Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,332,033 Methods and systems for enabling community-tested security features for legacy applications
A computer-implemented method for enabling community-tested security features for legacy applications may include: 1) identifying a plurality of client systems,...
US-9,332,032 Implementing security in a social application
Implementing security in social applications includes inferring a closeness level of a connection to a user's profile of a social application based on a...
US-9,332,031 Categorizing accounts based on associated images
Categorizing accounts based on associated images is described, including identifying information associated with an account associated with a user, the...
US-9,332,030 Systems and methods for thwarting illegitimate initialization attempts
The disclosed computer-implemented method for thwarting illegitimate initialization attempts may include (1) receiving an initialization packet designed to...
US-9,332,029 System and method for malware detection in a distributed network of computer nodes
Disclosed are system and method of distributed detection of malware. An example system includes a security client deployed on a computer node. The security...
US-9,332,028 System, method, and apparatus for providing network security
Methods, systems, and apparatuses for proactively protecting a computing network are disclosed. A proactive security mechanism is disclosed, among other things,...
US-9,332,027 Data communication using media files
A web browser may implement a single origin policy that makes an exception for media files such as markup language image files. In cases where the delivery of...
US-9,332,026 Real-time network attack detection and mitigation infrastructure
The invention features systems and methods for detecting and mitigating network attacks in a Voice-Over-IP (VoIP) network. A server is configured to receive...
US-9,332,025 Systems and methods for detecting suspicious files
A computer-implemented method for detecting suspicious files may include (1) detecting a file within incoming file traffic directed to a file recipient, (2)...
US-9,332,024 Utilizing digital linear recursive filters to estimate statistics for anomaly detection
A method is provided to estimate statistics of user interaction with a computing system. For example, the method includes tracking the interaction of a...
US-9,332,023 Uploading signatures to gateway level unified threat management devices after endpoint level behavior based...
Zero day threats are detected at gateway level and blocked from entering a network. A database containing signatures identifying malware is maintained at the...
US-9,332,022 Systems and methods for detecting suspicious internet addresses
The disclosed computer-implemented method for detecting suspicious Internet addresses may include (1) monitoring Internet communications of an entity (e.g., an...
US-9,332,021 Methods and systems for preventing security breaches
A security payload is attached to a received binary executable file. The security payload is adapted to intercept application programming interface (API) calls...
US-9,332,020 Method for tracking machines on a network using multivariable fingerprinting of passively available information
A method for tracking machines on a network of computers includes determining one or more assertions to be monitored by a first web site which is coupled to a...
US-9,332,019 Establishment of a trust index to enable connections from unknown devices
A method of controlling access to a remote system includes granting a connecting device full access to the system upon determining the device is registered to a...
US-9,332,018 Method and system for secure authentication
A method and system for accessing a resource associated with a resource control entity that includes receiving, by a ledger, a request, corresponding to a user,...
US-9,332,017 Monitoring remote access to an enterprise network
Techniques to provide an improved representation of remote network access for a network administrator managing and controlling access to resources on an...
US-9,332,016 Web server, information providing method, and information providing system
A server device includes a memory and a processor coupled to the memory. The processor executes generating a list in which a privilege of which the number of...
US-9,332,015 System and method for providing error handling in an untrusted network environment
An example method is provided and may include receiving a DIAMETER-based error over an SWm interface by a first evolved packet data gateway (ePDG) for a user...
US-9,332,014 Distribution of broadcast content to controlled-environment facilities
A system for receiving satellite radio signals and/or internet content and extracting a plurality of channels from the satellite radio signals and/or internet...
US-9,332,013 Neural authentication system
In certain embodiments, a system receives a first request from a user to perform a function with an enterprise. The system communicates a second request for the...
US-9,332,012 Apparatus and methods for storing electronic access clients
Apparatus and methods for storing and controlling access control clients. In one embodiment, transmitting and receiving devices ensure that only one copy of an...
US-9,332,011 Secure authentication system with automatic cancellation of fraudulent operations
The present invention relates to a method and system to securely authenticate an operation request using a secure device. Automatic rejections are initiated on...
US-9,332,010 Methods and systems for token-based application management
Disclosed herein are methods and systems for token-based application management. In an embodiment, requests are received from applications for tokens that can...
