Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,392,030 Communication apparatus, communication apparatus control method, and storage medium for data communication...
There is provided a multifunction peripheral (MFP) configured to perform data communication using a session initiation protocol (SIP) server, which includes a...
US-9,392,029 Session initiation protocol message routing method between IP networks using different IP address format
Disclosed are the examples of an interworking system and related methods. The interworking system can be configured to implement a session initiation protocol...
US-9,392,028 Apparatus and method for macro operation involving a plurality of session protocol transactions
An apparatus and method for macro operation involving a plurality of session protocol transactions is disclosed. In accordance with an embodiment of the...
US-9,392,027 Message handling in an IP multimedia subsystem
A Session Initiation Protocol Application Server of an IP Multimedia Subsystem having processing means for handling a message received from a Serving Call/State...
US-9,392,026 Real time collaboration using embedded data visualizations
Scorecard data is received, processed, and visualizations provided by a performance metric application. Real time collaboration between users is facilitated...
US-9,392,025 Subscriber dependent redirection between a mobile packet core proxy and a cell site proxy in a network environment
A method is provided in one example embodiment and includes receiving, by a first proxy within an access network, a first request for content associated with a...
US-9,392,024 Policy-based selection of remediation
Methods and systems for remediating a security policy violation on a computer system are provided. According to one embodiment, information regarding a...
US-9,392,023 End-to-end secure cloud computing
A method includes receiving, at a control node of a cloud computing network, a first enterprise policy specific to the first enterprise and a second enterprise...
US-9,392,022 Methods and apparatus to measure compliance of a virtual computing environment
Methods, apparatus, systems and articles of manufacture are disclosed to measure compliance of a virtual computing environment. An example method disclosed...
US-9,392,021 Apparatuses, methods and systems for a secure resource access and placement platform
The APPARATUSES, METHODS AND SYSTEMS FOR A SECURE RESOURCE ACCESS AND PLACEMENT PLATFORM ("SRAP PLATFORM") provides a secure supporting infrastructure within a...
US-9,392,020 Network watermark
A network communications method utilizing a network watermark for providing security in the communications includes creating a verifiable network communications...
US-9,392,019 Managing cyber attacks through change of network address
A system for responding to a cyber-attack on a server. A notification is sent to a server administrator that a cyber-attack is occurring and the number of...
US-9,392,018 Limiting the efficacy of a denial of service attack by increasing client resource demands
A device may detect an attack. The device may receive, from a client device, a request for a resource. The device may determine, based on detecting the attack,...
US-9,392,017 Methods, systems, and media for inhibiting attacks on embedded devices
Methods, systems, and media for inhibiting attacks on embedded devices are provided, in some embodiments, a system for inhibiting on embedded devices is...
US-9,392,016 System and method for below-operating system regulation and control of self-modifying code
A system for securing an electronic device may include a memory, a processor; one or more operating systems residing in the memory for execution by the...
US-9,392,015 Advanced persistent threat detection
A variety of techniques are disclosed for detection of advanced persistent threats and similar malware. In one aspect, the detection of certain network traffic...
US-9,392,014 Automated detection of harmful content
This document discloses a solution for automatically detecting malicious content by computer security routine executed in a processing device. A user input to a...
US-9,392,013 Defending against a cyber attack via asset overlay mapping
Methods, apparatus and articles of manufacture for defending against a cyber attack via asset overlay mapping are provided herein. A method includes determining...
US-9,392,012 Application security testing system
Embodiments of the invention are directed to an apparatus, method, and computer program product for an exposure based application security testing system. In...
US-9,392,011 Web vulnerability repair apparatus, web server, web vulnerability repair method, and program
A Web vulnerability repair apparatus (50) detects the presence of a vulnerability of a Web application of a Web server (30) and the type of the vulnerability....
US-9,392,010 Streaming method and system for processing network metadata
A method and system for processing network metadata is described. Network metadata may be processed by dynamically instantiated executable software modules...
US-9,392,009 Operating a network monitoring entity
Network flow records from various administrative domains are provided to a network monitoring entity. The network monitoring entity analyzes the network flow...
US-9,392,008 Systems and methods for identifying information related to payment card breaches
Approaches for determining a potential merchant breach are described. A system can acquire card transaction data from one or more sources such as merchants or...
US-9,392,007 System and method for identifying infected networks and systems from unknown attacks
Systems and method of the present disclosure are directed to a network security monitor. The monitor can receive logs of a second computer network indicative of...
