Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,369,481 Incident triage engine
An incident triage engine performs incident triage in a system by prioritizing responses to incidents within the system. One prioritization method may include...
US-9,369,480 Systems and methods for automating blind detection of computational vulnerabilities
Methods for blind detection of computational vulnerabilities include the submission by a detecting system of potentially interpretable information to a target...
US-9,369,479 Detection of malware beaconing activities
Malware beaconing activity detection is disclosed, including: monitoring a plurality of conversations between an internal device and one or more external...
US-9,369,478 OWL-based intelligent security audit
The disclosure herein describes a system for facilitating intelligent auditing of security log records. A set of security policies are converted into a set of...
US-9,369,477 Mitigation of path-based convergence attacks
Technologies are generally described for mitigation of a convergence attack in a network portion that includes multiple nodes interconnected by links in a...
US-9,369,476 System for detection of mobile applications network behavior-netwise
The invention is a system for protecting mobile devices in cellular networks from unauthorized harmful applications and for protecting cellular network...
US-9,369,475 System and method for securing a third party communication with a hosting web page
A system and method for providing secure communications between third parties and hosting web pages. The method includes uploading a hosting web page to a...
US-9,369,474 Analytics data validation
Analytics data validation techniques are described. In one or more implementations, an analytics service collects analytics data from a client device that...
US-9,369,473 Method and system for extending network resources campus-wide based on user role and location
A method, system, and computer readable medium is disclosed which utilizes the LISP control plane to increase communications and access to enterprise resources...
US-9,369,472 Authorization framework
Embodiments disclosed herein provide an authorization framework. An apparatus may include a data storage to store a first plurality of authorization plugin...
US-9,369,471 Interaction privacy in a default network
A system and a method are disclosed for controlling access to content in a default network computing system. The method includes receiving a request for a data...
US-9,369,470 User collision detection and handling
Techniques for user collision detection and handling are described. According to various embodiments, a network resource provides content, services, and so...
US-9,369,469 Method for managing access to protected computer resources
A system for securing and tracking usage of transaction services or computer resources by a client computer from a first server computer, which includes...
US-9,369,468 Generation of a visually obfuscated representation of an alphanumeric message that indicates availability of a...
This disclosure relates to a system and related operating methods. A computer-implemented server device receives a request from a device that includes an...
US-9,369,467 System, method, and computer program for providing generic access to web content on a mobile device
A system, method, and computer program product are provided for providing generic access to web content on a mobile device. In use, a request for requested web...
US-9,369,466 Managing use of network resources
Some aspects of what is described here relate to managing the use of network resources on a mobile device. User input received at the device indicates whether...
US-9,369,465 System for transmitting data by using USB interface
A system for transmitting data by using a USB interface is provided. The system includes: a terminal equipment; a data transmission line, having a first...
US-9,369,464 Scalable authentication system
Disclosed is a key management method for administering a token with an administrative server and an authentication server wherein a set of keys stored therein...
US-9,369,463 Information processing method and system
Disclosed are an information processing method and system. The first terminal sends operation request information to an electronic signature token. The...
US-9,369,462 Secure data entry via audio tones
A cloud client device identifies one or more devices within a predetermined range of the cloud client device operable to communicate with the cloud client...
US-9,369,461 Passcode verification using hardware secrets
A hardware secret is securely maintained in a computing device. The hardware secret is used to generate a hash of a passcode that is persistently stored for...
US-9,369,460 Authentication manager
Disclosed are various embodiments for an authentication manager. The authentication manager performs a certificate validation for a network site. If the...
US-9,369,459 Method of establishing secure groups of trusted contacts with access rights in a secure communication system
A method of establishing secure groups of trusted contacts with access rights in a secure communication system. The method includes establishing secure groups...
US-9,369,458 Web-centric authentication protocol
Systems and methods are disclosed for providing a Web-centric authentication protocol. In one implementation, a processing device receives a user request to...
US-9,369,457 Mobile multifactor single-sign-on authentication
Features are disclosed for authentication of mobile device applications using a native, independent browser using a single-sign-on system. An authentication...
US-9,369,456 Single sign-on in multi-tenant environments
The disclosed embodiments provide a system that authenticates a user. During operation, the system identifies a first tenant associated with a first request for...
