Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,723,023 Destination address rewriting to block peer-to-peer communications
Systems and methods for protecting a network including providing a mapping between internal addresses as seen by devices of the protected network and external...
US-9,723,019 Infected endpoint containment using aggregated security status information
In one example, a network device may store health status information specifying a current security status for each of a plurality of authenticated endpoint...
US-9,723,018 System and method of analyzing web content
Computer-implemented methods and systems for categorizing a uniform resource locator (URL) based on web content associated with the URL are disclosed. In one...
US-9,723,017 Method, apparatus and computer program product for detecting risky communications
There is disclosed herein techniques for use in detecting risky communications. In one embodiment, the techniques comprise a method including the following...
US-9,723,016 Detecting web exploit kits by tree-based structural similarity search
A method of detecting exploit kits includes receiving, at an input port of a computer, indication of HTTP (Hypertext Transfer Protocol) traffic. The HTTP...
US-9,723,015 Detecting malware-related activity on a computer
Detecting malware-related activity on a computer by detecting activity associated with the creation of a data object, where the activity is performed by a...
US-9,723,014 Detecting malware-related activity on a computer
Detecting malware-related activity on a computer by detecting activity associated with the creation of a data object, where the activity is performed by a...
US-9,723,013 Secondary asynchronous background authorization (SABA)
A system for identify threats to the security of an owner's electronic information by performing a secondary background authorization (SABA) that is transparent...
US-9,723,012 Systems and methods for security tiering in peer-to-peer networking
A method may also include receiving from each of one or more of potential peer information handling systems a connection request comprising a peer minimum...
US-9,723,011 Dynamic profile sharing using expiring tokens
Access to a user profile of a user device at a location may be provided to a destination device upon detecting that the location is within a proximity of a...
US-9,723,010 Passenger screening system
A system, method and program product for providing passenger screening. A method is disclosed that includes: providing a third party service to collect profile...
US-9,723,009 System and method for providing for secure network communication in a multi-tenant environment
A security solution provides secure communication in a multi-tenant environment which includes a connection-based fabric, storage cells holding data associated...
US-9,723,008 System and method for providing an integrated firewall for secure network communication in a multi-tenant...
An integrated firewall provides security in a multi-tenant environment having a connection-based switched fabric directly connecting database servers which...
US-9,723,007 Techniques for secure debugging and monitoring
Techniques for secure debugging and monitoring are presented. An end user requests a secure token for logging information with a remote service. A secure...
US-9,723,006 Temporary process deprivileging
There is disclosed in an example a computing apparatus, including: a process deprivilging engine operable for: recognizing that a process has an undetermined...
US-9,723,005 Turing test via reaction to test modifications
Current CAPTCHA tests are designed to be difficult for a bot and simple for a human-user to answer; however, as artificial intelligence improves, bots are more...
US-9,723,004 Method of controlling access to network drive, and network drive system
A network drive system for controlling access to a network drive based on location information on a communication device according to the present technology...
US-9,723,003 Network beacon based credential store
A variety of different mobile computing devices, such as a laptop, tablet or smartphone, may be used in a mixed set of computing environments. At least some of...
US-9,723,002 Protecting access to a hardware device through use of an aggregate identity instance
A computer-implemented method, system, and/or computer program product controls access to an appliance. A host system receives, from a client computer,...
US-9,723,001 Method and system for state machine security device
A security device may be utilized to provide security measures to an electronic device that may incorporate the security device or be coupled to it. The...
US-9,723,000 System and method of securing content
The present invention relates generally to a system and method of securing content from on networked enabled communication devices wherein the user's identity...
US-9,722,999 Secure access to secure access module-enabled machine using personal security device
A system and method are provided to access a secure host device using a personal security device (PSD). A user's PSD may hold a credential of a requesting...
US-9,722,998 Authenticating a cookie with distinctive signals
A system, method, and apparatus are provided for using distinctive signals associated with an electronic device to authenticate or validate a cookie or other...
US-9,722,997 Method and apparatus of detecting weak password
A method and an apparatus of detecting a weak password are disclosed. The method comprises: receiving a password to be detected; acquiring an identity...
US-9,722,996 Partial password-based authentication using per-request risk scores
A system that permits authentication based on a partial password, in which a risk score is assigned to an authentication request, and a minimum partial password...
