Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0083994 UNSUPERVISED CLASSIFICATION OF WEB TRAFFIC USERS
Techniques to facilitate web traffic classification are disclosed herein. In at least one implementation, web traffic between a plurality of clients and at...
2018/0083993 RADIO-ASSISTED TAMPER PROTECTION OF HARDWARE
The present disclosure relates to a method for resisting tampering in a HSM electronic device. The method comprises: receiving radio signals from a network...
2018/0083992 MULTI-TIER AGGREGATION FOR COMPLEX EVENT CORRELATION IN STREAMS
A system and method for detecting anomalous activity, the method includes collecting data from a plurality of data sources, wherein each data source generates...
2018/0083991 AUTO-TUNING SECURITY ANALYSIS TOOL CONFIGURATION VIA CORRELATION ANALYSIS
A configuration for a security analysis tool is received from a user. The configuration includes two or more configuration items. Each configuration item is a...
2018/0083990 Network Security Device and Application
The present invention passively monitors computer network traffic to determine when a potential network attack is underway. The system, method and computer...
2018/0083989 MANAGING SECURITY BREACHES IN A NETWORKED COMPUTING ENVIRONMENT
Approaches for managing security breaches in a networked computing environment are provided. A method includes detecting, by at least one computer device, a...
2018/0083988 THREAT SCORING SYSTEM AND METHOD
A threat scoring system and method are provided in which the threat scoring system and method generates a better threat score. In one embodiment, the system...
2018/0083987 SYSTEM AND METHOD FOR GENERATING RULES FOR ATTACK DETECTION FEEDBACK SYSTEM
There is provided a method for auto-generation of decision rules for attack detection feedback systems. The method is executed on a server. The method...
2018/0083986 CREDENTIAL MODIFICATION NOTIFICATIONS
Disclosed are systems and methods for providing protection against alteration of data, such as a credential, associated with a transaction. A first...
2018/0083985 SYSTEMS AND METHODS FOR NETWORK SECURITY EVENT FILTERING AND TRANSLATION
System, methods, and apparatuses enable a network security system to more efficiently process system events. For example, the disclosed approaches may be used...
2018/0083984 REMOTE COMPUTING SYSTEM PROVIDING MALICIOUS FILE DETECTION AND MITIGATION FEATURES FOR VIRTUAL MACHINES
A computing device may include a memory and a processor cooperating therewith to operate a plurality of virtual computing sessions for a plurality of client...
2018/0083983 REMOTE MALWARE REMEDIATION
An opportunity to assist with remediation of a file at a remote particular host device is identified. One or more remediation techniques are identified that...
2018/0083982 SECURE COMMAND EXECUTION FROM A CLOUD MONITORING SYSTEM TO A REMOTE CLOUD AGENT
An industrial control system that includes a cloud platform facilitates secure execution of command data for an industrial device in communication with the...
2018/0083981 GLOBAL ATTESTATION PROCEDURE
A method, computer program product, and system for authenticating a computing device by geographic attestation includes a processor utilizing executing an...
2018/0083980 SHARING DYNAMICALLY CHANGING UNITS OF CLOUD-BASED CONTENT
Systems for managing multiple shared content objects using access tokens that cover the multiple shared content objects are disclosed. A method commences upon...
2018/0083979 NETWORKING APPLICATION FOR CONTROLLED-ACCESS-ESTABLISHMENT
This disclosure provides an apparatus, method, and non-transitory computer readable medium for operating networking for members and supporting a...
2018/0083978 Conditional Delivery of Content Over a Communication Network Including Social Sharing and Video Conference...
A system and method are provided for conditional delivery of electronic content such as images or video stream content over a communication network. In some...
2018/0083977 Distributed High Availability Agent Architecture
A high availability (HA) Identity Bridge (IDBridge) between an on-premises Active Directory (AD) and a cloud-based Identity Cloud Service (IDCS) is provided. A...
2018/0083976 DETERMINING USER ACCESS TO GROUPS GENERATED IN A CLOSED ONLINE SYSTEM BASED ON CATEGORIES DETERMINED FOR THE GROUPS
An online system provides a social networking environment for a set of users, such as members of an organization. The online system allows generation of groups...
2018/0083975 METHOD TO ALLOW FOR QUESTION AND ANSWER SYSTEM TO DYNAMICALLY RETURN DIFFERENT RESPONSES BASED ON ROLES
Embodiments are directed to a question and answer (QA) pipeline system that adjusts answers to input questions based on a user criteria, thus implementing a...
2018/0083974 INFORMATION SECURITY APPARATUS AND METHODS FOR CREDENTIAL DUMP AUTHENTICITY VERIFICATION
In some embodiments, an apparatus includes a memory, storing processor-executable instructions, blacklist terms, and credential dump records, and a processor....
2018/0083973 LIVENESS DETECTION
In a liveness detection system, a first set of one or more parameters of a first liveness test is selected at random. The first parameter set is transmitted to...
2018/0083972 METHOD AND APPARATUS FOR SECURITY CONFIGURATION IN WIRELESS COMMUNICATION SYSTEM
Disclosed is a method for a security configuration in a wireless communication system and an apparatus using the same. Specifically, in a method for performing...
2018/0083971 AUTHORIZATION WITH CONTAINER APPLICATION ISSUED TOKEN
A method and system manages access to resources within a virtualization platform using an application token, where the application token includes information...
2018/0083970 DOCUMENT CLASSIFICATION BY A HYBRID CLASSIFIER
Systems and methods for classifying URLs by a hybrid classifier are provided. According to one embodiment, a hybrid classifier receives a candidate URL. A...
2018/0083969 VALIDATING STATE CHANGE REQUESTS
Some embodiments of the present invention include a system and method for validating state change requests and include generating one or more permission tokens...
