At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Patent # | Description |
---|---|
US-9,762,598 |
Automatic dynamic vetting of browser extensions and web applications A digital good offered for downloading from a first computing system to a client computing device for execution by a browser executing on the client is... |
US-9,762,597 |
Method and system to detect and interrupt a robot data aggregator ability
to access a website An information processing system, a computer readable storage medium, and a method to detect and block a robot data aggregator from accessing a website. A... |
US-9,762,596 |
Heuristic botnet detection In some embodiments, heuristic botnet detection is provided. In some embodiments, heuristic botnet detection includes monitoring network traffic to identify... |
US-9,762,595 |
Secure cross domain solution systems and methods Generally discussed herein are systems, apparatuses, and methods for secure transfer of content across a security boundary. A system can include a high side... |
US-9,762,594 |
Method and apparatus for improving network security A method and an apparatus for improving network security are provided. The method includes obtaining, by a control node, alarm information, where the alarm... |
US-9,762,593 |
Automatic generation of generic file signatures Systems and methods to automatically generate signatures used to detect malware are provided. The systems and methods use machine learning techniques, to build... |
US-9,762,591 |
Message sender authenticity validation In an example, a system and method are provided for validating the sender of a message, such as an e-mail, text message, voice mail, network message, internet... |
US-9,762,590 |
System and method for an integrity focused authentication service Systems and methods for authentication. At an authentication service, key synchronization information is stored for an enrolled authentication device for a user... |
US-9,762,589 |
Methods and systems for generating a dynamic workflow in a multi-tenant
database environment Techniques and systems for modifying a virtual machine functionality. Archive files each including at least a class files are received. The archive files are... |
US-9,762,588 |
Imposter account detection and remediation in a social networking system When a request to connect a requesting user to a target user is received by the social networking system, information associated with the requesting user and... |
US-9,762,587 |
Grouping access control violations for process-aware systems Methods, systems, and computer-readable storage media for analyzing access control violations of a computer-implemented process. Implementations include actions... |
US-9,762,586 |
System and method for controlling mutual access of smart devices The present invention discloses a system and method for controlling mutual access of smart devices. The method includes creating a home account on a cloud... |
US-9,762,585 |
Tenant lockbox Tenant approval for operator access to tenant data is provided. In order to grant service personnel operators access to a tenant's data for performing a... |
US-9,762,584 |
Identity management system A identity management system is provided for managing documents within an computer system. The computer system receives a document within an authentication... |
US-9,762,583 |
Protection against unsolicited communication Methods and apparatus are disclosed to provide protection against Unsolicited Communication (UC) in a network, such as, without limitation, an Internet Protocol... |
US-9,762,582 |
Threat-aware provisioning and governance A management component of a computing system evaluates end-users, end-user devices, and user accounts for access to provisioned-resources of the computing... |
US-9,762,581 |
Multifactor authentication through wearable electronic device A method to implement multifactor authentication of a user may include performing biometric authentication of a person that bears the wearable electronic device... |
US-9,762,580 |
Policy control in a network There are disclosed measures for policy control in a network, including an authorization check. Namely, a method of policy control in a network comprises... |
US-9,762,579 |
Internetwork authentication A technique for network authentication interoperability involves initiating an authentication procedure on a first network, authenticating on a second network,... |
US-9,762,578 |
Methods and systems for establishing secure authenticated bidirectional
server communication using automated... A method of authenticating communications includes receiving, by a computer, a first set of credentials, verifying the first set of credentials by comparing the... |
US-9,762,577 |
Mutual authentication with symmetric secrets and signatures A client and server negotiate a secure communication channel using a pre-shared key where the server, at the time the negotiation initiates, lacks access to the... |
US-9,762,576 |
Enhanced multi factor authentication In one embodiment, a network element comprises one or more processors, and a memory module communicatively coupled to the processor. The memory module comprises... |
US-9,762,575 |
Method for performing communication via fingerprint authentication and
electronic device thereof A method is provided for operating a first electronic device. The method includes determining sameness of first fingerprint data and second fingerprint data.... |
US-9,762,574 |
Techniques for providing software support for a hardware component of a
computing device Various embodiments are generally directed to techniques to provide software support for a hardware component incorporated into a computing device with a... |
US-9,762,573 |
Biometric framework allowing independent application control Generation and segregation of mobile device biometric application template storage is described. Applications request a memory domain within mobile device... |
