Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,398,034 Matrix factorization for automated malware detection
Disclosed herein is a system and method for automatically identifying potential malware files or benign files in files that are not known to be malware. Vector...
US-9,398,033 Regular expression processing automaton
A method and corresponding apparatus are provided implementing a stage one of run time processing using Deterministic Finite Automata (DFA) and implementing a...
US-9,398,032 Apparatus and methods for detecting malicious scripts in web pages
One embodiment relates to a computer-implemented method for detecting malicious scripts in web pages. A local engine and an application are executed at a client...
US-9,398,031 Malicious advertisement detection and remediation
Detecting a malicious advertisement is disclosed. An advertisement is analyzed. A determination that the advertisement is associated with malicious activity is...
US-9,398,030 Ascertaining domain contexts
Various embodiments pertain to ascertaining domain contexts. In one embodiment, an application receives content that may contain a script (i.e. code). In this...
US-9,398,029 Cybersecurity training system with automated application of branded content
A cybersecurity training system uses lures and training actions to help train a user of an electronic device to recognize and act appropriately in situations...
US-9,398,028 System, device and method for detecting a malicious attack based on communcations between remotely hosted...
In an embodiment, a dynamic analysis engine is configured to receive an identifier associated with a source for network traffic including at least one object...
US-9,398,027 Data detecting method and apparatus for firewall
A data detecting method and apparatus for a firewall device connected with a network to identify security threat in the data, where the method is implemented by...
US-9,398,026 Method for authenticated communications incorporating intermediary appliances
Method for managing appliance authentication. In one embodiment, the method comprises generating, by a server, a first secret and a second secret from a...
US-9,398,025 Method for generating and check-controlling network identity indentification code in network electronic...
A method for generating and check-controlling a network identity identification code in a network electronic identity is provided for the establishment of a...
US-9,398,024 System and method for reliably authenticating an appliance
A system and an apparatus (41) for reliably authenticating an appliance (42) involves a challenge message (C) being linked to the examination apparatus (40) by...
US-9,398,023 Server verification of secure electronic messages
Systems and methods for processing encoded messages within a wireless communications system are disclosed. A server within the wireless communications system...
US-9,398,022 Systems and methods for universal enhanced log-in, identity document verification, and dedicated survey...
Systems and methods are provided for controlling access via a computer network to a subscriber server. A log-in server receives a query to connect through the...
US-9,398,021 Method for providing file aging service
A method provides an file aging service. In view of the above, it may be possible to inhibit copyrighted literary works from being redistributed and reshared,...
US-9,398,020 Graduated authentication in an identity management system
A method and system for graduated security in an identity management system utilize differing levels of time sensitivity, channel security and authentication...
US-9,398,019 Verifying caller authorization using secret data embedded in code
In a computer system operable at more than one privilege level, confidential code is securely customized to use secret data to establish a code protection...
US-9,398,018 Virtual currency system
Methods for use with computing devices implementing a plurality of nodes of a ring-shaped overlay network. A joining node implemented by a joining computing...
US-9,398,017 Isolation of objects representng server resources in browser using iframes
Method for web-based management of resources. On a cloud computing system, for groups of user resources, defining commonly managed subgroups. Accessing...
US-9,398,016 Cache-free and lock-free handling of security information for multiple distributed objects in protection...
A native protection storage operating system (PSOS) process receives a request specifying an operation having security related implications for elements in the...
US-9,398,015 Method for modifying rights to security domain for smartcard, and server, smartcard, and terminal for same
The present invention relates to modifying rights to a security domain for a smartcard, and more specifically, to a server for managing modification of rights...
US-9,398,014 Validation of a location resource based on recipient access
Aspects of the present disclosure relate to a method, a system, and a computer program product for validating a location resource, e.g., a hyperlink, embedded...
US-9,398,013 System, method and computer program product for an authentication management infrastructure
A system and method for allowing a user to access enterprise resources comprising authentication devices and an authentication server. The authentication...
US-9,398,012 Secure authentication in a multi-party system
A user device transmits a login request. A provider server, receives a random number from and transmits other information to an authentication server. The...
US-9,398,011 Location determination for user authentication
User authentication techniques based on geographical locations associated with a client device is provided. A network connection can be established between two...
US-9,398,010 Provisioning layer two network access for mobile devices
In general, techniques are described for provisioning layer two access in computer networks. A network device located in a public network comprising an...
