Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,548,992 System and method for detecting network activity of interest
Systems and methods for detecting a visual characteristic of interest within an image are disclosed. An example method involves obtaining an image that includes...
US-9,548,991 Preventing application-level denial-of-service in a multi-tenant system using parametric-sensitive transaction...
Denial-of-service attacks are prevented or mitigated in a cloud compute environment, such as a multi-tenant, collaborative SaaS system. This is achieved by...
US-9,548,990 Detecting a heap spray attack
Various techniques for exploit detection based on heap spray detection are disclosed. In some embodiments, exploit detection based on heap spray detection...
US-9,548,989 Network monitoring apparatus and method
When obtained communication data corresponds to an external communication from the outside of the network to the inside, external communication data is stored....
US-9,548,988 Systems and methods for attributing potentially malicious email campaigns to known threat groups
The disclosed computer-implemented method for attributing potentially malicious email campaigns to known threat groups may include (1) identifying a potentially...
US-9,548,987 Intelligent remediation of security-related events
An information processing system implements an intelligent remediation system for security-related events. The intelligent remediation system comprises a...
US-9,548,986 Sensitive data tracking using dynamic taint analysis
A system and method for tracking sensitive data uses dynamic taint analysis to track sensitive data as the data flows through a target application running on a...
US-9,548,985 Non-invasive contextual and rule driven injection proxy
User requests for a web application can be received at a reverse proxy. Web application code for a first application can be obtained. Data can be checked at the...
US-9,548,984 Authorizing a user by means of a portable communications terminal
A method and system for authorizing a user at a field device by a portable communications device. A first information is acquired by the portable communications...
US-9,548,983 Cross access login controller
Systems and methods here may be used for authorizing network access including using a flow controller server in communication with a first gateway associated...
US-9,548,982 Secure controlled access to authentication servers
An authentication-related request sent from a mobile device to an authentication server is received at a proxy server. A posture of the mobile device is...
US-9,548,981 Method and system for providing security for universal plug and play operations in a home network environment...
A method and system for providing security to Universal Plug and Play (UPnP) operations in a home network environment based on ownership rights where a request...
US-9,548,980 Method for providing user interface for each user, method for performing service, and device applying the same
A method and device for performing a service. The method includes detecting whether a user terminal device approaches an approach recognition area, receiving...
US-9,548,979 Systems and methods for authentication program enrollment
Methods and systems for enrolling a user in an authentication program. In some embodiments, voice interaction that includes a request or command is received...
US-9,548,978 Method and system for authorizing secure electronic transactions using a security device
Methods and systems for authenticating a security device for providing a secure access and transaction authorization to a remote network location are provided....
US-9,548,977 System, method, and apparatus for performing reliable network, capability, and service discovery
A system, method, and apparatus are provided for performing reliable network, capability, and service discovery. A method may include providing for transmission...
US-9,548,976 Facilitating single sign-on to software applications
After an initial user sign-on with an identity provider, and in response to an intention of the user to use a third-party application executing on a client...
US-9,548,975 Authentication method, authentication system, and service delivery server
A client terminal transmits a signal related to an authentication request to a service delivery server through a browser every time an application is started by...
US-9,548,974 Network system, network device and connection control method
A network system includes: a network device; and a portable connection device capable of connecting thereto a terminal device which accesses the network device,...
US-9,548,973 Detecting and responding to an atypical behavior
Methods, devices, and systems are provided for optimizing the dissemination of information in various types of systems such as an access control system. More...
US-9,548,972 Multi-drive cooperation to generate an encryption key
A system, method, and computer-readable storage medium for protecting a set of storage devices using a secret sharing scheme. The data of each storage device is...
US-9,548,971 Systems and methods for smart cipher selection
A computer-implemented method for smart cipher selection may include (1) receiving, at a server and from a client, a request to communicate according to a...
US-9,548,970 Managing unlinkable identifiers for controlled privacy-friendly data exchange
A method for managing unlinkable database user identifiers includes distributing to a first database a first encrypted user identifier, a first database...
US-9,548,969 Encryption/decryption method, system and device
An encryption/decryption method are described, which includes that a terminal performs an encryption operation according to information of an encryption...
US-9,548,968 Image sharing system
A server system for distributing information securely includes a network interface for receiving, over a network, an information object accompanied by metadata....
