Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2017/0257385 VARIABLE RUNTIME TRANSPILATION
In an approach, an apparatus comprises: one or more processors; a processor logic coupled to the one or more processors and configured to: intercept, from a...
2017/0257384 IN-APP BEHAVIOR-BASED ATTACK DETECTION
Architectures and techniques for in-app behavior detection. A behavior detection agent within an application running on a hardware computing device captures...
2017/0257383 DETERMINISTIC REPRODUCTION OF CLIENT/SERVER COMPUTER STATE OR OUTPUT SENT TO ONE OR MORE CLIENT COMPUTERS
Computer systems and methods for improving security or performance of one or more client computers interacting with a plurality of server computers. In an...
2017/0257382 MAINTAINING DYNAMIC CONFIGURATION INFORMATION OF A MULTI-HOST OFF-CLUSTER SERVICE ON A CLUSTER
Techniques for maintaining dynamic configuration information of a multi-host off-cluster service on a cluster are described. An apparatus may comprise a...
2017/0257381 SYSTEMS AND METHODS FOR PROVIDING SECURITY SERVICES DURING POWER MANAGEMENT MODE
Systems and methods for providing security services during a power management mode are disclosed. In some embodiments, a method comprises detecting with a...
2017/0257380 METHOD AND APPARATUS FOR USER AND ENTITY ACCESS MANAGEMENT FOR CODE SIGNING ONE OR MORE OF A PLURALITY OF DEVICES
A method and apparatus is provided for managing the eligibility of data signing in an online code signing system. The method is used by a plurality of data...
2017/0257379 POLICY MANAGEMENT, ENFORCEMENT, AND AUDIT FOR DATA SECURITY
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for managing, and enforcing policies on data security. A policy...
2017/0257378 METHOD FOR OPERATING A FIELD DEVICE
A method for operating a field device is disclosed, the field device having settings and/or functions classified into different security levels, where one of...
2017/0257377 METHOD AND DEVICE FOR DELEGATING ACCESS RIGHTS
A method and a device for delegating access rights in a system which is configured to handle access rights of users to resources in the system is disclosed....
2017/0257376 Systems and Methods for Detecting and Reacting to Malicious Activity in Computer Networks
Described herein are systems and methods for performing operations responsive to potentially malicious activity. Embodiments may include receiving an...
2017/0257375 Systems and Methods for Detecting and Reacting to Malicious Activity in Computer Networks
Described herein are systems and methods for performing potentially malicious activity detection operations. Embodiments may include receiving data associated...
2017/0257374 SOCIAL MEDIA LOGIN AND INTERACTION MANAGEMENT
A hardware or software firewall may be installed within a private network. The firewall may intercept a first set of login credentials entered into a login...
2017/0257373 ROLE-SPECIFIC SERVICE CUSTOMIZATION
In many computing scenarios, an individual may choose to interact with a service in a variety of roles, and may therefore create a set of accounts respectively...
2017/0257372 TIME-LIMITED ACCESS TO CONFIGURATION SETTINGS
Broadly speaking, embodiments of the present techniques provide methods and apparatus to implement a time-limited configuration settings hierarchy. The...
2017/0257371 RULE-BASED APPLICATION ACCESS MANAGEMENT
A container that manages access to protected resources using rules to intelligently manage them includes an environment having a set of software and...
2017/0257370 CONTROLLED PROVISION OF CONTROLLED DATA
A computer system includes a control device for controlling an industrial technical process, a logic unit and a memory device. The control device controls the...
2017/0257369 FLEXIBLE FEATURE ENABLING INTEGRATED CIRCUIT AND METHODS TO OPERATE THE INTEGRATED CIRCUIT
A method for enabling a circuit feature on an integrated circuit device having inactive circuit features includes a step to receive an encrypted message and a...
2017/0257368 APPLICATION MANAGEMENT SYSTEM
An application management system, especially a web application management system, for enabling different clients to access specific versions of an application,...
2017/0257367 ELECTRONIC DEVICES AND METHOD FOR PERFORMING AUTHENTICATION BETWEEN ELECTRONIC DEVICES
Disclosed herein is an electronic device including a message creation unit for creating an authentication message that includes hardware information and...
2017/0257366 OPTOELECTRONIC SYSTEMS AND METHOD FOR OPERATING THE SAME
Optoelectronic systems include an array of optoelectronic modules and a computational unit. The array of optoelectronic modules and the computational unit are...
2017/0257365 SYSTEM AND METHOD FOR HARDWARE-BASED TRUST CONTROL MANAGEMENT
A trust control management method for security, operable on a computer system generates a unique Trust ID value by combining user-defined values with...
2017/0257364 SYSTEMS AND METHODS FOR AUTHENTICATION USING AUTHENTICATION VOTES
A system and method of authentication is described. In operation, an authenticator computing device receives a request to access a resource from a requesting...
2017/0257363 SECURE MOBILE DEVICE TWO-FACTOR AUTHENTICATION
A user of a computer seeking to access a protected resource must first authenticate with an authentication appliance. The user provides credentials to the...
2017/0257362 UNIFIED PROVISIONING OF APPLICATIONS ON DEVICES IN AN ENTERPRISE SYSTEM
The present disclosure relates generally to managing access to an enterprise system using remote devices. Techniques are disclosed for provisioning...
2017/0257361 Authenticating or Controlling Software Application on End User Device
A method of authenticating or controlling a software application on an end user device. The method includes selecting a code signing certificate related to an...
2017/0257360 ACCESSING ENTERPRISE RESOURCES
Systems, methods, and software can be used to access an enterprise resource. In some aspects, a certificate for accessing enterprise resources at one or more...
