Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,003,8710 Efficient identification of log events in enterprise threat detection
A first set of log entries is identified. A plurality of log entry classes occurring in the first set of log entries is determined. Each log entry in a given...
US-1,003,8709 Computer network defense system employing multiplayer gaming functionality
A computerized network defense system includes a user interface component for displaying an interactive landscape to an agent, including a graphical...
US-1,003,8708 Geo-mapping system security events
A particular security event is identified that has been detected as targeting a particular computing device included in a particular computing system. A...
US-1,003,8707 Rarity analysis in network security anomaly/threat detection
A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security...
US-1,003,8706 Systems, devices, and methods for separating malware and background events
Embodiments relate to systems, devices, and computing-implemented methods for separating malware and background events to classify malware based on traffic data...
US-1,003,8705 System and method for performing intrusion detection in an information handling system
A method and information handling system (IHS) for identifying communication threats in an IHS. The method includes triggering a board management controller...
US-1,003,8704 Systems and methods for correlating and distributing intrusion alert information among collaborating computer...
Systems and methods for correlating and distributing intrusion alert information among collaborating computer systems are provided. These systems and methods...
US-1,003,8703 Rating network security posture and comparing network maliciousness
Embodiments are disclosed for profiling network-level malicious activity. Profiling embodiments include observing malicious activity, representing such activity...
US-1,003,8702 Server drift monitoring
Threat detection is improved by monitoring variations in observable events and correlating these variations to malicious activity. The disclosed techniques can...
US-1,003,8701 Method for detecting security error in mobile telecommunications system and device of mobile telecommunications
According to one embodiment, a method of performing a re-establishment procedure in a mobile communication system includes: receiving at least one packet data...
US-1,003,8700 Establishing trustworthiness of devices in the internet of things (IoT) to control inter-device communication
Technology for establishing trustworthiness of devices in the Internet of Things (IoT), and for controlling communications between devices based on the...
US-1,003,8699 Management device, management system, and management method
A management device manages information of a task having been executed by users cooperatively. An electronic data access unit accesses electronic data by using...
US-1,003,8697 Determining similarity between security rules based on weighted comparisons of their rule parameters
First and second security rules are accessed in a configuration file. Comparison points for comparing the first and second security rules are determined. Each...
US-1,003,8696 System and method for controlling access to enterprise networks
A method in an access control server of controlling access to an enterprise network includes: receiving, at the access control server from a client computing...
US-1,003,8695 Remotely deauthenticating a user from a web-based application using a centralized login server
Provided is a process including: relaying, with a server at a first domain, at least part of a plurality application-layer messages between a client web browser...
US-1,003,8694 System and method for security mode-based authorization for data management operations in a multi-tenant...
According to one embodiment, a request is received from a remote device of a user for performing a data management operation from source data represented by a...
US-1,003,8693 Facilitating secure network traffic by an application delivery controller
Facilitation of secure network traffic by an application delivery controller is provided herein. In some examples, a method includes: (a) receiving a data...
US-1,003,8692 Characteristics of security associations
Authentication of a user or a wireless transmit/receive unit may be based on an obtained measure of authentication strength, which may referred to as an...
US-1,003,8691 Authorization of a financial transaction
An iris biometric recognition module includes technology for capturing images of an iris of an eye of a person, whether the person is moving or stationary. The...
US-1,003,8690 Multifactor authentication processing using two or more devices
A first user request may be received to access a particular resource. A first authentication credential from a first client device may be received based on a...
US-1,003,8689 Dynamic password generation
Aspects of the present disclosure relate to dynamically generating a security challenge and corresponding password. A set of user activity data may be obtained...
US-1,003,8688 Web based system that allows users to log into websites without entering username and password information
Internet user passwords are securely managed. A formation component can enable a user to create a master account on a web server, the master account comprising...
US-1,003,8687 Devices and control method thereof and application login system
The present invention relates to a terminal and a control method thereof which automatically log in to an application, which is installed on a common smart...
US-1,003,8686 Hybrid device and person based authorization domain architecture
This invention relates to a system and a method of generating an Authorized Domain (AD) by selecting a domain identifier, and binding at least one person (P1,...
US-1,003,8685 Service request authentication method and apparatus
Methods and apparatuses for service request authentication are disclosed to prevent a terminal or a first server that does not sign an agreement with a gateway...
