKS, AND CORRESPONDING METHOD THEREOF
Proposed are a system and a method for the automated measurement, accumulation and monitoring of diverging cyber risks, wherein risk components are exposed by...
2017/0013010 INTERACTING WITH A REMOTE SERVER OVER A NETWORK TO DETERMINE WHETHER TO ALLOW DATA EXCHANGE WITH A RESOURCE AT...
Provided are a computer program product, system, and method for interacting with a remote server over a network to determine whether to allow data exchange...
2017/0013009 TEST METHOD AND SYSTEM FOR PLC SECURITY DEFENSE DEVICE
A test method and system for PLC security defense device are provided. The method including: acquiring by the first test end the information about the device...
2017/0013008 SYSTEM AND METHOD FOR SIMULATING NETWORK SECURITY THREATS AND ASSESSING NETWORK SECURITY
A system and method of security assessment of a network is described. The system may include one or more security assessment computers controlled by a security...
2017/0013007 SYSTEM AND METHOD FOR IMPROVING SECURITY INTELLIGENCE THROUGH INVENTORY DISCOVERY
A system for monitoring devices in a network comprising a coordinator operating on a first processor and configured to detect a plurality of active devices and...
2017/0013006 METHOD FOR PREVENTING ELECTRONIC CONTROL UNIT FROM EXECUTING PROCESS BASED ON MALICIOUS FRAME TRANSMITTED TO BUS
A method for use in a network communication system including a plurality of electronic controllers that communicate with each other via a bus in accordance...
2017/0013005 SYSTEM AND METHOD FOR CONSISTENCY BASED ANOMALY DETECTION IN AN IN-VEHICLE COMMUNICATION NETWORK
A system and method for providing security to a network may include monitoring, by a processor, traffic on a first and second network portions of an in-vehicle...
2017/0013004 DEVICE AND METHOD FOR DETECTING COMMAND AND CONTROL CHANNEL
A device for detecting a command and control channel includes: a session log collector for collecting log information of sessions generated between at least...
2017/0013003 Log Analysis Based on User Activity Volume
In one example implementation, a log analysis system can comprise an activity engine to monitor user activity of a computer system, a baseline engine to...
2017/0013002 THREAT ASSESSMENT LEVEL DETERMINATION AND REMEDIATION FOR A CLOUD-BASED MULTI-LAYER SECURITY ARCHITECTURE
A device may obtain information regarding a security situation of a set of computing resources associated with a cloud-based platform. The information may be...
2017/0013001 Streaming Method and System for Processing Network Metadata
A method and system for processing network metadata is described. Network metadata may be processed by dynamically instantiated executable software modules...
2017/0013000 PROFILING FOR MALICIOUS ENCRYPTED NETWORK TRAFFIC IDENTIFICATION
A malicious encrypted traffic detector connected to a computer network method for identifying malicious encrypted network traffic communicated via a computer...
2017/0012999 EXTERNAL LINK PROCESSING
A system and method of external link processing is disclosed. The system includes an interface configured to receive a user request to access an encoded...
2017/0012998 AUTOMATION OF COLLECTION OF FORENSIC EVIDENCE
Embodiments of the invention are directed to systems, methods and computer program products for automated collection of user-specified forensic data from a...
2017/0012997 Method and Apparatus for Detecting Man-In-The-Middle Attack
A method and an apparatus for detecting a man-in-the-middle attack, where the method includes receiving, by a macro evolved Node B (MeNB), a first check...
2017/0012996 Method and apparatus for assuring location data integrity with minimum location disclosure
An invention relates to method and apparatus of a location assurance system and particularly, although not exclusively, the present invention also relates to...
2017/0012995 SECURITY SYSTEM
A security system is disclosed. The security system includes a secure zone, user access to which is restricted, a first gateway encrypted using a first...
2017/0012994 PASSWORD PROTECTED DEVICE UNLOCK BASED ON MOTION SIGNATURE AND PROXIMITY
A method is provided for the authentication of an electronic device using an authenticated wearable device. The method includes wirelessly connecting a...
2017/0012993 MANAGING DOCUMENT ANNOTATIONS IN A PUBLISH/SUBSCRIBE SYSTEM
Managing document annotations in a publish/subscribe system is described. A publishing system creates annotations of a document that include references to...
2017/0012992 AUTHENTICATION SYSTEM AND METHOD
A system includes least one processor in communication with a memory storing instructions, the at least one processor to receive an authentication request...
2017/0012991 METHOD AND SYSTEM FOR WIRELESSLY COMMUNICATING WITH PROCESS MACHINERY USING A REMOTE ELECTRONIC DEVICE
A method implemented using a server includes receiving a credential to access one or more transmitters from a user equipment (UE). The method also includes...