US-9,392,006 Method and apparatus for management and troubleshooting of a processing system
The present invention includes an apparatus connected to a processing system including a data collector to gather and store data regarding operation of the...
US-9,392,005 System and method for matching pattern
System and method for matching a pattern are provided. The pattern matching method includes performing a sub pattern matching operation to match at least one...
US-9,392,004 Method and system for dynamic protocol decoding and analysis
A method for dynamically decoding protocol data on a computer system is provided using a protocol decoder, which inspects and analyzes protocol data received by...
US-9,392,003 Internet security cyber threat reporting system and method
A risk assessment and managed security system for network users provides security services for dealing with formidable cyber threats, malware creations and...
US-9,392,002 System and method of providing virus protection at a gateway
A system, a method for providing virus protection, and a computer program stored on a storage medium in a communication system including at least a first...
US-9,392,001 Multilayered deception for intrusion detection and prevention
Concepts and technologies are disclosed herein for multilayered deception for intrusion detection. According to various embodiments of the concepts and...
US-9,392,000 Re-authentication timer for user equipment
A device receives, from a user equipment (UE), a first request to access a first packet data network (PDN), and receives authentication information from the UE....
US-9,391,999 Method and system for executing applications in a mobile device
A method and system for executing applications in a mobile device including receiving a request for execution of the application; determining whether the mobile...
US-9,391,998 Extended OAuth architecture supporting multiple types of consent based on multiple scopes and contextual...
Method, device, and storage medium to receive a request to authorize a release of protected resource data, wherein the request includes a device identifier that...
US-9,391,997 Message processing apparatus, wireless device and method of storing a message in a wireless device
Embodiments of the invention relate generally to a message processing apparatus, to a wireless device and to a method of storing a message in a wireless device....
US-9,391,996 Auditable retrieval of privileged credentials
In an approach for providing auditable retrieval of privileged credentials in a privilege identity management (PIM) system, a processor invokes a checkout of a...
US-9,391,995 Remote processing of mobile applications
In an example implementation of the disclosed technology, a method includes accessing, by a management agent associated with a client device, a profile...
US-9,391,994 Contextual device locking/unlocking
Particular embodiments of a computing device associated with a user may detect an event using a sensor of the computing device. The event may be a...
US-9,391,993 Sharing content by indicating activity from users in a social network
The subject technology discloses configurations for receiving an indication of user activity from a first user with respect to a post, wherein the post includes...
US-9,391,992 System and method for secure control of resources of wireless mobile communication devices
Systems and methods for secure control of a wireless mobile communication device are disclosed. Each of a plurality of domains includes at least one wireless...
US-9,391,991 Messaging gateway for directory and anonymous services
A subscriber who seeks to block access to contact information may receive identifying information for people attempting to access the subscriber's contact...
US-9,391,990 User authentication based on self-selected preferences
Embodiments of the invention are directed to a system, method, and a computer program product for a user authentication based on self-selected preferences. The...
US-9,391,989 Automatic identification of returned merchandise in a data center
A method and system for determining a device identifier assigned to a device within an installation of devices connected via a network is provided. A system...
US-9,391,988 Community biometric authentication on a smartphone
Methods and systems are presented for performing biometric authentication of a plurality of users on a user device (e.g., smartphone). In some embodiments, a...
US-9,391,987 Biometric personal authentication
A module for authenticating a person is characterized in that it comprises: a processing circuit (102) comprising an authentication memory (104), a sensor...
US-9,391,986 Method and apparatus for providing multi-sensor multi-factor identity verification
An approach for multi-sensor multi-factor identity verification. An identity verification platform determines biometric data associated with a user from one or...
US-9,391,985 Environment-based two-factor authentication without geo-location
The invention provides a method and system for accomplishing two-factor authentication for internet transactions, wherein the user of the device through which...
US-9,391,984 Mobile virtual communication and entertainment service
Aspects of the subject disclosure may include, for example, a method including providing, by a processor in a dongle coupled to a display device, a graphical...
US-9,391,983 Method and system for access control
In a method for control accessing to a communication account, a second terminal obtains the identification information of a first terminal, and sends the...
US-9,391,982 Network authentication of multiple profile accesses from a single remote device
A network authentication system and method is described for authenticating multiple profile accesses from a single remote device. A device remote from a web...
US-9,391,981 Registration and credential roll-out for accessing a subscription-based service
A user may access a subscription-based service via a system comprising one or more devices with one or more separate domains where each domain may be owned or...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.