Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,374,383 Events from network flows
In one embodiment, a system includes a processor to receive network flows, for each of one of a plurality of event-types, compare each one of the network flows...
US-9,374,382 Apparatus and method for attack source traceback
An apparatus and a method for an attack source traceback capable of tracing back an attacker, that is, an attack source present behind a command and control...
US-9,374,381 System and method for real-time malware detection based on web browser plugin
According to a method and system for real-time malware detection based on web browser plugin, the method and system may connect a web server of a web site...
US-9,374,380 Non-harmful insertion of data mimicking computer network attacks
Non-harmful data mimicking computer network attacks may be inserted in a computer network. Anomalous real network connections may be generated between a...
US-9,374,379 Application unlock
Techniques are provided for controlling access to an application. A first request to use an application may be received from a first user and an application...
US-9,374,378 Access method and communication system for accessing a protected communication service
An access method for accessing a protected communication service via a public communication network by using a secure communication network, whereby the secure...
US-9,374,377 Mandatory protection control in virtual machines
A method and system for authenticating a user to provide access to a secure application configured on a mobile device are disclosed. The method includes...
US-9,374,376 Anti-hacking system for quantum communication
A method and apparatus for reducing unauthorized access of an information stream. The information stream is received at a node along a path to a destination...
US-9,374,375 Systems and methods for publishing datasets
Systems and methods for publishing datasets are provided herein. According to some embodiments, methods for publishing datasets may include receiving a request...
US-9,374,374 Systems and methods for securing social media for users and businesses and rewarding for enhancing security
The disclosed system and method enhances security of people, organizations, and other entities that use what has been termed "social media." Recent trends have...
US-9,374,373 Encryption techniques for improved sharing and distribution of encrypted content
In an embodiment, content may be encrypted by a first device using a dual hash chain technique, where the first device maintains a forward hash chain and a...
US-9,374,372 Systems and methods for profiling client devices
Systems and methods are disclosed for providing, generating, and managing profiles. Such systems and methods may be implemented to control access to a function...
US-9,374,371 Authentication apparatus and method thereof, and computer program
According to one embodiment, there is provided an authentication apparatus, including: a communication unit, a verifier and a connection configuration checker....
US-9,374,370 Invariant biohash security system and method
Systems, methods, and program products for providing secure authentication for electronic messages are disclosed. A method may comprise generating an asymmetric...
US-9,374,369 Multi-factor authentication and comprehensive login system for client-server networks
Embodiments are directed to a system and method for authenticating a user of a client computer making a request to a server computer providing access to a...
US-9,374,368 Distributed passcode verification system
A distributed passcode verification system includes devices that each have a hardware secret and that are each able to perform a limited number of verifications...
US-9,374,367 Method for generating a soft token, computer program product and service computer system
A method is provided for generating a soft token by which attributes of a user may be authenticated. A request to generate the soft token is transmitted from an...
US-9,374,366 System and method for anti-phishing authentication
A method and system for providing security against phishing attacks. The method can include receiving a login ID from a client, and providing an encrypted...
US-9,374,365 Pushing a virtual desktop session from an authenticated device using image scanning
Image scanning and encoding technologies can be utilized to authenticate devices to virtual desktops and to transfer virtual desktop sessions between devices....
US-9,374,364 Method and system for implementing video two factor authentication
A method for authentication includes receiving a log-in request at a first client computer, and capturing user information with the request. The method includes...
US-9,374,363 Restricting access of a portable communication device to confidential data or applications via a remote network...
Systems and methods disclosed herein relate to the protection of a plurality of protected personas on a protected network that may be isolated from a...
US-9,374,362 Method and apparatus for providing radio communication with an object in a local environment
A method and apparatus for providing radio communication with an electronic object in a local environment are disclosed. For example the method receives via a...
US-9,374,361 Cross-native application authentication application
A user device stores first authentication information used to grant access to a resource associated with a first application, and configuration information...
US-9,374,360 System and method for single-sign-on in virtual desktop infrastructure environment
A system and a method for single-sign-on (SSO) in a virtual desktop infrastructure (VDI) environment are disclosed. The system includes a VDI service server...
US-9,374,359 Generating a data display in view of user activities
A method and system for collecting, aggregating, and displaying type specific content in an inbox like view are described. An inbox manager collects information...
