Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,531,742 Detection of malicious network connections
In one embodiment a method, system and apparatus is described for detecting a malicious network connection, the method system and apparatus including...
US-9,531,741 Controlling a computer system
A method and apparatus for control of a computer system are disclosed. The computer system includes a terminal for operator based monitoring of the computer...
US-9,531,740 Software program identification based on program behavior
Operations performed by a software application instance executed by a computing device are monitored. A determination is made that a particular operation...
US-9,531,739 Methods and systems for detecting an electronic intrusion
Methods and systems for detecting an electronic intrusion are described. A notification is received, over a network, from a server, the notification reporting a...
US-9,531,738 Cyber security adaptive analytics threat monitoring system and method
A system and method of detecting command and control behavior of malware on a client computer is disclosed. One or more DNS messages are monitored from one or...
US-9,531,737 Method and vehicle-to-X communication system for selectively checking data security sequences of received...
A method for selectively checking data security sequences of received vehicle-to-X messages, in which a number of the vehicle-to-X messages are received and/or...
US-9,531,736 Detecting malicious HTTP redirections using user browsing activity trees
A method for detecting malicious HTTP redirections. The method includes obtaining, based on a single client IP address, HTTP flows triggered by visiting a...
US-9,531,735 Systems and methods for delivering introspection notifications from a virtual machine
Described systems and methods enable a computer security module to protect a set of guest virtual machines against computer security threats. In some...
US-9,531,734 Method and apparatus for intercepting or cleaning-up plugins
The present invention discloses a method and apparatus for intercepting or cleaning-up plugins. The methods may include: obtaining performance attributes of a...
US-9,531,733 Device, system, and method of detecting a remote access user
Devices, systems, and methods of detecting user identity, differentiating between users of a computerized service, and detecting a possible attacker. The...
US-9,531,732 Computer implemented system and method for authenticating a sender of electronic data to a recipient
A sever receives data from a sender to be dispatched to a recipient. Before dispatching the data to the recipient the server sends a message to the sender's...
US-9,531,731 Method for establishing a plurality of modes of operation on a mobile device
A method, device and system for establishing plural modes of operation on a mobile device, including: associating each application on the mobile device with one...
US-9,531,730 Apparatus, and associated method, for alerting user of communication device of entries on a mail message...
Apparatus, and an associated method, for alerting a respondent that generates a reply to a received mail message of addressing of the reply message to a...
US-9,531,728 Controlled delivery and assessing of security vulnerabilities
A method for providing security vulnerability information is provided. The method may include checking for the security vulnerability information product...
US-9,531,727 Indirect user authentication
As disclosed herein a method, executed by a computer, includes receiving, from a user, a request for access to a shared system, wherein the request comprises a...
US-9,531,726 Systems and methods for automatic discovery of systems and accounts
In various embodiments, a method comprises scanning a directory structure to generate a scan result comprising a plurality of discovered systems, identifying...
US-9,531,725 Optimizing infrastructure support based on authenticated access, validation and context related information...
fSystems and methods for infrastructure support optimization are described. The system includes an authorization module to verify a user, based on authorization...
US-9,531,724 Systems and methods of assessing permissions in virtual worlds
Systems and methods of virtual world interaction, operation, implementation, instantiation, creation, and other functions related to virtual worlds (note that...
US-9,531,723 Phased bucket pre-fetch in a network processor
A packet processor provides for rule matching of packets in a network architecture. The packet processor includes a lookup cluster complex having a number of...
US-9,531,722 Methods for generating an activity stream
A method includes receiving, at one or more server computers, an activity information request regarding an object; determining whether a user associated with...
US-9,531,721 Networked access control system
Methods and systems for controlling a network access control system that includes a server encrypting a first identifier that can be related to a registered...
US-9,531,720 System and methods for leveraging an object cache to monitor network traffic
According to non-limiting embodiments disclosed herein, the functionality of an object cache in a server can be extended to monitor and track web traffic, and...
US-9,531,719 Permissions for hybrid distributed network resources
A computing resource service provider may receive, from a user client connected to an on-premises network, a security document specifying one or more user roles...
US-9,531,718 Confirming the identity of integrator applications
An application service system receives, from a merchant service system, an application program code comprising identifying information. The identifying...
US-9,531,717 Method of securing access to data or services that are accessible via a device implementing the method and...
The invention allows to secure access to data or services that are available for devices and applications via a device implementing the method. In order to...