US-9,722,995 Managing and securing manageable resources in stateless web server architecture using servlet filters
Access is controlled to managed resources in a stateless web server architecture including a stateless web server computing platform; a resource locator map...
US-9,722,994 User terminal for password-based authentication, and password-based trading terminal, system, and method
A user terminal, a password-based trading terminal, a system and a method for password-based authentication are provided. Wherein, the user terminal comprises a...
US-9,722,993 Data backup and transfer system, method and computer program product
A backup system having a plurality of accounts for copying selected data between one or more account user computers and a system computer where an account...
US-9,722,992 Secure installation of software in a device for accessing protected content
The invention relates to a device for decrypting protected content and for providing the decrypted content for playback, the device comprising a secure module...
US-9,722,991 Confidence-based authentication discovery for an outbound proxy
A confidence-based authentication discovery scheme is implemented at a proxy. The scheme assumes that some level of unauthenticated browsing is allowed prior to...
US-9,722,990 Virtualized data storage and management of policy and credential data sources
Web-based single sign-on can enable a user to log in to a single interface (such as through a web browser or thin client) and then provide SSO services to the...
US-9,722,989 System and method for collaborative authentication
Systems and methods are disclosed for collaborative authentication of a person based on an interaction with another person. A request for collaborative...
US-9,722,988 Techniques for authenticating a device for wireless docking
Examples are disclosed for a first device to wirelessly dock to a second device. In some examples, a first device may receive identification from the second...
US-9,722,987 Access relationships in a computer system
Various mechanisms can be used for authorizing access between entities in a computing environment. Configuring such access may involve configuration data stored...
US-9,722,986 Electronic tool and methods for meetings
An electronic meeting tool and method for communicating arbitrary media content from users at a meeting. These can include a node configuration device adapted...
US-9,722,985 Sensory output for image association
Methods, systems, computer-readable media, and apparatuses for authenticating users using the haptic, aural, and/or olfactory association processing channels...
US-9,722,984 Proximity-based authentication
A first device requests a protected resource (managed by a second device). A first authentication is performed by the second device upon receipt of the request....
US-9,722,983 Method and device for connecting to a high security network
The present invention relates to the field of access to a high-security network, and more particularly to a device allowing secure access, for example for...
US-9,722,982 Unauthenticated access to artifacts in commerce networks
The disclosed embodiments provide a system that facilitates business interaction. During operation, the system identifies a non-registered entity associated...
US-9,722,981 Password management system
An embodiment of the invention may include a method, computer program product and computer system for password management. The embodiment may include a...
US-9,722,980 System and method for securing authentication information in a networked environment
This disclosure is directed to systems and methods for securely communicating authentication information in a networked environment such as one involving a...
US-9,722,979 System and method for automatic wireless connection between a portable terminal and a digital device
A method and system are provided for automatic wireless connection to a digital device in a portable terminal, wherein information about the portable terminal...
US-9,722,978 System and method for automated licensing identification and verification
A system for license identification and verification uses watermarking technology to embed license information in the medium itself. Various techniques for the...
US-9,722,977 Secure host authentication using symmetric key crytography
Methods of securely authenticating a host to a storage system are provided. A series of authentication sessions are illustratively performed. Each of the...
US-9,722,976 Methods and apparatus for synchronizing decryption state with remote encryption state
Methods and apparatus for supporting secure packet communications, e.g., SRTP, which use implicit index numbers for synchronization and sequencing of received...
US-9,722,975 Methods and apparatus for establishing a secure communication channel
A method for establishing a secure communication channel between an off-card entity and an embedded Universal Integrated Circuit Card (eUICC) is provided. The...
US-9,722,974 Automated data re-encryption process in multi-tiered encryption system
A re-encryption service module in a multi-tiered encryption system that manages key rotation policies continuously or periodically re-encrypts data. Each...
US-9,722,973 System and method to anonymize data transmitted to a destination computing device
A method and system for a distributed anonymization system is disclosed. A master anonymization system is provided. A slave anonymization system is configured...
US-9,722,972 Methods and apparatuses for secure communication
A method of establishing a secure communications path between a first local server on a local network and a device on a wide area network comprising:...
US-9,722,971 Method for routing within a mobile terminal emulating a contactless payment card
The present invention concerns the field of the emulation of contactless payment cards and more particularly the routing of the contactless communication within...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.