Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,553,890 Devices, systems, and methods for detecting proximity-based mobile malware propagation
Devices, systems, and methods are disclosed. An agent resides in a mobile communication device. The agent detects Proximity-based Mobile Malware Propagation....
US-9,553,889 System and method of detecting malicious files on mobile devices
Disclosed are system, method and computer program product for detecting malicious files on mobile devices. An example method includes: analyzing a file to...
US-9,553,888 Systems and methods for dynamic protection from electronic attacks
Systems and methods for gathering, classifying, and evaluating real time security intelligence data concerning security threats presented by an IP address, and...
US-9,553,887 Virtual machine compliance checking in cloud environments
One or more examples provide a method of transferring a virtual machine between a virtualized computing system and a cloud computing system that includes:...
US-9,553,886 Managing dynamic deceptive environments
A deception management system to detect attackers within a dynamically changing network, including a deployment governor dynamically designating a deception...
US-9,553,885 System and method for creation, deployment and management of augmented attacker map
A network surveillance system including a deception management server within a network, including a deployment module managing and planting decoy attack vectors...
US-9,553,883 Method and an apparatus to perform multiple packet payloads analysis
A method and an apparatus to perform multiple packet payload analysis have been disclosed. In one embodiment, the method includes receiving a plurality of data...
US-9,553,882 Correlation of advertising content to malicious software
Technologies are generally described for systems, methods and devices effective to analyze a file. In some examples, a processor may receive the file. The file...
US-9,553,881 Security monitoring for optical network
Apparatus for an optical communications network has optical paths for optical traffic, and optical ports, one of which is an unused output port. A security...
US-9,553,880 Subscription media on demand VII
An electronic media distribution/play system includes a service facility that has a communications network interface and maintains a data file catalog. The...
US-9,553,879 Method and apparatus to represent and use rights for content/media adaptation/transformation
The invention provides a method and apparatus for providing content in a network having a network proxy arranged between a mobile terminal and a content...
US-9,553,878 People directory with social privacy and contact association features
In one embodiment, a social networking system provides people look up service and establish anonymous communication session between users; creates contact...
US-9,553,877 Installing virtual machines within different communication pathways to access protected resources
One or more processors fractionate a computer application into disparate components, and assign two or more of the disparate components to different...
US-9,553,876 IOT device environment detection, identification and caching
A method and apparatus for controlling latency within a wireless system, and more specifically sharing, updating and storing status information between devices...
US-9,553,875 Managing user access in a communications network
A method of operating a node for performing handover between access networks wherein a user has authenticated for network access in a first access network. The...
US-9,553,874 Programmable display apparatus, control method, and program with facial authentication
Provided is a programmable display apparatus that can permit access to an application through facial authentication, and can display a screen corresponding to...
US-9,553,873 Conducting sessions with captured image data of physical activity and uploading using token-verifiable proxy...
A token-verifiable proxy uploader is disclosed. A token request may be transmitted from an end-user communication device for requesting an upload token from a...
US-9,553,872 Method and system for providing zero sign on user authentication
An approach for receiving a request for an authentication code for presentation in an authentication user interface, wherein the request is from a relying party...
US-9,553,871 Clock synchronized dynamic password security label validity real-time authentication system and method thereof
This invention discloses a clock synchronized dynamic password security label validity real-time authentication system and method thereof, which comprises, the...
US-9,553,868 Toggle between accounts
Techniques are described for enabling administrators of teams that use a particular service to specify which sign-on options, of multiple possible sign-on...
US-9,553,867 Secure application access system
A proxy server receives a synchronization request from an application program resident on a user device. The proxy server determines that the user device...
US-9,553,866 Method and apparatus of providing messaging service and callback feature to mobile stations
Disclosed are an apparatus and method of performing automated administrative operations on a mobile device. One example method may include determining via a...
US-9,553,865 Protecting websites from cross-site scripting
Methods and systems for protecting websites from cross-site scripting are disclosed. A request for a web page comprising a web page element is received from a...
US-9,553,864 Dual code authentication system
A verification method and system are disclosed that verify a user. The user is provided a verification code via, for example, a website, to be communicated to...
US-9,553,863 Computer implemented method and system for an anonymous communication and computer program thereof
A communication service accessible on a web that authenticates user credential information of a first user to authorize a request in order to perform a...