US-1,003,8684 Relationship-based authorization
Methods and apparatus, including computer program products, related to relationship-based authorization. In general, data characterizing a request for...
US-1,003,8683 Authentication of service requests using a communications initiation feature
Described are computer-based methods and apparatuses, including computer program products, for facilitating communications initiated through a social networking...
US-1,003,8682 System and method for communicating between distributed applications and databases
A JBoss application may allow for a distributed application hosted on a JBoss application server to connect to a hierarchical type database. Additionally, the...
US-1,003,8681 Method for managing an access from a remote device to data accessible from a local device and corresponding system
The invention relates to a method for managing an access from a remote device to data and/or at least one resource accessible from a local device. The local...
US-1,003,8679 Centralized secure device pairing
Various embodiments are generally directed to pairing computing devices for collaborative interaction via a network through a centralized secure device pairing...
US-1,003,8678 System and method to enable PKI- and PMI- based distributed locking of content and distributed unlocking of...
A central server configured with an Attribute Authority ("AA") acting as a Trusted Third Party mediating service provider and using X.509-compatible PKI and...
US-1,003,8677 Digital security bubble
A digital security bubble encapsulation is disclosed. A public key and a device identifier of at least one recipient is requested from a first server. A message...
US-1,003,8676 Call encryption systems and methods
Techniques described herein may be used to encrypt a telephone call between users. User devices (e.g., smart phones) may be connected to encryption relay...
US-1,003,8675 Storing decrypted body of message and key used to encrypt and decrypt body of message
A non-transitory computer-readable storage medium comprising instructions stored thereon. When executed by at least one processor, the instructions may be...
US-1,003,8674 Secure mobile data sharing
Implementations of the present disclosure include methods, systems, and computer-readable storage mediums for providing secure mobile data sharing. Actions can...
US-1,003,8673 On-premises data access and firewall tunneling
A system and method for tunneling through a network separation device such as a firewall or a Network Address Translator including a first server receiving an...
US-1,003,8672 Virtual private network sessions generation
A system for generating virtual private network (VPN) sessions from VPN server log messages uses and displays a VPN sessions table in which each row contains...
US-1,003,8671 Facilitating enforcement of security policies by and on behalf of a perimeter network security device by...
Systems and methods for managing network traffic by a perimeter network security device based on internal network traffic or configuration information are...
US-1,003,8670 System and method for controlling access to a plant network
A system for centrally controlling access by computers in a corporate network to a plant network that runs plant applications. The system includes an access...
US-1,003,8669 Path control system, control device, and path control method
To provide a path control system, a control device and a path control method that can achieve reduction of the load on a gateway device, there are included a...
US-1,003,8668 Computerized system and method for handling network traffic
Methods and systems for processing network content associated with multiple virtual domains are provided. According to one embodiment, a service daemon process...
US-1,003,8667 Method and system of authentication and OTA registration of a new user without a SIM card in multi-operator...
In a preferred aspect of the present invention there is disclosed method of authentication and over-the-air (OTA) registration of a new user without a...
US-1,003,8666 Configuration services
Measures, including methods, systems and non-transitory computer-readable storage mediums, for providing a Domain Name Service (DNS) configuration service for...
US-1,003,8665 Reducing broadcast flooding in a software defined network of a cloud
A mechanism is provided for reducing network load in a software defined network. The mechanism is executed by a virtual machine hypervisor. The mechanism...
US-1,003,8664 Terminal status subscription method, apparatus, and system
A terminal status subscription method, apparatus, and system. The method includes receiving a notification message sent by a presence server serving a first...
US-1,003,8663 Computer, internet and telecommunications based network
A method and apparatus for a computer and telecommunication network which can receive, send and manage information from or to a subscriber of the network, based...
US-1,003,8662 Automation of matching of short message tags to content
A system, method, and computer-readable medium for providing a short message tag identification tool which performs a short message tag identification operation...
US-1,003,8661 Systems and methods for storing and transferring message data
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for storing and transferring messages. An example method...
US-1,003,8660 System and method for reducing unsolicited e-mails
A method for reducing unsolicited e-mails includes receiving an e-mail message from a sender, storing the e-mail message within a holding unit, and sending a...
US-1,003,8659 Electronic business postal system
An electronic business postal system collects, clears and delivers electronic business mail through a closed access, secure messaging system. A collection...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.