Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2017/0099310 DYNAMIC DEEP PACKET INSPECTION FOR ANOMALY DETECTION
In one embodiment, a device in a network captures a first set of packets based on first packet capture criterion. The captured first set of packets is provided...
2017/0099309 DYNAMIC INSTALLATION OF BEHAVIORAL WHITE LABELS
In one embodiment, a device in a network analyzes data regarding a detected anomaly in the network. The device determines whether the detected anomaly is a...
2017/0099308 CYBERSECURITY SYSTEM WITH DIFFERENTIATED CAPACITY TO DEAL WITH COMPLEX CYBER ATTACKS
An improved cyber security protection system with differentiated capacity to deal with complex cyber attacks in complex, highly-connected industries. The...
2017/0099307 SYSTEMS AND METHODS FOR INSTRUCTIONS-BASED DETECTION OF SOPHISTICATED OBFUSCATION AND PACKING
Disclosed herein are new methods and systems for detecting obfuscated programs. We build a recursive traversal disassembler that extracts the control flow...
2017/0099306 DETECTION OF ADVANCED PERSISTENT THREAT ATTACK ON A PRIVATE COMPUTER NETWORK
A system for detecting an advanced persistent threat (APT) attack on a private computer network includes hosts computers that receive network traffic and...
2017/0099305 MANAGEMENT AND DISTRIBUTION OF VIRTUAL CYBER SENSORS
A system includes reception of data at a computing network, generation of alerts at the computing network based on received data and on cyber sensor data, the...
2017/0099304 AUTOMATIC GENERATION OF CLUSTER DESCRIPTIONS
In one embodiment, a method includes receiving data associated with a cluster at a computer and processing the data at the computer to automatically generate a...
2017/0099303 METHOD, SYSTEM, AND STORAGE MEDIUM FOR ADAPTIVE MONITORING AND FILTERING TRAFFIC TO AND FROM SOCIAL NETWORKING...
Embodiments disclosed herein provide a system, method, and computer readable storage medium storing computer instructions for implementing a Socialware...
2017/0099302 METHODS, SYSTEMS, AND MEDIA FOR INHIBITING ATTACKS ON EMBEDDED DEVICES
Methods, systems, and media for inhibiting attacks on embedded devices are provided. In some embodiments, a system fur inhibiting on embedded devices is...
2017/0099301 MANAGING ACCESS TO CONTENT FOR A SPONSORED DATA CAMPAIGN
A device may receive a network address and a signature. The network address may be associated with a sponsored data campaign, and the signature may be...
2017/0099300 SYSTEM AND PROCESS FOR DISTRIBUTION OF INFORMATION ON A COMMUNICATION NETWORK
A communications system includes a plurality of recipient processors located at geographically remote locations with respect to each other and connected for...
2017/0099299 PERMISSIONS FOR HYBRID DISTRIBUTED NETWORK RESOURCES
A computing resource service provider may receive, from a user client connected to an on-premises network, a security document specifying one or more user...
2017/0099298 CLIENT-SIDE INTEGRATION FRAMEWORK OF SERVICES
Systems and methods for providing client-side integration of apps and services is provided. An integration framework execution upon a computing device provides...
2017/0099297 VIRTUAL COLLABORATION SYSTEMS AND METHODS
A system including a domain controller and a document, policy, and collaboration servers. The document server receives a request signal based on an input...
2017/0099296 ACCESS CONTROL SYSTEM AND METHOD
A team-centric computerized access control system includes at least one data record, one or more collaboration spaces associated with the data record, and for...
2017/0099295 ACCESS AND PORTABILITY OF USER PROFILES STORED AS TEMPLATES
A system to access one or more user profiles that govern one or more vehicle functions. The system cooperates with a processor and verification module which...
2017/0099294 Multi-Party Secure Information Integration System
A method of the present disclosure includes a host system authenticating a user of the user device to access secure host information associated with the user...
2017/0099293 DIGITAL CERTIFICATION ANALYZER TEMPORARY EXTERNAL SECURED STORAGE SYSTEM TOOLS
A temporary external secured storage (or "TESS") system utilizes a group of system tools to aid in the management of digital content. An artificial or virtual...
2017/0099292 Systems and Methods for Access Permission Revocation and Reinstatement
Provided herein are systems and methods of managing permissions for applications deployed in a distributed computing infrastructure. An exemplary system...
2017/0099291 PROTECTING PRIVACY IN AN ONLINE SETTING
Systems, methods, and computer program products to perform an operation comprising receiving digital content associated with an account identifier, parsing the...
2017/0099290 AUDITABLE RETRIEVAL OF PRIVILEGED CREDENTIALS
In an approach for providing auditable retrieval of privileged credentials in a privilege identity management (PIM) system, a processor invokes a checkout of a...
2017/0099289 Temporary Mac Address-Based Access Method, Apparatus, and System
A temporary MAC address-based access method, apparatus, and system is provided. A method includes performing wireless communication access authentication on a...
2017/0099288 INFORMATION PROCESSING SYSTEM, PERIPHERAL DEVICE, WIRELESS COMMUNICATION CHIP, COMPUTER-READABLE NON-TRANSITORY...
In this information processing system including a server, a communication terminal communicable with the server via the Internet, and a peripheral device...
2017/0099287 USER AUTHENTICATED ENCRYPTED COMMUNICATION LINK
Systems and methods are provided for establishing a secure communication link between a first client and a second client. One exemplary computer-implemented...
2017/0099286 ENABLING APPLICATION FUNCTIONS RESPONSIVE TO BIOMETRIC INPUT FROM MORE THAN ONE PERSON
A method includes running an application on a mobile computing device, the mobile computing device accepting biometric input, and the mobile computing device...