2017/0012990 INDIRECT USER AUTHENTICATION
As disclosed herein a method, executed by a computer, includes receiving, from a user, a request for access to a shared system, wherein the request comprises a...
2017/0012989 IN-CAR ENROLLMENT
A method for enrolling a user of a vehicle to a first server, wherein the vehicle includes a system having at least a user interface. The method provides a...
2017/0012988 DETECTION OF PROXY SERVER
Devices, systems, and methods of detecting whether an electronic device or computerized device or computer, is communicating with a computerized service or a...
2017/0012987 Management of Group-Sourced Contacts Directories, Systems and Methods
Systems and methods for group-sourced contacts directories are presented. A first member of a shared contacts directory can add contact information of a second...
2017/0012986 INDIRECT USER AUTHENTICATION
As disclosed herein a method, executed by a computer, includes receiving, from a user, a request for access to a shared system, wherein the request comprises a...
2017/0012985 GRANTING PERMISSIONS TO AN OBJECT WHEN ADDING PEOPLE TO A CONVERSATION
A user generates a message by adding a recipient in order to send the message to the recipient. The message has a link to an attached object which is...
2017/0012984 ACCESS CONTROL FOR A DOCUMENT MANAGEMENT AND COLLABORATION SYSTEM
A method and apparatus for controlling access to documents retained by a document management and collaboration system is disclosed. The document management and...
2017/0012983 MECHANISM FOR FACILITATING DYNAMIC CONTEXT-BASED ACCESS CONTROL OF RESOURCES
A mechanism is described for facilitating context-based access control of resources for according to one embodiment. A method of embodiments, as described...
2017/0012982 Protecting Data From Unauthorized Access
In general, the subject matter described in this disclosure can be embodied in methods, systems, and program products for identifying that an application...
2017/0012981 TRUST POLICY FOR TELECOMMUNICATIONS DEVICE
Systems and processes that may be implemented to manage access by software applications to various resources of a user telecommunications device are disclosed....
2017/0012980 WEB DOCUMENT PREVIEW PRIVACY AND SECURITY PROTECTION
Techniques are disclosed for protecting the privacy and security of data associated with a web document. A web browser is configured to manipulate the URL,...
2017/0012979 NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM STORING INFORMATION PROCESSING PROGRAM, INFORMATION...
Provided is a recording medium storing an information processing program including: specifying access information with respect to a web site; establishing a...
2017/0012978 SECURE COMMUNICATION METHOD AND APPARATUS
The present invention provides a secure communication method and apparatus. A security proxy device is arranged between a client and a server; after receiving...
2017/0012977 METHOD FOR ALLOCATING ADDRESSING IDENTIFIER, ACCESS POINT, STATION, AND COMMUNICATIONS SYSTEM
A method for allocating an addressing identifier includes: notifying, by an access point, at least two stations of an encrypted new MAC address that...
2017/0012976 AUTHENTICATION METHOD, APPARATUS, AND SYSTEM
An authentication method is provided. The authentication method includes receiving a login request from a client terminal. The login request may be generated...
2017/0012975 Network Function Virtualization Security and Trust System
A network function virtualization security and trust system includes a network device that operates as a virtualized network device with virtualized services...
2017/0012974 Combined Authorization Process
Some embodiments provide a method for a first device to join a group of related devices. The method receives input of a password for an account with a...
2017/0012973 TRUST FRAMEWORK FOR SECURED DIGITAL INTERACTIONS BETWEEN ENTITIES
A trust framework for secured digital interactions between entities is disclosed. In an example implementation, a secured digital interaction is initiated by a...
2017/0012972 PROXIMITY BASED AND DATA EXCHANGE AND USER AUTHENTICATION BETWEEN SMART WEARABLE DEVICES
A system and method including a disposable wearable device that provides enhanced capabilities to a non-wearable device for a limited period of time by sensing...
2017/0012971 COMMUNICATING APPARATUS, METHOD, AND COMMUNICATING SYSTEM
A communicating apparatus, method, and system that capture an image, authenticate a person in the image that has been captured, determine a direction of the...
2017/0012970 RELATIONAL ENCRYPTION
A method includes receiving biometric data, the biometric data non-uniformly distributed and processing the biometric data to a level of randomness as a...
2017/0012969 METHOD AND DEVICE FOR AUTHENTICATION USING DYNAMIC PASSWORDS
Embodiments of the present application relate to a method and device for authentication processing. The method includes obtaining an equipment code that...
2017/0012968 NETWORK FUNCTION VIRTUALIZATION-BASED CERTIFICATE CONFIGURATION METHOD, APPARATUS, AND SYSTEM
The invention discloses a network function virtualization-based certificate configuration method, apparatus, and system. A virtualized network management...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.