Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,485,289 HTTP streaming client adaptation algorithm based on proportional-integral control
In one embodiment, an HTTP streaming session may be initiated at a client device in a network. The client device may have a buffer and may be configured to...
US-9,485,288 Peer-to-peer communication method in content centric network environment
There is provided a peer-to-peer communication method in a content centric network environment. In embodiments, the peer-to-peer communication method in a...
US-9,485,287 Indicating bit stream subsets
A method of indicating bit stream subsets in a video bit stream (210) is provided. The method comprises receiving the bit stream, dividing the bit stream into...
US-9,485,286 Sharing media items with pass phrases
A sharing service receives a request to store a media item stored on an electronic book reader device for sharing with one or more other content rendering...
US-9,485,285 Assisting the authoring of posts to an asymmetric social network
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for assisting the authoring of posts to an asymmetric social...
US-9,485,284 Customizing participant information in an online conference
Various embodiments of systems, methods, and computer programs are disclosed for customizing participant information in an online conference. One embodiment is...
US-9,485,283 Method and apparatus for enabling communications between users
A method and device are provided for creating and utilizing a database which enables ascribing a plurality of communication addresses to each of a plurality of...
US-9,485,282 Method and apparatus for negotiating color information in image communication system
A method and apparatus for a video call service in a communication system is provided. The method includes transmitting, in a process of configuring a session...
US-9,485,281 Communication system and server
A SOAP-SIP adapter 2 establishes a session with the terminals 5b and 5c in accordance with a SIP. At this time, the SOAP-SIP adapter 2 sends an INVITE message...
US-9,485,280 Proposal system access policy enforcement
Described herein are techniques and mechanisms for access policy creation and enforcement. According to various embodiments, a message may be received via a...
US-9,485,279 Automated generation of access control rules for use in a distributed network management system that uses a...
An access control rule authorizing communication between a plurality of managed servers within an administrative domain is determined. Communication information...
US-9,485,278 Plug-in based policy evaluation
A device may include an interface to send authentication information to a plug-in, where the authentication information is related to a client device. The...
US-9,485,277 Wide area network access management computer
A system and method for connecting a classified internet protocol (IP) network to a public IP network including an unclassified computing device. The...
US-9,485,276 Dynamic service handling using a honeypot
A network device comprises one or more processors coupled to a memory, and a dynamic services module configured for execution by the one or more processors to...
US-9,485,275 Detection of spoofing of remote client system information
Digital fingerprint generation logic executed by a client device includes quirk-exposing logic configured to expose behavioral differences between various...
US-9,485,274 Traffic segmentation in prevention of DDOS attacks
Systems, methods, and computer storage media for traffic segmentation in prevention of DDoS attacks are provided. Data associated with one or more users of a...
US-9,485,273 System and method to diffuse denial-of-service attacks using virtual machines
A system for diffusing denial-of-service attacks by using virtual machines is disclosed. In particular, the system may receive, from a measurement probe, a...
US-9,485,272 Systems and methods for estimating confidence scores of unverified signatures
The disclosed computer-implemented method for estimating confidence scores of unverified signatures may include (1) detecting a potentially malicious event that...
US-9,485,271 Systems and methods for anomaly-based detection of compromised IT administration accounts
A computer-implemented method for anomaly-based detection of compromised information technology (IT) administration accounts may (1) include establishing a set...
US-9,485,270 Polluting results of vulnerability scans
A security device may receive, from a server device, a response to a request. The request may be provided by an attacker device and may include a plurality of...
US-9,485,269 Systems and methods for reporter-based filtering of electronic communications and messages
Methods and apparatuses for filtering electronic communications in a communication system. The method includes receiving a message report from a user in...
US-9,485,268 System, method and apparatus to visually configure an analysis of a program
A method extracts views from an application program, where at least some extracted views include at least one view component, and presenting the extracted views...
US-9,485,267 Anomalous behavior detection using radio frequency fingerprints and access credentials
Electromagnetic (EM)/radio frequency (RF) emissions may be detected and corresponding EM personas may be created. One or more EM personas may be associated with...
US-9,485,266 Security measures based on signal strengths of radio frequency signals
Electromagnetic (EM)/radio frequency (RF) emissions may be detected and corresponding EM personas may be created. One or more EM personas may be associated with...
US-9,485,265 Malicious activity detection system capable of efficiently processing data accessed from databases and...
