Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,473,540 Call flow system and method for use in a legacy telecommunication system
A method of operating a network server, such as a mobile application gateway, connect devices on a cellular or carrier network with individual networks, such as...
US-9,473,539 Extending SIP P-served user header over IMS interfaces
The invention provides a method of handling SIP messages in an IMS core network. The method comprises receiving at a first network entity, a first SIP message...
US-9,473,538 Soft website block override
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for overriding a soft website block. One of the methods includes...
US-9,473,537 Cloud based mobile device management systems and methods
The present disclosure relates to cloud based mobile device management (MDM) systems and methods to use the "cloud" to pervasively manage mobile devices. The...
US-9,473,536 Method, system, and computer program product for facilitating communication in an interoperability network
Methods and apparatus are described for facilitating communication among a plurality of entities via an interoperability network. Each entity has policy data...
US-9,473,535 Methods and devices for analyzing user privacy based on a user's online presence
A method, non-transitory computer readable medium, and policy rating server device that receives a request from a client computing device for one or more...
US-9,473,534 System and method for switching between messaging security policies
A system and method are provided for switching between messaging security policies. The method includes determining that a messaging security policy for the...
US-9,473,533 Secure mobile framework
Systems and methods for a secure mobile framework to securely connect applications running on mobile devices to services within an enterprise are provided....
US-9,473,532 Data loss prevention (DLP) methods by a cloud service including third party integration architectures
Embodiments of the present disclosure include data loss prevention methods by a cloud-based service including third party integration architectures. The...
US-9,473,531 Endpoint traffic profiling for early detection of malware spread
According to one exemplary embodiment, a method for detecting malware in a network stream to at least one host computer is provided. The method may include...
US-9,473,530 Client-side active validation for mitigating DDOS attacks
Methods and systems for mitigating denial-of-service attacks include a proxy server that monitors a set of application servers configured to receive and service...
US-9,473,529 Prevention of denial of service (DoS) attacks on session initiation protocol (SIP)-based systems using method...
A device receives an attack on a Session Initiation Protocol (SIP) based device, and applies, based on a type of the attack, a method vulnerability based filter...
US-9,473,528 Identification of malware sites using unknown URL sites and newly registered DNS addresses
In some embodiments, identification of malware sites using unknown URL sites and newly registered DNS addresses includes performing a heuristic analysis for...
US-9,473,527 Automatically generated and shared white list
Each time a version of a virus pattern is downloaded to a local computer a scanned file cache is generated including all files scanned by that version. A...
US-9,473,526 Fight-through nodes for survivable computer network
A survivable network is described in which one or more network device includes enhanced functionality to fight through cyber attacks. A Fight-Through Node (FTN)...
US-9,473,525 Dynamic loading and configuation of threat detectors based on feedback from other nodes
Artificial Immune Systems (AIS) including the Dendritic Cell Algorithm (DCA) are an emerging method to detect malware in computer systems. The DCA...
US-9,473,524 Computer system for distributed discovery of vulnerabilities in applications
In one aspect, the disclosure provides: A method comprising: inviting a distributed plurality of researchers to participate in one or more computer...
US-9,473,523 Execution of test inputs with applications in computer security assessment
A given application is instrumented to trace its execution flow. Constraints and/or transformation associated with input identified in the execution flow are...
US-9,473,522 System and method for securing a computer system against malicious actions by utilizing virtualized elements
A method and system for protecting a computing system, the method comprising allocating simulator nodes, the simulator nodes emulating operations of devices in...
US-9,473,521 Method and system for information leak prevention
A method for mitigating false positive type errors while applying an information leak prevention policy to identify important information and to prevent outward...
US-9,473,520 Systems and methods for incubating malware in a virtual organization
Systems and methods for tracking malware operator behavior patterns in a network environment simulated for an extended period of time include a processor that...
US-9,473,519 System, method, and computer program product for identifying unwanted data communicated via session initiation...
A system, method, and computer program product are provided for identifying unwanted data communicated via a session initiation protocol. In use, packets...
US-9,473,518 Securing network communications with logical partitions
Embodiments of the present invention provide methods, systems, and computer program products that enable secure network communications with logical partitions....
US-9,473,517 Content screening method, apparatus and system
A content screening method, apparatus and system are provided for a content screening component to verify the trust relationship and the categorization standard...
