Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,401,934 Establishing sessions with defined quality of service
The present invention allows different types of communication applications to cooperate with an associated communication client to facilitate communications...
US-9,401,933 Classification of security policies across multiple security products
A management entity connects with multiple security devices across a network. Each security device operates in accordance with one or more security policies....
US-9,401,932 Device and method for detection of anomalous behavior in a computer network
A device and method for providing forensic data in network activity indicative of the presence of malware. A distributed set of network-based sensors operates...
US-9,401,931 Method and system for dynamically associating access rights with a resource
A method for dynamically associating, by a server, access rights with a resource includes the step of receiving, by the server, a request for a resource from a...
US-9,401,930 System and method for using partial evaluation for efficient remote attribute retrieval
An attribute-based policy defining subjects' access to resources is enforced by a computer system. A processing means (PDP) in the system communicates with a...
US-9,401,929 Method, system and computer program product for tagging content on uncontrolled Web application
Communications by a device in a private network to a site operating outside of the network can be programmatically inspected. Unstructured data, including...
US-9,401,928 Data stream security processing method and apparatus
Embodiments of the present invention provide a data stream security processing method and apparatus. In the embodiments of the present invention, security...
US-9,401,927 Compromised insider honey pots using reverse honey tokens
According to one embodiment, a method for setting a trap to detect that an intruder has compromised a client end station (CES) in an attempt to gain...
US-9,401,926 System and method for implementation of cyber security
The present invention provides a system and method designed to continually monitor and evaluate an IT system. More specifically, the present invention teaches a...
US-9,401,925 Systems and methods for detecting security threats based on user profiles
A computer-implemented method for detecting security threats based on user profiles may include 1) identifying behavior on a computing system that is...
US-9,401,924 Monitoring operational activities in networks and detecting potential network intrusions and misuses
Concepts and technologies disclosed herein are for monitoring operational activities in networks and detecting potential network intrusions and misuses....
US-9,401,923 Electronic system for detecting and preventing compromise of vehicle electrical and control systems
A method for detecting threats or attacks on an automobile network, the automobile network connected to a plurality of electronic components and an attack...
US-9,401,922 Systems and methods for analysis of abnormal conditions in computing machines
Systems and methods are provided for detecting an anomalous condition in a virtual computing environment having a virtualization control system coupled to a...
US-9,401,921 Insuring integrity of remote procedure calls used in a client and server storage system
A system and method generates a message integrity check. The message integrity check value is computed by hashing one or more block checksums from procedure...
US-9,401,920 Black core network system and method
In a network having an encryptor device having an encryption module, a plaintext interface and a ciphertext interface, wherein the encryption module encrypts...
US-9,401,919 Web form protection
A request for a web page is received and the requested web page is retrieved. The web page is modified to obfuscate a set of form attribute values into a...
US-9,401,918 User to user delegation service in a federated identity management environment
Method for providing user-to-user delegation service in federated identity environment, characterized in that it comprises a delegation or assignment step...
US-9,401,917 Pre-caching resources based on a cache manifest
A method executed on a first electronic device for accessing an application server on a second electronic device includes receiving a cache manifest for an...
US-9,401,916 Method for providing a user with an authenticated remote access to a remote secure device
The invention relates to a method for providing a user with an authenticated remote access to a remote secure device (2), said remote access being initiated...
US-9,401,915 Secondary device as key for authorizing access to resources
A secondary device may be used to provide access to resources to a primary device. Upon receiving an authorization indication at a device, a registration key...
US-9,401,914 Utilization of multiple keypads for password inputs
A method includes generating a first virtual keypad for entry of a first portion of a password, wherein the first portion includes a first value and a second...
US-9,401,913 Updating stored passwords
A device may include an authentication server and a server. The authentication server may receive a first form of a password from a client device in accordance...
US-9,401,912 Late binding authentication
A late-binding token (LBT) is securely generated and provided to a device application. When the LBT is presented and validated, a resource associated with the...
US-9,401,911 One-time password certificate renewal
Embodiments are directed to providing a certificate extension to an authentication certificate, to validating an authentication certificate request and to...
US-9,401,910 Establishing and maintaining an improved single sign-on (SSO) facility
A backend server system includes at least one hardware processor configured to initiate and/or perform the following. A login page is sent to a browser...
