Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0139222 METHOD AND DEVICE FOR DETECTING WEBSITE ATTACK
The present invention provides a method for detecting a website attack, comprising: selecting multiple uniform resource locators (URLs) from history access...
2018/0139221 MULTI-TENANT CLOUD SECURITY THREAT DETECTION
Methods and systems for security threat detection are disclosed. For example, a virtual machine with a network interface of a plurality of virtual machines...
2018/0139220 SHARED CAPABILITY SYSTEM
Systems, computer products, and methods are described herein for a shared capability system for improved logging of events that occur on systems and within...
2018/0139219 Cyber Security: A system to monitor home Wi-Fi networks
Consumers have a general awareness of cyber threats and its prevalence but most are completely unaware that their own computer systems are below the standard...
2018/0139218 REVERSION OF SYSTEM OBJECTS AFFECTED BY A MALWARE
A computerized method of reverting system data affected by a malware. The method comprises monitoring, in run time, a plurality of events of a plurality of...
2018/0139217 SYSTEM AND METHOD FOR DETECTING AND PREVENTING NETWORK INTRUSION OF MALICIOUS DATA FLOWS
The present disclosure provides a system for detecting and preventing the intrusion of malicious data flows in a software defined network (SDN). The system...
2018/0139216 Remote Malware Scanning Capable of Static and Dynamic File Analysis
There are provided measures for enabling resource-efficient remote malware scanning capable of static and dynamic file analysis. Such measures could...
2018/0139215 SYSTEMS AND METHODS FOR DETECTING AN ATTACK ON AN AUTO-GENERATED WEBSITE BY A VIRTUAL MACHINE
A system for detecting an attack by a virtual or physical machine on one or more auto-generated websites is provided. The system includes a processor, a...
2018/0139214 MALWARE CLASSIFICATION AND ATTRIBUTION THROUGH SERVER FINGERPRINTING USING SERVER CERTIFICATE DATA
In one embodiment, a device in a network receives certificate data for an encrypted traffic flow associated with a client node in the network. The device...
2018/0139213 METHOD AND TERMINAL DEVICE FOR ENCRYPTING MESSAGE
A method and device for securing data of a message is provided. A method for encrypting a message of a user terminal device includes: receiving a message via a...
2018/0139212 Subscription Media On Demand IX
An electronic media distribution/play system includes a service facility that has a communications network interface and maintains a data file catalog. The...
2018/0139211 DATA LOSS PREVENTION FOR MOBILE COMPUTING DEVICES
System calls to a kernel of a mobile computing device are monitored. A particular system call is intercepted relating to input/output (I/O) functionality of...
2018/0139210 SYSTEMS, DEVICES, AND METHODS FOR ACCESS CONTROL AND IDENTIFICATION OF USER DEVICES
Systems, devices, and techniques that can provide access control and/or identification of user devices.
2018/0139209 COMMON AUTHORIZATION MANAGEMENT SERVICE
An improved method in a computing environment for establishing access for individuals in at least one enterprise with one or more services provided by a...
2018/0139208 SECURE VIRTUALIZATION OF REMOTE STORAGE SYSTEMS
The disclosed embodiments provide a system for managing access to a remote storage system. During operation, the system receives a request from a user to...
2018/0139207 System and Method for Communicating With Inmates in a Privileged Communication
A system and method for with an inmate in a privileged communication are disclosed. a communication system includes a portal subsystem that determines whether...
2018/0139206 MOBILE CALLER AUTHENTICATION FOR CONTACT CENTERS
A call request is received, from a mobile device, to establish a communication with a contact center. For example, the call request may be to establish a voice...
2018/0139205 SYSTEM AND METHOD FOR TRANSPARENT MULTI-FACTOR AUTHENTICATION AND SECURITY POSTURE CHECKING
A method for creating a secure connection between a remote client computing device and an enterprise asset platform includes a server receiving from a client...
2018/0139204 Remote Document Execution and Network Transfer Using Augmented Reality Display Devices
An augmented reality user device includes a display, a physical identification verification engine, a gesture confirmation engine, and in interface. The...
2018/0139203 Facilitating Digital Data Transfers Using Augmented Reality Display Devices
An augmented reality system that includes an augmented reality user device for a first person including a head-mounted display configured to overlay virtual...
2018/0139202 COMMUNICATIONS SYSTEM, A STATION, A CONTROLLER OF A LIGHT SOURCE, AND METHODS THEREIN FOR AUTHENTICATING THE...
A method performed by a communications system, for authenticating a station, STA, to access a network is provided. The STA is capable of communicating with a...
2018/0139201 Centralized Authentication and Reporting Tool
A system includes a retrieval engine, an authentication engine, an extraction engine, a determination engine, and an export engine. The retrieval engine...
2018/0139200 REVOKING SESSIONS USING SIGNALING
Embodiments are directed to revoking user sessions using signaling. In one scenario, an identity platform operating on a computer system receives an indication...
2018/0139199 SELECTIVE AUTHENTICATION SYSTEM
A method and authentication mechanism is provided. A request is sent to authenticate a user of the application from a mobile device to an authentication...
2018/0139198 KEY BASED AUTHORIZATION FOR PROGRAMMATIC CLIENTS
Key based authorization for programmatic clients is described. In an embodiment, one or more server computers receive a request for an action on one or more...
2018/0139197 SEAMLESS AUTHENTICATION FOR AN APPLICATION DEVELOPMENT PLATFORM
Various embodiments concern mechanisms for facilitating communication between network-accessible platforms for developing, hosting, or running hybrid...