US-9,473,516 Detecting network attacks based on a hash
Techniques for analyzing access to a network-based document may be provided. For example, a portion of the network-based document for hashing may be identified....
US-9,473,515 Method, device and system for securely downloading data
A method for data downloading is provided, including: sending a download request, and sending a security check request according to the download request;...
US-9,473,514 Efficient sensor data delivery
A method is provided to enhance efficiency of sensor event data transmission over network. Specifically, a method is described to buffer a set of sensor data,...
US-9,473,513 Authentication based on proximate devices
In one embodiment, a computer-implemented method includes, in response to an attempt by a user to perform a transaction using a computing device, accessing a...
US-9,473,512 Methods and systems to implement fingerprint lookups across remote agents
The present invention provides methods and systems to protect an organization's secure information from unauthorized disclosure. The present system uses protect...
US-9,473,511 Geographical location authentication
The method includes identifying a computing device attempting to access content. The method further includes identifying a defined geographical boundary that is...
US-9,473,510 System and method for location verification
Location data from one or more geolocation engines such as GPS, a system that determines location from relative signal strengths or transit times, etc., within...
US-9,473,509 Selectively permitting or denying usage of wearable device services
Selectively permitting or denying usage of a service available on a device is provided. Usage restrictions on usage of services available on the device are...
US-9,473,508 Method for the protected deposit of event protocol data of a computer system, computer program product and...
A method for the protected deposit of event protocol data of a computer system provides access control which prohibits access to event protocol data in the...
US-9,473,507 Social and proximity based access control for mobile applications
Methods and systems for proximity-based access control include determining whether a distance from a first mobile device to each of one or more safe mobile...
US-9,473,506 Secure file transfer and notification server
A system, method and computer readable medium for secure file transfer is disclosed. In one embodiment, the system encrypts a file; sends, via a secure channel,...
US-9,473,505 Management of third party access privileges to web services
A user clicks on a link on a third-party Web site from his computer in order to utilize a third-party application with a Web service with which the user has an...
US-9,473,504 Role based access control for connected consumer devices
A processing device authenticates a computing device of a user to a user account. The processing device determines a role associated with the user account, and...
US-9,473,503 Systems and methods of object processing in virtual worlds
Systems and methods of virtual world interaction, operation, implementation, instantiation, creation, and other functions related to virtual worlds (note that...
US-9,473,502 Atomically updating ternary content addressable memory-based access control lists
Embodiments described herein provide techniques for atomically updating a ternary content addressable memory (TCAM)-based access control list (ACL). According...
US-9,473,501 System and method for associating a universal user identification and a domain specific user identification
There is presented a system and method for associating a domain transcendent identification (ID) of a user and a domain specific ID of the user, the system...
US-9,473,500 Compliance validator for restricted network access control
A method, system, and computer program product for detecting and enforcing compliance with access requirements for a computer system in a restricted computer...
US-9,473,499 Federated role provisioning
In various embodiments, techniques for federated role provisioning are provided. A federated role definition for a resource is constructed and distributed. The...
US-9,473,498 Method for using java servlets as a stack based state machine
A client module downloaded by web browser from a server receives authentication information to open a smart card in a card reader and to initiate a secure...
US-9,473,497 Exclusion engine for electronic communications in controlled-environment facilities
An exclusion engine for electronic communications in controlled-environment facilities. In some embodiments, a method may include method may include receiving,...
US-9,473,496 Dynamically mapping network trust relationships
In an embodiment, the method is comprising, receiving an access request, from an authenticator device, to grant a supplicant device access to a data network;...
US-9,473,495 User authentication for proxy-configured clients in captive portal environments
Methods, systems and computer readable media for user authentication for proxy-configured clients in captive portal deployments are described. In some...
US-9,473,494 Access credentials using biometrically generated public/private key pairs
A method and system for access credential functionality using biometrically generated public/private key pairs may involve generating an asymmetric encryption...
US-9,473,493 Secure data communication
A system and a method for secure data communication over a network are described. In one embodiment, a method comprises generating a visual flashing code...
US-9,473,492 Password scheme that can be used for security of modems in an independently operated cable system that is...
A password scheme is provided that can be used for security of cable modems in a cable network. In the system, the password is unique to each modem, the...
US-9,473,491 Computing device with integrated authentication token
Disclosed are various embodiments for a computing device with an integrated authentication token. The computing device includes first circuitry having a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.