Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,319,428 Analysis of scripts
A method and system for analyzing scripts. A script is analyzed to determine whether the script includes malicious content. A computer executes at least two...
US-9,319,427 Anti-malware detection and removal systems and methods
An anti-malware system including at least one database, remote from a plurality of computers to be protected, which stores identification of computer...
US-9,319,426 System and method for operating malicious marker detection software on management controller of protected system
An information handling system includes a processor and a management controller separate from the processor. The management controller is operable to store an...
US-9,319,425 Systems and methods for self-tuning network intrusion detection and prevention
Systems and method of the present disclosure are directed to a network security tool. In some embodiments, the tool identifies a current vulnerability of a...
US-9,319,424 Methods and systems for complying with network security requirements
The present invention provides for methods and systems for complying with network security requirements, particularly those defined by NERC CIP. In particular,...
US-9,319,423 Malware and anomaly detection via activity recognition based on sensor data
A system for malware and anomaly detection via activity recognition based on sensor is disclosed. The system may analyze sensor data collected during a selected...
US-9,319,422 Detecting remote operation of a computer
Detecting remote operation of a computer by another computer by receiving pointing device movement event information associated with multiple pointing device...
US-9,319,421 Real-time detection and classification of anomalous events in streaming data
A system is described for receiving a stream of events and scoring the events based on anomalousness and maliciousness (or other classification). The events can...
US-9,319,420 Cyber intelligence clearinghouse
Systems, methods, and computer-readable and executable instructions are provided for providing a cyber intelligence clearinghouse (CIC). Providing a CIC can...
US-9,319,419 Device identification scoring
Device identification scoring systems and methods may be provided that can increase the reliability and security of communications between devices and service...
US-9,319,418 Method and apparatus for software downloads in a network
Files associated with the operation of gateway and client devices in a network may be downloaded with minimal operator intervention. Accordingly, a method...
US-9,319,417 Data leak protection
Methods and systems for Data Leak Prevention (DLP) in an enterprise network are provided. According to one embodiment a data leak protection method is provided....
US-9,319,416 Priority based radius authentication
An apparatus, method and machine readable storage medium, for an authentication server such as a RADIUS server, for authenticating a subscriber are disclosed....
US-9,319,415 Method and system for providing reference architecture pattern-based permissions management
Reference architecture pattern role data representing reference architecture pattern roles to be associated with entities taking part in the development, and/or...
US-9,319,414 Scalable full spectrum cyber determination process
A full spectrum cyber identification determination process for accurately and reliably determining and reporting any identification determination from a full...
US-9,319,413 Method for establishing resource access authorization in M2M communication
A method for establishing a resource access authorization in M2M communication is provided. When an entity including a terminal, a gateway and an end user as...
US-9,319,412 Method for establishing resource access authorization in M2M communication
A method for establishing a resource access authorization in M2M communication is provided. When an entity including a terminal, a gateway and an end user as...
US-9,319,411 Security management for cloud services
A cloud management node (102) in a public cloud (100) works together with a private management system (116) in a private cloud (114) to manage provisioning and...
US-9,319,410 Electronic shared-document repository
In an embodiment, a client device receives from a server device one or more bookmark objects associated with one or more respective bookmarks to which a...
US-9,319,409 Automatic configuration of household playback devices
Embodiments are provided for causing a playback device to be automatically added to a secure network for rendering media in synchrony with other devices in the...
US-9,319,408 One step security system in a network storage system
This is directed to providing access to content stored on a local cloud. In particular, a device can direct a librarian service overseeing the operation of a...
US-9,319,407 Authentication extension to untrusted devices on an untrusted network
A server for providing premium communication services via an untrusted network. The server comprises a processor, memory, and an application that is configured...
US-9,319,406 System and method for linking pre-installed software to a user account on an online store
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for associating an application that was pre-installed on a computer...
US-9,319,405 System and methods for assignation and use of media content subscription service privileges
This invention describes a system and methods for media content subscription service distribution; typical services include cable television, premium content...
US-9,319,404 Security for the internet of things
Apparati, methods, and computer-readable media for improving the security of communications networks. In one embodiment, an application control device (1102)...
