Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,602,538 Network security policy enforcement integrated with DNS server
A plug-in software module of a DNS server helps to enforce a network security policy. The plug-in module scans communication packets at a DNS server computer...
US-9,602,537 Systems and methods for providing secure communication
A client includes a security agent configured to create a client certificate that corresponds to one or more client identifiers. A server includes a server...
US-9,602,536 Virtualized network honeypots
Disclosed are various embodiments for virtualized network honeypots. In one embodiment, client computing devices that are coupled to a network are each...
US-9,602,535 System and method for software defined behavioral DDoS attack mitigation
Systems and methods for software defined behavioral DDoS attack mitigation are provided. According to one embodiment, a method is provided for controlling...
US-9,602,534 Monitoring and mitigating client-side exploitation of application flaws
A system for monitoring and mitigating client-side exploitation of application flaws includes a server to operate a first application. The first application...
US-9,602,533 Detecting network reconnaissance by tracking intranet dark-net communications
A method and system for detecting network reconnaissance is disclosed wherein network traffic can be parsed into unidirectional flows that correspond to...
US-9,602,532 Method and apparatus for optimizing finite automata processing
A method, and corresponding apparatus and system are provided for optimizing matching at least one regular expression pattern in an input stream by walking at...
US-9,602,531 Endpoint-based man in the middle attack detection
A first node of a networked computing environment initiates each of a plurality of different man-in-the middle (MITM) detection tests to determine whether...
US-9,602,530 System and method for predicting impending cyber security events using multi channel behavioral analysis in a...
Multi channel distributed behavioral analysis architecture provides a software solution to the major operational challenges faced with providing an early...
US-9,602,529 Threat modeling and analysis
A system is provided for modeling and analysis of cybersecurity threats may include a data flow diagram (DFD) creator, threat indicator and threat analyzer. The...
US-9,602,528 Discovering and constraining idle processes
Methods and systems for process constraint include collecting system call information for a process. It is detected whether the process is idle based on the...
US-9,602,527 Security threat detection
Systems and methods for retrospective scanning of network traffic logs for missed threats using updated scan engines are provided. According to an embodiment, a...
US-9,602,526 User login monitoring device and method
The present invention discloses a user login monitoring device and method. The method comprises: acquiring a latest user login record list of a user, wherein...
US-9,602,525 Classification of malware generated domain names
Techniques are presented herein that combine a host-based analysis of an executable file on a host computer with a network-based analysis, i.e., an analysis of...
US-9,602,524 Methods and apparatus for application isolation
Processor(s) for detecting malicious software. A hardware virtual machine monitor (HVMM) operates under a host OS. Container(s) initialized with network...
US-9,602,523 Dashboards for displaying threat insight information
Dashboards for displaying threat insight information are provided herein, as well as systems and methods for generating the same. According to some embodiments,...
US-9,602,522 Methods and systems for full pattern matching in hardware
According to an example, an intrusion-prevention system may include a network interface to receive a subject data word via a network. The intrusion-prevention...
US-9,602,521 Securing cloud computing environments
Some examples of security cloud computing environments can be implemented as methods. A processor of a first computer system that lacks permission to store data...
US-9,602,520 Preventing URL confusion attacks
Methods and apparatus are disclosed for detecting illegitimate or spoofed links on a web page. Illegitimate links can be detected by receiving a web link that...
US-9,602,519 Methods and systems for data validation in a client-server environment
Methods and systems are provided for dynamically generating validation rules. In certain implementations, state information related to one or more operations is...
US-9,602,518 Modulation analysis and distortion identification
An apparatus, method, computer readable medium, and system are provided to generate a symbol placement associated with a transmission scheme by transforming a...
US-9,602,517 Resource-centric authorization schemes
A method includes receiving a request of a user to perform an operation with respect to a first resource, in response to the request, determining, in view of a...
US-9,602,516 Method, server and terminal device for establishing communication session
The disclosed embodiments provide a method, a server, and a terminal device for establishing a communication session. The method includes: receiving a...
US-9,602,515 Enforcing alignment of approved changes and deployed changes in the software change life-cycle
On a host, host content change requests are intercepted in real-time. In a tracking mode, the change requests are logged and allowed to take effect on the host....
