Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,386,032 Method and system for detecting restricted content associated with retrieved content
Techniques are described for detecting restricted content associated with retrieved content. A method and system includes receiving a client request for...
US-9,386,031 System and method for detection of targeted attacks
Methods, systems, and computer programs for detecting targeted attacks on compromised computer. An example method includes receiving from a plurality of...
US-9,386,030 System and method for correlating historical attacks with diverse indicators to generate indicator profiles for...
An apparatus and method predict and detect network attacks by using a diverse set of indicators to measure aspects of the traffic and by encoding traffic...
US-9,386,029 Method and system for tracking fraudulent activity
A method and system for tracking potentially fraudulent activities associated with one or more web sites is disclosed. The system includes a fraud tracking...
US-9,386,028 System and method for malware detection using multidimensional feature clustering
Methods and systems for malware detection techniques, which detect malware by identifying the Command and Control (C&C) communication between the malware and...
US-9,386,027 Detection of pileup vulnerabilities in mobile operating systems
A system is provided for detecting pileup vulnerabilities corresponding to mobile operating system updates. The system includes: an exploit opportunity...
US-9,386,026 System and method for scheduling and executing secure electronic correspondence operations
A secure electronic correspondence method and system based on a principle relating to the uniqueness of the originals of the correspondences. The archiving...
US-9,386,025 Modulation analysis and distortion identification
An apparatus, method, computer readable medium, and system are provided to generate a symbol placement associated with a transmission scheme by transforming a...
US-9,386,024 System and method for detecting modified or corrupted external devices
Disclosed are systems and methods for detecting modified or corrupted external devices connected to a computer system. An exemplary method includes storing in a...
US-9,386,023 Method, apparatus and system for managing packet delivery
Portable electronic devices typically have reduced computing resources, including reduced available bandwidth to receive communications. A method, apparatus and...
US-9,386,022 Systems and methods of virtual worlds access
Systems and methods of virtual world interaction, operation, implementation, instantiation, creation, and other functions related to virtual worlds (note that...
US-9,386,021 Restricting network access to untrusted virtual machines
Approaches for providing operating environments selective access to network resources. A guest operating system, executing on a device, may issue a request to a...
US-9,386,020 Permission-based updating of contact information
A system for automatically updating personal consumer and business contact information is disclosed. A server located "in the cloud" automatically controls a...
US-9,386,019 System and method for controlled access to network devices
In one embodiment, a system includes a non-transitory computer readable medium comprising one or more rules associated with access to a first server. The system...
US-9,386,018 Distributed cryptography system
A card reader controller engine includes an interface controller responsive to information. The engine is coupled to the interface controller and is configured...
US-9,386,017 Authentication device, system and method
An authentication device includes: a memory; and a processor coupled to the memory and configured to: when a registration request including authentication...
US-9,386,016 System and device for authentication
An authentication device receives each authentication context including an output information block, an input information block, and an authenticator block. The...
US-9,386,015 Security model for industrial devices
Systems and/or methods are described relating to a security model that provides interoperability with foreign security domains while remaining scalable to small...
US-9,386,014 Soft token system
Systems and methods for a secure soft token solution applicable to multiple platforms and usage scenarios are provided. According to one embodiment a unique...
US-9,386,013 Dynamic password authentication method and system thereof
The present invention discloses a dynamic password authentication method and a system thereof. The method comprises: a server receives first information sent...
US-9,386,012 Web based system that allows users to log into websites without entering username and password information
Internet user passwords are securely managed. A formation component can enable a user to create a master account on a web server, the master account comprising...
US-9,386,011 Systems and methods for managing resetting of user online identities or accounts
Systems and methods are disclosed for managing the resetting of online identities or accounts of users of Internet web pages. One method includes: receiving,...
US-9,386,010 Abstracted authenticated client connectivity application programming interface (API)
A request to establish a connection to a server application executed by a server device is received at a client-side authenticated-connection application...
US-9,386,009 Secure identification string
Providing secure access to a mobile or other device using a network-assisted PIN or other short password is disclosed. In various embodiments, upon entry by a...
US-9,386,008 Secure installation of encryption enabling software onto electronic devices
A process/method is provided, which authenticates electronic devices allowing the installation and utilization of encryption enabling software capable of...
