Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,363,282 Platforms for implementing an analytics framework for DNS security
Flux domain is generally an active threat vector, and flux domain behaviors are continually changing in an attempt to evade existing detection measures....
US-9,363,281 Detecting covert routing
A method and apparatus for detecting covert routing is disclosed. In the method and apparatus, data addressed to an unrestricted computer system traverses a...
US-9,363,280 System and method of detecting delivery of malware using cross-customer data
According to one embodiment, a computerized method comprises receiving a set of indicators of compromise (IOCs) associated with a known malware of a first...
US-9,363,279 Assessing threat to at least one computer network
Apparatus configured to determine predicted threat activity based on stochastic modelling of threat events capable of affecting at least one computer network in...
US-9,363,278 Dynamic and selective response to cyber attack for telecommunications carrier networks
The disclosed subject matter provides a response to a cyber attack on a carrier network. The response can be based on inspection of traffic flowing through a...
US-9,363,277 Systems and methods for detecting and preventing flooding attacks in a network environment
A method for processing network traffic data includes receiving a packet, and determining whether the packet is a previously dropped packet that is being...
US-9,363,276 Method and system for testing and validation of cryptographic algorithms
A method for testing cryptographic algorithms includes: receiving one or more request files, wherein each request files is associated with a cryptographic...
US-9,363,275 Sampled deterministic finite automata for deep packet inspection
In one embodiment, a method includes sampling text in a received packet at a network device and analyzing the sampled text using a sampled deterministic finite...
US-9,363,274 Methods and systems for broadcasting pictures
A method and system for broadcasting pictures across multiple user terminals are provided. The method includes generating a user signature based on information...
US-9,363,273 Secure clock synchronization
The present disclosure provides a secure one-step IEEE 1588 clock using either a symmetric or asymmetric protection scheme. Clocks of mission-critical or...
US-9,363,272 System and method for identity management for mobile devices
Systems and methods for managing a user identity on a mobile device are provided. The system comprises the mobile device comprising a user agent and a client...
US-9,363,271 Method and system of reserving and using an access channel
A radio access network (RAN) may be providing, in a coverage area, at least two access channels that are available for use by any wireless communication devices...
US-9,363,270 Personas in application lifecycle management
A user management construct, referred to as a persona, is provided to enable a flexible mechanism that grants elevated or administrative privileges to users,...
US-9,363,269 Zero day threat detection based on fast flux detection and aggregation
A method in a cloud-based security system includes operating a Domain Name System (DNS) resolution service, proxy, or monitor in the cloud-based security...
US-9,363,268 System and method for controlling multicast geographic distribution
A content distribution network includes first and second controllers, and multicast enabled routers. The first controller is configured to select a multicast...
US-9,363,267 Transaction verification through enhanced authentication
Methods, systems, and computer program products for providing transaction verification through enhanced authentication are provided. A method performed by a...
US-9,363,266 Secured electronic device
Methods, systems, and apparatus for communicatively pairing and securing an electronic device to a vehicle based electronic system. The pairing can enable the...
US-9,363,265 Methods and systems for enhancing the accuracy performance of authentication systems
A method for enhancing the accuracy performance of authentication systems includes determining an authentication data requirement for a desired transaction and...
US-9,363,264 Networked device access control
A computer apparatus is remotely initiated. Confirmation of a detected and authenticated presence of a user is detected and confirmed remote from the computer...
US-9,363,263 Just in time polymorphic authentication
Methods, systems, apparatuses, and computer-readable media for utilizing just-in-time polymorphic authentication techniques to secure information are presented....
US-9,363,262 Authentication tokens managed for use with multiple sites
A method and system for authenticating an account holder using multi-factor authentication. An account holder is associated with a token device configured to...
US-9,363,261 Synchronous timestamp computer authentication system and method
A method and system for authenticating computer nodes on a network, including providing a synchronized clock system, at a predetermined clock frequency, for use...
US-9,363,260 Detecting sharing of passwords for password protected user accounts
A method for detecting the sharing of a password related to a password protected user account provided by an organization, by multiple entities of the...
US-9,363,259 Performing client authentication using onetime values recovered from barcode graphics
Techniques are disclosed for authenticating users accessing computing applications, e.g., applications hosted in a cloud environment accessed using a variety of...
US-9,363,258 Secure digital signature system
The illustrative embodiments provide a computer implemented method, apparatus, and computer program product for receiving a request from a client to instantiate...
