Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,584,543 Method and system for web integrity validator
A computer-implemented method and system for the validation of a true browsing user on a website is disclosed. The invention allows for the collection of data...
US-9,584,542 Relay attack countermeasure system
An apparatus for preventing a relay attack that includes a microcontroller, a receiver, and a transmitter. The receiver is configured to receive a challenge...
US-9,584,541 Cyber threat identification and analytics apparatuses, methods and systems
The cyber threat identification and analytics ("CTIA") apparatuses, methods and systems, for example, identify a list of relevant malware indicators of...
US-9,584,540 Crowdsourcing of trustworthiness indicators
Systems and methods are described herein for calculating trust score based on crowdsourced information. The trust score may reflect the trustworthiness,...
US-9,584,539 Enhanced browsing with security scanning
A method scans a second web page linked to a first web page being displayed by a browser. The method identifies a target link to the second web page. Prior to...
US-9,584,538 Controlled delivery and assessing of security vulnerabilities
A method for providing security vulnerability information is provided. The method may include checking for the security vulnerability information product...
US-9,584,537 System and method for detecting mobile cyber incident
A method for detecting mobile cyber incidents includes: allowing a mobile incident collection server to determine whether new text is received; extracting the...
US-9,584,536 Presentation of threat history associated with network activity
Methods and systems for extracting, processing, displaying, and analyzing events that are associated with one or more threats are provided. According to one...
US-9,584,535 System and method for real time data awareness
A system includes a sensor and a processor. The sensor is configured to passively read data in packets as the packets are in motion on a network. The processor...
US-9,584,534 Dynamic field re-rendering
A computer-implemented method involves identifying an initial element for serving by a web server system to a client device and recoding the element by creating...
US-9,584,533 Performance enhancements for finding top traffic patterns
A method for network traffic characterization is provided. Flow data records are acquired associated with a security alert signature. Unidimensional traffic...
US-9,584,532 Enterprise intrusion detection and remediation
Events are securely packaged and transmitted from peripherals of terminals and from secure input/out modules (SIOMs) of terminals. The events are collected and...
US-9,584,531 Out-of band IP traceback using IP packets
A method and system for tracing internet protocol packets is disclosed. One aspect of the method involves generating traceback packets containing information...
US-9,584,530 In-band identity verification and man-in-the-middle defense
A variety of techniques for performing identity verification are disclosed. As one example, a verification request is received from a remote user. The...
US-9,584,529 Method and system for obtaining peripheral information, and location proxy server
A method for obtaining peripheral information method is disclosed herein and includes steps of: receiving a request for obtaining peripheral information, and...
US-9,584,528 Securing databases against piracy attacks
A database for location or geographic based services is secured by requiring location based requests to include a unique identifier that identifies the location...
US-9,584,527 User authentication based on FOB/indicia scan
Embodiments of the invention are directed to systems, methods and computer program products for receiving a request from a user for access to at least one...
US-9,584,526 Anonymous discussion forum
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for enabling anonymous posting of content, e.g., over a...
US-9,584,525 Entitlement predictions
Systems, methods, and devices for predicting entitlements to computing resources are described. An entitlement associated with a user of a computer system may...
US-9,584,524 Sensor-based human authorization evaluation
A resource-access management system detects whether a user is authorized to access resources. The system may include a user device being configured to include a...
US-9,584,523 Virtual private network access control
According to an example, a method for virtual private network (VPN) access control includes receiving a request from an application on a user device to access a...
US-9,584,522 Monitoring network traffic by using event log information
A solution is provided for associating network traffic traversing a networked environment according to a selected category item, such as a user name or other...
US-9,584,521 Bi-directional communication over a one-way link
Apparatus for communication includes a single one-way link, which is physically capable of carrying the communication signals in one direction and incapable of...
US-9,584,520 Multi-tiered authentication methods for facilitating communications amongst smart home devices and cloud-based...
Apparatus, systems, methods, and related computer program products for synchronizing distributed states amongst a plurality of entities and authenticating...
US-9,584,519 Apparatus, and associated method, for controlling connectivity of a computer device with a computer network
A computer device can include a plurality of network adapters each operable to connect the computer device with a network, such as a private wired local area...
