Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,313,230 Policy approval layer
A customer of a policy management service may use an interface with a configuration and management service to interact with policies that may be applicable to...
US-9,313,228 Collaborative graphics rendering using mobile devices to support remote display
Systems, devices and methods are described including receiving a policy from a secure storage device, where the policy may be used to implement collaborative...
US-9,313,227 Gateway-based audit log and method for prevention of data leakage
A system and method for prevention of data leakage, the system comprising: a server configured to receive and transmit user activity commands; a protection...
US-9,313,226 Method and system for network validation of information
Embodiments of the present application relate to a method for network validation of information, a system for network validation of information, and a computer...
US-9,313,225 Method for packet processing, electronic device and storage medium
A method for processing packets, an electronic device and a storage medium are proposed. The present invention presets a defense module preventing DoS in the...
US-9,313,224 Connectivity protector
A method of protecting connectivity in a network is provided. The method includes monitoring a client communication received from a client on the network, and...
US-9,313,223 Systems and methods for tokenizing user-generated content to enable the prevention of attacks
The present invention relates to systems and methods for the tokenization of user-generated content in order to prevent attacks on the user-generated content....
US-9,313,222 Method, electronic device, and user interface for on-demand detecting malware
A method, an electronic device, and a user interface for on-demand detecting a malware are provided and adapted for estimating whether an application has...
US-9,313,221 Determination of spoofing of a unique machine identifier
In one embodiment, an edge network device may monitor a network service that is provided at a network service device. Information related to the monitored...
US-9,313,220 Proxy gateway anti-virus method, pre-classifier, and proxy gateway
A proxy gateway anti-virus method, a pre-classifier, and a proxy gateway are provided. The method includes: receiving a resource obtaining request for obtaining...
US-9,313,219 Detection of repackaged mobile applications
A repackaged mobile app that has been unpacked and repackaged back is detected based on similarity of app labels of a target mobile app being evaluated and a...
US-9,313,218 Systems and methods for providing information identifying the trustworthiness of applications on application...
The disclosed computer-implemented method for providing information identifying the trustworthiness of applications on application distribution platforms may...
US-9,313,217 Integrated network threat analysis
The inventive systems and methods aggregate network information to accompany file information in an indicator and warning environment. This system also provides...
US-9,313,216 Method and system for monitoring application program of mobile device
The present disclosure provides a method and system for monitoring an application. The method includes creating a simulated system service; establishing a...
US-9,313,215 Monitoring and limiting requests to access system resources
Systems, apparatuses and methods for preventing requests to access a system's resources from having a negative impact on higher priority data processing...
US-9,313,214 Enhanced security using service provider authentication
A method (100) and an apparatus (e.g., a network node (210)) for providing enhanced security using service provider authentication. In addition to...
US-9,313,213 System and method for detecting classes of automated browser agents
A method for determining if a web browser is being operated by a human or a non-human agent, based on analysis of certain aspects of how a user interacts with a...
US-9,313,212 Dynamic adjustment of authentication mechanism
According to one aspect of the present disclosure, a method and technique for dynamic adjustment of authentication mechanism is disclosed. The method includes:...
US-9,313,211 Systems and methods to protect against a vulnerability event
A computer-implemented method to protect against a vulnerability event is described. A first set of security policies is enforced. A client device is monitored...
US-9,313,210 Automated privacy level suggestions for social networking
Embodiments of the present invention provide a method, system and computer program product for the automated suggestion of a privacy level setting for a new...
US-9,313,209 Loan origination software system for processing mortgage loans over a distributed network
A loan origination and processing system is described. The system can reside on a server computer that is coupled to a data store storing data related to a...
US-9,313,208 Managing restricted access resources
Entities such as resource and service providers can utilize a ticketing system to define operational actions as primitives that can be stored, combined into...
US-9,313,207 Apparatus and method for access validation
One or more techniques for access validation are provided. Access validation may be performed automatically or in real-time. Access validation may be at the...
US-9,313,206 Electronic signatures
A method, comprising: storing, at a server device, an electronic resource; receiving, at the server device and from a client device associated with a first...
US-9,313,205 Restricting communication over an encrypted network connection to internet domains that share common IP...
An apparatus prevents communication by a client device to a domain that cannot be uniquely identified by relocating the DNS mapping of the domain to a...
