Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,444,831 Malicious script detection using context-dependent script emulation
One embodiment relates to a computer-implemented process for detecting malicious scripts at a client computer using a malicious script detector. A web page...
US-9,444,830 Web server/web application server security management apparatus and method
A security management apparatus and method for a web server/web application server is provided. The security management apparatus includes a connection state...
US-9,444,829 Systems and methods for protecting computing resources based on logical data models
A computer-implemented method for protecting computing resources based on logical data models may include (1) receiving, from a security agent, log data that...
US-9,444,828 Network intrusion detection apparatus and method using Perl compatible regular expressions-based pattern...
A network intrusion detection apparatus and method that perform Perl Compatible Regular Expressions (PCRE)-based pattern matching on the payloads of packets...
US-9,444,827 Multi-function, modular system for network security, secure communication, and malware protection
Representative embodiments are disclosed for providing network and system security. A representative apparatus includes an input-output connector coupleable to...
US-9,444,826 Method and system for filtering communication
An e-mail relay provides message filtering services to an e-mail network. The e-mail relay monitors incoming communication and intercepts e-mail messages. The...
US-9,444,825 Continuous user authentication
Technologies are generally described for authenticating a user account. In some examples, a method performed under control of a server may include providing a...
US-9,444,824 Methods, systems, and articles of manufacture for implementing adaptive levels of assurance in a financial...
Disclosed are methods, systems, and articles of manufacture for implementing adaptive levels of authentication assurance according to sensitivity or criticality...
US-9,444,823 Method and apparatus for providing network communication association information to applications and services
A system and method are provided that allow an application on a first terminal to inquire about available network communication associations that it can use to...
US-9,444,822 Storage array access control from cloud-based user authorization and authentication
Providing authorization and authentication in a cloud for a user of a storage array includes: receiving, by a storage array access module from a client-side...
US-9,444,821 Management server, communication cutoff device and information processing system
An inspection system 1 having a plurality of network segments 2 includes: a management information acquiring unit 34 which acquires a node ID that a node 90...
US-9,444,820 Providing context-based visibility of cloud resources in a multi-tenant environment
A secure tag generation service is associated with a cloud infrastructure. This service establishes a security context for a particular cloud tenant based on a...
US-9,444,819 Providing context-based visibility of cloud resources in a multi-tenant environment
A secure tag generation service is associated with a cloud infrastructure. This service establishes a security context for a particular cloud tenant based on a...
US-9,444,818 Method and system for automatically managing secure communications in multiple communications jurisdiction zones
Communications and data security policy data for two or more communications jurisdiction zones is obtained that includes data indicating allowed protocols for...
US-9,444,817 Facilitating claim use by service providers
Aspects of the subject matter described herein relate to facilitating claim use in an identity framework. In aspects, a definition of a trust framework may be...
US-9,444,816 Continuous voice authentication for a mobile device
Disclosed is an apparatus, system, and method to continuously authenticate a user of a mobile device. The mobile device includes a user interface, a...
US-9,444,815 Method and system for accessing a service
To access a service, each user device stores one first key. The user device is connected to a first server. A terminal sends to a second server a connection...
US-9,444,814 Method and system for the provision of services for terminal devices
Services are provided for terminal devices, each having a TPM module. The TPM module of a terminal device transmits a service request with an ID assertion...
US-9,444,813 Token-based security for remote resources
Systems and methods of token-based protection for remote resources are disclosed. For example, a method may include receiving, at a second computing device, a...
US-9,444,812 Systems and methods for authenticating a service
A method for authenticating a user to provide a service is provided. The method includes storing information associated with a user of a first device on a...
US-9,444,811 Using an enhanced data agent to restore backed up data across autonomous storage management systems
An exemplary system preserves the autonomy of two or more distinct storage management systems all the while enabling backed up data to be restored from a first...
US-9,444,809 Secure and efficient authentication using plug-in hardware compatible with desktops, laptops and/or smart...
A portable apparatus is removably and communicatively connectable to a network device to communicate authentication or authorization credentials of a user in...
US-9,444,808 System and method for providing multtenant access to shared resources
In one embodiment, a method includes maintaining a domain information cache. The method further includes receiving credentials from a client system. The...
US-9,444,807 Secure non-geospatially derived device presence information
This invention includes a system and method to enable a device to determine the presence information of another device over a secure communication network....
