Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2017/0134405 Dynamic Honeypot System
Various embodiments include a honeypot system configured to trigger malicious activities by malicious applications using a behavioral analysis algorithm and...
2017/0134404 HIERARCHICAL FEATURE EXTRACTION FOR MALWARE CLASSIFICATION IN NETWORK TRAFFIC
In one embodiment, a method includes receiving packet flow data at a feature extraction hierarchy comprising a plurality of levels, each of the levels...
2017/0134403 TECHNOLOGIES FOR HANDLING MALICIOUS ACTIVITY OF A VIRTUAL NETWORK DRIVER
Technologies for handling malicious activity of a virtual network driver include a network computing device on which a virtual machine is being executed and...
2017/0134402 Protecting from Unintentional Malware Download
Protection from malware download is provided. A first input is received to access one of an email attachment or a web site link using an application. A newly...
2017/0134401 SYSTEM AND METHOD FOR DETECTING ABNORMAL TRAFFIC BEHAVIOR USING INFINITE DECAYING CLUSTERS
A system and method for detecting abnormal traffic behavior. The method comprises: applying a task to an input data set to create an un-normalized cluster of...
2017/0134400 METHOD FOR DETECTING MALICIOUS ACTIVITY ON AN AIRCRAFT NETWORK
An aircraft includes an aircraft network having a plurality of nodes that are segregated into a plurality of zones, each zone defining a different level of...
2017/0134399 SECURITY LEVEL AND STATUS EXCHANGE BETWEEN TCP/UDP CLIENT(S) AND SERVER(S) FOR SECURE TRANSACTIONS
According to one embodiment, a method includes informing a second peer about a security issue in one or more secure transmission control protocol/user datagram...
2017/0134398 Devices, Systems, and Methods for Detecting Proximity-Based Mobile Malware Propagation
Devices, systems, and methods are disclosed. An agent resides in a mobile communication device. The agent detects Proximity-based Mobile Malware Propagation....
2017/0134397 MALICIOUS SOFTWARE DETECTION IN A COMPUTING SYSTEM
A computer system identifies malicious Uniform Resource Locator (URL) data items from a plurality of unscreened data items that have not been previously...
2017/0134396 Face Based Secure Messaging
In an embodiment, a system includes at least one core and a trusted execution environment (TEE) to conduct an identity authentication that includes a...
2017/0134395 METHOD AND APPARATUS FOR SECURE AGGREGATED EVENT REPORTING
A computer implemented method and system for secure aggregated event reports. The method comprises determining, by a device, that a status change has occurred...
2017/0134394 DATA TRANSMITTING AND RECEIVING METHOD, TRANSMITTER, RECEIVER AND CAN BUS NETWORK
The present disclosure provides data transmitting and receiving methods, transmitter, receiver and CAN bus network. The present disclosure may enhance the...
2017/0134393 METHOD, APPARATUS, AND RECORDING MEDIUM FOR SHARING USE AUTHORITY WITH RESPECT TO SERVICE
A method of a second terminal for sharing a use authority of a service allowed by a first user of a first terminal is provided. The method includes requesting...
2017/0134392 INCIDENT MANAGEMENT TO MAINTAIN CONTROL OF RESTRICTED DATA IN CLOUD COMPUTING ENVIRONMENTS
Techniques allow DevOps personnel to perform incident management for cloud computing environments in a manner that maintains control over restricted data and...
2017/0134391 LOCATION AND DEVICE BASED STUDENT ACCESS CONTROL
Techniques are described for controlling access to an online service by a one or more authentication mechanisms based on device, browser, or location, or a...
2017/0134390 TECHNIQUES FOR DATA MONITORING TO MITIGATE TRANSITIVE PROBLEM IN OBJECT-ORIENTED CONTEXTS
Techniques for mitigating the transitive data problem using a secure asset manager are provided. These techniques include generating a secure asset manager...
2017/0134389 Third Party Paywall Authentication System
The present technology provides a less burdensome mechanism to bring media items owned or licensed in the physical world into an account hosted by an...
2017/0134388 METHODS AND SYSTEMS FOR GENERATING A DYNAMIC WORKFLOW IN A MULTI-TENANT DATABASE ENVIRONMENT
Techniques and systems for modifying a virtual machine functionality. Archive files each including at least a class files are received. The archive files are...
2017/0134387 SYSTEM AND METHOD FOR SECURE CONTENT SHARING AND SYNCHRONIZATION
A flexible content sharing system may comprise a network based application built on a client device using information from dissociated user experience...
2017/0134386 SENSOR-BASED HUMAN AUTHORIZATION EVALUATION
A resource-access management system detects whether a user is authorized to access resources. The system may include a user device being configured to include...
2017/0134385 Systems and Methods for Controlling Sign-on to Web Applications
The described technology provides a single sign-on capability so that a user who is already signed on to a web application from a client application may not be...
2017/0134384 METHOD AND DEVICE FOR OBTAINING SUPERUSER PERMISSION
The embodiment of the present disclosure discloses a method and device for obtaining superuser permission. The method for obtaining the superuser permission...
2017/0134383 METHOD AND DEVICE FOR SHARING A RESOURCE
The invention provides a method for accessing a resource, the method including: receiving, by a sharing device, request information transmitted by an accessing...
2017/0134382 VEHICLE ACCESS SYSTEMS AND METHODS
Systems, devices, and methods for controlling access to vehicles in rental, loaner, shared-use, and other vehicle fleets. Some of the present systems, devices,...
2017/0134381 DASHBOARD AS REMOTE COMPUTING SERVICES
Various techniques for implementing computer dashboards as cloud-based services are disclosed herein. In one embodiment, a method includes receiving a...
