Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,467,482 Reverse prefix delegation
Prefix delegation for Internet protocol (IP) prefixes or other types of prefixes. The prefix delegation resulting in multiple prefixes being delegated to...
US-9,467,481 Multi-access gateway for direct to residence communication services
Different residences can be communicatively linked to a communication backbone via a multi-access gateway, where each residence comprises an adapter through...
US-9,467,480 Selectively multiplexing incoming WebRTC traffic and/or de-multiplexing outgoing WebRTC traffic by a...
In an embodiment, a first WebRTC proxy module on a first UE receives a multiplexed stream from a first WebRTC multimedia client application on the first UE. The...
US-9,467,479 User aliases in a communication system
A technique is disclosed in the context of a communications system whereby parties accessible through the system may be referenced by multiple alternative...
US-9,467,478 Overlay management protocol for secure routing based on an overlay network
A method for creating a secure network is provided. The method comprises establishing an overlay domain to control routing between overlay edge routers based on...
US-9,467,477 Method and system for automatically managing secrets in multiple data security jurisdiction zones
Data security jurisdiction zones are identified and data security policy data for the data security jurisdiction zones is obtained. The data security policy...
US-9,467,476 Context aware microsegmentation
Context aware microservice networks and contextual security policies for microservice networks are provided herein. In some embodiments, a system includes a...
US-9,467,475 Secure mobile framework
Systems and methods for a secure mobile framework to securely connect applications running on mobile devices to services within an enterprise are provided....
US-9,467,474 Conjuring and providing profiles that manage execution of mobile applications
Various aspects of the disclosure relate to configuring and providing policies that manage execution of mobile applications. In some embodiments, a user...
US-9,467,473 System and method for compact form exhaustive analysis of security policies
A system is described that analyzes and validates network security policies associated with network devices. The system includes a compiler and a security...
US-9,467,472 Controlling access to a software application
A method for controlling access to a software application includes generating a policy machine template based on at least one role and at least one permission...
US-9,467,471 Encrypted communication apparatus and control method therefor
An encrypted communication apparatus determines a security protocol in IPsec to be applied to an IP packet, and calculates, based on the determined security...
US-9,467,470 System and method for local protection against malicious software
A method in one example implementation includes intercepting a network access attempt on a computing device and determining a software program file associated...
US-9,467,469 Server with mechanism for changing treatment of client connections determined to be related to attacks
According to certain non-limiting embodiments disclosed herein, the functionality of a server is extended with a mechanism for identifying connections with...
US-9,467,467 Detection of privilege escalation vulnerabilities using bag of words
A method for detecting a privilege escalation vulnerability comprises selecting an address identifier of a web address with secure content. A first response to...
US-9,467,466 Certification of correct behavior of cloud services using shadow rank
Determining potential harm associated with a network endpoint external to an enterprise includes receiving information about a network-based communication by a...
US-9,467,465 Systems and methods of risk based rules for application control
In various embodiments, an agent on a digital device may comprise a monitor module, an application identification module, a vulnerability module, a rules...
US-9,467,464 System and method for correlating log data to discover network vulnerabilities and assets
The disclosure relates to a log correlation engine that may cross-reference or otherwise leverage existing vulnerability data in an extensible manner to support...
US-9,467,463 System and method for assessing vulnerability of a mobile device
A system and method for assessing vulnerability of a mobile device including at a remote analysis cloud service, receiving at least one vulnerability assessment...
US-9,467,462 Traffic anomaly analysis for the detection of aberrant network code
A method for detecting nodes in an enterprise network infected with aberrant code is presented in which traffic conversation information representative of...
US-9,467,461 Countering security threats with the domain name system
Described herein are methods, systems, and apparatus in which the functionality of a DNS server is modified to take into account security intelligence when...
US-9,467,460 Modularized database architecture using vertical partitioning for a state machine
A modularized architecture using vertical partitioning of a database is configured to store object metadata and processing results of one or more objects...
US-9,467,459 System and method for detection of rogue routers in a computing network
A method and apparatus for detecting the presence of a rogue router in a computer network is described. The method may include transmitting a router...
US-9,467,458 System and method for providing selective access to a redirected device
In one embodiment, a method includes, by a computing device, receiving identifiers of one or more sessions, users, or groups selected to have access to a...
