Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,912,704 System, apparatus and method for access control list processing in a constrained environment
In one embodiment, a method includes receiving a first request from a first device to access a first resource of the system and determining whether to grant...
US-9,912,703 Security compliance framework usage
A method and system for improving usage of a security compliance framework is provided. The method includes authenticating a user for: access to the security...
US-9,912,702 Protection of sensitive data from unauthorized access
A method and associated computing system. A first computing environment receives data that includes first sensitive data. The first computing environment...
US-9,912,701 Administration of a context-based cloud security assurance system
A cloud infrastructure is enhanced to provide a context-based security assurance service to enable secure application deployment. The service inspects network...
US-9,912,700 System for escalating security protocol requirements
Disclosed is a system for escalating security protocol requirements. The system typically includes a processor, a memory, and a security protocol module stored...
US-9,912,699 Selectively applying internet protocol security (IPSEC) encryption based on application layer information
A network device may receive a packet flow, and may identify an application associated with the packet flow. The network device may determine that packets...
US-9,912,698 Malicious content analysis using simulated user interaction without user involvement
Techniques for detecting malicious content using simulated user interactions are described herein. In one embodiment, a monitoring module monitors activities of...
US-9,912,697 Virtual private network based parental control service
In various embodiments, methods and systems for implementing parental controls on mobile devices using virtual private network (VPN)-based parental control...
US-9,912,696 Data loss prevention techniques
Data received through a proxy for a service is analyzed for compliance with one or more data policies, such as one or more data loss prevention policies. When...
US-9,912,695 Techniques for using a honeypot to protect a server
Techniques for operating a security system are provided. An example method for operating a security system according to the disclosure includes monitoring...
US-9,912,694 Dashboards for displaying threat insight information
Dashboards for displaying threat insight information are provided herein, as well as systems and methods for generating the same. According to some embodiments,...
US-9,912,693 Identification of malicious precise time protocol (PTP) nodes
A server system generates and transfers Precision Time Protocol (PTP) synch requests for delivery to a PTP clock server and responsively receives PTP synch...
US-9,912,691 Fuzzy hash of behavioral results
A computerized method for classifying objects in a malware system is described. The method includes detecting behaviors of an object for classification after...
US-9,912,690 System and method for malware detection using hashing techniques
A system and method in accordance with example embodiments may include systems and methods for generating and transforming data presentation. The method may...
US-9,912,689 Anonymized network data collection and network threat assessment and monitoring systems and methods
Systems and methods for data collection and processing in a network, including one or more sensors disposed in a network interface and configured to collect raw...
US-9,912,688 Method and apparatus for protecting consumers and resources in a communication network
Aspects of the subject disclosure may include, for example, a method including comparing call volume of call sessions associated with a wireless network node of...
US-9,912,687 Advanced processing of electronic messages with attachments in a cybersecurity system
A system manages computer security risks associated with message file attachments. When a user of an electronic device with a messaging client attempts to open...
US-9,912,686 Methods and systems for enhancing data security in a computer network
Network security risk assessment systems and methods are provided. The system has a remote subscriber computer, a risk assessment viewer application, and a risk...
US-9,912,685 Simulating a bot-net spanning a plurality of geographic regions
Computer systems and methods in various embodiments are configured to test the security of a server computer by simulating a wide range of attacks from one or...
US-9,912,684 System and method for virtual analysis of network data
A system is provided with one or more virtual machines and a replayer. The virtual machine(s) are configured to mimic operations of a first device. The replayer...
US-9,912,683 Method and apparatus for determining a criticality surface of assets to enhance cyber defense
A method and apparatus is provided for determining aggregated value of risk and resilience metrics of critical nodes in a network of computer nodes, comprising...
US-9,912,682 Aggregation of network traffic source behavior data across network-based endpoints
Aggregation of network traffic source behavior data across network endpoints may be implemented. Indications of endpoint-specific network traffic directed to...
US-9,912,681 Injection of content processing delay in an endpoint
A malware detection system (MDS) appliance is configured to inject delay associated with delivery and/or processing of communication traffic directed to one or...
US-9,912,680 Detecting malicious HTTP redirections using user browsing activity trees
A method for detecting malicious HTTP redirections. The method includes obtaining, based on a single client IP address, HTTP flows triggered by visiting a...