2017/0134380 SYSTEMS AND METHODS FOR GROUP AUTHENTICATION
The field of the invention relates to network connected authentication systems, and more particularly to systems and methods that enable authentication of one...
2017/0134379 METHOD FOR SECURING AN APPLICATION AND DATA
The present disclosure relates to methods for securing an application. A first method generates a unique cipher for securing the application, by performing...
2017/0134378 Method for configuring access for a limited user interface (UI) device
A method operable by a computing device for configuring access for a limited user interface (UI) device to a network service via a local network access point...
2017/0134377 INFORMATION PROCESSING DEVICE, LOGIN CONTROL METHOD AND PROGRAM
An information processing device includes an imaged image display section configured to display an imaged image on a display, a registered user information...
2017/0134376 USING THE ABILITY TO SPEAK AS A HUMAN INTERACTIVE PROOF
In one embodiment, a human interactive proof portal 140 may use a biometric input to determine whether a user is a standard user or a malicious actor. The...
2017/0134375 SERVER BASED BIOMETRIC AUTHENTICATION
A server-side biometric authentication system is disclosed that can split data knowledge and processes, so that extensive collusion would be required in order...
2017/0134374 BIOMETRIC VIRTUAL MACHINE IMAGE ADMINISTRATION
A method for receiving a virtual machine image comprising configuring a user device to receive a virtual machine image, receive a biometric input from a user,...
2017/0134373 TRUSTED MANAGEMENT CONTROLLER FIRMWARE
A method for ensuring management controller firmware security, by a security manager of a computing device, includes storing a public key and raw identity...
2017/0134372 LOCATION AUTHENTICATION USING MULTISPECTRAL IMAGING
An invention is provided for authentication in a network environment. The invention includes displaying an authentication image on a display device, and...
2017/0134371 TOGGLE BETWEEN ACCOUNTS
Techniques are described for enabling administrators of teams that use a particular service to specify which sign-on options, of multiple possible sign-on...
2017/0134370 ENABLING SINGLE SIGN-ON AUTHENTICATION FOR ACCESSING PROTECTED NETWORK SERVICES
Embodiments of the disclosure enable single sign-on for secure network services. In one embodiment, a method is provided. The method comprises providing, by a...
2017/0134369 METHOD AND APPARATUS FOR PROVIDING TIME-ASSISTED AUTHENTICATION PROTOCOL
Disclosed herein are a method and apparatus for time-assisted authentication. A main authentication entity may generate a group of communication entities. In...
2017/0134368 REQUEST-SPECIFIC AUTHENTICATION FOR ACCESSING WEB SERVICE RESOURCES
Requests for access to Web service resources are evaluated based on the type of request that is received. Requests are not granted unless sufficient proof of...
2017/0134367 ADAPTIVE TIMEOUTS FOR SECURITY CREDENTIALS
Session-specific information stored to a cookie or other secure token can be selected and/or caused to vary over time, such that older copies will become less...
2017/0134366 Trust Stamp
The present invention relates generally to identity or trustworthiness verification for online users. More specifically, the present invention is a method of...
2017/0134365 WIRELESS FIDELITY CONNECTION METHOD AND SYSTEM FOR INTELLIGENT TERMINAL AND ROUTER
An embodiment of the present disclosure discloses a wireless fidelity connection method and a wireless fidelity connection system for an intelligent terminal...
2017/0134364 NOTE UPDATE METHOD AND DEVICE
Disclosed are a note update method and device. The method includes: a first login terminal receives a first instruction of obtaining a note triggered by a...
2017/0134363 DYNAMIC AUTHENTICATION FOR A COMPUTING SYSTEM
A method, computer program product, and computer system for authenticating user access to a computing system using dynamic tokens are provided. A login request...
2017/0134362 DETECTION OF ANOMALOUS AUTHENTICATION ATTEMPTS IN A CLIENT-SERVER ARCHITECTURE
Computerized systems and methods facilitate detection of anomalous activity during the authentication of login attempts. When a login attempt is made,...
2017/0134361 METHODS AND SYSTEMS FOR PRINTING MESSAGES
The present invention discloses methods and systems for printing messages on a print medium. The system comprises a server, a print server, and a gateway. The...
2017/0134360 COMPUTERIZED METHOD AND SYSTEM FOR MANAGING AN EMAIL INPUT FACILITY IN A NETWORKED SECURE COLLABORATIVE...
In embodiments of the present invention improved capabilities are described for managing an email input facility in a networked secure collaborative computer...
2017/0134359 SYSTEM AND METHOD FOR COLLABORATIVE AUTHENTICATION
Systems and methods are disclosed for collaborative authentication of a person based on an interaction with another person. A request for collaborative...
2017/0134358 COMMUNICATION SYSTEM, COMMUNICATION CONTROL DEVICE, AND FRAUDULENT INFORMATION-TRANSMISSION PREVENTING METHOD
A plurality of ECUs and a monitoring device are connected to a common CAN bus. Each ECU outputs to the CAN bus a transmission frame where authentication...
2017/0134357 METHODS AND APPARATUSES FOR ENABLING AN ESTABLISHMENT OF A SECOND SECURE SESSION OVER A COMMUNICATION NETWORK
This disclosure provides a method, performed in a client terminal (50), for enabling an establishment of a second secure session over a communication network....
2017/0134356 CONTENT URL AUTHENTICATION FOR DASH
Technology for content uniform resource locator (URL) authentication for dynamic adaptive streaming over hypertext transfer protocol (HTTP) (DASH) is...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.