Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,537,890 Trust in physical networks
A trust network has at least one transmission medium supporting transmission of data, wherein data transmitted is in at least some instances transmitted in...
US-9,537,889 Trusting crowdsourced data with issued tags
Embodiments control submission of crowdsourced data from a computing device to a cloud service. The cloud service receives a packet from the computing device...
US-9,537,888 Proxy server-based malware detection
Disclosed are various embodiments for malware detection by way of proxy servers. In one embodiment, a proxy server application generates a browsing history for...
US-9,537,887 Method and system for network connection chain traceback using network flow data
Disclosed are provided a method and a system for network connection chain traceback by using network flow data in order to trace an attack source site for cyber...
US-9,537,886 Flagging security threats in web service requests
Provided are methods and systems for flagging security threats in web service requests. Specifically, a method for flagging security threats in web service...
US-9,537,885 Secure browsing via a transparent network proxy
A system for providing secure browsing via a transparent network proxy is disclosed. The system may receive, from a client, a request to access a resource. The...
US-9,537,884 Assessment of cyber threats
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for assessing cyber threats. In some implementations, data...
US-9,537,883 Process security validation
Techniques for process security validation are described herein. In one example, a method includes determining, via a processor, that a process is in a first...
US-9,537,882 Methods, systems, and devices for detecting and isolating device posing security threat
Methods and systems are disclosed for detecting a security threat. The methods and systems comprise detecting that a first device is coupled with the first I/O...
US-9,537,881 Security risk mapping of potential targets
A method for security risk mapping of attack vectors of target assets of an organization at risk of being attacked, wherein each of the attack vectors is...
US-9,537,880 Anomalous network monitoring, user behavior detection and database system
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for network monitoring, user account compromise determination,...
US-9,537,879 Cyber security monitoring system and method for data center components
A security monitoring system is disclosed which is adapted for use with a component having a service processor. The system may use a device configured to...
US-9,537,878 Network adaptor configured for connection establishment offload
Coupling circuitry couples a network to a host. The host operating system is configured for transfer of data between the host and at least one peer via the...
US-9,537,877 Method, system, and storage medium for adaptive monitoring and filtering traffic to and from social networking...
Embodiments disclosed herein provide a system, method, and computer readable storage medium storing computer instructions for implementing a Socialware...
US-9,537,876 Method and apparatus for detecting vulnerability status of a target
A computer implemented method for detecting vulnerability status of a target having interfaces and ports is provided. The method comprises tracking the...
US-9,537,875 Handling potentially malicious communication activity
At least some incoming traffic is distributed into a first set of traffic groups according to a first grouping scheme. Communication activity from a potentially...
US-9,537,874 System for providing behavior information notification service and method for providing behavior information...
The present invention has the aim of providing a method of an activity information notification service in which a server can receive activity information from...
US-9,537,873 Secure analysis application for accessing web resources
Embodiments described herein may be directed to systems, methods, apparatuses, devices, computer program products, computer-executable instructions, and/or...
US-9,537,872 Secure neighbor discovery (SEND) using pre-shared key
An extension is provided to the SEND protocol without requiring a CGA or third party trust anchor. A shared key is provided to both a sender and receiver of a...
US-9,537,871 Systems and methods for categorizing network traffic content
A method for categorizing network traffic content includes determining a first characterization of the network traffic content determining a first probability...
US-9,537,870 Detecting unauthorized devices
Methods and systems are disclosed that, in some aspects, provide for receiving a provisioning request from a requesting device, and identifying one or more...
US-9,537,869 Geographical restrictions for application usage on a mobile device
Apps are secured or security-wrapped either before they are downloaded onto a device, such as a smart phone or tablet device, or after they are downloaded but...
US-9,537,868 Communication management and policy-based data routing
A network environment includes a wireless access point providing access to a corresponding network. One or more mobile communication devices communicate with...
US-9,537,867 Digital social network trust propagation
A trust propagation system is disclosed that propagates trust data based on established trust relationships. The trust system may automatically propagate trust...
US-9,537,866 Method and apparatus to control the use of applications based on network service
A method and apparatus to control the use of applications on handheld device is based on network service, the method comprising the steps of: receiving a...
