Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2017/0251027 EMERGENCY CALL BACK FOR SESSION INITIATION PROTOCOL SESSIONS
An Address Resolution Protocol (ARP) process receives a first Internet Protocol (IP) address that is associated with a Media Access Control (MAC) address of a...
2017/0251026 APPARATUS AND METHODS FOR CENTRALIZED MESSAGE EXCHANGE IN A USER PREMISES DEVICE
Methods and apparatus for providing a messaging server within a premises device e.g., a home or enterprise gateway device. In one embodiment, a system is...
2017/0251025 SYSTEMS AND METHODS FOR DISTRIBUTED DATA SHARING WITH ASYNCHRONOUS THIRD-PARTY ATTESTATION
Methods and systems for distributed data verification between a relying party server and a client device using data attested by at least one attestation...
2017/0251024 SYSTEM AND METHOD FOR SHARED PARAMETER-LEVEL DATA
A computationally implemented method includes, but is not limited to: configuring a centrally administered data template including one or more data parameters,...
2017/0251023 SYSTEM AND METHOD FOR ASSOCIATING ENCRYPTION KEY MANAGEMENT POLICY WITH DEVICE ACTIVITY
Examples described herein relate to systems and methods for integrating and implementing ad hoc groups within a policy hierarchy environment. The ad hoc groups...
2017/0251022 POLICY-ENABLED ENCRYPTION KEYS HAVING COMPLEX LOGICAL OPERATIONS
Examples described herein relate to a system for orchestrating a security object, including a memory and processor configured to define a plurality of complex...
2017/0251021 System and Method for Communicating with Security Devices within Secure Networks
A system and method for diagnosing and/or configuring a security device included within a secure network is disclosed. A technician mobile computing device...
2017/0251020 METHOD AND APPARATUS FOR A DUAL RADIO USER EQUIPMENT
A method at a user equipment capable of supporting at least two radio connections, the method including requesting from a remote server, using a first radio...
2017/0251019 SECURE PERFORMANCE MONITORING OF REMOTE APPLICATION SERVERS
Mechanisms for obtaining performance metric information securely are provided. A first application server executing on a computing device comprising a...
2017/0251018 MITIGATION OF DISTRIBUTED DENIAL-OF-SERVICE ATTACKS
A method and apparatus for mitigating a distributed denial-of-service attack are disclosed. In the method and apparatus a first set of data received from a...
2017/0251017 METHOD AND SYSTEM FOR DESTROYING BROWSER-BASED MEMORY CORRUPTION VULNERABILITIES
Client-less methods and systems destroy/break the predictive layout of, for example, a client computer memory. The methods and systems operate by injecting a...
2017/0251016 TECHNIQUES FOR TARGETED BOTNET PROTECTION USING COLLECTIVE BOTNET ANALYSIS
A botnet identification module identifies members of one or more botnets based upon network traffic destined to one or more servers over time, and provides...
2017/0251015 TECHNIQUES FOR TARGETED BOTNET PROTECTION
A botnet identification module identifies members of one or more botnets based upon network traffic destined to one or more servers over time, and provides...
2017/0251014 ANTI-REPLAY SYSTEMS AND METHODS
Systems and methods for detecting replay attacks are provided. One or more sensors may be used to collect data about a state of a device. The device may be...
2017/0251013 TECHNIQUES FOR DISCOVERING AND MANAGING SECURITY OF APPLICATIONS
Techniques for discovery and management of applications in a computing environment of an organization are disclosed. A security management system discovers use...
2017/0251012 CYBER SECURITY
Disclosed herein is a method for use in detection of abnormal behavior of a group of a plurality of entities of a computer system. The method is arranged to be...
2017/0251011 System And Method For Security And Quality Assessment Of Wireless Access Points
A computer-implemented method for security risk assessment of wireless access point devices, the computer-implemented method comprising: receiving signals from...
2017/0251010 SYSTEMS AND METHODS FOR CREATING AND RUNNING HETEROGENEOUS PHISHING ATTACK CAMPAIGNS
A method for creating a plurality of campaigns for simulated phishing attacks includes creating, by a campaign manager, a plurality of campaigns for simulated...
2017/0251009 SYSTEMS AND METHODS FOR PERFORMING OR CREATING SIMULATED PHISHING ATTACKS AND PHISHING ATTACK CAMPAIGNS
A method for establishing a campaign for a simulated phishing attack includes receiving, via a campaign manager, specification of a plurality of parameters for...
2017/0251008 METHOD OF AND SYSTEM FOR PROCESSING AN UNAUTHORIZED USER ACCESS TO A RESOURCE
There is provided a method of processing a potentially unauthorized user access request. The method is executable on a server. The method comprises: receiving...
2017/0251007 AUTOMATED COMPUTER BEHAVIORAL ANALYSIS SYSTEM AND METHODS
Events related to an end-point connected with one or more devices are recorded and collected to observe end-point behavior and determine the risk of...
2017/0251006 SYSTEM FOR DETECTING FRAUDULENT ELECTRONIC COMMUNICATIONS IMPERSONATION, INSIDER THREATS AND ATTACKS
A system for detecting fraudulent emails from entities impersonating legitimate senders that are intended to cause the recipients to unknowingly conduct...
2017/0251005 TECHNIQUES FOR BOTNET DETECTION AND MEMBER IDENTIFICATION
A botnet identification module identifies members of one or more botnets based upon network traffic destined to one or more servers over time, and provides...
2017/0251004 Method For Tracking Machines On A Network Using Multivariable Fingerprinting Of Passively Available Information
A method for tracking machines on a network of computers includes determining one or more assertions to be monitored by a first web site which is coupled to a...
