Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,762,598 Automatic dynamic vetting of browser extensions and web applications
A digital good offered for downloading from a first computing system to a client computing device for execution by a browser executing on the client is...
US-9,762,597 Method and system to detect and interrupt a robot data aggregator ability to access a website
An information processing system, a computer readable storage medium, and a method to detect and block a robot data aggregator from accessing a website. A...
US-9,762,596 Heuristic botnet detection
In some embodiments, heuristic botnet detection is provided. In some embodiments, heuristic botnet detection includes monitoring network traffic to identify...
US-9,762,595 Secure cross domain solution systems and methods
Generally discussed herein are systems, apparatuses, and methods for secure transfer of content across a security boundary. A system can include a high side...
US-9,762,594 Method and apparatus for improving network security
A method and an apparatus for improving network security are provided. The method includes obtaining, by a control node, alarm information, where the alarm...
US-9,762,593 Automatic generation of generic file signatures
Systems and methods to automatically generate signatures used to detect malware are provided. The systems and methods use machine learning techniques, to build...
US-9,762,591 Message sender authenticity validation
In an example, a system and method are provided for validating the sender of a message, such as an e-mail, text message, voice mail, network message, internet...
US-9,762,590 System and method for an integrity focused authentication service
Systems and methods for authentication. At an authentication service, key synchronization information is stored for an enrolled authentication device for a user...
US-9,762,589 Methods and systems for generating a dynamic workflow in a multi-tenant database environment
Techniques and systems for modifying a virtual machine functionality. Archive files each including at least a class files are received. The archive files are...
US-9,762,588 Imposter account detection and remediation in a social networking system
When a request to connect a requesting user to a target user is received by the social networking system, information associated with the requesting user and...
US-9,762,587 Grouping access control violations for process-aware systems
Methods, systems, and computer-readable storage media for analyzing access control violations of a computer-implemented process. Implementations include actions...
US-9,762,586 System and method for controlling mutual access of smart devices
The present invention discloses a system and method for controlling mutual access of smart devices. The method includes creating a home account on a cloud...
US-9,762,585 Tenant lockbox
Tenant approval for operator access to tenant data is provided. In order to grant service personnel operators access to a tenant's data for performing a...
US-9,762,584 Identity management system
A identity management system is provided for managing documents within an computer system. The computer system receives a document within an authentication...
US-9,762,583 Protection against unsolicited communication
Methods and apparatus are disclosed to provide protection against Unsolicited Communication (UC) in a network, such as, without limitation, an Internet Protocol...
US-9,762,582 Threat-aware provisioning and governance
A management component of a computing system evaluates end-users, end-user devices, and user accounts for access to provisioned-resources of the computing...
US-9,762,581 Multifactor authentication through wearable electronic device
A method to implement multifactor authentication of a user may include performing biometric authentication of a person that bears the wearable electronic device...
US-9,762,580 Policy control in a network
There are disclosed measures for policy control in a network, including an authorization check. Namely, a method of policy control in a network comprises...
US-9,762,579 Internetwork authentication
A technique for network authentication interoperability involves initiating an authentication procedure on a first network, authenticating on a second network,...
US-9,762,578 Methods and systems for establishing secure authenticated bidirectional server communication using automated...
A method of authenticating communications includes receiving, by a computer, a first set of credentials, verifying the first set of credentials by comparing the...
US-9,762,577 Mutual authentication with symmetric secrets and signatures
A client and server negotiate a secure communication channel using a pre-shared key where the server, at the time the negotiation initiates, lacks access to the...
US-9,762,576 Enhanced multi factor authentication
In one embodiment, a network element comprises one or more processors, and a memory module communicatively coupled to the processor. The memory module comprises...
US-9,762,575 Method for performing communication via fingerprint authentication and electronic device thereof
A method is provided for operating a first electronic device. The method includes determining sameness of first fingerprint data and second fingerprint data....
US-9,762,574 Techniques for providing software support for a hardware component of a computing device
Various embodiments are generally directed to techniques to provide software support for a hardware component incorporated into a computing device with a...
US-9,762,573 Biometric framework allowing independent application control
Generation and segregation of mobile device biometric application template storage is described. Applications request a memory domain within mobile device...
