Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,325,734 Distributed polymorphic transformation of served content
A computer-implemented method includes receiving, at a computer security server system located between the Internet and a client computing device that makes...
US-9,325,733 Unsupervised aggregation of security rules
A processing device comprises a processor coupled to a memory and is configured to obtain at least one rule set utilized to detect malicious activity in a...
US-9,325,732 Computer security threat sharing
A computer security threat sharing technology is described. A computer security threat is recognized at an organization. A partner network graph is queried for...
US-9,325,731 Identification of and countermeasures against forged websites
A system, a method, and computer program product identify a website that is a forgery of a primary website. Client side executable code is included in a page of...
US-9,325,730 Collaborative phishing attack detection
Described herein are methods, network devices and machine-readable storage media for detecting whether a message is a phishing attack based on the collective...
US-9,325,729 K-zero day safety
Systems and methods for determining a safety level of a network vulnerable to attack from at least one origin to at least one target are described. Machines,...
US-9,325,728 Systems and methods for implementing and scoring computer network defense exercises
Processes for the implementation and scoring of computer and network system defense exercises include base and modified scoring in accordance with various...
US-9,325,727 Email verification of link destination
In some embodiments, techniques for computer security comprise receiving a first email, detecting a first link in the email, wherein the first link is...
US-9,325,726 Method and system for virtual asset assisted extrusion and intrusion detection in a cloud computing environment
An analysis trigger monitoring system is provided in one or more virtual assets. One or more analysis trigger parameters are defined and analysis trigger data...
US-9,325,725 Automated deployment of protection agents to devices connected to a distributed computer network
Network traffic is monitored to detect attempted inter-network communications, including attempts by devices internal to the network to communicate with...
US-9,325,724 Time zero classification of messages
Detecting infectious messages comprises performing an individual characteristic analysis of a message to determine whether the message is suspicious,...
US-9,325,723 Proximity service security system and method using beacon
Provided are a system and method for securing security for a proximity service using a beacon signal transmitted by a beacon. A proximity service security...
US-9,325,722 Apparatus, method, and computer-readable medium
An apparatus includes a memory; and a processor coupled to the memory and configured to: set an indicator so that the indicator indicates an access to data is...
US-9,325,721 Restricting access to objects created by privileged commands
A method and system for restricting access to objects created by privileged commands. In an RBAC environment, execution of certain privileged commands creates...
US-9,325,720 System and method of controlling application level access of subscriber to a network
The invention is a system and method of controlling an access of a subscriber to a network. The method includes sending an identification of the subscriber and...
US-9,325,719 Method and system for evaluating access granted to users moving dynamically across endpoints in a network
A network analysis tool is provided in support of a data communication network having user devices at indeterminate endpoints wherein user identities, namely,...
US-9,325,718 System and method for communications routing
Provided is a system which allows a user to efficiently locate and contact those individuals the user would like to communicate with. The system can also...
US-9,325,717 Web-store restriction of external libraries
A browser-based fetch of an external library may include a browser receiving a request from a web application to load an external library and determining...
US-9,325,716 Method, apparatus and computer program for enabling access to remotely stored content
A method, and apparatus and computer program for enabling the method, the method comprising: detecting a user input at a first apparatus and, in response to the...
US-9,325,715 System and method for controlling access to personal user data
Disclosed are system and methods for controlling access of a consumer to personal data of a user. An example method includes: collecting information about the...
US-9,325,714 System and methods for access control based on a user identity
System and methods for access control in a Universal Plug and Play (UPnP) network are based on a user identity. A control point has an identity assertion...
US-9,325,713 Systems and methods for controlling email access
Embodiments of the disclosure relate to proxying at least one email resource from at least one email service to at least one client device, identifying at least...
US-9,325,712 Unified user identification with automatic mapping and database absence handling
An identification system that may be used in heterogeneous computing environments provides a fail-free path to providing identifiers from a single canonical...
US-9,325,711 Apparatus and data processing systems for accessing an object
A system and method for providing access to an object over a network may comprise hosting an object on a distributed data processing system accessible over the...
US-9,325,710 Personal content server apparatus and methods
Personal content server apparatus and associated methods that allow a user (e.g., cable or satellite network subscriber) to access content, such as a video...