US-9,537,865 Access control using tokens and black lists
Examples of techniques for validating access tokens are described herein. An example computer-implemented method includes receiving, via a processor, a pushed...
US-9,537,864 Encryption system using web browsers and untrusted web servers
In one embodiment of the present invention, a first user--the creator--uses a web browser to encrypt some information. The web browser provides to the creator a...
US-9,537,863 Data driven role based security
Data driven role based security is provided. At login, the system queries for a data context in connection with access to computing objects of a computing...
US-9,537,862 Relayed network access control systems and methods
A computer system for authenticating and managing network traffic may comprise a network link providing a connection to a network, an authentication,...
US-9,537,861 Method of mutual verification between a client and a server
A method of mutual verification between a client and a server is disclosed. The method comprises receiving a request via a telecommunication link, the request...
US-9,537,860 Display control apparatus, display control method and server system
A display control apparatus performs download processing and streaming processing. In the download processing, after first mutual authentication between...
US-9,537,859 Method for authenticating identity of handset user in a cloud-computing environment
A method for authenticating the identity of a handset user in a cloud-computing environment is provided. The method includes: obtaining, a login account and a...
US-9,537,858 Methods and apparatus to support globalplatform.TM. usage on an embedded UICC (eUICC)
Disclosed herein is a technique for managing one or more electronic Subscriber Identity Modules (eSIMs) on an embedded UICC (eUICC). In particular, the...
US-9,537,857 Distributed password verification
Distribution of verification of passwords for electronic account. Password verification is distributed (divided) across multiple entities to reduce potential...
US-9,537,856 Redirection method for electronic content
Electronic content, for example, a web page, is configured for display by a web browser application to include content that is not included in or referenced by...
US-9,537,855 Secure authenticated distance measurement
The invention relates to a method for a first communication device to perform authenticated distance measurement between the first communication device and a...
US-9,537,854 Transmitting encoded digital certificate data to certificate authority using mobile device
Techniques are disclosed for managing a digital certificate enrollment process. A certificate assistant on a server is configured to encode certificate...
US-9,537,853 Sign-on service and client service information exchange interactions
Techniques are described for providing customizable sign-on functionality, such as via an access manager system that provides single sign-on functionality and...
US-9,537,852 Cloud queue access control
An example implementation may involve a media playback system obtaining an authorization token corresponding to a particular queue of media items at a remote...
US-9,537,851 Revoking sessions using signaling
Embodiments are directed to revoking user sessions using signaling. In one scenario, an identity platform operating on a computer system receives an indication...
US-9,537,850 Information processing apparatus, information processing method, and storage medium
An information processing apparatus includes a storage unit capable of storing authentication information corresponding to a web service. Information is output...
US-9,537,849 Service provision system, service provision method, and computer program product
A service provision system includes: a management information storage unit that stores management information for managing user identification information,...
US-9,537,848 Application security system and method
According to an aspect, a computing device includes a processor; a computer readable memory; a display screen; a touch sensitive panel overlying the display...
US-9,537,847 Image based key derivation function
Embodiments of the invention relate to methods of generating and using an image-based derived key. In various embodiments, the image-based derived key may be...
US-9,537,846 Integrity check optimization systems and methods in live connectivity frames
A method, a network element, and a network include determining an authentication mechanism between two nodes in a network path; operating the network path;...
US-9,537,845 Determining authenticity based on indicators derived from information relating to historical events
A method comprises storing in a memory of a first processing device information relating to one or more historical events visible to the first processing device...
US-9,537,844 Access control to operating modules of an operating unit
The invention relates to an operating unit (1) for a production plant (2). The operating unit (1) comprises an authorization receiving module (71) so as to...
US-9,537,843 Method, client, server and system of login verification
The present disclosure introduces a method, a client, a server and a system of login verification. When a user logins, the client obtains a login request from...
US-9,537,842 Secondary communications channel facilitating document security
Disclosed are various embodiments for facilitating the sharing of files or documents on behalf of a sending user to a recipient user. A secured file is...
US-9,537,841 Key management for compromised enterprise endpoints
Threat detection instrumentation is simplified by providing and updating labels for computing objects in a context-sensitive manner. This may include simple...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.