Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,942,249 Phishing training tool
According to one embodiment, an apparatus is configured to communicate a first plurality of phishing emails to a first plurality of users, each phishing email...
US-9,942,248 Systems and methods for adjusting behavioral detection heuristics
The disclosed computer-implemented method for adjusting behavioral detection heuristics may include (1) configuring a behavioral detection heuristic to provide...
US-9,942,247 Traffic shape obfuscation when using an encrypted network connection
According to one exemplary embodiment, a method for obfuscating a traffic pattern associated with a plurality of network traffic within a tunnel connection is...
US-9,942,246 Preemptive event handling
A computerized method of preemptive event handling, The method comprises monitoring, in run time at kernel level, a plurality of events of a plurality of...
US-9,942,245 Resilient control design for distributed cyber-physical systems
A distributed cyber-physical system includes physical elements (15-1, 15-2, . . . , 15-n) disposed in a physical space (11). Controllers (13-1, 13-2, . . . ,...
US-9,942,244 Secure service for receiving sensitive information through nested iframes
Methods and systems for receiving sensitive information include receiving a request for entering sensitive information, the request received from a user...
US-9,942,243 Taint mechanism for messaging system
A method for managing a plurality of messages associated with an online messaging system is provided. The method may include receiving a message from a...
US-9,942,242 Content access for duration of calendar events
Content access for the duration of a calendar event may be provided. Upon receiving a calendar invitation comprising a start time, an end time, and an encrypted...
US-9,942,241 Identity switching method and associated server for improving system security
A server includes a processor and a storage unit. The storage unit stores a program code, and when the program code is executed by the processor, the processor...
US-9,942,240 Anonymous application wrapping
Methods and systems are disclosed for providing approaches to anonymous application wrapping on a mobile device. The methods and systems may include receiving,...
US-9,942,239 Indirect user authentication
As disclosed herein a computer system, executed by a computer, includes receiving, from a user, a request for access to a shared system, wherein the request...
US-9,942,238 Configuring access to online accounts for third parties not associated with the online account
According to one embodiment, a system includes a memory comprising instructions, an interface, and a processor communicatively coupled to the memory and the...
US-9,942,237 Determining access requirements for online accounts based on characteristics of user devices
According to one embodiment, a system comprises a memory comprising instructions, an interface, and a processor communicatively coupled to the memory and the...
US-9,942,236 Information processing apparatus, access control method, and communication system
An information processing apparatus includes one or more processors, the processor including a reception unit configured to receive an access request...
US-9,942,235 Network access security for internet of things (IoT) devices
A network device receives, from an Internet of Things (IoT) device, a Domain Name System (DNS) query that includes a domain name for resolving a network address...
US-9,942,234 Cognitive password entry system
An aspect includes a cognitive password entry system. A processor detects a login attempt targeting a website for a user identifier having a previously stored...
US-9,942,233 Identification of patterns in stateful transactions
A system for the identification of patterns in stateful transactions may include a message interceptor, a message pattern processor, a message handler, and a...
US-9,942,232 User control of data de-identification
A method for transmitting, storing and sharing data collected by a wearable device is provided. In one example, data related to one or more measurements...
US-9,942,231 System, method, and program product for processing secure transactions within a cloud computing system
Particular systems, methods, and program products for web-based security systems for user authentication and processing in a distributed computing environment...
US-9,942,230 Multi-dimensional framework for defining criteria that indicate when authentication should be revoked
Methods and systems are presented for defining criteria that indicate when authentication for an identified client device should be revoked based on rules...
US-9,942,229 Authenticating a limited input device via an authenticated application
A limited input device, such as a camera, is authenticated based on a request received from an authenticated application. The application can request an...
US-9,942,228 System and method for processing user interface events
A system and method to detect and prevent non-human interaction between a client and a web server invokes an effect to change the event generation behavior at...
US-9,942,227 Apparatus and method for secure over the air programming of a communication device
A system that incorporates the subject disclosure may perform, for example, receiving an over-the-air programming message that is utilizing a hypertext transfer...
US-9,942,226 NFC package for storing biometric information and electronic device
An electronic device includes a biometric sensor configured to generate biometric data by sensing a biometric characteristic and to encrypt the biometric a near...