US-9,912,679 System, method, and computer program for managing security in a network function virtualization (NFV) based...
A system, method, and computer program product are provided for providing security in a Network Function Virtualization based (NFV-based) communication network....
US-9,912,678 Techniques for automatically mitigating denial of service attacks via attack pattern matching
A method for mitigating a denial of service attack includes determining, for a client, a number of requests being transmitted to a server and determining, for...
US-9,912,677 Evaluating a questionable network communication
Techniques for evaluating a questionable network communication are disclosed. In some implementations, an evaluation module determines whether a network...
US-9,912,676 Account sharing prevention and detection in online education
An application delivers educational, entertainment or work-related content including videos and documents to any computing device of a user via an account, each...
US-9,912,675 Method, system and apparatus for geo-verification
A method, system and apparatus are provided for geo-verification for access to data stored in a memory of a server having a processor and a network interface...
US-9,912,674 Method and system for compiling map data
In compiling map data, a server communicates with a programmable device and determines an authorization level of the device or a user of the device by comparing...
US-9,912,673 Method and device for secure network access
In a hotspot Wi-Fi network, users can access the Internet from a variety of access points. The users' credentials are centrally authenticated within the network...
US-9,912,672 Access permissions entitlement review
A system for operating an enterprise computer network including multiple network objects, said system comprising monitoring and collection functionality for...
US-9,912,671 Multiple data store authentication
Systems and methods for authenticating access to multiple data stores substantially in real-time are disclosed. The system may include a server coupled to a...
US-9,912,670 Resource feature transfer
Resource feature transfer is described. In one or more embodiments, information is collected about interaction of an unauthenticated user of a computing device...
US-9,912,669 Systems and methods for enabling dialog amongst different participant groups with expandable membership
An electronic communication system, such as a question-and-answer service, is provided in which a user submitting a question specifies one or more dialog...
US-9,912,668 Enhancing user experience relative to peripheral devices
The description relates to enhancing user experience with devices, such as host and peripheral devices. One example relates to devices that can automatically...
US-9,912,667 Managing private and public service set utilization
Methods, systems, and computer readable media may be operable to facilitate the management of connections between one or more client devices and an access point...
US-9,912,666 Access management for controlling access to computer resources
A method and system for controlling access to computer resources of a computer data center. A received request to manage an initial service request targets one...
US-9,912,665 Packet validation in virtual network interface architecture
Roughly described, a network interface device receiving data packets from a computing device for transmission onto a network, the data packets having a certain...
US-9,912,664 Media content filtering
Allowing a subscriber of media content services or products to receive filtered content based on the current viewer's profile (i.e., age, gender, maturity,...
US-9,912,663 Enabling secure network mobile device communications
Methods and systems of communicating with secure endpoints included within a secured network from a mobile device external to the secured network is disclosed....
US-9,912,662 Indoor location server provision and discovery
Techniques are presented for receiving, at a discovered secure user platform location (SUPL) server (D-SLP) a request from a device for authorization to access...
US-9,912,661 Identification of proximate devices
A method of identifying proximate client devices (1, 2) comprises the steps of: providing a sensory identifier, the first device (1) detecting the sensory...
US-9,912,660 Apparatus for authenticating pairing of electronic devices and associated methods
An apparatus comprising: a processor; and a memory including computer program code, the memory and the computer program code configured, with the processor, to...
US-9,912,659 Locking systems with multifactor authentication and changing passcodes
A computer-based locking system using changing passcodes includes an application server and an application in electronic communication with the application...
US-9,912,658 Checking validity of a communication target device
There is provided a communication terminal including a transmission controller configured to allow transmission of, to a verification target device,...
US-9,912,657 Adaptive multi-factor authentication system
A system and methodology for adaptive selection of multiple modalities for authentication in different operating environments, thereby making authentication...
US-9,912,656 Trust metrics on shared computers
Particular embodiments of a verification authority associated with a web service may receive a request to access the web service. The request may comprise data...
US-9,912,655 Unmanned vehicle message exchange
Two unmanned vehicles come within communication range of one another. The unmanned vehicles exchange logs of messages each has received. Each of the unmanned...
US-9,912,654 IP security certificate exchange based on certificate attributes
Architecture that provides Internet Protocol security (IPsec) certificate exchange based on certificate attributes. An IPsec endpoint can validate the security...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.