Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,986,004 Method and system for content delivery based on user preferences
A method and a system for content delivery based on user preferences are provided. The method includes accessing profiles of a plurality of users, where the...
US-9,986,003 Mediating content delivery via one or more services
A device for receiving streaming data includes a broadcast or multicast middleware unit configured to receive the streaming data via a second service and a...
US-9,986,002 Multifusion of a stream operator in a streaming application
Embodiments of the present disclosure include a method, a system, and a computer program product for fusing a stream operator into more than one processing...
US-9,986,001 Information processing apparatus
A streaming data acquisition section acquires streaming data distributed from a server and including an application image, and a streaming data reproduction...
US-9,986,000 Systems and methods for recording and storing media content
In an example, a method for recording media content using a mobile device includes establishing a communication session between a control system and the mobile...
US-9,985,999 Changing an application between a single-user session and a multi-user session
Functionality is disclosed herein for changing an application between a single-user session and multi-user session. An application enters a multi-user session...
US-9,985,998 Group curated media channels
A system for collaboratively generating and/or managing a media channel is provided. The system includes an identification component, a generation component and...
US-9,985,997 Apparatus and method for communications involving a legacy device
A gateway receives a message from a first terminal to establish a connection between the first terminal and a second terminal. The gateway sends a second...
US-9,985,996 Decoupling audio-video (AV) traffic processing from non-AV traffic processing
A device for decoupling audio-video (AV) traffic processing from non-AV traffic processing may include a first processor and a second processor. The first...
US-9,985,995 Method and arrangement for managing security Reconfiguration in a cellular communication system
Methods are discussed of managing security reconfiguration and cell update procedures in a user equipment and in a node in a cellular communication system and a...
US-9,985,994 Enforcing compliance with a policy on a client
A method and system for enforcing compliance with a policy on a client computer in communication with a network is disclosed. The method involves receiving a...
US-9,985,993 Query system and method to determine authentication capabilities
A system, apparatus, method, and machine readable medium are described for determining the authentication capabilities. For example, one embodiment of a method...
US-9,985,992 Entitlement system and method
The invention relates to a computer-implemented system and method for controlling access by users of an organization to one or more components of a computer...
US-9,985,991 HTTP password mediator
A method and system for password mediation including identifying an HTTP request issued by a client application executing on a client device, the HTTP request...
US-9,985,990 Security information interaction system, device and method based on active command of secure carrier
The invention proposes a security information interaction system, apparatus and method based on security carrier's active command. The method comprises: an...
US-9,985,989 Managing dynamic deceptive environments
A deception management system to detect attackers within a dynamically changing network of computer resources, including a deployment governor dynamically...
US-9,985,988 Deception to detect network scans
Provided are systems, methods, and computer-program products for using deceptions to detect network scans. In various implementations, a network device,...
US-9,985,987 Honeypot computing services that include simulated computing resources
The disclosure relates to provisioning honeypot computing services using a simulation state database to simulate a set of computing resources. One example...
US-9,985,986 Unconditional secure communication method based on beam-forming and security code
The present invention discloses an unconditional secure communication method based on beam-forming and security code, which comprises the following steps of:...
US-9,985,985 Method of distributed denial of service (DDos) and hacking protection for internet-based servers using a...
A method of DDoS and hacking protection for internet-based servers using a private network of internet servers utilizes multiple data streams sent over a...
US-9,985,984 Dynamic defense and network randomization for computer systems
The various technologies presented herein relate to determining a network attack is taking place, and further to adjust one or more network parameters such that...
US-9,985,983 Systems for network risk assessment including processing of user access rights associated with a network of devices
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for network risk assessment. One of the methods includes...
US-9,985,982 Method and apparatus for aggregating indicators of compromise for use in network security
In one embodiment, a method includes receiving at a security analysis device a plurality of indicators of compromise (IOCs) associated with an entity, sorting...
US-9,985,981 Monitoring traffic in a computer network
A computer-implemented method, computerized apparatus and computer program product for monitoring traffic in a computer network. The computer network comprises...
US-9,985,980 Entropy-based beaconing detection
A method includes (a) collecting information on times at which domains were contacted by each device of a set of devices on a network, (b) for each domain...