US-9,762,572 |
Smartcard formation with authentication A method includes detecting a security token device that is un-formatted with respect to an enterprise, wherein the security token device comprises a first... |
US-9,762,571 |
Securing connections to unsecure internet resources There is provided a method for automatically intercepting two or more data packets transported over a computer network, where the data packets originated from... |
US-9,762,570 |
Information processing system, information processing method and computer
readable recording medium stored a... Information processing system includes a first certification device which executes a first temporary certification, creates a first temporary certificate,... |
US-9,762,569 |
Network authentication The present invention addresses apparatuses, methods and computer program product for providing improved authentication of a network by a network node. A... |
US-9,762,568 |
Consolidated authentication A method and system for authenticating a user at a first computer to first and second applications installed in a second computer. The second computer receives... |
US-9,762,567 |
Wireless communication of a user identifier and encrypted time-sensitive
data Examples disclosed herein relate to wireless communication of a user identifier and encrypted time-sensitive data. Examples further include wireless... |
US-9,762,566 |
Reducing authentication confidence over time based on user history Technologies are provided in embodiments to manage an authentication confirmation score. Embodiments are configured to identify, in absolute session time, a... |
US-9,762,565 |
Spatial-light-modulator-based signatures of intrinsic and extrinsic
scattering surface markers for secure... Unique methods and systems are introduced herein for the determination of unique spatial light modulator based optical signatures of intrinsic and extrinsic... |
US-9,762,564 |
Acquiring client device data In one implementation, a processing system receives a request from a client device to access a user account of the user. In response to receiving the request,... |
US-9,762,563 |
Resource access system and method A system for enabling an endpoint residing in an external network to perform resource operations on an internal resource, the system including a directory... |
US-9,762,562 |
Techniques for multi-standard peer-to-peer connection Techniques for multi-protocol peer-to-peer connection are described. An apparatus may comprise a discovery component to discover a remote device using a first... |
US-9,762,561 |
System and method for tunneling of management traffic A method of tunneling management traffic includes receiving at a managed system a control feature from a proxy-managed system that is connected to the managed... |
US-9,762,560 |
Method for generating cryptographic "one-time pads" and keys for secure
network communications A method of generating random and pseudo-random material which is incorporated in devices located at each end of a communications network for secure... |
US-9,762,559 |
Connection key distribution A system and method for securely providing a mobile device with a cryptographic key in a vehicle. The method includes generating a cryptographic key pair that... |
US-9,762,558 |
Wireless pairing of personal health device with a computing device Systems and methods for the wireless pairing of a personal health device (PHD) (e.g., blood glucose monitor) with a computing device (e.g., smartphone) are... |
US-9,762,557 |
Policy settings configuration with signals Techniques and systems are disclosed for enabling device configuration using signals that encode device policy settings. A method of configuring policy settings... |
US-9,762,556 |
Registering, managing, and communicating with IOT devices using domain
name system processes Provided herein is a method for registering an IoT device with a DNS registry. The method can include obtaining, at a DNS server, an identifier, IP address, and... |
US-9,762,555 |
Data processing method and apparatus A data processing method and apparatus, where the method includes acquiring a first network data packet that is sent by a target application that runs in an... |
US-9,762,554 |
Handling of performance monitoring data System, methods, nodes, and computer program for handling performance monitoring data in a communication network are described. The communication network (100)... |
US-9,762,553 |
Systems and methods of secure data exchange In embodiments of the present invention improved capabilities are described for managing digital rights management (DRM) protected content sharing in a... |
US-9,762,552 |
Efficient sensor data delivery A method is provided to enhance efficiency of sensor event data transmission over network. Specifically, a method is described to buffer a set of sensor data,... |
US-9,762,551 |
Small form-factor cryptographic expansion device A cryptographic expansion device that can be attached to a communication component of a communication device to enable the communication device to perform... |
US-9,762,550 |
Low latency active noise cancellation system with client
intercommunication A system and method for providing load balanced secure media content and data delivery (10) in a distributed computing environment is disclosed. Media content... |
US-9,762,549 |
Instant messaging private tags Systems for instant messaging private tags preferably comprise a parser for parsing an instant message for sensitive data and an encryption engine for... |
US-9,762,548 |
Controlling encrypted data stored on a remote storage device A method, system, and apparatus are provided for controlling encrypted data stored on a remote device. In particular, a remote device includes a storage... |