Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,998,502 Method and apparatus for managing calls
A system that incorporates teachings of the present disclosure may include, for example, receiving a request for a voice call at a mobile switching center...
US-9,998,501 Sensor gateway
A sensor gateway manages wireless communications to sensors and the exchange of data between the sensors and a connection to the Internet. A sensor gateway...
US-9,998,500 Methods and systems for performing lawful interception (LI) in communication networks involving content...
A method for lawful interception in a communication network involving adulteration by colluding agent is disclosed. The method includes activating, selectively,...
US-9,998,498 Cognitive authentication with employee onboarding
Embodiments include method, systems and computer program products for onboarding a new employee to an organization. Aspects include receiving, by a processor,...
US-9,998,497 Managing relationships in a computer system
Certain embodiments provide means for managing automated access to computers, e.g., using SSH user keys and other kinds of trust relationships. Certain...
US-9,998,496 Logging and monitoring usage of cloud-based hosted storage services
A computer-implemented method for accessing a hosted service on client devices is described. The client devices include client software that uses a remotely...
US-9,998,495 Apparatus and method for verifying detection rule
Disclosed herein are an apparatus and method for verifying a detection rule. The apparatus for verifying a detection rule includes a grammar checking unit for...
US-9,998,494 Methods and apparatus for secure communication in a vehicle-based data communication system
A method provides secure communication between a first module and a second module within a vehicle communication network. A first anti-replay counter is...
US-9,998,493 Systems and methods for key logger prevention security techniques
An applet may be downloaded or provided to a web browser when a user visits a site in order to protect data input by the user from being captured by malicious...
US-9,998,492 Processing method for network address translation technology, NAT device and BNG device
Provided are a processing method for a Network Address Translation, NAT, technology, an NAT device and a BNG device, the method includes: the NAT device...
US-9,998,491 Forecasting and classifying cyber-attacks using neural embeddings based on pattern of life data
A first collection including a pattern of life (POL) feature vector and a Q&A feature vector is constructed. A second collection is constructed from the first...
US-9,998,490 Security management in a networked computing environment
An approach for addressing (e.g., preventing) detected network intrusions in a virtualized/networked (e.g., cloud) computing environment is provided. In a...
US-9,998,489 Method and system for tamper-proofing a dual modulation network
A system and method for a tamper-resistant network is disclosed. The system includes a primary network hub (PNH) having a PNH transceiver and a PNH...
US-9,998,488 Protection system including machine learning snapshot evaluation
This disclosure is directed to a protection system including machine learning snapshot evaluation. A device may comprise a machine learning engine (MLE) to...
US-9,998,487 Domain level threat detection for industrial asset control system
A normal space data source stores, for each of a plurality of threat nodes, a series of normal values that represent normal operation of an industrial asset...
US-9,998,486 System for utilizing one or more databases to identify a point of compromise
Systems and computer-readable media are disclosed for utilizing one or more databases to detect a point of compromise ("POC"). A POC detection computing...
US-9,998,485 Network intrusion data item clustering and analysis
Embodiments of the present disclosure relate to a data analysis system that may automatically generate memory-efficient clustered data structures, automatically...
US-9,998,484 Classifying potentially malicious and benign software modules through similarity analysis
A method comprises obtaining at least a first software module not classified as benign or potentially malicious, extracting a set of features associated with...
US-9,998,483 Service assurance and security of computing systems using fingerprinting
Providing detection of computing application malfunctions by performing at least the following: collecting a plurality of computing events that correspond to a...
US-9,998,482 Automated network interface attack response
An attack upon a web interface is detected in real-time. The web interface is one of many web interfaces across many ports across many computer systems within a...
US-9,998,481 Systems and methods for use in scoring entities in connection with preparedness of the entities for cyber-attacks
Systems and methods are provided for scoring business entities for attack preparedness, for example, in connection with cyber-attaches, etc. One exemplary...
US-9,998,480 Systems and methods for predicting security threats
A computer-implemented method for predicting security threats may include (1) predicting that a candidate security target is an actual target of a specific...
US-9,998,479 Filtering network traffic using protected filtering mechanisms
Concepts and technologies are disclosed herein for filtering network traffic using protected filtering mechanisms. An indication that traffic is to be filtered...
US-9,998,478 Enterprise-wide security for computer devices
A system and method for securing data in mobile devices (104) includes a computing mode (102) and a plurality of mobile devices (104). A node security program...
