Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,961,104 Side channel attack deterrence in networks
The present disclosure relates to technologies to deter side channel data center attacks. An example method may include receiving an incoming packets destined...
US-9,961,103 Intercepting, decrypting and inspecting traffic over an encrypted channel
A network-based appliance includes a mechanism to intercept, decrypt and inspect secure network traffic flowing over SSL/TLS between a client and a server. The...
US-9,961,102 Detection of stack pivoting
Particular embodiments described herein provide for an electronic device that can be configured to receive a function call for a function, determine a current...
US-9,961,101 Methods and systems for implementing a phishing assessment
A system, method, and computer program product for implementing a phishing assessment of a target computer network that includes a phishing assessment platform...
US-9,961,100 Network security analysis system
A network security analysis system performs anomaly detection with low false positives by implementing a multiple perspective analysis of network data. The...
US-9,961,099 Systems and methods for detecting and tracking adversary trajectory
This disclosure is related to using network flow information of a network to determine the trajectory of an attack. In some examples, an adjacency data...
US-9,961,098 Container data offline and online scan in a cloud environment
Techniques for security scanning of containers executing within VMs. A virtualization system maintains container disk files that store data for containers. The...
US-9,961,097 System for remote access of a user premises
A home security and control system for monitoring and controlling an external environment such as a home environment comprising: an Internet browser connectable...
US-9,961,096 Distributed behavior based anomaly detection
Systems and methods for detecting behavior-based anomalies are described herein. In various embodiments, the system includes a context engine for creating...
US-9,961,095 System and method for extracting and preserving metadata for analyzing network communications
Systems and methods are provided for advanced persistent threat detection on a network. The method includes capturing data packets from a network and performing...
US-9,961,094 Symptom detection using behavior probability density, network monitoring of multiple observation value types,...
One network monitoring system maintains information regarding historical activity and emergent activity of the network. Comparison of recent with historical...
US-9,961,093 Monitoring for reverse-connection network activity to detect a remote-administration tool
Techniques are disclosed for detecting malicious remote-administration tool (RAT) software by detecting reverse-connection communication activity....
US-9,961,092 Method and system for forensic data tracking
The present invention relates to a method and system for tracking the movement of data elements as they are shared and moved between authorized and unauthorized...
US-9,961,091 Apparatus and method for characterizing the risk of a user contracting malicious software
A non-transitory computer readable storage medium includes executable instructions to identify specified network interactions initiated by a client machine. The...
US-9,961,090 Message quarantine
Systems, methods, apparatuses, and computer-readable media configured to receive a search query and identify one or more messages matching at least a portion of...
US-9,961,089 Distributed estimation and detection of anomalies in control systems
Methods and Systems for detecting anomalies in a control area of a control system. Estimating for the control area, a first state from a historical state over a...
US-9,961,088 Systems and methods for geolocation-based authentication and authorization
Systems and methods are provided for controlling the authentication or authorization of a mobile device user for enabling access to the resources or...
US-9,961,087 Third party paywall authentication system
The present technology provides a less burdensome mechanism to bring media items owned or licensed in the physical world into an account hosted by an electronic...
US-9,961,086 Dynamic content authentication for secure merchant-customer communications
According to various embodiments, the Message Authentication Engine is given permission to access dynamically changing content provided by a buyer system. The...
US-9,961,085 Linking identities in a network entity
A network entity that allows collaboration among end users of a collaborative application by using different identifiers. The network entity receives an...
US-9,961,084 Computer readable storage media for tiered connection pooling and methods and systems for utilizing same
Systems and methods for tiered connection pooling are disclosed herein, which may be used in a method of fulfilling user requests in an enterprise computing...
US-9,961,083 Dynamic extensible application server management
A real-time plugin command-driven administrative control interface is provided that implements direct real-time command-driven control of operational...
US-9,961,082 Access control for digital data
A system and method to control access to data are disclosed. An access request is received from a requesting device to access requested data and a context for...
US-9,961,081 System for transaction authentication
Systems and methods for secure transaction authorization are provided. An emulator is instantiated on a host device and configured to emulate an integrated...
US-9,961,080 Communicating notifications from a third party system to online system users via the online system
To allow a third party system to more particularly identify sets of users for distributing content, an online system receives data from a third party system...