US-9,602,514 Enterprise mobility management and verification of a managed application by a content provider
A non-SDK based scalable technology for integrating multiple mobile device management (MDM) service providers into a content provider platform (or server) is...
US-9,602,513 Access control of edges in graph index applications
A computer-implemented method that monitors the activity of different nodes within a system as well as crowd sourcing activity. The computer-implemented method...
US-9,602,512 Methods and apparatus to distribute media delivery to mobile devices
Methods and apparatus to distribute media content are disclosed. An example method includes receiving a request for media content from a mobile device,...
US-9,602,511 User authentication
Providing a user apparatus access to a computer system including services and authentication levels. A service request is determined for at least one of the...
US-9,602,510 User authentication
Providing a user apparatus access to a computer system including services and authentication levels. A service request is determined for at least one of the...
US-9,602,509 Methods and systems for securely uploading files onto aircraft
Embodiments described herein provide for a system for verifying integrity of files uplinked to a remote vehicle. The system is configured to receive a first...
US-9,602,508 System and method for performing an action based upon two-party authorization
An action is permitted to be performed on a computing device only after the action has been confirmed by two or more authorized and/or authenticated parties. A...
US-9,602,507 Virtual smart card to perform security-critical operations
A portable data or information carrier in the form of a smart card with partially or fully virtualized components. To maximize the confidentiality of...
US-9,602,506 Method and apparatus for supporting login through user terminal
A method of supporting a login for a web service of a user terminal using a portable device is provided. The method includes registering the portable device...
US-9,602,505 Dynamic access control
A computer-implemented method for securing data and computer systems is described. In one embodiment, a request to connect to a server is received at an...
US-9,602,504 Strong Authentication by presentation of a number
Authentication method by one-time password from a user (10) having a computer terminal (11) and a telephone terminal (12) who wishes to access an online...
US-9,602,503 Systems and methods of using a temporary private key between two devices
A method executes at an authentication server. The method receives a request from a shared user device. The request seeks access to personal information that is...
US-9,602,502 User login methods, devices, and systems
A user login method for use in a terminal is provided. The method includes: receiving an automatic login request; acquiring a terminal identifier of the...
US-9,602,501 Bootstrapping user authentication
Disclosed are various embodiments relating to bootstrapping user authentication. A first application is authenticated based at least in part on a first security...
US-9,602,500 Secure import and export of keying material
An embodiment includes a method executed by at least one processor of a first computing node comprising: generating a key pair including a first public key and...
US-9,602,499 Authenticating a node in a communication network
A method and apparatus for authenticating a first node's identity in a communication network. An authentication node receives from a second node an...
US-9,602,498 Inline inspection of security protocols
Systems and methods for inline security protocol inspection are provided. According to one embodiment, a security device receives an encrypted raw packet from a...
US-9,602,497 Trusted and unsupervised digital certificate generation using a security token
A method, system and computer program product for ensuring PKI key pairs are operatively installed within a secure domain of a security token prior to...
US-9,602,496 Authenticating a data access request to a dispersed storage network
A method includes sending, by a user device, a plurality of data access requests to storage units. The method further includes sending, by one the storage...
US-9,602,495 Automated identity assessment method and system
A method, system and software for assessing an entity (15) at a first user terminal (13) connected to a data network (10). A control system (11) is used to...
US-9,602,494 Third party paywall authentication system
The present technology provides a less burdensome mechanism to bring media items owned or licensed in the physical world into an account hosted by an electronic...
US-9,602,493 Implicit challenge authentication process
A challenge value is received at a network connected device from a first server. A secure communication channel is established with the first server based on...
US-9,602,492 Privacy enhanced key management for a web service provider using a converged security engine
In an embodiment, a security engine of a processor includes an identity provider logic to generate a first key pair of a key pairing associating system user and...
US-9,602,491 Information processing apparatus, method of controlling the same, and storage medium
An information processing apparatus usable via a plurality of user interfaces, and a method of controlling the same, having a plurality of authentication...
US-9,602,490 User authentication confidence based on multiple devices
The present application is directed to user authentication confidence based on multiple devices. A user may possess at least one device. The device may...
US-9,602,489 System and method of facilitating the identification of a computer on a network
A system and method for facilitating identification of an attacking computer in a network is provided. A user attempting to login to a network application may...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.