US-9,319,403 IC chip, information processing apparatus, system, method, and program
An IC chip, an information processing apparatus, system, method, and program are provided. An IC chip includes an authentication control unit configured to...
US-9,319,402 Digital handshake for authentication of devices
This is directed to a digital handshake for establishing a secure communications path between two electronic devices. Each device can capture an image of the...
US-9,319,401 System and method for cross-channel authentication
A system may include a memory and processor. The memory may store a user account identifier associated with a user account. The processor may be able to receive...
US-9,319,400 Sharable content item links with use restrictions
Sharable content item links with use restrictions. In one embodiment, for example, a method comprises: receiving, from a client computing device used by an...
US-9,319,399 Consolidated authentication
A method and system for authenticating a user at a first computer to first and second applications installed in a second computer. The second computer receives...
US-9,319,398 Independent administering of verified user-controlled electronic identifications utilizing specifically...
In some embodiments, the instant invention provides for a central identification management computer system that includes at least: a computer programmed with...
US-9,319,397 On-vehicle gateway apparatus and communication system for vehicle
An on-vehicle gateway apparatus that carries out authentication of an external apparatus at a time of connection between the external apparatus and a vehicle,...
US-9,319,396 Trust relationships in a computerized system
Methods and apparatuses for a computerized system are disclosed. A data processing device receives information from at least one source of log information in...
US-9,319,395 System and method for securing authentication information in a networked environment
This disclosure is directed to systems and methods for securely communicating authentication information in a networked environment such as one involving a...
US-9,319,394 System and method for pool-based identity authentication for service access without use of stored credentials
A computer-implemented system and method for pool-based identity authentication for service access without use of stored credentials is disclosed. The method in...
US-9,319,393 Security information caching on authentication token
A method of operating a security token to authenticate a user in a multi-factor authentication system is disclosed. The method includes: monitoring user custody...
US-9,319,392 Credential management
A credential management system is described that provides a way to disable and/or rotate credentials, such as when a credential is suspected to have been...
US-9,319,391 Law enforcement agency portal
Implementations of the present disclosure involve a system and/or method for providing account information for a telephone number. All users are authenticated...
US-9,319,390 Method and apparatus for providing a trust level to access a resource
An approach is provided for providing a trust level to access a resource. A system receives a request at a device, from a first user, to access a resource...
US-9,319,389 Data recording device, and method of processing data recording device
A controller is provided with a controller key and a first controller identification information unique to the controller. The controller generates a controller...
US-9,319,388 Cryptographic key pair generation system
In certain embodiments, a system communicates a request for a user to provide a thought to facilitate generating a cryptographic key pair. The system receives a...
US-9,319,387 Secure spin torque transfer magnetic random access memory (STTMRAM)
A magnetic memory device includes a main memory made of magnetic memory, the main memory and further includes a parameter area used to store parameters used to...
US-9,319,386 Security for mobility between MBMS servers
In accordance with the exemplary embodiments of the invention there is at least a method and apparatus to perform operations including triggering by user...
US-9,319,385 System and method for accessing host computer via remote computer
In a peer-to-peer fashion, various host computers communicate with various remote computers using the Internet so that user inputs from the remote computers are...
US-9,319,384 Filtering hidden data embedded in media files
Systems and methods for filtering unsafe content at a network security appliance are provided. According to one embodiment, a network security appliance...
US-9,319,383 Firewall with two-phase filtering
Two-phase filtering for a firewall is disclosed. In the first, general phase, a request is filtered to verify one or more of: that the request is pursuant to a...
US-9,319,382 System, apparatus, and method for protecting a network using internet protocol reputation information
Certain embodiments described herein provide a computer system, a log collection device, and methods for protecting a plurality of guarded networks from...
US-9,319,381 Systems and methods for supplementing content policy
A method for supplementing a content policy is provided. The method may include receiving a request to access network content associated with a network content,...
US-9,319,380 Below-OS security solution for distributed network endpoints
Described systems and methods allow protecting a client system, such as a computer system or smartphone, from malware. In some embodiments, a network regulator...
US-9,319,379 Methods and systems of generating a unique mobile device identifier
A method of generating a user identifier is disclosed. The method comprises identifying, by a client, that the client does not have a device identifier...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.