Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,544,339 Computer system, a telecommunication device and a telecommunication network
A telecommunication network 20 configures a telecommunication device 11 and makes and controls communication connections between telecommunication devices. The...
US-9,544,338 Call handling for IMS registered user
The present invention proposes a solution for providing IMS services to users having circuit-switched controlled terminals. In particular, it is proposed, in...
US-9,544,337 Converged media packet gateway for a novel LTE data and voice core network architecture
An Evolved Packet Core network comprises a converged media packet gateway control element including a GTP-C function of SGW, PGW, and P-CSCF and ATCF functions....
US-9,544,336 Mechanisms for handling SIP glare across multiple dialogs
The system and method detect and properly handle a glare condition in a SIP communication session. A glare condition is where a communication device has two...
US-9,544,335 Method and system for local calling via webpage
The present disclosure provides a method for local calling via a webpage, including that: a local calling operation instruction is serialized, the serialized...
US-9,544,334 Policy routing-based lawful interception in communication system with end-to-end encryption
A method for intercepting encrypted communications exchanged between first and second computing devices in a communication network, wherein interception is...
US-9,544,333 Policy setting for content sharing of a plurality of remotely connected computing devices in physical or...
An information handling system includes a method for executing instructions for a content sharing system having mixed operating system capabilities, detecting...
US-9,544,332 Method and system for network service health check and load balancing
A non-transitory computer readable medium includes instructions which, when executed by one or more network devices, causes performance of operations. The...
US-9,544,331 Method and system for controlling access to shared devices
A non-transitory computer readable medium includes computer readable program code including instructions for subsequent to a client device associating with an...
US-9,544,330 Method of securing management interfaces of virtual machines
A virtual server set is disclosed, comprising one or more virtual servers for processing user requests, the virtual server set comprising, at least a first...
US-9,544,329 Client/server security by an intermediary executing instructions received from a server and rendering client...
In an embodiment, a method comprises intercepting, from a server computer, a first set of instructions that define a user interface; executing, using a headless...
US-9,544,328 Methods and apparatus for providing mitigations to particular computers
Mitigation for combating malicious codes is delivered to particular endpoint computers. A first malicious code pattern is received in a first computer over a...
US-9,544,327 Prioritizing security findings in a SAST tool based on historical security analysis
A cloud-based static analysis security tool accessible by a set of application development environments is augmented to provide for anonymous knowledge sharing...
US-9,544,326 Digital weapons factory and digital operations center for producing, deploying, assessing, and managing digital...
A method of rapidly producing a new cyber response tool (e.g., in near-real-time) by matching vulnerabilities of enemy threats (e.g., a missile and/or a tank)...
US-9,544,325 Social network security monitoring
A computer-implemented method includes security settings data associated with one or more profiles of a protected social entity on one or more social networks...
US-9,544,324 System and method for managed security assessment and mitigation
In an embodiment of the invention, a system for assessing vulnerabilities includes: a security management system; a network device in a system under test (SUT),...
US-9,544,323 System and method for remotely conducting a security assessment and analysis of a network
A system and method for performing a security audit of a target network. The system includes a device that establishes a connection to the target network...
US-9,544,322 Systems, methods, and media protecting a digital data processing device from attack
In accordance with some embodiments of the disclosed subject matter, systems, methods, and media for protecting a digital data processing device from attack are...
US-9,544,321 Anomaly detection using adaptive behavioral profiles
Anomalous activities in a computer network are detected using adaptive behavioral profiles that are created by measuring at a plurality of points and over a...
US-9,544,320 Detection of intrusion in a wireless network
A method and associated system for detecting intrusion of a wireless network. A determination is made that a first data stream received by the wireless network...
US-9,544,319 Anomaly detection on web client
Embodiments for anomaly detection on a web client are generally described herein. A processor on the web client is monitored, where a web browser is installed...
US-9,544,318 HTML security gateway
A technique allows a client computing system with a web browser to receive a web page in response to transmitting a request for content. The web page may...
US-9,544,317 Identification of potential fraudulent website activity
Identification of potential fraudulent website activity is performed based on log entry analysis. A log entry representing a user referral from an external...
US-9,544,316 Method, device and system for detecting security of download link
A method, a device and a system for detecting security of a download link are provided. The method comprises: pre-acquiring an information set of download link...