US-9,762,572 Smartcard formation with authentication
A method includes detecting a security token device that is un-formatted with respect to an enterprise, wherein the security token device comprises a first...
US-9,762,571 Securing connections to unsecure internet resources
There is provided a method for automatically intercepting two or more data packets transported over a computer network, where the data packets originated from...
US-9,762,570 Information processing system, information processing method and computer readable recording medium stored a...
Information processing system includes a first certification device which executes a first temporary certification, creates a first temporary certificate,...
US-9,762,569 Network authentication
The present invention addresses apparatuses, methods and computer program product for providing improved authentication of a network by a network node. A...
US-9,762,568 Consolidated authentication
A method and system for authenticating a user at a first computer to first and second applications installed in a second computer. The second computer receives...
US-9,762,567 Wireless communication of a user identifier and encrypted time-sensitive data
Examples disclosed herein relate to wireless communication of a user identifier and encrypted time-sensitive data. Examples further include wireless...
US-9,762,566 Reducing authentication confidence over time based on user history
Technologies are provided in embodiments to manage an authentication confirmation score. Embodiments are configured to identify, in absolute session time, a...
US-9,762,565 Spatial-light-modulator-based signatures of intrinsic and extrinsic scattering surface markers for secure...
Unique methods and systems are introduced herein for the determination of unique spatial light modulator based optical signatures of intrinsic and extrinsic...
US-9,762,564 Acquiring client device data
In one implementation, a processing system receives a request from a client device to access a user account of the user. In response to receiving the request,...
US-9,762,563 Resource access system and method
A system for enabling an endpoint residing in an external network to perform resource operations on an internal resource, the system including a directory...
US-9,762,562 Techniques for multi-standard peer-to-peer connection
Techniques for multi-protocol peer-to-peer connection are described. An apparatus may comprise a discovery component to discover a remote device using a first...
US-9,762,561 System and method for tunneling of management traffic
A method of tunneling management traffic includes receiving at a managed system a control feature from a proxy-managed system that is connected to the managed...
US-9,762,560 Method for generating cryptographic "one-time pads" and keys for secure network communications
A method of generating random and pseudo-random material which is incorporated in devices located at each end of a communications network for secure...
US-9,762,559 Connection key distribution
A system and method for securely providing a mobile device with a cryptographic key in a vehicle. The method includes generating a cryptographic key pair that...
US-9,762,558 Wireless pairing of personal health device with a computing device
Systems and methods for the wireless pairing of a personal health device (PHD) (e.g., blood glucose monitor) with a computing device (e.g., smartphone) are...
US-9,762,557 Policy settings configuration with signals
Techniques and systems are disclosed for enabling device configuration using signals that encode device policy settings. A method of configuring policy settings...
US-9,762,556 Registering, managing, and communicating with IOT devices using domain name system processes
Provided herein is a method for registering an IoT device with a DNS registry. The method can include obtaining, at a DNS server, an identifier, IP address, and...
US-9,762,555 Data processing method and apparatus
A data processing method and apparatus, where the method includes acquiring a first network data packet that is sent by a target application that runs in an...
US-9,762,554 Handling of performance monitoring data
System, methods, nodes, and computer program for handling performance monitoring data in a communication network are described. The communication network (100)...
US-9,762,553 Systems and methods of secure data exchange
In embodiments of the present invention improved capabilities are described for managing digital rights management (DRM) protected content sharing in a...
US-9,762,552 Efficient sensor data delivery
A method is provided to enhance efficiency of sensor event data transmission over network. Specifically, a method is described to buffer a set of sensor data,...
US-9,762,551 Small form-factor cryptographic expansion device
A cryptographic expansion device that can be attached to a communication component of a communication device to enable the communication device to perform...
US-9,762,550 Low latency active noise cancellation system with client intercommunication
A system and method for providing load balanced secure media content and data delivery (10) in a distributed computing environment is disclosed. Media content...
US-9,762,549 Instant messaging private tags
Systems for instant messaging private tags preferably comprise a parser for parsing an instant message for sensitive data and an encryption engine for...
US-9,762,548 Controlling encrypted data stored on a remote storage device
A method, system, and apparatus are provided for controlling encrypted data stored on a remote device. In particular, a remote device includes a storage...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.