2017/0251003 AUTOMATICALLY DETERMINING WHETHER MALWARE SAMPLES ARE SIMILAR
Techniques for automatically determining whether malware samples are similar are disclosed. In some embodiments, a system, process, and/or computer program...
2017/0251002 MALWARE ANALYSIS PLATFORM FOR THREAT INTELLIGENCE MADE ACTIONABLE
Techniques for a malware analysis platform for threat intelligence made actionable are disclosed. In some embodiments, a system, process, and/or computer...
2017/0251001 METADATA INFORMATION BASED FILE PROCESSING
Methods and systems for network level file processing based on metadata information retrieved from a file are provided. According to one embodiment, a file is...
2017/0251000 DATABASE ATTACK DETECTION TOOL
The disclosed techniques provide systems and methods for detecting coordinated attacks on social networking databases containing personal end-user data. More...
2017/0250999 A TELECOMMUNICATIONS DEFENCE SYSTEM
A telecommunications defence system comprises: at least one shield server; at least one target server arranged to be in communication with the shield server...
2017/0250998 SYSTEMS AND METHODS OF PREVENTING INFECTION OR DATA LEAKAGE FROM CONTACT WITH A MALICIOUS HOST SYSTEM
Methods and systems are described for the detection of malicious host systems in real time using techniques that are computationally efficient, and that...
2017/0250997 ALERTING AND TAGGING USING A MALWARE ANALYSIS PLATFORM FOR THREAT INTELLIGENCE MADE ACTIONABLE
Techniques for alerting and tagging using a malware analysis platform for threat intelligence made actionable are disclosed. In some embodiments, a system,...
2017/0250996 SYSTEMS AND METHODS FOR PROVIDING SECURITY SERVICES DURING POWER MANAGEMENT MODE
Systems and methods for providing security services during a power management mode are disclosed. In some embodiments, a method comprises detecting with a...
2017/0250995 OBTAINING SUSPECT OBJECTS BASED ON DETECTING SUSPICIOUS ACTIVITY
A device may detect a suspicious activity. The device may automatically obtain a suspect object from a client device that is associated with the suspicious...
2017/0250994 AUTOMATED CLASSIFICATION OF APPLICATIONS FOR MOBILE DEVICES
Automated classification of applications ("apps") for mobile devices is provided. In some embodiments, automated classification of apps for mobile devices...
2017/0250993 SYSTEM, APPARATUS AND METHOD FOR ACCESS AND AUTHORIZATION CONTROL
A control server provides access and authorization control by: receiving an access request (including a resource identifier and a recipient device identifier)...
2017/0250992 SYSTEMS AND METHODS FOR ACCESS TO ELECTRONIC DATA
Systems, methods, and machine readable medium are provided for improving access to electronic data. An application is provided that generates a graphical user...
2017/0250991 METHOD AND SYSTEM FOR IMPLEMENTING THIRD-PARTY AUTHENTICATION BASED ON GRAY LIST
The present invention relates to a communication method, comprising: receiving a service request from a requesting party; performing a third-party...
2017/0250990 GROUP ZONING AND ACCESS CONTROL OVER A NETWORK
Example implementations relate to hard zoning capabilities for devices using Internet small computer system interface (iSCSI) protocol. For example, a method...
2017/0250989 Method and System to Enable Controlled Safe Internet Browsing
Various embodiments provide an approach to controlled access of websites based on website content, and profile for the person consuming the data. In operation,...
2017/0250988 ACCESS GUARDS FOR MULTI-TENANT LOGGING
Implementations of the present disclosure provide access guards for multi-tenant logging. A method of the disclosure includes receiving, by a processing device...
2017/0250987 AUTHORIZATION OF DEVICE ACCESS TO NETWORK SERVICES
The invention provides for authorization of devices entering a network. A new device entering a network sends an authorization request. Another device in the...
2017/0250986 SYSTEMS AND METHODS FOR CONTROLLING ACCESS TO POSITION INFORMATION
Controlling access to position information. Control of access to position information may be provided by exchanging authenticating messages that restrict...
2017/0250985 METHODS, SYSTEMS, AND MEDIA FOR PROVIDING ACCESS CONTROL FOR A COMPUTING DEVICE
Methods, systems, and media for providing access control for a computing device are provided. In some implementations, methods for providing access control for...
2017/0250984 AUTHENTICATION PROXY AGENT
An authentication engine may be configured to receive an authentication request and credentials from a client. The authentication engine may then generate a...
2017/0250983 Method And System For Tracking Machines On A Network Using Fuzzy Guid Technology
A method for querying a knowledgebase of malicious hosts numbered from 1 through N. The method includes providing a network of computers, which has a plurality...
2017/0250982 WEB-BASED USER AUTHENTICATION TECHNIQUES AND APPLICATIONS
A system, apparatus, method, and machine readable medium are described for performing user authentication. For example, one embodiment of a system comprises:...
2017/0250981 Small Form Factor Wireless Communication Device and Method
Disclosed herein is a small form factor device for selectively communicating an authorisation signal. The small form factor device comprises a processor...
2017/0250980 MANAGEMENT AND AUTHENTICATION IN HOSTED DIRECTORY SERVICE
A user, group, and device management and authentication system allows administrators to manage one or more directories with devices that are not associated...
2017/0250979 SYSTEMS AND METHODS FOR RECOGNIZING A DEVICE
A system for detecting whether a device seeking communication with a server is a returning device that previously communicated with the server includes a...
2017/0250978 Method and system for managing secure custom domains
Method, system and infrastructures for managing certificates for platform providers are described. A platform provider provides a platform to host a plurality...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.