US-9,584,518 Dynamic communications controller
Apparatuses, systems, methods, and computer program products are disclosed for a dynamic communications session controller. An identity module is configured to...
US-9,584,517 Transforms within secure execution environments
Methods and systems for instantiating an enclave according to a request, the enclave being instantiated at a determined location of a set of locations in a...
US-9,584,516 Proxy authentication for a multiple core network device
The present invention is generally related to a network computing device including a first processor communicating with a second processor as a proxy for a...
US-9,584,515 Enterprise system authentication and authorization via gateway
Methods and systems are disclosed for providing approaches to authenticating and authorizing client devices in enterprise systems via a gateway device. The...
US-9,584,514 Binding mobile device secure software components to the SIM
Various embodiments include a method for binding a secure software application to a mobile device wherein the mobile device includes a processor and a...
US-9,584,513 Network resource management system utilizing physical network identification for privileged network access
The disclosed network resource management system employs a hardware configuration management (HCM) information handling system (IHS) that may couple to a single...
US-9,584,512 Verifying an association between an application and a mobile device through a telecommunication network
A system for verifying an association between an application and a mobile computing device. The mobile computing device transmits a request to a service to...
US-9,584,511 Virtual verification
An automatic machine implemented identification and data processing, gathering and storage system and method. A system, method and computer program product for...
US-9,584,510 Image capture challenge access
Aspects of image capture challenge access are described. In one embodiment, an access service of a computing device directs an imaging system to capture an...
US-9,584,509 Auditing and permission provisioning mechanisms in a distributed secure asset-management infrastructure
The embodiments described herein describe technologies for ticketing systems used in consumption and provisioning of data assets, such as a pre-computed (PCD)...
US-9,584,508 Peer to peer enterprise file sharing
Disclosed are various embodiments for facilitating the distribution of files from a file repository. Files from a file repository can be distributed via peer to...
US-9,584,507 Distributed password verification
Distribution of verification of passwords for electronic account. Password verification is distributed (divided) across multiple entities to reduce potential...
US-9,584,506 Server apparatus, information processing method, program, and storage medium
An information processing method for a server apparatus controlling access based on a role of a user and a scope as authority held by an authorization token for...
US-9,584,505 Cross instance user authentication architecture
In accordance with disclosed embodiments, there are provided methods, systems, and apparatuses for implementing a cross instance user authentication...
US-9,584,504 Auto login method and device
Disclosed are an auto login method and device. The method includes: when a request for auto logging into a designated account is received, acquiring the URL of...
US-9,584,503 Authentication to a remote server from a computing device having stored credentials
Authentication to a remote-server from a computing device having stored credentials for the remote server is described. In one example, a method of...
US-9,584,502 Transfer dongle for stored vehicle information
A data transfer dongle for transferring electronic information from an existing specific vehicle module to a predetermined specific vehicle module. The dongle...
US-9,584,501 Resource protection on un-trusted devices
Authenticating a client device to a service to allow the client device to access a resource provided by the service. A client device obtains a secondary...
US-9,584,500 Methods, systems, and products for authentication of users
Methods, systems, and products authenticate users for access to devices, applications, and services. Skills of a user are learned over time, such that an...
US-9,584,499 Authentication system and method
A system and method whereby the identity of a person, entity, device or the like attempting to gain access to a secured resource may be securely authenticated...
US-9,584,498 Feature activation using near field communication
The present disclosure relates to feature activation using near field communication. In an embodiment, a device may include a chip to receive and store wireless...
US-9,584,497 Managing access to a network
In a method of managing access to a network, a MAC based authentication operation is implemented in determining whether to grant a user device access to the...
US-9,584,496 Systems and methods for securely monitoring an individual
A biometric sensor may be coupled to a portable communications device, such as a cellular telephone. The biometric sensor may be configured to acquire one or...
US-9,584,495 Method and system for establishing secure communications using composite key cryptography
A method is disclosed for establishing a secure communication session using composite key cryptography. The method comprises generating a first plurality of...
US-9,584,494 Terminal and server for applying security policy, and method of controlling the same
A method of operating a terminal using Mobile Device Management (MDM) solution includes: installing an application, requesting for registration by a license key...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.