US-9,398,009 Device driven user authentication
The disclosed embodiments provide a system that authenticates a user. The system includes an authentication server that obtains an authentication request...
US-9,398,008 Cloud-based system for reading of decodable indicia
A data decoding system can comprise one or more computers communicatively coupled to a network. The computers can execute at least one decoding process. The...
US-9,398,007 Deferred authentication methods and systems
A wearable computing device, such as a wearable credit card type device or a wearable identification type device, that provides for deferred re-authentication...
US-9,398,006 Smart space access method, system, controller, and smart space interface server
The present disclosure provides a smart space access method, a system, a controller, and a smart space interface server. The smart space access method includes:...
US-9,398,005 Managing seed provisioning
A method is used in managing seed provisioning. An authentication device having a device value is provisioned with a seed value. The seed value and device value...
US-9,398,004 Method for reading attributes from an ID token
The invention relates to a method for reading at least one attribute stored in an ID token, wherein the ID token is assigned to a user, comprising the following...
US-9,398,003 Token device re-synchronization through a network solution
A system and method are illustrated as including receiving a request for a current time and transmitting the current time to a password device. The current time...
US-9,398,002 Secure communication during provisioning of a mobile device to stream media content from a media client
A device may be configured to communicate with a mobile device using a short range communication protocol. The device may open a port based on communicating...
US-9,398,001 System for and method of providing single sign-on (SSO) capability in an application publishing environment
A client-server computing system includes a computer cluster for hosting certain resources, applications, programs, processes, files, and/or data that are...
US-9,398,000 Providing authentication using previously-validated authentication credentials
Embodiments of the invention are directed to systems, methods and computer program products for providing authentication using previously-validated...
US-9,397,999 Methods, devices, and computer readable storage devices for sharing sensitive content securely
Sensitive content is securely shared. A request is received from a first communication device to share sensitive content. The first communication device is...
US-9,397,998 Computerized method and system for managing secure content sharing in a networked secure collaborative exchange...
In embodiments of the present invention, improved capabilities are described for securely sharing computer data content between business entities as managed...
US-9,397,997 Systems and methods for secure operation of an industrial controller
A method of securing an industrial control system includes operating the industrial control system in an open mode, wherein communications between a plurality...
US-9,397,996 Establishing historical usage-based hardware trust
Establishing trust according to historical usage of selected hardware involves providing a usage history for a selected client device; and extending trust to a...
US-9,397,995 Information processing apparatus and user authentication method
An information processing apparatus includes a memory and a processor that is connected to the memory. The processor executes a process including: determining,...
US-9,397,994 Packet forwarding device, packet forwarding system, and packet forwarding method
A packet forwarding device includes: an evaluation unit configured to judge whether or not authentication information is stored in a header, the authentication...
US-9,397,993 System and method for accessing modular applications
A method and system for providing modular application for use within a cloud-based file includes storing on a cloud computing service a link to a modular...
US-9,397,992 Authentication using color-shape pairings
A technique provides access control. The technique involves prompting a user to enter color-shape pairings, and receiving multiple color-shape pairings from the...
US-9,397,991 Digital content distribution and subscription system
Digital content distribution systems and methods are provided for distributing for digital data files, such as digital audio and video data files. In accordance...
US-9,397,990 Methods and systems of generating and using authentication credentials for decentralized authorization in the cloud
A method of controlling the sharing of data between entities that are in electronic communication with each other may include generating an authentication...
US-9,397,989 Bootstrapping user authentication on devices
Disclosed are various embodiments that facilitate bootstrapping authentication of a user at a first device using a second device. The second device is...
US-9,397,988 Secure portable store for security skins and authentication information
A security component may be associated with a network-enabled application. The security component may access a secure store, which may include customization...
US-9,397,987 Managing interaction with hosted services
Systems and methods are disclosed which facilitate managing interaction with instances corresponding to hosted services. Customers may implement services on a...
US-9,397,986 Authenticating acceptance of a string using an automaton
Provided is a server connectable to a client for input of a string and that has an automaton defining a subsequent state for transition for each state and each...
US-9,397,985 System and method for providing a cryptographic platform for exchanging information
A system and method configured for providing a cryptographic platform for exchanging information. One or more information transactions including encrypted...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.