US-9,332,009 Use, provision, customization and billing of services for mobile users through distinct electronic apparatuses
An office electronic apparatus is associated to an apparatus card and is able to use or provide a service by means of identification information; the...
US-9,332,008 Time-based one time password (TOTP) for network authentication
A Time-based One-Time Password (TOTP) validator is interposed between a principal and a network service. The validator interacts with a mobile application (app)...
US-9,332,007 Method for secure, entryless login using internet connected device
A system, method, and computer-readable medium are disclosed for using an entryless One-Time Password (OTP) in an active tag environment. Authentication...
US-9,332,006 Service account access
A computer system detects an external media device and determines the external media device contains authentication data for the computer system. In response, a...
US-9,332,005 System and method for providing switch based subnet management packet (SMP) traffic protection in a middleware...
A system and method can provide switch based subnet management packet (SMP) traffic protection in a middleware machine environment. The middleware machine...
US-9,332,004 Digital content acquisition system and techniques
A network- and/or client-side digital content acquisition system facilitates automatic and simplified transactions, between a user of a consumer electronic...
US-9,332,003 Systems and methods for discovering website certificate information
The disclosed computer-implemented method for discovering website certificate information may include (1) receiving, from a plurality of computing devices...
US-9,332,002 Authenticating and authorizing a user by way of a digital certificate
An administrator may issue a credential to a user and may define a policy that authorizes its use based on a predefined location. The policy and the credential...
US-9,332,001 Customizable sign-on service
Techniques are described for providing customizable sign-on functionality, such as via an access manager system that provides single sign-on functionality and...
US-9,332,000 One-pass authentication mechanism and system for heterogeneous networks
A one-pass authentication mechanism and system for heterogeneous networks are provided. The mechanism comprises authenticating a user based on an authentication...
US-9,331,999 Information processing system and authentication method
An information processing system includes a first authentication function unit that issues first authentication information which is necessary to perform an...
US-9,331,998 Dynamic secured network in a cloud environment
The disclosure presents systems, methods and computer program products relating to an overlay network in a cloud environment. A management machine may manage an...
US-9,331,997 Systems and methods for managing disclosure of protectable information
A server and one or more portals cooperate with a first registered agency, an administrator of the first registered agency, a second agency, and an...
US-9,331,996 Systems and methods for identifying devices by a trusted service manager
Embodiments of the disclosure provide systems and methods for identifying devices by a trusted service manager. According to one example embodiments of the...
US-9,331,995 Secure configuration of mobile application
Secure configuration of a mobile application ("app") includes sending the required configuration data for the app to the user's mobile computing device in a...
US-9,331,994 User authentication based on historical transaction data
Embodiments are directed to systems, methods and computer program products for providing user authentication based on transaction data. Embodiments receive from...
US-9,331,993 Authentication server and communication device
A communication device comprising a central processing unit (CPU) and a memory device is disclosed. The CPU is configured to send a first attach request...
US-9,331,992 Access control
A scalable access filter that is used together with others like it in a virtual private network to control access by users at clients in the network to...
US-9,331,991 Authenticating a client using linked authentication credentials
Techniques are provided for improving security in a single-sign-on context by providing, to a user's client system, two linked authentication credentials in...
US-9,331,990 Trusted and unsupervised digital certificate generation using a security token
A method, system and computer program product for ensuring PKI key pairs are operatively installed within a secure domain of a security token prior to...
US-9,331,989 Secure shared key sharing systems and methods
Systems and methods used to securely communicate a shared key to devices. One embodiment describes a method to securely communicate a shared key to a first...
US-9,331,988 System and method for provisioning secrets to an application (TA) on a device
A system and method can support device management. An authorization entity can pass one or more secrets that are wrapped with a first key to a communication...
US-9,331,987 Virtual storage system and file encryption methods
A virtual storage system in data communication with a user computing device via a communication network and file encryption methods for encrypting electronic...
US-9,331,986 Encryption communication method, apparatus and system
An encrypted communication method relating to communication technologies includes allocating a same encryption key for a first application and a terminal that...
US-9,331,985 Portable device, a stationary device, a digital device and a method for performing secure communication using...
A method includes sensing an image of a portable device by using a camera unit, acquiring an orientation information estimation value of the portable device by...
US-9,331,984 Secret sharing method and system
In a secret sharing process based on an improved threshold scheme, secret data is shared as shared data parts equal to or greater than a threshold value in...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.