2017/0257359 USER AUTHENTICATION METHOD AND SYSTEM FOR IMPLEMENTING SAME
A new user authentication method which prevents illicit access to a system includes an authentication system which authenticates a user, said authentication...
2017/0257358 Method and System for Authenticated Login Using Static or Dynamic Codes
Method of authentication including sending a login web page to a first device of a user including a scannable code having an envelope ID and a login challenge....
2017/0257357 Data Communication Method, User Equipment, and Server
A data communication method, and a user equipment relate to the communications field and implement isolation for programs using a container technology. The...
2017/0257356 SECURITY MIGRATION IN A BUSINESS INTELLIGENCE ENVIRONMENT
In various implementations, local identifiers associated with users may be utilized to enable access one or more functions in a Business Intelligence (BI)...
2017/0257355 DUAL CODE AUTHENTICATION SYSTEM
A verification method and system are disclosed that verify a user. The user is provided a verification code via, for example, a website, to be communicated to...
2017/0257354 SINGLE LOGIN PROCEDURE FOR ACCESSING SOCIAL NETWORK INFORMATION ACROSS MULTIPLE EXTERNAL SYSTEMS
A social networking system contains information describing users of the social network and various connections among the users. A user can access multiple...
2017/0257353 System For Using Login Information And Historical Data To Determine Processing For Data Received From Various...
In an embodiment, upon receiving access credentials from a first entity, first information about the first entity is retrieved and used to determine a first...
2017/0257352 IMPROVED INSTALLATION OF A TERMINAL IN A SECURE SYSTEM
A system comprising a terminal and a server, wherein the terminal is installed in the system by the server being configured to: identify the terminal; generate...
2017/0257351 SYSTEMS AND METHODS FOR DECRYPTION AS A SERVICE VIA A MESSAGE QUEUING PROTOCOL
Systems and methods for decryption of payloads are disclosed herein. In various embodiments, systems and methods herein are configured for decrypting thousands...
2017/0257350 SYSTEMS AND METHODS FOR DECRYPTION AS A SERVICE VIA A HARDWARE SECURITY MODULE
Systems and methods for decryption of payloads are disclosed herein. In various embodiments, systems and methods herein are configured for decrypting thousands...
2017/0257349 SHARING PROTECTED USER CONTENT BETWEEN DEVICES
Aspects of the subject technology relate to systems and methods for sharing encrypted information among multiple devices. A peer-to-peer connection between a...
2017/0257348 SYSTEM AND METHOD FOR INTEGRATED HEADER, STATE, RATE AND CONTENT ANOMALY PREVENTION FOR SESSION INITIATION PROTOCOL
Methods and systems for an integrated solution to the rate based denial of service attacks targeting the Session Initiation Protocol are provided. According to...
2017/0257347 FILTERING HIDDEN DATA EMBEDDED IN MEDIA FILES
Systems and methods for filtering unsafe content by a network security device are provided. According to one embodiment, a network security device captures...
2017/0257346 PHYSICAL LEVEL-BASED SECURITY SYSTEM FOR DATA SECURITY OF SECURITY TERMINAL AND METHOD USING THE SAME
A physical level-based security system for data security of a security terminal and a method using the system. The security system includes at least one normal...
2017/0257345 SECURE TUNNELING FOR CONNECTED APPLICATION SECURITY
A computing platform of a vehicle may receive a request, from a mobile application accessing a secure vehicle function, to create a secure tunnel between the...
2017/0257344 BASIC SERVICE SET IDENTIFICATION
Methods, apparatuses, computer readable media for basic service set (BSS) identification (ID). An apparatus of a station comprising processing circuitry is...
2017/0257343 DEVICE, SYSTEM AND METHOD FOR NETWORK-BASED ADDRESS TRANSLATION FOR MULTIPLE RECIPIENTS
A network system, switch controller for multicast packet distribution by controlling a network switch having at least one ingress interface and at least one...
2017/0257342 METHOD AND SYSTEM FOR REDUCING A COLLISION PROBABILITY OF HASH-BASED NAMES USING A PUBLISHER IDENTIFIER
A replica service of a Content Centric Network can host content published by various publishers, without having to explicitly advertise a name prefix...
2017/0257341 DYNAMIC GENERATION OF UNIQUE IDENTIFIERS IN A SYSTEM OF CONNECTED THINGS
Embodiments of the invention relates to methods, and apparatuses for dynamically creating and updating unique internet of Things (IoT) device identifiers in a...
2017/0257340 MANAGING REQUEST ROUTING INFORMATION UTILIZING CLIENT IDENTIFIERS
Systems and methods for managing requesting routing functionality associated with resource requests for one or more resources associated with a content...
2017/0257339 LOGICAL / PHYSICAL ADDRESS STATE LIFECYCLE MANAGEMENT
Methods, apparatus, and articles of manufacture for managing logical and physical address state lifecycles are disclosed. An example apparatus includes a...
2017/0257338 METHOD AND APPARATUS FOR ADDING NOTIFICATION OBJECTS
Embodiments of the present invention provide a system for generating a user-targeting alert notification based on an existing communication message. The system...
2017/0257337 METHODS, SYSTEMS, AND MEDIA FOR PRESENTING A REMINDER TO VIEW CONTENT
Methods, systems, and media for presenting a reminder to view content are provided. In accordance with some embodiments, a method for presenting a reminder to...
2017/0257336 LOCATION-BASED CONVERSATION ENGINE FOR ENTITIES IN A SOCIAL NETWORKING SYSTEM
Various embodiments include a conversation engine for facilitating a conversation between member accounts (e.g., personal accounts) and social network entities...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.