Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,438,631 Off-device anti-malware protection for mobile devices
Techniques for off-device anti-malware protection for mobile devices are disclosed. In some embodiments, off-device anti-malware protection for mobile devices...
US-9,438,630 Network access control using subnet addressing
A server responds to a DHCP request for an IP address by setting a subnet in accordance with whether the client's MAC address is recognized as previously having...
US-9,438,629 Sensitive information leakage prevention system, sensitive information leakage prevention method, and...
A client device (100) determines whether or not access is allowed, based on security levels that are set for an application program and data held in a server...
US-9,438,628 Apparatus and method for securing a distributed control system (DCS)
A method includes receiving, at a first distributed control system (DCS) node over a network, information associated with a security manager. The method also...
US-9,438,627 Shared security utility appliance for secure application and data processing
A security information technology element (ITE) is disclosed for secure application and data processing, the security ITE including a physical enclosure...
US-9,438,626 Risk scoring for internet protocol networks
Methods, apparatus and articles of manufacture for risk scoring for internet protocol networks are provided herein. A method includes identifying a network to...
US-9,438,625 Mitigating scripted attacks using dynamic polymorphism
In an embodiment, a data processing system comprises one or more processors; script analysis logic coupled to the one or more processors and configured to...
US-9,438,624 Detection of side channel attacks between virtual machines
Technologies are directed to a detector to identify a side channel attack between virtual machines. According to some examples, an inter-processor interrupt...
US-9,438,623 Computer exploit detection using heap spray pattern matching
According to one embodiment, a threat detection system is integrated with at least a dynamic analysis engine. The dynamic analysis engine is configured to...
US-9,438,622 Systems and methods for analyzing malicious PDF network content
Systems and methods for analyzing malicious PDF network content are provided herein. According to some embodiments, a PDF parser examines a body portion of a...
US-9,438,621 Dendritic cell algorithm module with inflammatory inter-node signaling
Artificial Immune Systems (AIS) including the Dendritic Cell Algorithm (DCA) are an emerging method to detect malware in computer systems. An implementation of...
US-9,438,620 Control flow graph representation and classification
A software sample is identified that includes code and a control flow graph is generated for each of a plurality of functions included in the sample. Features...
US-9,438,619 Crowdsourcing of trustworthiness indicators
Systems and methods are described herein for calculating trust score based on crowdsourced information. The trust score may reflect the trustworthiness,...
US-9,438,618 Threat detection and mitigation through run-time introspection and instrumentation
A system and method for threat detection and mitigation through run-time introspection. The system and method comprising receiving a request to monitor a...
US-9,438,617 Application security testing
Example embodiments disclosed herein relate to real-time modification of an application under test (AUT). A security rest is performed on the AUT. A real-time...
US-9,438,616 Network asset information management
A network asset information management system (101) may include an asset determination and event prioritization module (105) to generate real-time asset...
US-9,438,615 Security risk management
Among other things, traces are received of activities of an online user who is associated with an entity. By analysis of the traces a security state of the...
US-9,438,614 SDI-SCAM
A distributed multi-agent system and method is implemented and employed across at least one intranet for purposes of real time collection, monitoring,...
US-9,438,613 Dynamic content activation for automated analysis of embedded objects
According to one embodiment, a threat detection platform is integrated with at least one virtual machine that automatically performs a dynamic analysis of a...
US-9,438,612 Calculating consecutive matches using parallel computing
Methods and systems for determining consecutive matches are provided. According to one embodiment, a class definition and a data stream are received by a...
US-9,438,611 Managing a blocked-originator list for a messaging application
Managing a blocked-originator list for a messaging application, including: detecting, by a list management module, a list management initiation event for a...
US-9,438,610 Anti-tampering server
A method for preventing tampering with the accessibility of resources specified by Universal Resource Locators (URLs) comprising receiving a primary URL from a...
US-9,438,609 Device verification prior to registration
Embodiments are directed to registering a device to receive notifications. In one scenario, a computer system receives a notification registration request from...
US-9,438,608 Method and device for verifying the integrity of platform software of an electronic device
A method for verifying the integrity of platform software of an electronic device is provided, the method comprising accessing a module of said platform...
US-9,438,607 Information processing apparatus and verification control method
An information processing apparatus obtains a plurality of messages transmitted between a client and a server, each message including at least one of a...