US-9,942,225 User authentication via evoked potential in electroencephalographic signals
Techniques are disclosed for authentication and identification of a user by use of an electroencephalographic (EEG) signal. For example, a method for...
US-9,942,224 Management and authentication in hosted directory service
A user, group, and device management and authentication system allows administrators to manage one or more directories with devices that are not associated with...
US-9,942,222 Authentication with wearable device
Described are techniques and systems for providing authentication credentials associated with a user. The user is authenticated using one or more techniques,...
US-9,942,221 Authentication for blocking shoulder surfing attacks
An approach to authenticating a user for resource access. The approach displays independently bi-directionally rotating concentric layers wherein each of the...
US-9,942,220 Preventing unauthorized account access using compromised login credentials
User login information submitted as part of an attempt to log into a computer system is evaluated for unauthorized or illegitimate use based on indicators of...
US-9,942,219 Data security
In one embodiment, a method is provided that may include one or more operations. One of these operations may include, in response, at least in part, to a...
US-9,942,218 Automated production of certification controls by translating framework controls
A compliance application automatically produces certification controls by translating framework controls. The framework controls are common certification...
US-9,942,217 System and method for generating a service provider based secure token
Devices, systems, and methods for generating a secure token specific to an online service provider are provided. User account information of a user is...
US-9,942,216 System and method for traversing a NAT device with IPSec AH authentication
A method for routing IP packets with IPSec AH authentication is disclosed. The method includes locating overlay edge routers between private domains and their...
US-9,942,215 Cloud queue synchronization protocol
An example implementation may involve a computing system receiving, from a media playback system over the network interface, a request to initiate playback of...
US-9,942,214 Automated agent detection utilizing non-CAPTCHA methods
A computer-facilitated service receives a request, from a user client, to access a site provided by the service. The service may obtain, from the request,...
US-9,942,213 Systems and methods for providing secure services
Systems and methods for providing one or more secure services are disclosed. One method can comprise authenticating and/or authorizing a user device to receive...
US-9,942,212 Communication device and system, data processing method and method for secure data exchange
The present invention relates to a method for processing data in a communication device comprising a host and a security module associated with this host. This...
US-9,942,211 Efficient use of keystreams
Performing cryptographic operations such as encryption and decryption may be computationally expensive. In some contexts, initialization vectors and keystreams...
US-9,942,210 Key derivation method and apparatus for local access under control of a cellular network
A method for key derivation may comprise: generating a second key based at least in part on a first key for a first connection between a user equipment and a...
US-9,942,209 Technologies for secure extensible inter-device I/O redirection across a network
Technologies for secure I/O redirection include a provider device, a consumer device, an authentication server, and a messaging server. The provider device and...
US-9,942,208 Updating stored encrypted data with enhanced security
Technologies described herein provide enhanced security for storing and updating secret data, such as a password. Based on one or more conditions, an existing...
US-9,942,207 Security network controller
Described herein is a security network controller having a main bus to which is coupled a central processing unit, a cryptographic processing circuit, a...
US-9,942,206 System and method for privacy-preserving genomic data analysis
A method includes accessing genomic data of from a genomic database; generating, by a processor, a first hash by probabilistically and irreversibly encrypting a...
US-9,942,205 Method and system for digital rights management of documents
An improved method and system for digital rights management is described.
US-9,942,204 Secure personal server system and method
A provider computer announces content to the provider computer and establishes a secure connection to a VPN server. Requests for the content are received in one...
US-9,942,203 Enhanced security when sending asynchronous messages
According to one exemplary embodiment, a method for increasing security when sending a plurality of messages over a network connection is provided. The method...
US-9,942,202 Trust status of a communication session
Techniques for trust status of a communication session are described. According to various embodiments, different networks cooperate to facilitate routing of...
US-9,942,201 Context specific keys
A method for operating a network is provided. The method comprises segmenting the network into a plurality of virtual private networks, wherein each virtual...
US-9,942,200 End user authentication using a virtual private network
A user is provisioned for a Web service by supplying a user name and password. A digital certificate and VPN identifier are generated and downloaded to the...
US-9,942,199 Optimizing connections over virtual private networks
The disclosed embodiments provide a system that provides a virtual private network (VPN). The system includes a routing apparatus on a public network. The...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.