US-9,961,079 Context aware intruder detection using WIFI MAC addresses
A method and system for intruder detection is provided. The method includes generating a whitelist of media access control (MAC) addresses of a plurality of...
US-9,961,078 Network system comprising a security management server and a home network, and method for including a device in...
The network system comprises a security management server and a first device is added to the network system by creating a one-time code on the security...
US-9,961,077 System and method for biometric authentication with device attestation
A system, apparatus, method, and machine readable medium are described for biometric device attestation. For example, one embodiment of an apparatus includes: a...
US-9,961,076 System and method for identity authentication
A system, comprising includes an orchestration server including a processor, the orchestration server to receive authentication factors. A rules engine connects...
US-9,961,075 Identity based ticketing
A system for identity based ticketing is provided, wherein a user device sends a challenge to a terminal; the terminal updates a filter based on the challenge...
US-9,961,074 System and method for providing an authentication certificate for a wireless handheld device a data center...
A system includes an access controller including a short range wireless communication controller to couple to a mobile device, and an access point including a...
US-9,961,073 Dynamic certificate generation on a certificate authority cloud
Techniques are disclosed for dynamically generating a digital certificate for a customer server. A customer server creates a certificate profile and receives an...
US-9,961,072 Delegating authorizations
Delegating authorizations sufficient to access services is contemplate. The authorization may be delegated in the form of a token or other transmissible...
US-9,961,071 Native application single sign-on
In an example embodiment, a virtual private network (VPN) connection is established between a client device and an authentication service. Then a request is...
US-9,961,070 Strong authentication with feeder robot in a federated identity web environment
Method, system, and programs for performing two-factor authentication for a controlled access application via one or more third-party host verification servers....
US-9,961,069 Ticket generator for alternate authentication environments
In a computer system, some resources may be protected within an SSO environment, and other resources may be protected in an alternate authentication...
US-9,961,068 Single sign-on for interconnected computer systems
Methods, systems, and computer-readable media support provisioning a computer application that is executed on an associated computing component through a...
US-9,961,067 Zero sign-on authentication
A method of facilitating zero sign-on access to media services depending on trust credentials. The trust credentials may be cookies, certificates, and other...
US-9,961,066 Method and apparatus for limiting traffic rate to an origin server
A method and an apparatus of limiting a rate at which traffic is received at an origin server are described. A first request for a resource at an origin server...
US-9,961,065 Computerized method and system for managing an email input facility in a networked secure collaborative...
In embodiments of the present invention improved capabilities are described for managing an email input facility in a networked secure collaborative computer...
US-9,961,064 Ad hoc communications
Ad hoc communications are established between unknown contacts. For example, in today's mobile communications environment, there are many instances in which a...
US-9,961,063 Electronic device, server, electronic device controlling method, information processing method and recording medium
An information processing device includes an interface configured to receive authentication information from an electronic device. The device also includes...
US-9,961,062 Centralized authentication server for providing cross-domain resources via a rest-based tunnel
In various example embodiments, an authentication server provides a secure communication pathway between a client device and a service provider. The...
US-9,961,061 Node for use by a network, a system for interconnecting multiple networks and methods of operating the node and...
There is provided a method of operating a node (512, 520, 1102) for use by a first network (502, 504), the first network (502, 504) applies an authentication...
US-9,961,060 Embedded universal integrated circuit card supporting two-factor authentication
A module with an embedded universal integrated circuit card (eUICC) can include a profile for the eUICC. The profile can include a first and second shared...
US-9,961,059 Authenticator plugin interface
Authenticator plugin interface for an enterprise virtualization portal is provided. An example method for evaluating a portal access request may comprise:...
US-9,961,058 System and method of message routing via connection servers in a distributed computing environment
A system and method of message routing messages via connections in a distributed computing environment. The method includes providing a platform server, a set...
US-9,961,057 Securing a cryptographic device against implementation attacks
Methods of securing a cryptographic device against implementation attacks, are described. A disclosed method comprises the steps of obtaining a key (230) from...
US-9,961,056 Method of deniable encrypted communications
Embodiments herein provide, for example, a method that includes generating a deniability key; downloading an encrypted blob from a server, where the encrypted...
US-9,961,055 Inaccessibility of data to server involved in secure communication
A client negotiates multiple cryptographic keys with a server. One of the cryptographic keys is used to encrypt communications that the server can decrypt....
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.