Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,450,978 Hierarchical event detection in a computer network
In one embodiment, network data is received at a first node in a computer network. A low precision machine learning model is used on the network data to detect...
US-9,450,977 Systems and methods for updating content detection devices and systems
A method of updating a content detection module includes obtaining content detection data, and transmitting the content detection data to a content detection...
US-9,450,976 Managing data traffic in the presence of a sensitive site
Website security may be managed based on known site attributes and placing limits on communication outside a site. One example may include at least one of...
US-9,450,975 Target-based SMB and DCE/RPC processing for an intrusion detection system or intrusion prevention system
A method performed in a processor of an intrusion detection/prevention system (IDS/IPS) checks for valid packets in an SMB named pipe in a communication...
US-9,450,974 Intrusion management
A computer implemented method for managing a network intrusion is disclosed. The method can include monitoring, by an intrusion management system, a set of...
US-9,450,973 Method and apparatus for machine to machine network security monitoring in a communications network
A method, non-transitory computer readable medium and apparatus for providing network security monitoring in a communications network are disclosed. For...
US-9,450,972 Network attack detection using combined probabilities
In one embodiment, a device in a network receives a set of output label dependencies for a set of attack detectors. The device identifies applied labels that...
US-9,450,971 Device, system, and method of visual login and stochastic cryptography
Devices, systems, and methods of detecting user identity, differentiating between users of a computerized service, and detecting a possible attacker. The...
US-9,450,970 Automatic blocking of bad actors across a network
Disclosed is a system for restricting access to a network, the system comprising a monitoring module configured to be coupled to a plurality of network access...
US-9,450,969 System and method for key challenge validation
This document discusses, among other things, a system and method for detecting an initiation of a transaction and generating a string of characters based on the...
US-9,450,968 Media stream trust display
Media stream trust display techniques are described in which trust information regarding content elements is accessible on an individual element basis. In...
US-9,450,967 Intelligent network service provisioning and maintenance
A network gateway is implemented on behalf of a customer entity. The network gateway may be implemented using a distributed computer system and the network...
US-9,450,966 Method and apparatus for lifecycle integrity verification of virtual machines
A method and system for verifying the integrity of virtual machines and for verifying the integrity of discrete elements of the virtual machines throughout the...
US-9,450,965 Mobile device, program, and control method
When a pre-determined time period has elapsed after a user access is last detected, a mobile device performs protection processing on account-related...
US-9,450,964 Information processing system, information processing method, and computer program product
An information processing system includes a receiving unit and a determining unit. The receiving unit receives an application request to request an application...
US-9,450,963 Multiple resource servers interacting with single OAuth server
A framework, which conforms to the OAuth standard, involves a generic OAuth authorization server that can be used by multiple resource servers in order to...
US-9,450,962 System and method for access control and usage monitoring
A system (100) for providing access control and usage monitoring of a plurality of electronic devices or applications (110a-h) enables efficient access control....
US-9,450,961 Mechanism for facilitating dynamic adjustments to computing device characteristics in response to changes in...
A mechanism is described for facilitating dynamic adjustments to features of computing devices according to one embodiment. A method of embodiments, as...
US-9,450,960 Virtual machine file system restriction system and method
A method includes creating a virtual machine including a remote file system, a file system service, and a security application. Access to the remote file system...
US-9,450,959 Method and system for utilizing a location-based internetwork gateway
A system for utilizing a location-based application across a plurality of networks. A target mobile device operates within a target network of the plurality of...
US-9,450,958 Permission delegation technology
In one implementation, a computer system maintains one or more permissions associated with a credential held by a first user, where at least one of the one or...
US-9,450,957 Interactive mail verification system and method
The present disclosure relates generally to electronic systems and methods, and more particularly, to systems, methods, and various other disclosures related to...
US-9,450,956 Proximity-based system for automatic application initialization
A system and method provide automatic access to applications or data. A portable physical device, referred to herein as a Personal Digital Key or "PDK", stores...
US-9,450,955 Authenticator for user state management
Different types of soft-lockout policies can be associated with different organizations (or groups) in an identity management system. Each soft-lockout policy...
US-9,450,954 Form filling with digital identities, and automatic password generation
In one implementation, form field(s) of a form of a website or application are populated with data obtained using a digital identity, and the populated form...
