Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,413,780 Security assessment incentive method for promoting discovery of computer software vulnerabilities
In one aspect, the disclosure provides: A method comprising: inviting a distributed plurality of researchers to participate in one or more computer...
US-9,413,779 Learning model selection in a distributed network
In one embodiment, local model parameters are generated by training a machine learning model at a device in a computer network using a local data set. One or...
US-9,413,778 Security policy creation in a computing environment
This disclosure describes, in part, systems and techniques for creating policies to enable software to access resources protected by one or more rule sets after...
US-9,413,777 Detection of network security breaches based on analysis of network record logs
Computer program products and methods of inspecting a log of security records in a computer network are provided. The method includes retrieving a log record,...
US-9,413,776 System for finding code in a data flow
A code finder system deployed as a software module, a web service or as part of a larger security system, identifies and processes well-formed code sequences....
US-9,413,775 Macro grid governance and communication
A governance apparatus and a communication method for communicating within the governance apparatus. The governance apparatus includes a Government. The...
US-9,413,774 Dynamic malware analysis of a URL using a browser executed in an instrumented virtual machine environment
Various techniques for performing malware analysis of a URL (e.g., a URL sample) using a browser executed in an instrumented virtual machine environment are...
US-9,413,773 Method and apparatus for classifying and combining computer attack information
A method and apparatus for classifying and combining computer attack information identifying as malicious events, events in a network that cause...
US-9,413,772 Managing rogue devices through a network backhaul
Managing rogue devices in a network through a network backhaul. A rogue device is detected in a network and a rogue device message that includes the rogue...
US-9,413,771 Protecting documents using policies and encryption
A system protects documents at rest and in motion using declarative policies and encryption. A document at rest includes documents on a device such as the hard...
US-9,413,770 Cloud based application account management
An aspect provides a method, including: receiving at a remote device a client log in to a cloud based account issued from a client device; determining the...
US-9,413,769 Key management system for toll-free data service
A system may receive a network address to be validated to determine whether the network address is associated with a toll-free data service. The system may...
US-9,413,768 Method for managing access to protected computer resources
A system for securing and tracking usage of transaction services or computer resources by a client computer from a first server computer, which includes...
US-9,413,766 Method for establishing connection between devices
A device and method for establishing a connection between devices is disclosed. A first device receives a request to connect to a second network device and,...
US-9,413,765 Multinode hubs for trusted computing
Embodiments of multinode hubs for trust operations are disclosed herein. In some embodiments, a multinode hub may include a plurality of memory regions, a...
US-9,413,764 Fuzzing server responses to malicious client devices
A security device may receive a request, from a client device and intended for a server device, to provide a resource. The resource may be associated with...
US-9,413,763 Coordination between self-organizing networks
A mechanism to handle conflict situations relating to a situation in which an intended SON operation at or near the domain's boundary (border area) may impact...
US-9,413,762 Asynchronous user permission model for applications
Use of an application to engage services on behalf of a third party is contemplated. The services may be engaged one behalf of the third party with delivery of...
US-9,413,761 System and method for visual content sharing in an online environment
There is provided herein a system and method for content sharing over the Internet, wherein the user creates visual representations of specific content share...
US-9,413,760 System and method for data quality analysis between untrusted parties
A system and method for data quality analysis between untrusted parties is provided. A dataset having attributes each associated with one or more elements is...
US-9,413,759 Apparatus and method for secure delivery of data from a communication device
A system that incorporates the subject disclosure may perform, for example, providing an upload request to a mobile communication device to cause a secure...
US-9,413,758 Communication session transfer between devices
Methods and apparatuses, including computer program products, are described for communication session transfer between a plurality of computing devices. A first...
US-9,413,757 Secure identity authentication in an electronic transaction
An approach is provided for securely authenticating an identity of a user participating in an electronic transaction. A request is received from a mobile device...
US-9,413,756 Systems and methods using short-lived proxy token values obfuscating a stable long-lived token value
Systems and methods in which an intermediary server provides a proxy token value in lieu of a stable token value to a third-party. The intermediary server...
US-9,413,755 Method for managing identifiers in an integrated circuit board and corresponding integrated circuit board
A method of managing file identifiers in a portable data medium having an integrated circuit by means of a table of identifiers associating a given reference...