Various systems and methods are provided that retrieve raw data from issuers, reorganize the raw data, analyze the reorganized data to determine whether the...
US-9,485,264 Coordinated detection and differentiation of denial of service attacks
According to one embodiment, an analyzer module (AM) within a same protected network and on-premise with a web application server (WAS) detects and...
US-9,485,263 Volatility-based classifier for security solutions
Various embodiments provide an approach to classifying security events based on the concept of behavior change detection or "volatility." Behavior change...
US-9,485,262 Detecting past intrusions and attacks based on historical network traffic information
A device may receive information that identifies an attack signature for detecting an intrusion. The device may determine a device configuration that is...
US-9,485,261 Web security protection method, device and system
A method, device and system for network security protection comprise: according to a received scan task, a network security device performs a security bug scan...
US-9,485,260 Method and apparatus for information verification
The present disclosure provides a method and an apparatus for user verification. A terminal device recognizes a sequence of click operations made by the user...
US-9,485,259 System and architecture for electronic permissions and security policies for resources in a data system
An electronic permissions and security system are disclosed which may be used to determine permissions and policies for resources in a complex multi-dimensional...
US-9,485,258 Mediation system and method for restricted access item distribution
Mediation systems and methods for restricted access item distribution are disclosed. In an embodiment, a method for facilitating payment from a user device for...
US-9,485,257 Atomically updating ternary content addressable memory-based access control lists
Embodiments described herein provide techniques for atomically updating a ternary content addressable memory (TCAM)-based access control list (ACL). According...
US-9,485,256 Secure assertion attribute for a federated log in
Embodiments of the present invention disclose a method, computer program product, and system for authenticating a user. The application server receives a user...
US-9,485,255 Authentication using remote device locking
A method includes (a) receiving, by the authentication server device, an authentication request from a requesting device in the name of a particular user, the...
US-9,485,254 Method and system for authenticating a security device
Methods for authenticating a security device at a local network location for providing a secure access from the local network location to a remote network...
US-9,485,253 Familiar dynamic human challenge response test content
Embodiments of the invention are directed to human challenge response test delivery systems and methods. Specifically, embodiments of the present invention are...
US-9,485,252 Apparatuses, methods and systems for virtualizing a reprogrammable universal integrated circuit chip
Apparatuses, methods, and systems are provided for virtualizing a reprogrammable universal integrated circuit chip (UICC) in a connected device's operating...
US-9,485,251 Methods and systems for authenticating users
A method of authenticating users to reduce transaction risks includes indicating a desire to conduct a transaction and determining whether the transaction...
US-9,485,250 Authority trusted secure system component
One embodiment is in the form of a Self-Service Terminal (SST), such as an automated teller machine (ATM). The SST includes a peripheral device, such as a cash...
US-9,485,249 User authentication in a mobile telecommunications system
A computer, such as a Windows-based PC (10), has associated with it a Subscriber Identity Module (or SIM) (12), such as of the type used in a GSM cellular...
US-9,485,248 Elevating trust in user identity during RESTful authentication and authorization
Credentials sent over a back channel during the authentication of a user to a RESTful service can elevate the trust the recipient system can place in the user's...
US-9,485,247 On-board vehicle communication system and method
An on-board vehicle communication system and method employ a storage device, a communication device and a controller. The storage device is configured to store...
US-9,485,246 Distributed authentication with data cloud
A method includes, in response to a need to access for a user certain stored data that requires authentication, sending a request for the stored data into a...
US-9,485,245 Industrial protocol system authentication and firewall
Aspects of the present invention provide machines, systems, and methods in which industrial control systems may be secured from compromise and/or disruption via...
US-9,485,244 Executing an operation over file repositories located in different authentication domains using a...
An initial server, located in an initial authentication domain, receives a requested operation from a RESTful client system, and generates a redirections list...
US-9,485,243 Securing a wireless mesh network via a chain of trust
A master beacon device emits a data packet that is received and retransmitted by servant beacon devices in a wireless mesh network that enables the beacon...
US-9,485,242 Endpoint security screening
In order to prevent unauthorized access to information, a system may analyze and may selectively store the information provided based on requests from users...
US-9,485,241 Secure communication paths in data networks with tethered devices
A communication network processes intermediate security data from intermediate access nodes on a communication path between a network access node and an...
US-9,485,240 Multi-account login method and apparatus
The present invention discloses a multi-account login method and apparatus. Herein, the multi-account login method comprises: opening a temporary webpage window...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.