US-9,998,477 Digital content access control
Access to a linked resource may be protected using a time-based transformation of links to the resource. A linked resource may be transmitted to a browser in a...
US-9,998,476 Data distribution apparatus, communication system, moving object, and data distribution method
According to an embodiment, a data distribution apparatus is connected with electronic apparatuses through a network. The data distribution apparatus includes a...
US-9,998,475 Streamlined utility portals for managing demand-response events
A method for authorizing a smart-home device for enrollment with a demand-response program may include receiving, at a control server of an energy management...
US-9,998,474 Secure assertion attribute for a federated log in
Embodiments of the present invention disclose a method, computer program product, and system for authenticating a user. The application server receives a user...
US-9,998,473 WiFi access management system and methods of operation thereof
A WiFi access management system and methods of operation are disclosed. In one embodiment, a method comprises receiving, at a server, a wireless access profile...
US-9,998,472 Search personalization and an enterprise knowledge graph
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium for searches associated with the enterprise information. In...
US-9,998,471 Highly accurate security and filtering software
A security software comprises administrative module for configuring access levels and creating types of accounts and application server for domain filtering by...
US-9,998,470 Enhanced data leakage detection in cloud services
Embodiments describing an approach to receiving user data, and monitoring a user data transaction. Monitoring a user data transaction. Identifying a plurality...
US-9,998,469 Media list for travel
In an approach for sending a media list to a transportation vehicle for a user, a processor determines a media list for travel for a user, wherein the media...
US-9,998,468 Threat-aware provisioning and governance
A management component of a computing system evaluates end-users, end-user devices, and user accounts for access to provisioned-resources of the computing...
US-9,998,467 Application publishing using memory state sharing
Examples described herein enable memory state sharing among a plurality of virtual machines (VM) including a parent VM and a child VM. A request for memory...
US-9,998,466 System and method for secure control of resources of wireless mobile communication devices
Systems and methods for secure control of a wireless mobile communication device are disclosed. Each of a plurality of domains includes at least one wireless...
US-9,998,465 Wireless communication apparatus, information processing apparatus, communication system, and method of...
Provided is a wireless communication apparatus including an accepting unit that accepts a transfer operation to transfer a connection right from a first...
US-9,998,464 Storage device security system
A storage device security system includes a server that is coupled to a storage device, a storage controller, a configuration IHS, and a remote access...
US-9,998,463 Peer to peer enterprise file sharing
Disclosed are various embodiments for facilitating the distribution of files from a file repository. Files from a file repository can be distributed via peer to...
US-9,998,462 Asynchronous design data exchange with external users
A method for an asynchronous data exchange between a PLM system and an external user. The method includes defining an exchange definition object related to...
US-9,998,461 Server, a system, a method, a computer program and a computer program product for accessing a server in a...
The invention concerns a first server (101) for accessing a second server (102) via a computer network (100), adapted to upon successful authentication of first...
US-9,998,460 Diameter redirect between client and server
A technique redirects a Diameter client command from a first server that has become unavailable to a second server consistent with a Diameter protocol. A method...
US-9,998,459 End-to end protection for shrouded virtual servers
Technical solutions are described for securely deploying a shrouded virtual server. An example method includes sending, by a host manager, authentication...
US-9,998,458 Identity verification method and device
A method and a device of identity verification are disclosed. The method includes: receiving by a server, an identity verification request sent from a terminal,...
US-9,998,457 Network authentication of a geo-fenced volume
Provided is a method for managing a software defined network using a software control layer to regulate a geo-fenced volume. The software control layer can use...
US-9,998,456 System and method for one time password-based authentication
Disclosed are a system and a method for one-time password (OTP)-based authentication. The system for OTP-based authentication includes a transceiver module...
US-9,998,455 Protection of application passwords using a secure proxy
Protecting application passwords using a secure proxy. A request is received by a proxy from a client to access a protected resource located on a target server....
US-9,998,454 Directional sensing mechanism and communications authentication
The present invention is directed toward an RFID device that includes a motion sensing mechanism. The motion sensing mechanism is adapted to sense motion of the...
US-9,998,453 Controlling access to personal data
Disclosed are various embodiments for controlling access to personal data of a user. In one embodiment, content is requested from a network site using an...
US-9,998,452 Customizing user interfaces for multiple different clients
Techniques described herein provide customized user interfaces to users of clients based on the context of the client. For instance, the techniques may receive...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.