US-9,531,716 Service enabled network
In one embodiment, a service enabled network (SEN) controller receives, from a control plane of a network service device, service instructions for corresponding...
US-9,531,715 Method and system for protecting credentials
A method and system for accessing local resources. The method includes intercepting, by a proxy, a request from an application to access a local resource, where...
US-9,531,714 Enterprise authentication via third party authentication support
Methods and systems are disclosed for providing approaches to enterprise authentication via third party authentication support. The methods and systems may...
US-9,531,713 Method and system for enabling and disabling execution of computer instructions
In a computer implemented method or system, users are enabled to associate usage rights with at least a first entity and a second entity. The first entity and...
US-9,531,712 Systems and methods for decryption as a service via a message queuing protocol
Systems and methods for decryption of payloads are disclosed herein. In various embodiments, systems and methods herein are configured for decrypting thousands...
US-9,531,711 Methods, systems, and computer program products for providing media management
An aspect of media management services includes allocating a portion of a storage system to a user, storing media files received from the user in the allocated...
US-9,531,710 Behavioral authentication system using a biometric fingerprint sensor and user behavior for authentication
A method and a corresponding device for authenticating a user for access to protected information, including at a registration stage, generating a biometric...
US-9,531,709 Securely unlocking a device using a combination of hold placement and gesture
A method includes receiving input from a touchscreen of a mobile electronic device, and receiving input from a plurality of contact sensors of the mobile...
US-9,531,708 Systems and methods for using wearable technology for biometric-based recommendations
Methods and systems are disclosed herein for determining a biometric state of a user or an emotional state of a user. Based on the determined biometric state or...
US-9,531,707 Convenient and secure biometrically authenticated system and method for delivering E-mail and parcels
A computer implemented method that includes receiving a biometric identifier from a biometric reader, generating an identifier associated with the biometric...
US-9,531,706 Icon password setting apparatus and icon password setting method using keyword of icon
Disclosed is an icon password setting apparatus and an icon password setting method, which provide a keyword of an icon for an icon password to be set. The icon...
US-9,531,705 Systems and methods for computer digital certificate management and analysis
Described herein are methods and systems for updating digital certificates on a computer and testing to confirm that the update was performed correctly. The...
US-9,531,704 Efficient network layer for IPv6 protocol
An electronic device may include a network interface that may enable the electronic device to wirelessly couple the electronic device to other electronic...
US-9,531,703 Single sign-on via application or browser
Single sign-on techniques via an application or browser are described. In one or more implementations, a single instance of entry of authentication information...
US-9,531,702 Two-factor authentication systems and methods
Systems and methods for authenticating defined user actions over a computer network. An authentication service receives an authentication request from an...
US-9,531,701 Method, device, and system of differentiating among users based on responses to interferences
Devices, systems, and methods of detecting user identity, differentiating between users of a computerized service, and detecting a cyber-attacker. An end-user...
US-9,531,700 Authentication survivability for assigning role and VLAN based on cached radius attributes
A system and method is described that allows the assignment of roles and/or VLANs to an authenticated client device even when an external remote authentication...
US-9,531,699 Electronic protected health information security for digital medical treatment room
A medical imaging system includes a data store having stored medical imaging data and a computer. The system may be in a medical treatment room and is adapted...
US-9,531,698 Identity selector for use with a user-portable device and method of use in a user-centric identity management...
An identity selector manages the identity requirements of an online interaction between a user and a service provider environment. The identity selector is...
US-9,531,697 Configurable adaptive access manager callouts
A framework, which conforms to the OAuth standard, involves a generic OAuth authorization server that can be used by multiple resource servers in order to...
US-9,531,696 Apparatus, system and method for secure payment
Embodiments of the invention generally relate to apparatus, systems and methods for authentication, in particular, apparatus, systems and methods for...
US-9,531,695 Access control to secured application features using client trust levels
Architecture that facilitates the conveyance of a trust level when the caller makes a call, the trust level in dependence on the state of the caller system. The...
US-9,531,694 Intelligent delivery system
An access control system includes a plurality of containers. Each container comprises a container identification feature, an interior space, a locking device...
US-9,531,693 Auditable retrieval of privileged credentials
In an approach for providing auditable retrieval of privileged credentials in a privilege identity management (PIM) system, a processor invokes a checkout of a...
US-9,531,692 Method of securing mobile applications using distributed keys
Aspects of the present disclosure are directed to methods and systems for securing mobile computing applications with distributed keys. In one aspect, a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.