US-9,313,204 Incrementally changing the availability of a feature
Techniques are described to incrementally change the availability of a feature of a software service to clients over a network based on a configuration setting...
US-9,313,203 Systems and methods for identifying a secure application when connecting to a network
A computer system receives, from a user device, a request to access a resource within a network of an organization and receives access credentials associated...
US-9,313,202 Communication apparatus, relay apparatus, wireless communication system, control method of communication...
A communication apparatus, which is connected to a relay apparatus, and transmits data to a server apparatus connected via the relay apparatus, includes a...
US-9,313,201 System and method of performing electronic transactions
A system and method of performing electronic transactions between a server computer and a client computer. The method implements a communication protocol with...
US-9,313,200 System and method for determining liveness
Systems and methods are provided for recording a user's biometric features and generating an identifier representative of the user's biometric features and...
US-9,313,199 Secure BIOS access and password rotation
A device may periodically update a BIOS password on a client device. In some implementations, the device may determine a particular password generation...
US-9,313,198 Multi-factor authentication using an authentication device
Systems and methods of authenticating users using a possession factor communicate a first authentication code to the user device and a second authentication...
US-9,313,197 System and method for assigning quality to cryptographaic identities used in a digital transaction
A method of assessing risk in an electronic transaction involves assignment of quality attributes to cryptographic identities presented in a digital...
US-9,313,196 System and method for secure access of a remote system
A system and method for providing a user with secure access to devices operatively connected to a network comprising at least one processing device that has...
US-9,313,195 Collision avoidance in a distributed tokenization environment
A client receives sensitive data to be tokenized. The client queries a token table with a portion of the sensitive data to determine if the token table includes...
US-9,313,194 Verification of configuration using an encoded visual representation
Aspects of the present disclosure relate to a method, system, and computer program product for verifying a parameter on a computing node. The method can include...
US-9,313,193 Management and authentication in hosted directory service
A user, group, and device management and authentication system allows administrators to manage one or more directories with devices that are not associated with...
US-9,313,192 Communications hub for use in life critical network
Secured communications between patient portable communicators (PPC) and a central authority (CA) via an unsecured network are implemented using software...
US-9,313,191 Virtual requests
A first request from a client using a first protocol is translated into one or more second requests by a servicer using a second protocol through a virtual...
US-9,313,190 Shutting down access to all user accounts
Disclosed is a system and associated method or restricting access to a user's account via one or more account access channels. The system typically includes a...
US-9,313,189 Automatic management of secure connections
In an example embodiment, on-premise systems have access to a cloud connector located on-premise. When the on-premise cloud connector is started, it may...
US-9,313,188 Providing domain-joined remote applications in a cloud environment
Embodiments are directed to provisioning private virtual machines in a public cloud and to managing private virtual machines hosted on a public cloud. In one...
US-9,313,187 Network site customization using proxies
Disclosed are various embodiments for network site customization using proxy server applications. A first request is obtained from an administrator of a network...
US-9,313,186 Federated transaction path and service level agreement monitoring across service oriented application partner...
Computer implemented method, system and computer usable program code for monitoring a transaction that crosses an enterprise boundary in a composite...
US-9,313,185 Systems and methods for authenticating devices
A computer-implemented method for authenticating devices may include (1) identifying a request from a device for a credentialing service to issue a credential...
US-9,313,184 Communication apparatus, communication system, and computer program product
According to an embodiment, a communication apparatus includes a sharing processing unit, an extension unit, and a communication unit. The sharing processing...
US-9,313,183 Policy-based configuration of internet protocol security for a virtual private network
A method for performing policy-based configuration of Internet Protocol Security (IPSec) for a Virtual Private Network (VPN) is provided. According to one...
US-9,313,182 Protecting information using policies and encryption
A technique and system protects documents at rest and in motion using declarative policies and encryption. Encryption in the system is provided transparently...
US-9,313,181 System and method to merge encrypted signals in distributed communication system
In a computer implemented method for data privacy in a distributed communication system including a plurality of client terminals, the method includes:...
US-9,313,180 Systems and methods for quantum key generation
A quantum key generation system including two photon detector units, two photon entanglement chains extending between the two photon detector units, and a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.