US-9,363,257 Secure federated identity service
Federated identity is the means of linking a person's electronic identity and attributes, such that the user can be authenticated with a single sign-on, across...
US-9,363,256 User authentication in separate authentication channels
Apparatuses, systems, methods, and computer program products are disclosed for user authentication in separate authentication channels. A token module is...
US-9,363,255 Cloud queue playhead
An example implementation may involve a computing system receiving, from a media playback system, a request for an indication of a playhead pointer for a...
US-9,363,254 Cloud queue access control
An example implementation may involve a computing system receiving a request to establish a queue of media items. The computing system may assign a first access...
US-9,363,253 Systems and methods for pairing bluetooth devices
Embodiments of software-supervised pairing processes are provided. The processes enable a user to pair a mouse and keyboard with a Bluetooth transceiver without...
US-9,363,252 Method for customizing software applications
In one example embodiment, a method includes, in one of an interpreted computer environment and a compiled computer environment, generating a software...
US-9,363,251 Systems and methods for credential management between electronic devices
Embodiments are provided for managing user credentials that enable access to secure websites. According to certain aspects, a browser device connects (230) to a...
US-9,363,250 Hub coordination service
In implementations of a hub coordination service, a device includes a communication interface for communication coordination with one or more associated devices...
US-9,363,249 Secure simple enrollment
Methods, systems, and apparatus are disclosed for generating one or more device identifiers based on a public key associated with a respective device. Various...
US-9,363,248 Data encryption in a network memory architecture for providing data based on local accessibility
A network memory system is disclosed. The network memory system comprises a first appliance configured to encrypt first data, and store the encrypted first data...
US-9,363,247 Method of securing files under the semi-trusted user threat model using symmetric keys and per-block key encryption
A computer system and method for securing files in a file system equipped with storage resources that are accessible to an authenticable user operating with an...
US-9,363,246 Certificate distribution device and method for same, and computer program
Distribution of a certificate and a private key via a network includes a certificate/private key storage unit by which a certificate and a private key prepared...
US-9,363,245 Secure network access
The present invention relates to a system and method for facilitating access to secure network sites, such as sites providing secure financial information. An...
US-9,363,244 Realizing authorization via incorrect functional behavior of a white-box implementation
A method of authorization in a cryptographic system that provides separate authorization for a plurality of different input message groups using a single...
US-9,363,243 External indexing and search for a secure cloud collaboration system
An end-to-end secure cloud-hosted collaboration service is provided with a hybrid cloud/on-premise index and search capability. This approach includes...
US-9,363,242 Trusted communications between untrusting parties
A system and method is disclosed for assuring that networked communications between parties playing a game on a network (e.g., the Internet) are not tampered...
US-9,363,241 Cryptographic enforcement based on mutual attestation for cloud services
In accordance with embodiments disclosed herein, there are provided systems, apparatuses, and methods for implementing cryptographic enforcement based on mutual...
US-9,363,240 Method and system for reducing network latency
Method, system, and programs for reducing network latency in a network. A first connection is established between a relay and a host in the network. The relay...
US-9,363,239 Intelligent deliverable message annotation
Enabling recipients to share tags that they associate with received e-mails includes receiving an e-mail from a sending user addressed to a receiving user, the...
US-9,363,238 Repackaging demographic data with anonymous identifier
Using uniquely generated identifiers in a network-based ecosystem in which a plurality of client devices request media content and software applications from...
US-9,363,237 Secure data exchange between data processing systems
A data transfer method performed at a proxy server includes intercepting a data request from a client computer that is directed to a target server, encrypting...
US-9,363,236 Walled garden providing access to one or more websites that incorporate content from other websites
A cleared sites list includes one or more hostname descriptors. A firewall includes rules associated with a cleared IP list including cleared IP addresses, and...
US-9,363,235 Multi-service VPN network client for mobile device having integrated acceleration
An integrated, multi-service virtual private network (VPN) network client for cellular mobile devices is described. The multi-service network client can be...
US-9,363,234 Fast update filter
A method may include defining a filter for a network device, the filter including a rule and a particular number of prioritized fields, where at least one of...
US-9,363,233 Network accountability among autonomous systems
In one kind of DoS attack, malicious customers may try to send a large number of filter requests against an innocent customer. In one implementation, a Filter...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.