US-9,401,909 System for and method of providing single sign-on (SSO) capability in an application publishing environment
A client-server computing system includes a computer cluster for hosting certain resources, applications, programs, processes, files, and/or data that are...
US-9,401,908 Authentication interworking in communications networks
A system performs authentication for real-time communications (RTC). The system receives a request from a browser application for web authentication of a user....
US-9,401,907 Information processing apparatus and method, recording medium and program
An electronic device that shares a secret key with another electronic device; receives a first response request transmitted from the another electronic device;...
US-9,401,906 Method and apparatus for providing authorized remote access to application sessions
A method and apparatus for providing authorized remote access to one or more application sessions includes a client node, a collection agent, a policy engine,...
US-9,401,905 Transferring soft token authentication capabilities to a new device
A technique transfers soft token authentication capabilities from an old device to a new device. The technique involves receiving a transfer initiation message...
US-9,401,904 Security migration in a business intelligence environment
In various implementations, local identifiers associated with users may be utilized to enable access one or more functions in a Business Intelligence (BI)...
US-9,401,903 Facilitating access to data from virtual private networks
Arrangements and methods for facilitating access to VPN-derived data regardless of computing platform power state.
US-9,401,902 Method for exchanging strong encryption keys between devices using alternate input methods in wireless personal...
A method for exchanging strong encryption keys between devices using alternate input methods. At least two devices that want to communicate with one another are...
US-9,401,901 Self-configuring wireless network
Methods, systems, and apparatus, are provided for wireless networking. In some implementations, a self-configuring wireless system includes at least one...
US-9,401,900 Secure electronic mail system with thread/conversation opt out
An e-mail system is disclosed that overcomes many deficiencies of, but is backward compatible with, existing e-mail systems. An exemplary method for...
US-9,401,899 System and method for signaling segment encryption and key derivation for adaptive streaming
An apparatus for decoding a media stream, wherein the apparatus comprises a memory module, a processor module coupled to the memory module, wherein the memory...
US-9,401,898 System and method for wireless data protection
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for wireless data protection utilizing cryptographic key management on...
US-9,401,897 System and method for monitoring secure data on a network
A system and method for monitoring secure digital data on a network are provided. An exemplary network monitoring system may include a network device in...
US-9,401,896 Systems and methods for authenticating and protecting the integrity of data streams and other data
Systems and methods are disclosed for enabling a recipient of a cryptographically-signed electronic communication to verify the authenticity of the...
US-9,401,895 Device configuration for secure communication
A method including generating a mapping in response to an enrollment message received from a customer device. The enrollment message includes a device...
US-9,401,894 Proximity signature for secure communication with implantable medical device
Systems, devices and methods employing coded magnetic fields or transfer of encryption key information via proximity telemetry are described. The systems,...
US-9,401,893 System and method for providing data security in a hosted service system
Aspects of the present disclosure are directed to methods and systems for protecting sensitive data in a hosted service system. The system includes a host...
US-9,401,892 Method for addressing messages in a computer network
In a method for addressing messages in a computer network in which two different types of address are used, wherein at least one first network element (4, 5, 6,...
US-9,401,891 Network address translation traversals for peer-to-peer networks
In a networking environment, multiple end-users applications running on computing devices may operate behind a respective NAT device. Information transferred...
US-9,401,890 Method and a network element for content based addressing in a data transfer network
In a content addressable network, a hash result of a data item, which is a part of or relating to an entity to be accessed via the network, constitutes (401,...
US-9,401,889 Port-based dynamic network parameter assignment
Systems, apparatus and methods described herein are configured to dynamically assign network parameters based on a location (e.g., port) of a network parameter...
US-9,401,888 Internet protocol mapping resolution in fixed mobile convergence networks
Techniques for facilitating operation of a communication device having a first internet protocol (IP) address in a first network and a second IP address in a...
US-9,401,887 Identifying content in an incoming message on a social network
Identifying content in an incoming message on a social network includes categorizing a sender-recipient relationship between a sender and a recipient of an...
US-9,401,886 Preventing personal information from being posted to an internet
A method of preventing personal information from being posted to an internet, comprising determining whether text within a post includes a pre-identified text...
US-9,401,885 Data push service method and system using data pull model
A data push service method and system are provided. The service data push method includes: providing a device with data push information regarding service data...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.