US-9,450,953 Blacklisting of frequently used gesture passwords
A method of maintaining a blacklist for gesture-based passwords is provided. A data store of vectors corresponding to gestures is maintained on a blacklist...
US-9,450,952 Live tiles without application-code execution
Techniques enabling live tiles without application-code execution permit live content to be presented in tiles without executing code of applications associated...
US-9,450,951 Secure over-the-air provisioning solution for handheld and desktop devices and services
In one embodiment, a device and a services provisioning system establish an over-the-air connection with each other, and perform device posture validation to...
US-9,450,950 Secure session capability using public-key cryptography without access to the private key
A server establishes a secure session with a client device where a private key used in the handshake when establishing the secure session is stored in a...
US-9,450,949 Method for computer access control by means of mobile end device
A method for access control to a computer with a mobile end device relies on using contactless interfaces. An authentication to the computer is carried out with...
US-9,450,948 Method for securely searching, finding, reproducing, recovering, and/or exporting of electronic data
A method for securely searching, finding, reproducing, recovering, and/or exporting electronic data from at least two systems which can be found in a network...
US-9,450,947 Apparatus and method for securing a debugging session
A device executes debugging instructions received from a debugging computer. The device receives a debugging establishment request from the debugging computer....
US-9,450,946 Secure identity federation for non-federated systems
Methods and apparatus, including computer program products, implementing and using techniques for providing user credentials over a network to a remote computer...
US-9,450,945 Unified access controls for cloud services
A cloud service access and information gateway receives, from a user device, a request to access a cloud service. The cloud service access and information...
US-9,450,944 System and method for pass-through authentication
A gateway device comprising a processor and a memory, the processor is configured to receive a login operation request from an external endpoint, the login...
US-9,450,943 Method and apparatus for remote connection
A system and method for establishing a virtual network connection between an initiating computing device operated by an initiator and a target computing device...
US-9,450,942 Access to resources
A method performed by one or more processing devices, comprising: receiving a request for a quick response code associated with the hosted resource; generating...
US-9,450,941 Recovery of managed security credentials
Disclosed are various embodiments for recovery and other management functions relating to security credentials which may be centrally managed. Account data,...
US-9,450,940 Intelligent system for enabling automated secondary authorization for service requests in an agile information...
A service request for a managed computer system is received and once a primary authorization for same has been given, a secondary authorization management...
US-9,450,939 Method and apparatus for service login based on third party's information
A method and apparatus for service login to a service provider sites have been disclosed. The method including: receiving a login request from a user, wherein...
US-9,450,938 Information secure proactive multiparty computation (PMPC) protocol with linear bandwidth complexity
Described is system for secure proactive multi-party computation. The system securely evaluates a circuit in the presence of an adversary. The circuit receives...
US-9,450,937 Vehicle network authentication system, and vehicle network authentication method
Provided is a vehicle network authentication system such that processing by a vehicle control device can be smoothed while security of communication using dummy...
US-9,450,936 Method of processing requests for digital services
A method of processing requests for different digital services hosted by respective service entities is disclosed. The method including steps of receiving a...
US-9,450,935 Systems and methods for deployment of secure shell devices
A shell device with minimal software and/or hardware resources can download from a server configuration information and/or user data in order to allow the shell...
US-9,450,934 Managed access to content and services
Aspects of the disclosure relates to managed access to content and/or services in a network environment. In certain aspects, tokens or other artifacts can be...
US-9,450,933 Systems and methods for device and data authentication
Embodiments relate to systems and methods for authenticating devices and securing data. In embodiments, a session key for securing data between two devices can...
US-9,450,932 Mobile device and information protection method thereof
A mobile device and an information protection method are presented. The mobile device includes a sensor, a storage and a processor that is electrically...
US-9,450,931 Reducing authentication confidence over time based on user history
Technologies are provided in embodiments to manage an authentication confirmation score. Embodiments are configured to identify, in absolute session time, a...
US-9,450,930 Device association via video handshake
A method of pairing a first device with a second device is disclosed. Accordingly, an image that includes encoded data is generated. The encoded data includes a...
US-9,450,929 Communication device, communication system, and computer program product
According to an embodiment, a communication device is connected to a plurality of external devices which share key information with each other. The...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.