US-9,374,358 Methods, systems, and media for providing access control for a computing device
Methods, systems, and media for providing access control for a computing device are provided. In some implementations, methods for providing access control for...
US-9,374,357 Information processing device, and method and computer-readable medium therefor for the input and storage of...
An information processing device including a controller configured to accept a selection of a service from among a plurality of services including a first...
US-9,374,356 Mobile oauth service
A framework, which conforms to the OAuth standard, involves a generic OAuth authorization server that can be used by multiple resource servers in order to...
US-9,374,355 Programming vehicle modules from remote devices and related methods and systems
Methods, apparatus and systems are provided for programming a vehicle module. An exemplary vehicle includes a first module, a gateway module communicatively...
US-9,374,354 Method and apparatus for sharing content
A method and apparatus for sharing content by selecting a device with which the content is to be shared and performing authentication by using a device which is...
US-9,374,353 Enabling dynamic authentication with different protocols on the same port for a switch
The invention enables a client device that does not support IEEE 802.1X authentication to access at least some resources provided through a switch that supports...
US-9,374,352 Content restriction compliance using reverse DNS lookup
A method for alerting Internet content providers of the age or other personal information of a computer user, which includes receiving a reverse DNS lookup...
US-9,374,351 Virtual desktop accelerator support for network gateway
The subject disclosure relates to a method for initiating an accelerated desktop session between a client and a remote. In some aspects, the method includes...
US-9,374,350 Authenticating method of communicating connection, gateway apparatus using authenticating method, and...
An authenticating method of communicating connection between a terminal and a gateway apparatus, the method including transmitting authentication information...
US-9,374,349 Methods and credential servers for controlling access to a computer system
Methods and credential systems for use in controlling access to a computer system are disclosed. One example method includes receiving a request for a temporary...
US-9,374,348 System and method to enable unlicensed mobile access across terminals
A method and apparatus is provided for establishing a Global System for Mobile communications (GSM) call through an Unlicensed Mobile Access (UMA) Network by...
US-9,374,347 Method and system for authentication over a public network using multiple out-of-band communications channels...
A method includes sending an open request to a directory server for a first key, the first key being a trusted key wrapped in a public key. The open request...
US-9,374,346 Agile network protocol for secure communications using secure domain names
A network device comprises a storage device storing an application program for a secure communications service, and at least one processor configured to execute...
US-9,374,345 Transparent encryption/decryption gateway for cloud storage services
A mechanism is provided for secure data storage in a distributed computing system by a client of the distributed computing system. A gateway device intercepts a...
US-9,374,344 Secure end-to-end communication system
A secure end-to-end communication system is implemented via one or more security processing devices. In one embodiment, a method includes: loading, by a key...
US-9,374,343 Bitwise operations and apparatus in a multi-level system
A system uses multi-level encoding where each symbol of a plurality of symbols represents more than one bit of information in a user data symbol stream for...
US-9,374,342 System and method for testing network firewall using fine granularity measurements
A device may verify whether pinholes in a perimeter protection device are open and may determine pinhole opening and closing delays. The method for determining...
US-9,374,341 Establishing secure remote access to private computer networks
Techniques are described for providing users with access to computer networks, such as to enable users to interact with a remote configurable network service to...
US-9,374,340 Nested independent virtual private networks with shared rekey and consistency services
First and second nested virtual private networks share a common rekey service. A first key server generates first cryptographic keys and policies for use by...
US-9,374,339 Authentication of remote host via closed ports
A method, system and apparatus for authenticating a communication request sent from a client computing device. The communication request is initially blocked by...
US-9,374,338 Remotely processing detection of undesirable network traffic content
A method of detecting a content desired to be detected includes receiving electronic data at a first host, determining a checksum value using the received...
US-9,374,337 Systems and methods for supporting IP ownership in a cluster
While each node in a cluster of nodes sources connections with the same IP if each node allocates a port on this IP independently, there may be port clashes....
US-9,374,336 Forwarding selected document passages from an electronic reader
A method of forwarding selected passages from an electronic document being displayed on an electronic reader to a designated recipient. The method includes...
US-9,374,335 System and method for distributing messages to particular mobile devices
A message distribution system comprising an analytics system to receive an inquiry with qualifiers to generate an estimate of the number of mobile devices...
US-9,374,334 Programmatic message partner list management
Embodiments of the present invention address deficiencies of the art in respect to instant messaging and real-time communications systems and provide a method,...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.