US-9,553,862 Communication system, management apparatus, communication method and computer-readable recording medium
In the present invention, a start request terminal transmits start request information including participation restriction information to a management system. A...
US-9,553,861 Systems and methods for managing access to services provided by wireline service providers
A computer-implemented method for managing access to services provided by wireline service providers may include (1) receiving at least one request from a...
US-9,553,860 Email effectivity facility in a networked secure collaborative exchange environment
In embodiments of the present invention improved capabilities are described for managing access to a secure exchange environment managed by an intermediate...
US-9,553,859 Adaptive method for biometrically certified communication
A communication device and method for authentication of a message being transmitted from the communication device. The method includes receiving, by a messaging...
US-9,553,858 Hardware-based credential distribution
This document describes various techniques for distributing credentials based on hardware profiles. A resource access request including a hardware profile is...
US-9,553,857 Communication system, communication apparatus, communication method, and computer program
Content is transmitted within a range of the user's legitimate use while limiting the number of equipment to which the content is transmitted at the same time....
US-9,553,856 Secure session capability using public-key cryptography without access to the private key
A server establishes a secure session with a client device where a private key used in the handshake when establishing the secure session is stored in a...
US-9,553,855 Storing a key to an encrypted file in kernel memory
Storing a key to an encrypted file in a kernel memory is disclosed. Authentication data may be received and authentication credentials of the authentication...
US-9,553,854 Data security service
A distributed computing environment utilizes a cryptography service. The cryptography service manages keys securely on behalf of one or more entities. The...
US-9,553,853 Techniques for load balancing in a packet distribution system
Various embodiments are generally directed to techniques to distribute encrypted packets among multiple cores in a load-balanced manner for further processing....
US-9,553,852 Secure connection between a data repository and an intelligence application
Embodiments of the invention are directed to systems, methods and computer program products for establishing a secure connection between a data repository and...
US-9,553,851 Methods and apparatuses to track information using call signaling messages
Methods and systems to facilitate real time communications via a telephonic apparatuses that support data communications. In one embodiment, a telephonic...
US-9,553,850 Multi-tenant secure separation of data in a cloud-based application
Multi-tenant and single-tenant methodologies are blended into a single solution to provide cost savings of multi-tenancy along with data security and privacy of...
US-9,553,849 Securing data based on network connectivity
A method includes identifying a trusted computer network. The method also includes monitoring a plurality of active network connections. The method further...
US-9,553,848 Secure conditional access and digital rights management in a multimedia processor
Methods and systems for processing video data are disclosed herein and may comprise receiving within a single mobile multimedia processor chip integrated within...
US-9,553,847 Virtual desktop accelerator with support for multiple cryptographic contexts
In particular embodiments, a method includes intercepting a remote desktop connection request and connecting to a network gateway based on the remote desktop...
US-9,553,846 Method and system for realizing virtual network
A virtual network (VN) realization method and system are provided. The method includes setting a VN-AP in a data center network and/or a broadband network. A...
US-9,553,845 Methods for validating and testing firewalls and devices thereof
A method, non-transitory computer readable medium, and traffic management computing device that obtains one or more parameters for a packet. Firewall policies...
US-9,553,844 DNS application server
A method for providing access to an Internet resource includes receiving a DNS query including a hostname to be resolved, receiving status data, invoking a code...
US-9,553,843 Service directory profile for a fabric network
Methods and systems for obtaining service directory information for a remote service including sending a service endpoint query to a remote service requesting a...
US-9,553,842 Method and apparatus of processing social networking-based user input information
A method and apparatus of processing communications with end users are disclosed. One example method may include detecting a message or post on a website over...
US-9,553,841 Interactive content in a messaging platform
A messaging platform forms an interactive message with one or more components and broadcasts the interactive message to client devices associated with accounts....
US-9,553,840 Information sharing system, server device, display system, storage medium, and information sharing method
An example of an information sharing system includes at least one processor configured to: accept posting information on a content posted by each of a plurality...
US-9,553,839 Method and arrangement for obtaining an electronic mail service
The a user interface (UI) residing in a mobile environment, which has a possibility of indicating after reading each message whether or not the message is...
US-9,553,838 Querying for devices based on location
Querying for devices based on location is disclosed. A request to send a push notification to a location is received. One or more bucket indexes to search for...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.