2018/0083968 METHOD AND SYSTEM FOR AUTHORIZING SERVICE OF USER, AND APPARATUS
Embodiments of the application provide a method for authorizing a service of a user, and an apparatus. In the method, a first controller obtains an identifier...
2018/0083967 Tenant and Service Management For A Multi-Tenant Identity and Data Security Management Cloud Service
Tenant and service management for an Identity Cloud Service (IDCS) is provided. A request is received, from a Tenant Automation System (TAS) over a network, to...
2018/0083966 SECURE TRANSFER OF AUTHENTICATION INFORMATION
A secure method connects to an application run on a server from a client computer device, by a user who does not have the authentication data of the account...
2018/0083965 Method and Apparatus for Managing Authentication in a Decentralized or Distributed Network of Cyber- Physical...
A Method and Apparatus is disclosed for Multi-Agent Authentication in a decentralized or distributed network of Cyber-Physical Systems for the purpose of...
2018/0083964 Method for Authenticating Optical Network Unit, Optical Line Terminal, and Optical Network Unit
A method for authenticating an optical network unit (ONU) and devices for an optical line terminal (OLT) and an optical network unit (ONU) where an ONU is not...
2018/0083963 USER AUTHENTICATION VIA DEVICE CHARACTERISTICS
An embodiment of the invention may include a method, computer program product and system for authenticating a user device. The embodiment may include receiving...
2018/0083962 MOBILE APPLICATION BUNDLED WITH METADATA DATABASE
Customization objects stored in a mobile database may be used to customize webpages and applications rendered in, or executed by a mobile application...
2018/0083961 METHODS, SYSTEMS, AND MEDIA FOR AUTHENTICATION OF USER DEVICES TO A DISPLAY DEVICE
Methods, systems, and media for authentication of user devices to a display device are provided. In some implementations, the method comprises: authenticating...
2018/0083960 DIGITAL IDENTITY
A system for providing a user with access to different services of at least one service provider in a network considering privacy and security via a...
2018/0083959 WEBSITE AUTHENTICATION USING AN INTERNET-CONNECTED DEVICE
The invention is an authentication framework that enables a user to log in to a website using an Internet-connected device, such as smartphone, smart watch,...
2018/0083958 SYSTEM AND METHOD FOR NETWORK USER'S AUTHENTICATION AND REGISTRATION BY WAY OF THIRD PARTY COMPUTING DEVICE
The present invention concerns generally with a system and method for computer users' registration and authentication using a third-party computing device. The...
2018/0083957 INFORMATON PROCESSING SYSTEM, INFORMATION PROCESSING DEVICE, AND COMMUNICATION CONNECTION METHOD
The present invention provides, for a connection from an unspecified communication device, an information processing system, information processing device...
2018/0083956 SYSTEMS AND METHODS FOR AUTHENTICATING USERS ACCESSING A SECURE NETWORK
Systems and methods are disclosed for providing an unregistered user with access to a network in a secure and efficient manner. A random, on-demand password is...
2018/0083955 MULTI-SESSION AUTHENTICATION
An approach for multi-session authentication of multiple networked devices is disclosed. A user can create a public key-encrypted message on a client device...
2018/0083954 METHOD, SYSTEM, LOGIN DEVICE, AND APPLICATION SOFTWARE UNIT FOR LOGGING INTO DOCBASE MANAGEMENT SYSTEM
The present invention provides a method, system and login device for logging into a docbase management system. the method includes: establishing a login device...
2018/0083953 AUTHENTICATION SYSTEM AND AUTHENTICATION METHOD CAPABLE OF REALIZING SINGLE-SIGN-ON FUNCTION USED FOR...
The management server authenticates the user on the basis of the authentication request using the user name and the password received from the image forming...
2018/0083952 SYSTEMS AND METHODS FOR PROVIDING SINGLE SIGN-ON AUTHENTICATION SERVICES
Embodiments of the disclosure enable a system to provide authentication services. The system includes a system server that receives data associated with an...
2018/0083951 AGGREGATOR TECHNOLOGY WITHOUT USERNAMES AND PASSWORDS IMPLEMENTED IN A SERVICE STORE
Techniques are described in which a service store is provided that allows consumers to shop for services online. The service store system architecture includes...
2018/0083950 AGGREGATOR TECHNOLOGY WITHOUT USERNAMES AND PASSWORDS IMPLEMENTED IN UNIFIED RISK SCORING
Techniques are described in which for a user to obtain access to or entitlement to objects or locations, such as for example a web application or entry into an...
2018/0083949 EHN VENUE-SPECIFIC APPLICATION PROVISIONING
In order to leverage an enterprise-hosted network (EHN) associated with an entity, a communication technique may dynamically customize an application on a...
2018/0083948 EXTENDING SHROUDING CAPABILITY OF HOSTING SYSTEM
Technical solutions are described for extending shrouding capability of a virtual server hosting system. An example method includes receiving a request to...
2018/0083947 Stateless Server-Based Encryption Associated With A Distribution List
An example method of decrypting electronic messages includes receiving, by an authentication module of a decryptor device, authentication requests from a...
2018/0083946 SYSTEM AND METHOD FOR PROVIDING SECURITY MONITORING
The present disclosure describes systems and methods for processing security sensor data that enhances the ability of a user to quickly and efficiently review...
2018/0083945 SYSTEM AND METHOD FOR POOL-BASED IDENTITY AUTHENTICATION FOR SERVICE ACCESS WITHOUT USE OF STORED CREDENTIALS
A computer-implemented system and method for pool-based identity authentication for service access without use of stored credentials is disclosed. The method...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.