US-9,548,967 Method and apparatus for interworking authorization of dual stack operation
A method and apparatus for dynamic home address assignment by a home agent in multiple network interworking. The invention provides a method and apparatus send...
US-9,548,966 Validating visitor internet-based security threats
A validating server receives from a client device a first request that does not include a cookie for a validating domain that resolves to the validating sever....
US-9,548,965 Proxy methods for suppressing broadcast traffic in a network
Some embodiments use proxies on host devices to suppress broadcast traffic in a network. Each host in some embodiments executes one or more virtual machines...
US-9,548,964 VPN for containers and virtual machines in local area networks
A method, system and computer program product for a VPN for containers and VMs implemented on different network node. A number of network hardware nodes have...
US-9,548,963 Method and system to enable a virtual private network client
Aspects of the subject disclosure may include, for example, a method comprising transmitting, by a controller comprising a processor, a request to a server to...
US-9,548,962 Apparatus and method for providing a fluid security layer
A security management capability enables migration of individual security rules between storage/application locations. The migration of a security rule may...
US-9,548,961 Detecting adverse network conditions for a third-party network site
A network protection service for providing protective assistance to a subscribing host is presented. The network protection service is configured determine a...
US-9,548,960 Simplified packet routing
A method for communication, includes routing unicast data packets among nodes in a network using respective Layer-3 addresses that are uniquely assigned to each...
US-9,548,959 Address resolution suppression for data center interconnect
An example method is provided that includes determining whether an address resolution protocol reply from a local machine has been received at an edge node;...
US-9,548,958 Determining post velocity
Establishing the likely duration and precision with which the post was written is disclosed. An analysis may be used to infer how confident the user is of the...
US-9,548,957 System and method for facilitating transactions as conversations between participants
A computer-implemented system keeps records of communications between participants as a conversation. All communications between participants in a transaction...
US-9,548,956 Journaling, analysis, and archiving of electronic communications
Disclosed is a communication journaling and archival system which obtains content from social networks, handles re-authentication requirements which occur with...
US-9,548,955 Computer product, consolidation support method, and consolidation support apparatus
A computer-readable recording medium stores a consolidation support program that causes a computer to execute a process that includes acquiring an electronic...
US-9,548,953 Temporary suspension of electronic communications
Disclosed are various embodiments for a transmission service to suspend temporarily transmission of electronic communications to a recipient. In one embodiment,...
US-9,548,952 Method and radio communication device for the transmission efficient editing of multimedia messages
In order to edit, in a transmission-efficient manner, multimedia news before sending or receiving such news, the existing user data volume (VOL) of a piece of...
US-9,548,951 Providing additional information related to a vague term in a message
Methods and apparatus related to providing additional information related to a vague term in a message. For example, in some implementations, one or more...
US-9,548,950 Switching camera angles during interactive events
Multiple camera angles of an interactive event are simultaneously transmitted as part of a broadcast. The simultaneous distribution of multiple synchronized...
US-9,548,949 Message handling multiplexer
A method and apparatus for processing message is described. In one embodiment, an application programming interface is configured for receiving and sending...
US-9,548,948 Input current cancellation scheme for fast channel switching systems
A multichannel system, including a multiplexer having inputs for a plurality of input channels, and a pre-charge buffer having a plurality of inputs coupled to...
US-9,548,947 PPI de-allocate CPP bus command
Within a networking device, packet portions from multiple PDRSDs (Packet Data Receiving and Splitting Devices) are loaded into a single memory, so that the...
US-9,548,946 SAS domain management and SSP data handling over ethernet
A server application is executed on an active device within the SAS domain, the active device connected to a remote client via an Ethernet connection. At least...
US-9,548,945 Matrix of on-chip routers interconnecting a plurality of processing engines and a method of routing using thereof
Embodiments of the present invention relate to a scalable interconnection scheme of multiple processing engines on a single chip using on-chip configurable...
US-9,548,944 Systems, apparatus, and methods for non-blocking switch networks
A switch network may include a plurality of switch stages arranged in sequential stages. The plurality of switch stages may include a first switch stage...
US-9,548,943 Dual communication-interface facility monitoring and management system and method
A dual communication-interface facility monitoring and management system, the system including a multiplicity of facility monitoring\management devices, the...
US-9,548,942 Linking instances within a cloud computing environment
Embodiments of the present invention provide an approach to allow a user to link multiple cloud instances (e.g., virtual machines) together such that an action...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.