US-9,444,806 Method, apparatus and server for identity authentication
The disclosure relates to a method, apparatus and server for identity authentication, related to communication technique to solve system overload problem caused...
US-9,444,805 Context-aware validation
An application executed on a client device displays a user interface that receives input related to outputting credential information, wherein the application...
US-9,444,804 Dynamic security question generation
A method of dynamically generating a security question for accessing a resource. The method comprises monitoring a behavior of said user during a monitoring...
US-9,444,803 Authentication method and system oriented to heterogeneous network
An authentication method and system oriented to a heterogeneous network are disclosed. After receiving a service request sent by a virtual terminal, a unified...
US-9,444,802 Device authentication using display device irregularity
A device authentication server authenticates a remotely located device using data representing pixel irregularities of a display of the device. Since each...
US-9,444,801 Method, device and system for verifying communication sessions
An example technique is provided for authenticating a first communication session. The technique includes receiving an indication that a first network device...
US-9,444,800 Virtual communication endpoint services
Customers can utilize resources of a multi-tenant environment to provide one or more services available to various users. In order to simplify the process for...
US-9,444,799 System and method for dynamically allocating stream identifiers in a multi-encryption transport system
The present invention is suitable for use in a multi-encrypted system that dynamically allocates stream identifiers in a second stream depending upon the...
US-9,444,798 Transferring data
Techniques for transferring data may be provided. For example, destination files may be generated from a source file. Information about at least a location for...
US-9,444,797 Protection of private data
Technologies are generally described for generating obfuscated message data. In some examples, a method performed under control of a server may include...
US-9,444,796 Group member recovery techniques
Techniques are presented for optimizing secure communications in a network. A first router receives from a second router an encrypted packet with an unknown...
US-9,444,795 Robot mitigation
Computer systems, such as a client and a server operably interconnected via a network, are subject to stress on computational resources due to an abundance of...
US-9,444,794 Low-latency secure segment encryption and authentication interface
An apparatus comprising a memory, a processor coupled to the memory and configured to obtain a Dynamic Adaptive Streaming over Hypertext Transfer Protocol...
US-9,444,793 System, apparatus and method for encryption and decryption of data transmitted over a network
A method and system for securing data transmitted between a client device and a server by obtaining input text at an intermediate module, processing the input...
US-9,444,792 Dynamic tunnel for real time data communication
A tunneled session management ("TSM") server manages a dynamic datagram tunnel ("DDT") for a real time communication ("RTC") with a TSM client. The TSM server...
US-9,444,791 Method and system for providing secure access to private networks
Improved approaches for providing secure remote access to resources maintained on private networks are disclosed. According to one aspect, predetermined...
US-9,444,790 Method and apparatus for threat isolation and remote resolution for computer systems
A method and system providing remote access for threat removal to a computer system. A remote virtual private network (VPN) connection is established to an...
US-9,444,789 System and method for secure cloud service delivery with prioritized services in a network environment
An example method includes receiving a request for a cloud capability set during an Internet Key Exchange negotiation associated with a virtual private network...
US-9,444,788 Data leak protection in upper layer protocols
Methods and systems for Data Leak Prevention (DLP) in a private network are provided. A data structure is maintained within a network security appliance...
US-9,444,787 Non-intrusive method and apparatus for automatically dispatching security rules in cloud environment
The present invention relates to a non-intrusive method and apparatus for automatically dispatching security rules in a cloud environment. The method comprises:...
US-9,444,786 Policy based auditing of workflows
An auditing system is disclosed comprising a Policy Validation Mechanism Program (PVMP) that operates in conjunction with a Workflow Engine (WE), and a Policy...
US-9,444,785 Transparent provisioning of network access to an application
An apparatus and method for enhancing the infrastructure of a network such as the Internet is disclosed. A packet interceptor/processor apparatus is coupled...
US-9,444,784 Apparatus and method of peer-to-peer communication
An apparatus and method of communication include establishing, by a first communication device, a proximity-based connection with a another communication...
US-9,444,783 Communication apparatus and control method thereof
A communication apparatus stores a first address in association with a second address of an apparatus which is targeted to permit or restrict processing of a...
US-9,444,782 System and method for assigning a service flow classifier to a device
A system and method for assigning a service flow classifier to a device. A MAC address of a device is extracted from a DHCP discover message. A DHCP server...
US-9,444,781 Recursive DNS nameserver
A recursive DNS server receives a request for domain name information associated with a domain name from a subscriber. In response to the request for domain...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.