2017/0099285 METHODS AND APPARATUS TO SUPPORT GLOBALPLATFORM USAGE ON AN EMBEDDED UICC (eUICC)
Disclosed herein is a technique for managing one or more electronic Subscriber Identity Modules (eSIMs) on an embedded UICC (eUICC). In particular, the...
2017/0099284 SOFTWARE-DEFINED NETWORK THREAT CONTROL
In Software-Defined Network (SDN), a trust controller and trust processor exchange hardware-trust data over an SDN southbound interface to maintain ...
2017/0099283 SINGLE LOGIN AUTHENTICATION FOR USERS WITH MULTIPLE IPV4/IPV6 ADDRESSES
Disclosed in the authentication and authorization of a client device to access a plurality of resources, requiring a user of a client device to enter only one...
2017/0099282 ACCESS CONTROL AND SECURITY FOR SYNCHRONOUS INPUT/OUTPUT LINKS
Aspects include providing automatic access control and security for a synchronous input/output (I/O) link. Providing automatic access control and security...
2017/0099281 IDENTITY MANAGEMENT OVER MULTIPLE IDENTITY PROVIDERS
Systems and processes of advanced identity management over multiple identity providers deployable through mobile applications are provided. The process, e.g.,...
2017/0099280 Single Sign-On Method for Appliance Secure Shell
A system and method for efficiently establishing a secure shell connection for accessing Web resources. A user attempts to establish a secure Hypertext...
2017/0099279 IN-VEHICLE SHARED-SCREEN SYSTEM WITH WRITE BACK TO MULTIPLE USER ACCOUNTS
In some examples, a vehicle head unit of a vehicle includes at least one processor; and at least one module operable to: responsive to authenticating a first...
2017/0099278 DYNAMIC IDENTITY CHECKING
A selector apparatus to select one or more shared authentication facilities for a software service executing in a virtualized shared computing environment, the...
2017/0099277 Systems and Methods of External Entity Network Service Authentication
Systems and methods are disclosed for providing external entity network authentication, including a processor comprising a computer-readable medium with a set...
2017/0099276 WRIST WORN RFID DEVICE WITH SECURITY PROTECTION AND METHOD THEREOF
A wrist worn RFID device with security protection includes a wrist worn body, a control circuit, a sensing circuit, a safety circuit, a RFID module and a...
2017/0099275 AUDITABLE RETRIEVAL OF PRIVILEGED CREDENTIALS
In an approach for providing auditable retrieval of privileged credentials in a privilege identity management (PIM) system, a processor invokes a checkout of a...
2017/0099274 CALL ENCRYPTION SYSTEMS AND METHODS
Techniques described herein may be used to encrypt a telephone call between users. User devices (e.g., smart phones) may be connected to encryption relay...
2017/0099273 PERIPHERAL DEVICE, WIRELESS COMMUNICATION CHIP, COMPUTER-READABLE NON-TRANSITORY STORAGE MEDIUM HAVING...
This first communication section transmits, to an authentication server, an encryption key, identification information capable of uniquely identifying a...
2017/0099272 Hiding A Public Key Exchange in Noise
A process of hiding one or more public keys inside of random noise is introduced, whose purpose is to protect the privacy of the public keys. In some...
2017/0099271 MANAGE ENCRYPTED NETWORK TRAFFIC USING DNS RESPONSES
This present disclosure generally relates to managing encrypted network traffic using Domain Name System (DNS) responses. One example method includes...
2017/0099270 SYSTEMS AND METHODS FOR ENCRYPTED COMMUNICATION IN A SECURE NETWORK
A method for users of devices including mobile phones and computers to engage in encrypted communications with other devices using asymmetrical key exchange...
2017/0099269 SECURE TRANSMISSION SYSTEM WITH UPGRADED ENCRYPTION STRENGTH
According to one embodiment, is configured to receive a request to communicate a message comprising a body to an intended recipient and to receive a first...
2017/0099268 ENCRYPTED MESSAGE COMMUNICATION
Computer-implemented methods are provided for communicating message data from a sender computer to a receiver computer via a network. The sender computer...
2017/0099267 SYSTEMS AND METHODS FOR PKCS #8 PRIVATE FILE KEY SUPPORT
A communications platform may provide asymmetric cryptography using RSA and/or DSA algorithms using a public and private key pair. The communications platform...
2017/0099266 METHOD AND SYSTEM FOR SENDING A MESSAGE THROUGH A SECURE CONNECTION
The method and system enable secure forwarding of a message from a first computer to a second computer via an intermediate computer in a telecommunication...
2017/0099265 SMALL FORM-FACTOR CRYPTOGRAPHIC EXPANSION DEVICE
A cryptographic expansion device that can be attached to a communication component of a communication device to enable the communication device to perform...
2017/0099264 Method and system for secure document exchange
An application is instrumented with a document protection service provider interface (SPI). The interface is used to call an external function, e.g., an...
2017/0099263 METHOD FOR PERFORMING SIMILAR-INFORMATION SEARCH WHILE KEEPING CONTENT CONFIDENTIAL BY ENCRYPTION
A similar-information search method includes obtaining an instruction indicating which of an encrypted search and an unencrypted search a data computation...
2017/0099261 Splitting an SSL Connection Between Gateways
A system for secure communication, including a first security computer communicatively coupled with a client computer via an SSL connection, including a...
2017/0099260 PROVIDING LOCATION-SPECIFIC NETWORK ACCESS TO REMOTE SERVICES
Techniques are described for providing users with access to computer networks, such as to enable users to create and configure computer networks that are...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.