US-9,438,606 Environmental-based location monitoring
Aspects of the present disclosure are directed towards environmental based location monitoring. Environmental based location monitoring can include collecting,...
US-9,438,605 Determining response signature commonalities
An analyzer can obtain data regarding signal characteristics in each of multiple communication channels within an access network. The analyzer can use that data...
US-9,438,604 Managing user authentication in association with application access
A determination is made that an authentication mechanism is unable to complete an attempt to authenticate, in association with a user attempting to access an...
US-9,438,603 Method for managing access right of terminal to resource by server in wireless communication system, and device...
A method for managing an access right of a terminal to a resource by a server according to one embodiment of the present invention is disclosed, and the method...
US-9,438,602 Evolving rule based contact exchange
Methods and systems are described for managing a user's contact data which use evolving sequential sets of rules where the applicability of each set depends...
US-9,438,601 Operating group resources in sub-groups and nested groups
The present invention provides a method, a group server, and an apparatus for operating a group resource; a member resource operation request sent to a member...
US-9,438,600 Apparatus and methods for distributing and storing electronic access clients
Apparatus and methods for efficiently distributing and storing access control clients within a network. In one embodiment, the access clients include electronic...
US-9,438,599 Approaches for deployment approval
A deployment approval system receives, from a deployment tool, a deployment request for performing a deployment to a particular resource. The deployment...
US-9,438,598 Securely updating information identifying services accessible via keys
A first device may receive a service authorization instruction from a second device. The service authorization instruction may include one or more authorization...
US-9,438,597 Regulating credential information dissemination
A validating device receives, from a client device associated with a user, a representation for a first credential associated with the user. The validating...
US-9,438,596 Systems and methods for secured global LAN
This invention relates to a method and a network device for establishing a Virtual Private Network (VPN) among Local Area Networks (LANs). The method uses a...
US-9,438,595 Network resource access control methods and systems using transactional artifacts
Methods and systems are provided for use with digital data processing systems to control or otherwise limit access to networked resources based, at least in...
US-9,438,594 Method and apparatus for establishing tunnel data security channel
Sending an authentication request message to an authentication device, receiving an authentication response message sent by the authentication device, where the...
US-9,438,593 Method for providing user interface for each user and device applying the same
Disclosed herein are a method and device for providing a user interface that displays an icon indicating that a user has approached, if the user approaches an...
US-9,438,592 System and method for providing unified transport and security protocols
The system and method described herein may provide unified transport and security protocols. In particular, the unified transport and security protocols may...
US-9,438,591 Biometric authentication device and biometric authentication method
A biometric authentication device includes: a function module which executes a predetermined function; a biometric information acquisition unit which acquires...
US-9,438,590 Privacy preserving biometric authentication based on error correcting codes
A method includes transmitting initialization data including an error correction code and a matrix. The method also includes receiving registration data...
US-9,438,589 Binding a digital file to a person's identity using biometrics
A method and system are described for authenticating one or more digital files in which a feature, characteristic or a portion of the contents of said files is...
US-9,438,588 Passporting credentials between a mobile app and a web browser
Systems and methods for passporting credentials provide a mechanism by which a native app on a client device can invoke a service provider's core web site web...
US-9,438,587 System and method for user authentication
Disclosed are a system and method for controlling a user log in and log out process. The system may include the use of a near field communication ("NFC")...
US-9,438,586 Method and system for processing operation request
A method for processing an operation request includes: detecting by a terminal an operation request, and sending an operation request message to a smart card;...
US-9,438,585 Trusted vendor access
A system is provided and facilitates management of a device by a first entity and management of a third entity by a second entity, wherein by way of the system...
US-9,438,584 Provisioning DRM credentials on a client device using an update server
A method of provisioning DRM credentials on a client device, comprising receiving DRM credentials at an update server from a key generation system, the DRM...
US-9,438,583 Certificate generation method, certificate generation apparatus, information processing apparatus, and...
A certificate generation method executed by a computer, includes receiving specific information and configuration information of a communication device...
US-9,438,582 Systems and methods for controlling a local application through a web page
A system, computer-readable storage medium storing at least one program, and a computer-implemented method for controlling a local utility are disclosed. A...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.