Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,426,183 Authentication policy orchestration for a user device
A system and method for authentication policy orchestration may include a user device, a client device, and a server. The server may include a network interface...
US-9,426,182 Context-based authentication of mobile devices
A system and method are disclosed for adaptive authentication. An access control system stores policies for an enterprise, where each policy specifies a type of...
US-9,426,181 Managing communications between computing nodes
Techniques are described for managing communications between multiple intercommunicating computing nodes, such as multiple virtual machine nodes hosted on one...
US-9,426,180 Security policy editor
A shared computing infrastructure has associated therewith a portal application through which users access the infrastructure and provision one or more...
US-9,426,179 Protecting sensitive information from a secure data store
In embodiments of the present invention improved capabilities are described for the steps of receiving an indication that a computer facility has access to a...
US-9,426,178 Method and apparatus for centralized policy programming and distributive policy enforcement
A method and apparatus for centralized policy programming and distributive policy enforcement is described. A method comprises centrally maintaining a plurality...
US-9,426,177 Method and apparatus for detecting security vulnerability for animation source file
A method for detecting a security vulnerability for an animation source file is provided. The method may include: decompiling the animation source file and...
US-9,426,176 Method, system, and logic for in-band exchange of meta-information
In an embodiment, a method is provided for enabling in-band data exchange between networks. The method can comprise receiving, by a first enveloping proxy...
US-9,426,175 Rendered image collection of potentially malicious web pages
Techniques are described which may provide a rendered image of a website from a potentially malicious party. In an implementation, a rendered image is collected...
US-9,426,174 Protecting computing assets from segmented HTTP attacks
A method and system for managing data traffic and protecting computing assets. The method and system includes analyzing HTTP requests to determine if the HTTP...
US-9,426,173 System and method for elimination of spam in a data stream according to information density
A method for elimination of spam in a data stream according to information density, includes receiving, by a computing device, a stream of messages. The method...
US-9,426,172 Security threat detection using domain name accesses
Domain names are determined for each computational event in a set, each event detailing requests or posts of webpages. A number of events or accesses associated...
US-9,426,171 Detecting network attacks based on network records
Techniques for analyzing access to a network-based resource may be provided. For example, a client record associated with the access to the network-based...
US-9,426,170 Identifying target customers to stem the flow of negative campaign
A system and method for stemming flow of information from a negative campaign are described. A status for each node of a set of preselected nodes in a social...
US-9,426,169 System and method for cyber attacks analysis and decision support
A method for cyber attack risk assessment, the method including operating at least one hardware processor for: collecting global cyber attack data from a...
US-9,426,168 Fast-flux detection utilizing domain name system information
A processing device comprises a processor coupled to a memory and is configured to determine a first set of features from domain name system (DNS) information,...
US-9,426,167 Management of decommissioned server assets in a shared data environment
Embodiments of the present invention provide systems and methods for monitoring decommissioned servers in a shared data environment. Embodiments of the present...
US-9,426,166 Method and apparatus for processing finite automata
A method and corresponding apparatus for run time processing use a Deterministic Finite Automata (DFA) and Non-Deterministic Finite Automata (NFA) to find the...
US-9,426,165 Method and apparatus for compilation of finite automata
A method and corresponding apparatus are provided implementing run time processing using Deterministic Finite Automata (DFA) and Non-Deterministic Finite...
US-9,426,164 Network device and network system
A network device connected via a bus with a plurality of network devices includes: an authentication unit that executes authentication based upon message...
US-9,426,163 Collaboration space with event-trigger configuration views
Protecting sensitivity of information in a shared collaborative space on a computer network includes associating a set of sensitivity levels to sets of users...
US-9,426,162 Location-based configuration policy toggling
Location-based configuration profile toggling may be provided. Configuration profiles associated with user devices may be identified, determinations of whether...
US-9,426,161 Device-based authentication for secure online access
Methods, systems, and computer-readable media for providing device-based authentication for secure online access are provided. An authentication request is...
US-9,426,160 Delivering author specific content
Delivering author specific content includes identifying author specific content with tags inserted into its metadata across multiple online resources and...
US-9,426,159 Securing sensor data
Systems and methods include establishing a secure communication between an application module and a sensor module. The application module is executing on an...
