Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,479,540 User-based network onboarding
A network security system including a first-level security profile engine and a second-level security profile engine is disclosed. The first-level security...
US-9,479,539 Distributed network instrumentation system
A distributed network instrumentation system (100) includes a security management station (110) including a global network policy decomposer (112) configured to...
US-9,479,538 Combining network endpoint policy results
An endpoint integrity system controls access to resources of a protected network for endpoint devices attempting to access the protected network. The system may...
US-9,479,537 Method, system and apparatus for improving security level of a terminal when surfing internet
A method, system, and apparatus for improving security level of a terminal when it surfs the Internet. The method includes receiving, by a network side, network...
US-9,479,536 System and method of securing monitoring devices on a public network
A method for determining whether or not a monitor is registered with a security service. The method includes using a device search engine to perform a search...
US-9,479,535 Transmitting aggregated information arising from appnet information
A device, method, computer program product, and network subsystem are described for signaling a first application relating with a first core and with a second...
US-9,479,534 Method, system, and logic for in-band exchange of meta-information
In an embodiment, a method is provided for enabling in-band data exchange between networks. The method can comprise receiving, by a first enveloping proxy...
US-9,479,533 Time based authentication codes
Systems and methods of the present invention provide for one or more server computers communicatively coupled to a network and configured to: receive a request...
US-9,479,532 Mitigating denial of service attacks
Several methods are disclosed for detecting and mitigating Distributed Denial-of-Service (DDoS) attacks that are intended to exhaust network resources. The...
US-9,479,531 Systems and methods for accelerating malware analyses in automated execution environments
The disclosed computer-implemented method for accelerating malware analyzes in automated execution environments may include (1) monitoring a file that is...
US-9,479,530 Method and system for detection of malware that connect to network destinations through cloud scanning and web...
A method for detecting malware includes the steps of identifying a one or more open network connections of an electronic device, associating one or more...
US-9,479,529 Polymorphic security policy action
In one embodiment, a method of improving the security of a computing device comprises using a computing device that has received one or more messages that have...
US-9,479,528 Signature rule processing method, server, and intrusion prevention system
A signature rule processing method, a server, and an intrusion prevention system is provided. The method includes: performing, by a cloud server, correlation...
US-9,479,527 Methods and systems for automated network scanning in dynamic virtualized environments
Systems and methods for managing jobs to be scanned based on existence of processing nodes are described. One of the methods includes obtaining identification...
US-9,479,526 Dynamic comparative analysis method and apparatus for detecting and preventing code injection and other network...
A security appliance includes a vulnerable testbed that simulates at least one known vulnerability, and a secure testbed that simulates not having that...
US-9,479,525 Interacting with a remote server over a network to determine whether to allow data exchange with a resource at...
Provided are a computer program product, system, and method for interacting with a remote server over a network to determine whether to allow data exchange with...
US-9,479,524 Determining string similarity using syntactic edit distance
Examples relate to determining string similarity using syntactic edit distance. In one example, a computing device may: receive domain name system (DNS) packets...
US-9,479,523 System and method for automated configuration of intrusion detection systems
Methods and systems for automated generation of malicious traffic signatures, for use in Intrusion Detection Systems (IDS). A rule generation system formulates...
US-9,479,522 Method and apparatus for managing content distribution using content signatures
A method and apparatus for managing packet flow based on content signatures are disclosed. A process of netflow management, in one embodiment, is able to...
US-9,479,521 Software network behavior analysis and identification system
A particular method includes detecting, at a detection module, an indicator corresponding to a suspicious software component, where the indicator is detected...
US-9,479,520 Fuzzy whitelisting anti-malware systems and methods
In some embodiments, an anti-malware system accounts for benign differences between non-malicious data objects, such as differences introduced by compilers and...
US-9,479,519 Web content fingerprint analysis to detect web page issues
Techniques and solutions are described for detecting potential problems with web pages. For example, a web page can be analyzed (e.g., during loading of the web...
US-9,479,518 Low false positive behavioral fraud detection
Techniques to detect fraud through behavioral analysis with low false positives are disclosed. In various embodiments, resource access data indicating for each...
US-9,479,517 Service governance for distributed systems
Example systems and methods for service governance for distributed and cloud-based systems are described. In one implementation, a method extracts a plurality...
US-9,479,516 Automatic detection of fraudulent ratings/comments related to an application store
The present disclosure describes one or more systems, methods, routines and/or techniques for automatic detection of fraudulent ratings and/or comments related...