US-9,386,007 Multi-domain applications with authorization and authentication in cloud environment
A multi-domain application requiring SSO and SLO operations in cloud environment is presented. The computing system of the multi-domain application includes a...
US-9,386,006 Authentication mechanism for domain redirection of a representational state transfer (REST)-compliant client
An initial server responds to a request with a redirection object describing the a different server to which the request should be redirected, and providing...
US-9,386,005 Method and system for data communication over network
Embodiments of the present application relate to a method for data communication, a system for data communication, and a computer program product for data...
US-9,386,004 Peer based authentication
The disclosure is related to confirming an identity of a first user of a first user device. An aspect includes receiving a request to confirm the identity of...
US-9,386,003 System and method for secure transactions
The present disclosure describes systems and methods directed towards a highly secure and intelligent, end to end provisioning, authentication, and transaction...
US-9,386,002 Systems and methods to deliver information to a member
Systems, methods, and computer-readable media deliver a variety of personalized information to a member of an association. In embodiments, information intended...
US-9,386,001 Border gateway protocol (BGP) communications over trusted network function virtualization (NFV) hardware
A first Network Function Virtualization (NFV) computer system generates Hardware Root-of-Trust (HRoT) challenge data and transfers the HRoT challenge data in...
US-9,386,000 System and method for establishing a communication link
A system for and method of establishing a secure communication link is disclosed. The method comprises: (1) generating a Domain Name Service (DNS) request; (2)...
US-9,385,999 Systems and methods for securely streaming media content
Systems and methods securely provide media content from a media server to a media client via a network. The media content is segmented to create multiple media...
US-9,385,998 Signaling and carriage of protection and usage information for dynamic adaptive streaming
A Dynamic Adaptive Streaming over Hypertext Transport Protocol (DASH) server component is disclosed. The DASH server component may comprise a memory, a...
US-9,385,997 Protection of control words employed by conditional access systems
In accordance with a method for communicating a control word (CW) from a client such as an encryptor to a server such as the entitlement control message...
US-9,385,996 Method of operating a computing device, computing device and computer program
Data is stored on a computing device in an encrypted form using a control application. A data access application requests access to the data. It is determined...
US-9,385,995 Anonymous authentication
A method and system for anonymous purchase by a first user device, is described, the method and system including sending R from the first user device to a...
US-9,385,994 Network security device
Methods and apparatus, including computer program products, implementing and using techniques for processing a data packet. An input port receives a data...
US-9,385,993 Media for detecting common suspicious activity occurring on a computer network using firewall data and reports...
Some embodiments described herein relate to a method including receiving a report of a first suspicious activity from a network filter device. The report of the...
US-9,385,992 Inline key-based peer-to-peer processing
Various exemplary embodiments relate to a method and related network element including one or more of the following: receiving, in a network element in the...
US-9,385,991 Distributed system and method for tracking and blocking malicious internet hosts
Disclosed are systems and methods to perform coordinated blocking of source addresses, such as an Internet Protocol (IP) addresses, across a plurality of...
US-9,385,990 Relay server and relay communication system
A relay server stores a first routing target address, and stores a second routing target address in association with a virtual address assigned to the second...
US-9,385,989 Method and apparatus for managing MAC address generation for virtualized environments
MAC addresses are flexibly and dynamically allocated across groups of devices that need MAC addresses. MAC address pools are defined for the groups by...
US-9,385,988 Internet infrastructure survey
A system for surveying Internet access quality includes a nameserver, registered to be authoritative for a domain name and configured to receive a DNS query to...
US-9,385,987 Controlling notification based on power expense and social factors
In one embodiment, a computer system determines a wireless transmit cost for each of one or more outgoing messages for a first user, and transmits to the first...
US-9,385,986 Timing for providing relevant notifications for a user based on user interaction with notifications
A social networking system provides relevant third-party content objects to users by matching user location, interests, and other social information with the...
US-9,385,985 Systems and methods for assisting users with contact, access, and distribution lists
Managing contact groups entails receiving email header information for electronic messages sent during a certain period of time. Each header includes unique...
US-9,385,984 Computer-implemented system and method for notifying users upon the occurrence of an event
A computer-implemented system and method for notifying users on the occurrence of an event is disclosed. An embodiment further includes notifying selected users...
US-9,385,983 Gallery of messages from individuals with a shared interest
A machine includes a processor and a memory connected to the processor. The memory stores instructions executed by the processor to receive a message and a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.