US-9,369,455 Computerized method and system for managing an email input facility in a networked secure collaborative...
In embodiments of the present invention improved capabilities are described for managing an email input facility in a networked secure collaborative computer...
US-9,369,454 Computerized method and system for managing a community facility in a networked secure collaborative exchange...
In embodiments of the present invention improved capabilities are described for managing a community facility in a networked secure collaborative computer data...
US-9,369,453 Information processing apparatus and information processing system
An information processing apparatus includes a user authentication unit that authenticates a user, a data storage controller that controls the storing of data...
US-9,369,452 System and method for secure message reply
A system and method whereby an unregistered, anonymous user at an organization's website makes a submission/inquiry and is able to access a secure response...
US-9,369,451 Systems, methods, and apparatuses for sharing rights
A method of sharing rights includes, using one or more processors, at the request of a first user, granting a right of the first user to a second user,...
US-9,369,450 Methods preserving user identities during login and related systems, devices, and machines
A method of accepting a remote access at a target machine from a source machine may include receiving a login request at the target machine from the source...
US-9,369,449 Providing an enterprise application store
Methods, systems, and computer-readable media for providing an application store are presented. In some embodiments, authentication credentials of an...
US-9,369,448 Network security parameter generation and distribution
Disclosed are various embodiments for facilitating network security parameter distribution and generation in a converged network incorporating multiple...
US-9,369,447 System and method to securely transfer data
Various embodiments of the invention achieve optimal data security by adding a security layer to data at the point of generation. Some embodiments add a...
US-9,369,446 Secure remote desktop
A method for communication includes receiving in a secure installation via a network from a remote user terminal an input comprising a stream of symbols that...
US-9,369,445 Bin enabled data object encryption and storage apparatuses, methods and systems
The BIN ENABLED DATA OBJECT ENCRYPTION AND STORAGE APPARATUSES, METHODS AND SYSTEMS ("MBIN") transforms bin creation requests, bin templates and unencrypted...
US-9,369,444 Remote access service inspector
A method, system, and computer program product for providing protected remote access from a remote access client to a remote access server over a computer...
US-9,369,443 Field level data protection for cloud services using asymmetric cryptography
Systems, apparatuses, and methods for providing data security for data that is stored in a cloud-level platform. In one embodiment, each session is associated...
US-9,369,442 System and method for the safe spontaneous transmission of confidential data over unsecure connections and...
Disclosed is a method and system for transmitting data. The system includes at least one first stationary and/or mobile communication terminal at least one...
US-9,369,441 End-to-end secure communication system
The present disclosure is directed to an end-to-end secure communication system wherein, in addition to encrypting transmissions between clients, ...
US-9,369,440 Securing private information in public, private and mobile devices
Technologies are generally disclosed for methods and systems for securing data. An example method may include storing, by a processing device, the data in a...
US-9,369,439 Method for internet transactions
The present invention consists of a computer security method that enables all users of a computer application to enjoy superior security levels when sensitive...
US-9,369,438 Supervised data transfer
An apparatus and method are provided for controlling a transfer of data between data communications networks. In a preferred implementation, an apparatus is...
US-9,369,437 Internet-based proxy service to modify internet responses
A proxy server receives from a client device a request for a network resource that is hosted at an origin server for a domain. The request is received at the...
US-9,369,436 Firewall method and apparatus for industrial systems
Method and apparatus for use with systems including networked resources where communication between resources is via dual packet protocols wherein a first...
US-9,369,435 Method for providing authoritative application-based routing and an improved application firewall
A method for providing authoritative application-based routing and an improved application firewall, as well as a method for application classification, is...
US-9,369,434 Whitelist-based network switch
A whitelist-based network switch defines a whitelist and a handling rule based on an access control list, security policies, etc., and monitors and blocks...
US-9,369,433 Cloud based social networking policy and compliance systems and methods
Cloud based social networking policy and compliance systems and methods use the "cloud" to pervasively enforce security and policy on websites such as Web 2.0...
US-9,369,432 System and method for secure network communications
A system and method for establishing secure communication between a first device and a second device, wherein the first device is behind a firewall. A Secure...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.