US-9,325,709 System and method for importing and merging content items from different sources
Systems, methods, and computer-readable storage media for importing and merging photos from different sources are disclosed. The system receives credentials...
US-9,325,708 Secure access to data in a device
The invention concerns secure access to data in an electronic device (3). For this a link is set up with a server (2). The user of the electronic device (3)...
US-9,325,707 Method for identifying/authenticating a person using the venous network thereof
A person may be identified by at least an identification system including a device for capturing an image of a venous network of a finger and a database...
US-9,325,706 Methods, systems, and computer program products for determining an originator of a network packet using...
Associating a network packet with biometric information for a user includes identifying biometric identification information for a user of a network device,...
US-9,325,705 Trusted internet identity
A token or other storage device uses Internet identities to set file access attribute rights. Subsequently, requests to access a file can be controlled by...
US-9,325,704 Data access method and device
Disclosed are a data access method and device. The method comprises: a terminal sending an authentication request to a server, the authentication request being...
US-9,325,703 Automatic security parameter management and renewal
A method of automatic security parameter renewal including determining if a security parameter satisfies a renewal condition and automatically updating the...
US-9,325,702 Method for secure user and transaction authentication and risk management
To provide a user signature on a network transaction, a security server receives transaction information representing a transaction between a network user and a...
US-9,325,701 Method and apparatus for the secure authentication of a web-site
Methods for the authentication of a web site. A dynamic identification string and a one-time password are calculated by a device. The dynamic identification...
US-9,325,700 Service account access
A computer system detects an external media device and determines the external media device contains authentication data for the computer system. In response, a...
US-9,325,699 Method for apparatus for routing application programming interface (API) calls
A method and apparatus for routing Application Programming Interface (API) calls from a partner entity to a telephony service provider (TSP) network are...
US-9,325,698 Method and apparatus for on-site authorisation
A method for authorization of a user to access a computer system locally at a site is described. The computer system determines whether a network connection to...
US-9,325,697 Provisioning and managing certificates for accessing secure services in network
Systems and methods for provisioning and managing of certificates in a network are described. In one implementation, a signing certificate is generated by a...
US-9,325,696 System and method for authenticating to a participating website using locally stored credentials
A system and method is disclosed for authenticating a user using locally stored credentials. A website is configured to provide, to a web browser, a login page,...
US-9,325,695 Token caching in trust chain processing
A method, system, and computer usable program product for token caching in a trust chain processing are provided in the illustrative embodiments. An information...
US-9,325,694 Anonymous entity authentication method and system
An anonymous entity authentication method includes the steps of: an entity B sending RB and IGB; an entity A sending RB, R'A, IGA and IGB to a trusted third...
US-9,325,693 Method and apparatus for identity federation gateway
Techniques for an ID federation gateway include determining whether a user associated with a request for a particular network resource is to be identified by...
US-9,325,692 Relationship-based authorization
Methods and apparatus, including computer program products, related to relationship-based authorization. In general, data characterizing a request for...
US-9,325,691 Video management method and video management system
A video management method includes: associating video information to be uploaded to a moving image distribution server by a user with user information...
US-9,325,690 Verification service
Concepts and technologies are disclosed herein for verifying sender information. According to various embodiments of the concepts and technologies disclosed...
US-9,325,689 Transcoding content based on verification of ownership of the content
A computer-implemented method includes generating data indicative of one or more times in which to sample content of a first resource and content of a second...
US-9,325,688 Methods, systems, and computer readable mediums for performing workflow credential management in a converged...
Methods, systems, and computer readable mediums for performing workflow credential information management in a converged infrastructure system (CIS) are...
US-9,325,687 Remote authentication using mobile single sign on credentials
Systems and methods for remote authentication using mobile single sign on credentials are disclosed. In some implementations, a proxy server receives, from a...
US-9,325,686 System and method of generating verification code
The present disclosure provides techniques for generating an authentication code. These techniques may modularize processing diagram, noise element and words...
US-9,325,685 Authentication switch and network system
An authentication switch monitors a failure of an external server, and redirect information to a Web server that holds authentication information registration...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.