US-9,467,457 Identity management and authentication system for resource access
A system that authorizes access to a resource by a client validates the client and generates a Security Assertion Markup Language ("SAML") assertion for the...
US-9,467,456 Single login authentication for users with multiple IPv4/IPv6 addresses
Disclosed in the authentication and authorization of a client device to access a plurality of resources, requiring a user of a client device to enter only one...
US-9,467,455 Systems for network risk assessment including processing of user access rights associated with a network of devices
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for network risk assessment. One of the methods includes...
US-9,467,454 Systems and methods for network filtering in VPN
Described are systems and methods for managing network packet traffic between a client device and an enterprise server. A list of enterprise-authorized...
US-9,467,453 Network access and control for mobile devices
Systems, methods, and devices of the various embodiments enable content controls to be implemented by a modem of a mobile device to ensure the controls are...
US-9,467,452 Transferring services in a networked environment
The computer transitions services from a first user to a second user by receiving a notification of transition of job function from a first user to a second...
US-9,467,451 Generic proactively-secure secret-sharing protocol from any suitable honest-majority secret-sharing protocol
Described is system for transforming a SHARE protocol into a proactively secure secret sharing (PSS) protocol. A PREFRESH protocol is performed that includes...
US-9,467,450 Data driven schema for patient data exchange system
A patient data exchange system comprises at least one device. Each of the devices implements an interface. When a device in the patient data exchange system...
US-9,467,449 Method for protection of data shared between devices connected in a network and corresponding apparatus
The invention proposes a method and device for protection of data for devices connected in a network such as a local area network or LAN. The method and device...
US-9,467,448 Consigning authentication method
A method for sharing content between clients at a common trust level in a trust hierarchy associated with a network implementing policy-based management...
US-9,467,447 Network access method, authentication method, communications system and relevant devices
A network access method, an authentication method, a communications system, and relevant devices are provided. The authentication method includes: receiving a...
US-9,467,446 Runtime API framework for client-server communication
In particular embodiments, a method includes receiving, by a computing device including an import/export framework, encoded client data. The client data may be...
US-9,467,445 Systems and methods for group authentication
The field of the invention relates to network connected authentication systems, and more particularly to systems and methods that enable authentication of one...
US-9,467,444 Network resource management system utilizing physical network identification for privileged network access
The disclosed network resource management system employs a hardware configuration management (HCM) information handling system (IHS) that may couple to a single...
US-9,467,443 Authentication utilizing a dynamic passcode from a user-defined formula based on a changing parameter value
An authentication system utilizes dynamic passcode from a user-defined formula based on a changing parameter value. The changing parameter is publicly...
US-9,467,442 Automated step-up digital certificate installation process
Techniques are disclosed for rapidly securing a server in response to request for a high-assurance digital certificate. As described, a CA may issue a basic...
US-9,467,441 Secure service delegator
Systems and methods for a secure service delegator. In some embodiments, an Information Handling System (IHS) operated by a manufacturer of a client device...
US-9,467,440 Method and apparatus for providing an authentication context-based session
An approach is provided for providing separation of authentication protocols and/or authentication contexts for client-server and server-server communication in...
US-9,467,439 Access control method, access control system, communication terminal, and server
An access control method including: receiving a log information item indicating use history of electrical equipment that is used together with an intended...
US-9,467,438 Information processing system, apparatus, and method
An information processing system, which includes one or more computers, includes a reception part configured to receive a request addressed to a predetermined...
US-9,467,437 Flexible authentication framework
A flexible and extensible architecture allows for secure searching across an enterprise. Such an architecture can provide a simple Internet-like search...
US-9,467,436 Captcha systems and methods
Systems and methods for verifying human users through cognitive processes that computers cannot imitate are described herein. Human cognitive language...
US-9,467,435 Electronic message threat protection system for authorized users
An electronic message threat protection system that incorporates user authorization to ensure that only authorized users receive the benefits of the system's...
US-9,467,434 Document rendering service
Disclosed are some examples of systems, methods and storage media for generating a platform-independent document. In some implementations, a system is capable...
US-9,467,433 Authentication of warning messages in a network
There is described herein a device (101) for communicating with a network. The device (101) comprises a communications unit for receiving data, a notification...
US-9,467,432 Method and device for generating local interface key
A method, a terminal and a communication system are provided for generating a local interface key. In the disclosure, the terminal generates a variable...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.