US-9,544,315 Access-level control apparatus
An access-level control apparatus includes an NC machine tool, an RFID that is held by an operator and stores an ID given to the operator, a reader unit that...
US-9,544,314 Method for managing access to protected computer resources
A system for securing and tracking usage of transaction services or computer resources by a client computer from a first server computer, which includes...
US-9,544,313 Systems, devices, and methods for authentication in an analyte monitoring environment
Systems, devices, and methods are provided that allow the authentication of devices within analyte monitoring systems. The analyte monitoring systems can be in...
US-9,544,312 Methods and systems for managing directory information
Methods and systems for managing directory information, such as onboarding a LDAP server, employing a processor coupled to memory and other computer hardware...
US-9,544,311 Secure identity propagation in a cloud-based computing environment
The present disclosure describes methods, systems, and computer program products for providing secure identity propagation in a cloud-based computing...
US-9,544,310 Discovering and disambiguating identity providers
Systems, methods, and computer-readable storage media are provided for discovering and disambiguating identity providers such that user knowledge of appropriate...
US-9,544,309 System and method for enrolling in a biometric system
A system and method for enrolling in a biometric authorization system. A system user may be authorized to enroll by providing biometric data from both his...
US-9,544,308 Compliant authentication based on dynamically-updated credentials
A system, method and a computer-readable medium for authenticating a user in a live manner in non-face-to-face transactions, including a user downloading an...
US-9,544,307 Providing a security mechanism on a mobile device
Disclosed are methods, apparatus, systems, and computer program products for providing a security mechanism on a mobile device before performing an action on a...
US-9,544,306 Attempted security breach remediation
Methods, systems, apparatuses, and computer program products are provided for remediating suspected attempted security breaches. For example, a method is...
US-9,544,305 Server and method of providing server-based car security service, car device and method of using server-based...
A server-based car security service provides for image and position information to be provided to the server. The server uses the image information to make an...
US-9,544,304 Auditing and permission provisioning mechanisms in a distributed secure asset-management infrastructure
The embodiments described herein describe technologies for ticketing systems used in consumption and provisioning of data assets, such as a pre-computed (PCD)...
US-9,544,303 System and device for consolidating SIM, personal token, and associated applications for selecting a...
The present invention relates generally to a smart card device that is configured to facilitate wireless network access and credential verification....
US-9,544,302 Systems and methods for empowering IP practitioners
A browser application has at least two web browser objects for browsing Private PAIR while hiding multi-page navigation from a user. The browser application is...
US-9,544,301 Providing data security with a token device
A computer-implemented method for providing security to access and store data may include transferring first information for display from a token device having...
US-9,544,300 Method and system for providing device-specific operator data for an automation device in an automation...
Method and system for providing device-specific operator data for an automation device in an automation installation, which automation device authenticates...
US-9,544,299 Information processing apparatus, server, method for controlling the same and storage medium
An information processing apparatus for accessing a server via a network transmits an issuance request of a certificate including information unique to the...
US-9,544,298 Method for certificate-based authentication
A first subscriber authenticates himself to a second subscriber with a certificate associated to the first subscriber. The certificate specifies one or several...
US-9,544,297 Method for secured data processing
A method for facilitating secured data processing, the method includes generating, for each client out of at least two clients, a private key, and a public key;...
US-9,544,296 Transferring web-application prerequisite files while authentication interface occludes web-application interface
A web browser sends to a web-application server a request to access a web application. The web server transmits to the web browser a parent document with an...
US-9,544,295 Login method for client application and corresponding server
The present disclosure provides a login method for a client application and a corresponding server. The method includes: sending an access token to a browser of...
US-9,544,294 Pluggable authorization policies
A framework, which conforms to the OAuth standard, involves a generic OAuth authorization server that can be used by multiple resource servers in order to...
US-9,544,293 Global unified session identifier across multiple data centers
Systems and methods are disclosed for using a global unified session identifier across data centers. When a user first accesses a data center and an initial...
US-9,544,292 Credential management
A credential management system is described that provides a way to disable and/or rotate credentials, such as when a credential is suspected to have been...
US-9,544,291 System and method for limited records access for event scheduling
The longstanding problems of user password management and security, and user authentication are addressed. Disclosed is a system and method for providing a...
US-9,544,290 Device authentication using proxy automatic configuration script requests
Methods and systems for performing device authentication using proxy automatic configuration script requests are described. One example method includes...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.