US-9,985,979 Method and system for detecting threats using passive cluster mapping
An approach for detecting network threats is disclosed, that may involve receiving network traffic, plotting the network traffic in a n-dimensional feature...
US-9,985,978 Method and system for misuse detection
This disclosure discusses methods, systems, and an apparatus that can determine whether email content is potentially malicious, contains potentially malicious...
US-9,985,977 Direct cache access for network input/output devices
Methods and systems for improving efficiency of direct cache access (DCA) are provided. According to one embodiment, a set of DCA control settings are defined...
US-9,985,976 Methods for identifying network traffic characteristics to correlate and manage one or more subsequent flows...
A method, non-transitory computer readable medium, and device that identifies network traffic characteristics to correlate and manage one or more subsequent...
US-9,985,975 Hardware secret usage limits
A hardware secret is securely maintained in a computing device. The device operates in accordance with a usage limit corresponding to a limited number of...
US-9,985,973 Context sensitive security help
Embodiments of the present invention provide systems and methods for providing security in a computing environment. These systems and methods can be applied to...
US-9,985,972 Systems and methods for controlling sign-on to web applications
The described technology provides a single sign-on capability so that a user who is already signed on to a web application from a client application may not be...
US-9,985,971 Cognitive password entry system
An aspect includes a cognitive password entry system. A processor detects a login attempt targeting a website for a user identifier having a previously stored...
US-9,985,970 Individualized audit log access control for virtual machines
To provide enhanced operation of computing systems to control access to audit logging resources by virtual machines, various systems, apparatuses, methods, and...
US-9,985,969 Controlling use of computing-related resources by multiple independent parties
Techniques are described for managing access to computing-related resources that, for example, may enable multiple distinct parties to independently control...
US-9,985,968 Techniques to authenticate a client to a proxy through a domain name server intermediary
Techniques to authenticate a client to a proxy through a domain name server intermediary are described. In one embodiment, for example, a client apparatus may...
US-9,985,967 Gateway, client device and methods for facilitating communication between a client device and an application server
According to a first aspect, it is presented a method, executed in a gateway, the gateway being arranged to facilitate communication between a client device and...
US-9,985,966 Anonymous signature scheme
Technologies are generally described for providing an anonymous signature scheme. In some examples, a method performed under control of an end device ma 320...
US-9,985,965 Security verification method, apparatus, and system
A security verification method, apparatus, and system relate to the field of computer security technologies, and are used to improve reliability of the...
US-9,985,964 Systems and methods for providing block chain-based multifactor personal identity verification
Block chain-based multifactor personal identity verification may be provided. Verification addresses may be established on a block chain by: associating...
US-9,985,963 Method and system for authenticating liveness face, and computer program product thereof
Disclosed are a method and a system for authenticating liveness face, and a computer program product thereof, which belong to a field of face recognition...
US-9,985,962 Authorization server, authentication cooperation system, and storage medium storing program
An authorization token verification request including a second authorization token is received from an application server having received a processing request...
US-9,985,961 Information processing system and authentication method
An information processing system includes a service utilizing device and at least one information processing device to provide a service for the service...
US-9,985,960 Method for protecting data on a mass storage device and a device for the same
A method for protecting data on a mass storage device. The device has a security module and a data storage area configured to be switched between a protected...
US-9,985,958 Segmentation, handshaking, and access control solutions for Opendots technology
Apparatus, methods, and systems described herein are for segmentation, handshaking, and access control solutions for Opendots technology. One embodiment...
US-9,985,957 Digital certificate with software enabling indicator
A system and method of enabling software features on apheresis machines and/or infusion pumps uses a license server disposed outside of a medical facility and a...
US-9,985,956 Client authentication
A client authentication system receives authentication requests associated with a web page in response to a client computing system requesting access to the web...
US-9,985,955 System and method for single sign-on for thick-client applications
The embodiments herein provide a system and method to enable a single sign-on into a plurality of thick-client applications through an external application. The...
US-9,985,954 Sponsored trust relationship management between multiple racks
A new management node associated with a new rack sends at least a public key of the new management node to a first management node associated with a first rack...
US-9,985,953 Desktop application fulfillment platform with multiple authentication mechanisms
A service provider system may include an application fulfillment platform that delivers desktop applications to desktops on physical computing devices or...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.