US-9,413,754 Authenticator device facilitating file security
Disclosed are various embodiments for facilitating the encryption of files as well as facilitating requiring a user to employ an authenticator device in order...
US-9,413,753 Method for generating a soft token, computer program product and service computer system
A method is provided for generating a soft token by which attributes of a user may be authenticated. A request to generate the soft token is transmitted from an...
US-9,413,752 One-time password operating method
Disclosed is a dynamic token operating method. In the method, a key on the dynamic token is pressed down. If a power key is pressed down and a power flag is not...
US-9,413,751 Cooperation system, cooperation method thereof, information processing system, and storage medium
A client sends a request to start to use a service via an information processing system that is a cooperation source, acquires identification information...
US-9,413,750 Facilitating single sign-on (SSO) across multiple browser instance
Facilitating single sign-on (SSO) across multiple browser instances such that user authentication at one browser instance is used as a basis to permit access to...
US-9,413,749 System and method of authentication of a first party respective of a second party aided by a third party
A method and system of authenticating a service to access data respective of a user on a low-end mobile device are provided. The method includes receiving a...
US-9,413,748 Content service on demand
A method is provided and may include receiving a request for a network content delivery service from an access device; directing the access device to a network...
US-9,413,747 Shutting down access to all user accounts
Disclosed is a system and associated method or restricting access to a user's account via one or more account access channels. The system typically includes a...
US-9,413,746 Extension point application and configuration of a login module
Embodiments of the present invention address deficiencies of the art in respect to applying application security to an extension point oriented application...
US-9,413,745 System and method for accessing a membership-based service
System and methods for a membership-based service or network to enable access to membership-related services are provided. A portal application for members,...
US-9,413,744 Method and system for authenticating service
Embodiments of the present application relate to a method, a system, and a computer program product for authenticating a service. A method for authenticating a...
US-9,413,743 Trust based digital rights management systems
A system and method for allowing access to digitally protected content are disclosed. License metadata and credentials from multiple types of digital rights...
US-9,413,742 Systems, methods and apparatus to apply permissions to applications
Methods and apparatus are disclosed to apply permissions to applications. A disclosed example apparatus includes an address trust manager to obtain a first...
US-9,413,741 System, apparatus, and method for sharing electronic device
A system, apparatus, and method for sharing content in an electronic device behaving as a cloud electronic device are provided. An electronic device behaving as...
US-9,413,740 Establishing secure computing devices for virtualization and administration
Embodiments are directed to establishing a secure connection between computing systems and to providing computer system virtualization on a secure computing...
US-9,413,739 System and method for identification and consolidation of related concurrent document sessions
A cloud computing system identifies opportunities for users to collaborate on a file. Collaboration opportunities are identified based on similarity of separate...
US-9,413,738 Securing communications with enhanced media platforms
Various methods and systems for securing communications with enhanced media platforms, are provided. In particular, an enhanced media platform is authenticated...
US-9,413,737 Method and system for using social networks to verify entity affiliations and identities
Login credentials for at least one website, such as a social networking website, are received from a user purporting to act on behalf of an entity, for example,...
US-9,413,736 Providing an enterprise application store
Methods, systems, and computer-readable media for providing an application store are presented. In some embodiments, a request for a software application may be...
US-9,413,735 Managing distribution and retrieval of security key fragments among proxy storage devices
A method performed by a processor of a computer, includes obtaining a security key associated with data, dividing the security key into key fragments, and...
US-9,413,734 Methods and apparatus for sharing encrypted data
The present invention is directed to methods and systems in which data are stored as encrypted records on a computer usable medium, and search requests are...
US-9,413,733 Concurrent device control
Methods, systems, and devices for controlling a plurality of electronic devices are disclosed. An accessory device may monitor one or more frequency bands to...
US-9,413,732 Vehicle network system
In a vehicle network system, a plurality of ECUs are network-connected. The plurality of ECUs include a first ECU that has set therein a secret key from among...
US-9,413,730 Encryption in the cloud using enterprise managed keys
An encryption key management system and method implements enterprise managed encryption key for an enterprise using encryption for cloud-based services. In some...
US-9,413,729 Symmetric encryption apparatus and storage medium, and symmetric decryption apparatus and storage medium
In a symmetric encryption apparatus according to an embodiment, a storage unit stores a symmetric key formed from a plurality of elements of a first polynomial...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.