US-9,479,515 Identification of a fault
An apparatus, method, and system are provided for determining a location of an error source. Equalization coefficients may be retrieved and an average period of...
US-9,479,514 Method and system for controlling access to wireless apparatuses
A system for securely controlling access between two wireless (i.e. Bluetooth-enabled) apparatuses, also comprising a supervisor apparatus. The first apparatus...
US-9,479,513 Apparatus, method and system to control accessibility of platform resources based on an integrity level
Techniques and mechanism to selectively provide resource access to a functional domain of a platform. In an embodiment, the platform includes both a report...
US-9,479,512 Social and proximity based access control for mobile applications
Systems for proximity-based access control include a proximity module configured to determine whether a distance from a first mobile device to each of one or...
US-9,479,511 Accessing multiple client domains using a single application
Methods, computer systems, and computer-readable storage media for using a single application on a mobile device to access a plurality of client domain sites...
US-9,479,510 Maintaining a limited user profile for social networking system users unable to establish a user profile
A social networking system maintains a limited user profile associated with a user of the social networking system who does not satisfy one or more criteria for...
US-9,479,509 Unified system for authentication and authorization
A request is received at an authorization framework via an authorization application programming interface (API) from a trusted application for authorizing a...
US-9,479,508 Efficient indexing and searching of access control listed documents
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for storing a plurality of documents in computer-readable...
US-9,479,507 Single-point-of-access cyber system
The system and system components of the present disclosure provide individuals with both a safe and a secure cyber environment. Within this safe and secure...
US-9,479,506 At least one mechanism to permit, at least in part, allocation and/or configuration, at least in part, of at...
In an embodiment, at least one interface mechanism may be provided. The mechanism may permit, at least in part, at least one process allocate, at least in part,...
US-9,479,505 Controlling access to a website
Methods and apparatus for website access control. The methods and apparatus include, at a user terminal: accessing a plurality of training websites over a...
US-9,479,504 Method and apparatus for controlling access between home device and external server in home network system
A method for controlling access between home devices and servers in a home network system is provided. The method includes determining whether first access of...
US-9,479,503 Authenticating cloud computing enabling secure services
Authenticating cloud computing enabling secure services (ACCESS) offloads "client authentication" activity onto a third-party authenticating cloud computing...
US-9,479,502 Rule sets for client-applied encryption in communications networks
A rule set for client-applied encryption is created and deployed to a client device by a network device over a communications network. Encryption applied by the...
US-9,479,501 Methods and systems for enhancing the accuracy performance of authentication systems
A method for enhancing the accuracy performance of authentication systems includes determining an authentication data requirement for a desired transaction and...
US-9,479,500 Online pseudonym verification and identity validation
Methods, systems, and computer program products for authenticating an online user. Authentication involves sending a code from a server to a user device...
US-9,479,499 Method and apparatus for identity authentication via mobile capturing code
A method, client device and system of identity authentication are provided. The method may include detecting a login or registration operation, to a server, via...
US-9,479,498 Providing limited access to a service device via an intermediary
Systems and methods may provide for brokering limited access to a service device via an intermediary. In one example, the method may include receiving a request...
US-9,479,497 One time password authentication of websites
A method includes generating first and second One Time Password (OTP) token values from a shared clock, receiving a version of the second OTP token value, and...
US-9,479,496 Communication terminal and secure log-in method acquiring password from server using user ID and sensor data
A communication terminal is provided with functions to redirect authentication data, make a substitute reply of a password to a biometric authentication part,...
US-9,479,495 Sending authentication codes to multiple recipients
Systems and methods of the present invention provide for one or more server computers communicatively coupled to a network and configured to: receive a request...
US-9,479,494 Flexible authentication framework
A flexible and extensible architecture allows for secure searching across an enterprise. Such an architecture can provide a simple Internet-like search...
US-9,479,493 Document management system user interfaces
Systems, methods, and software to provide document management system user interfaces to clients. Some embodiments include an intermediary server to provide...
US-9,479,492 Authored injections of context that are resolved at authentication time
Techniques are described for enabling principals to inject context information into a credential (e.g. session credential). Once the credential has been issued,...
US-9,479,491 Methods and systems for multiple channel authentication
Methods and systems for multiple channel authentication are described. In one embodiment, a request for a combined voice and data call is initiated from within...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.