US-9,426,158 Client device connectivity with integrated business rules and multiple network types
Applications executing on mobile client devices may access remote resources via network connections. Operational capabilities and financial costs of these...
US-9,426,157 Platform for providing a social context to software applications
The present invention provides a system and method for providing a social context to software applications. According to one embodiment of the invention, a user...
US-9,426,156 System and method for facilitating federated user provisioning through a cloud-based system
The disclosure relates to systems and methods for provisioning a new user to a cloud-based system through a pre-registration process where the cloud-based...
US-9,426,155 Extending infrastructure security to services in a cloud computing environment
A cloud deployment appliance (or other platform-as-a-service (IPAS) infrastructure software) includes a mechanism to deploy a product as a "shared service" to...
US-9,426,154 Providing devices as a service
Devices, such as hardware security modules, are provided as a service. A customer of a computing resource provider is able to request the addition of a device...
US-9,426,153 Setup of multiple IOT devices
The present disclosure relates to the setup of multiple devices on a local area network. Specifically, various techniques and systems are provided for utilizing...
US-9,426,152 Secure transfer of web application client persistent state information into a new domain
A technique to reassign one or more stored elements of web application client state information is provided in an HTTP-based client upon receipt of an HTTP...
US-9,426,151 Determining identity of individuals using authenticators
Systems are provided that allow users to access resources in a manner that addresses inherent deficiencies in existing authentication systems. During a typical...
US-9,426,150 Biometric authentication
A biometric authentication system is disclosed that provides a trusted third party biometric authentication capability for independent confirmation of identity...
US-9,426,149 Mobile secure login system and method
A mobile secure login method comprises steps of 1) displaying a machine readable graphic form encoded with a sign in URL and a unique token on a browser,...
US-9,426,148 Increased communication security
A method of increasing communication security may include receiving, at a first computer system, a first message including a first data portion and a second...
US-9,426,147 Protected device management
A method, apparatus, system, and computer program product for management of storage devices protected by encryption, user authentication, and password...
US-9,426,146 Digital certificate issuer-correlated digital signature verification
A message including a digital signature of a message originator is received at a processor. In response to determining that the message originator is authorized...
US-9,426,145 Designation of classes for certificates and keys
Plural modes of operation may be established on a mobile device. Specific modes of operation of the mobile device may be associated with specific spaces in...
US-9,426,144 Single sign-on service security protections
One embodiment provides a method, including: receiving, from an end user device, authentication data of a user of a web service; storing, in a single sign-on...
US-9,426,143 Providing social network content based on the login state of a user
An electronic device includes a display, one or more processors, and memory storing one or more programs. The one or more programs include a first program...
US-9,426,142 Systems and methods for logging into an application on a second domain from a first domain in a multi-tenant...
A system and method for logging into an application across separate domains in a multi-tenant database environment is provided. The method may include...
US-9,426,141 Verifiable tokenization
Use rules are included within tokenized data either before or after tokenization. The use rules can be appended to the data before or after tokenization, can be...
US-9,426,140 Federated authentication of client computers in networked data communications services callable by applications
A data processing method providing improved and efficient authentication of client computers by server computers, the method comprising: using authentication...
US-9,426,139 Triggering a request for an authentication
The present disclosure relates to multifactor-based authentication systems. Multifactor authentication occurs during a communication session in response to...
US-9,426,138 Identity-independent authentication tokens
Identity-independent authentication tokens enable issuance of a single strong credential that can be mapped to an individual at each of multiple accounts within...
US-9,426,137 Mobile device user authentication based on user behavior information
Authentication involves collecting information relating to a user's behavior relative to a mobile device carried by the user, over a number of time periods that...
US-9,426,136 Increased communication security
Authentication data may be generated and included in a Constrained Application Protocol (CoAP) message communicated from a first computer system for delivery to...
US-9,426,135 Increased communication security
Authentication data may be generated and included in a Constrained Application Protocol (CoAP) message communicated from a first computer system for delivery to...
US-9,426,134 Method and systems for the authentication of a user
A computer security system used to identify and authenticate a user. In one aspect, a method for identifying and authenticating a user is provided. The method...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.