2018/0139196 COMMUNICATION APPARATUS, COMMUNICATION SYSTEM, COMMUNICATION METHOD, AND PROGRAM
A communication apparatus that transmits a challenge code on the basis of a received request signal and performs authentication of an authentication target...
2018/0139195 SYSTEM AND METHOD FOR PAIRING USERS WITH SERVICE PROVIDERS
A system and computer implemented method for pairing an service provider with a user comprises a memory unit to store a database comprising one or more records...
2018/0139194 SECURE SHARING OF USER ANNOTATED SUBSCRIPTION MEDIA WITH TRUSTED DEVICES
Generally, this disclosure provides systems, methods and computer readable media for secure sharing of user annotated subscription media content with trusted...
2018/0139193 SYSTEMS AND METHODS FOR MANAGING CREDENTIALS USED TO AUTHENTICATE ACCESS IN DATA PROCESSING SYSTEMS
A system receives a first request to replace a first credential used by an entity to access one or more resources with a second credential to be used by the...
2018/0139192 Adaptive Token Cache Management
Embodiments perform token cache management by renewing tokens heuristically. A token renewal request interval is defined based on a configurable lifetime of a...
2018/0139191 Method, Device, and System for Processing VXLAN Packet
This application provides a method, device, and system for processing a VXLAN packet. The method includes: obtaining, by a controller, a request message for...
2018/0139190 PRECOMPUTED AND TRANSACTIONAL MIXING
Precomputed and transactional mixing is believed to allow portable devices, such as smart phones, to send and receive messages, with little extra bandwidth or...
2018/0139189 DYNAMICALLY VARIABLE ENCRYPTION SYSTEMS AND METHODS
A system that includes client server and a client front end communicably coupled via a data stream, wherein the data stream includes encryption notification...
2018/0139188 Secure, Autonomous File Encryption and Decryption
The disclosure includes novel encryption and/or decryption methods and systems that provide various security benefits. More specifically, the disclosure...
2018/0139187 AUTHENTICATING CREDENTIALS FOR MOBILE PLATFORMS
Systems and methods for providing services are disclosed. One aspect comprises authenticating a user associated with a first service, receiving a selection of...
2018/0139186 SYSTEM FOR MULTIPLEXING AND DEMULTIPLEXING BLOCKCHAIN LEDGERS VIA A CRYPTOGRAPHIC HASH
Embodiments of the present invention provide a system for multiplexing and demultiplexing blockchain ledgers via a cryptographic hash. In particular, the...
2018/0139185 Method for Making Friends Anonymously under Instant Messaging Communications in Order to Protect a Real...
After a friendship pairing process is executed according to a phone directory, send a friendship request message, create at least one first platform identity...
2018/0139184 SYSTEMS AND METHODS FOR CRYPTOGRAPHY HAVING ASYMMETRIC TO SYMMETRIC KEY AGREEMENT
A system and method for generating data for use in cryptography or secure modulation is provided. The method may include randomly generating a public code...
2018/0139183 SIGNED EPHEMERAL EMAIL ADDRESSES
Architecture for generating a temporary account (e.g., an email address) with a user-supplied friendly name and a secret used to the sign the temporary...
2018/0139182 PASSPORT-CONTROLLED FIREWALL
A method, and associated system and computer program product, for modifying rules in a firewall infrastructure are described. A unit of deployment including...
2018/0139181 Cyber Threat Attenuation Using Multi-source Threat Data Analysis
A cyber threat attenuation system. The system comprises a cyber threat data store, a plurality of sensor control points (SCPs), wherein at least one SCP is...
2018/0139180 REAL-TIME MONITORING OF WEB PAGE CODE
A method for monitoring web page code comprising: monitoring attempted actions and/or attempted events initiated by components of the web page code for...
2018/0139179 BRIDGING A VIRTUAL CLONE OF A TARGET DEVICE IN A HONEY NETWORK TO A SUSPICIOUS DEVICE IN AN ENTERPRISE NETWORK
Techniques for bridging a honey network to a suspicious device in a network (e.g., an enterprise network) are disclosed. In some embodiments, a system for...
2018/0139178 Method, Apparatus, and System for Detecting Terminal Security Status
A method, an apparatus, and a system for detecting a terminal security status are provided. The method includes: receiving a file, and running the file, to...
2018/0139177 SYSTEMS AND METHODS FOR PROTECTING NETWORK DEVICES BY A FIREWALL
Embodiments of the present disclosure help protect network devices from unauthorized access. Among other things, embodiments of the disclosure allow full...
2018/0139176 PaaS CONNECTION METHOD AND PaaS CONNECTION DEVICE
In a CF including an RN that executes an application, a GR that transfers a communication packet toward the application to the RN, and a GW that transfers a...
2018/0139175 ACCESSING NODES DEPLOYED ON AN ISOLATED NETWORK
Example methods and systems are provided for a management entity on a first network to access a node deployed on a second network that is isolated from the...
2018/0139174 CENTRAL NAMESPACE CONTROLLER FOR MULTI-TENANT CLOUD ENVIRONMENTS
A centralized namespace controller allocates addresses in a distributed cloud infrastructure on-demand. Upon receiving a request to allocate addresses for a...
2018/0139173 METHOD AND APPARATUS FOR IMPLEMENTING A FIBRE CHANNEL ZONE POLICY
In some embodiments, an apparatus includes a first network switch configured to be within a Fibre Channel over Ethernet (FCoE) network, which has a set of...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.