Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,007,9859 Automated and adaptive model-driven security system and method for operating the same
A system and method for managing implementation of policies in an information technologies system receives into a processor at least one policy function stored...
US-1,007,9858 Managing access in one or more computing systems
Embodiments pertaining to managing access in one or more computing systems can include an operations controller in communication with the one or more computing...
US-1,007,9857 Method of slowing down a communication in a network
Method of forestalling attacks in a network, by slowing down a communication in a network including at least one computer including malware aimed at...
US-1,007,9856 Rotation of web site content to prevent e-mail spam/phishing attacks
Embodiments of the invention provide a method, system and computer program product for phishing attack management through Web site content rotation. In an...
US-1,007,9855 Password breach registry
A password breach registry is utilized to secure a service provided by a service provider. The password breach registry is a publicly accessible registry and...
US-1,007,9854 Client-side protective script to mitigate server loading
Embodiments of methods, systems and storage media associated with mitigating the effects of client-side (customer) bot-like activity caused by code injected...
US-1,007,9853 Differentiating among users based on responses to injected interferences
Devices, systems, and methods of detecting user identity, differentiating between users of a computerized service, detecting a cyber-attacker, and detecting...
US-1,007,9852 Sinkholing bad network domains by registering the bad network domains on the internet
Techniques for sinkholing bad network domains by registering the bad network domains on the Internet are provided. In some embodiments, sinkholing bad network...
US-1,007,9851 Device identification systems
Methods and systems for a device identification system may be provided. The device identification system may determine an identity of a user device associated...
US-1,007,9850 Systems and methods for provisioning cyber security simulation exercises
A computer-implemented method for provisioning cyber security simulation exercises may include (1) maintaining, at a data center level for a data center...
US-1,007,9849 Risk assessment of open Wi-Fi networks
For assessing a risk associated with a Wi-Fi network, an analysis to evaluate a risk element associated with the Wi-Fi network is performed at a mobile device....
US-1,007,9848 Auto-tuning security analysis tool configuration via correlation analysis
A configuration for a security analysis tool is received from a user. The configuration includes two or more configuration items. Each configuration item is a...
US-1,007,9847 Adaptive automatic email domain name correction
A system and methods for correcting domain names in invalid email addresses are described herein. The method includes receiving email failure information...
US-1,007,9846 Domain name system (DNS) based anomaly detection
In one embodiment, a method includes receiving at an analytics module operating at a network device, network traffic data collected from a plurality of sensors...
US-1,007,9845 IoT and PoS anti-malware strategy
Providing security to a device includes detecting, in a first device, a first function call, determining whether the first function call is forbidden for the...
US-1,007,9844 Insider attack resistant system and method for cloud services integrity checking
An insider attack resistant system for providing cloud services integrity checking is disclosed. In particular, the system utilizes an automated integrity...
US-1,007,9843 Streaming method and system for processing network metadata
A method and system for processing network metadata is described. Network metadata may be processed by dynamically instantiated executable software modules...
US-1,007,9842 Transparent volume based intrusion detection
A computing resource service provider may provide customers with a block-level forensics service. Logical volumes associated a customer may be used to...
US-1,007,9841 Automated runtime detection of malware
One example method and correspond apparatus extracts a model of a computer application during load time and stores the model of the computer application in a...
US-1,007,9840 Protection method and computer system of releasing malware attacks for network interface controller system
A protection method, which releases an attack of a malware to a network interface controller (NIC) system, includes processing a microbatching operation in a...
US-1,007,9839 Activation of gateway device
Systems and methods comprising a touchscreen that includes a processor coupled to a security system at a premises. User interfaces presented via the touchscreen...
US-1,007,9838 Decryption of data between a client and a server
Technologies for securing communication may include monitoring a secured network connection between a client and a server. The secured network connection may be...
US-1,007,9837 Distributed topology enabler for identity manager
Provided are techniques for combining existing identity management information from multiple Identity Manager (IM) nodes. The combined information from the...
US-1,007,9836 Methods and systems for secured authentication of applications on a network
A secured communication network can include a server including an authentication backend, the authentication backend configured to communicate with an...
US-1,007,9835 Systems and methods for data loss prevention of unidentifiable and unsupported object types
A computer-implemented method for data loss prevention of unidentifiable and unsupported object types may include (1) monitoring, through at least one filter,...
US-1,007,9834 Secure access to cloud-based services
Techniques to provide secure mobile access to a cloud-based service are disclosed. In various embodiments, a request to access the cloud-based service is...
US-1,007,9833 Digital rights management system with confirmation notification to document publisher during document...
A digital rights management (DRM) method for protecting digital documents, implemented in a DRM system. When an operator (document publisher) scans a document...
US-1,007,9832 Controlling user creation of data resources on a data processing platform
Methods and systems are disclosed for controlling user creation of data resources on a software platform for storing and executing data resources for multiple...
US-1,007,9831 Qualified web application security based on web application hierarchy
Qualified web application security based on web application hierarchy is described. A system receives a web application login request from a web browser...
US-1,007,9830 Lockable network testing device
A network testing device may be linked to a dedicated remote server e.g. a cloud-based server having a unique, pre-determined address. The testing device may be...
US-1,007,9829 Secure provisioning of devices for manufacturing and maintenance
Described herein are methods, apparatuses, and systems for secure provisioning of devices for manufacturing and maintenance. A method includes provisioning a...
US-1,007,9828 CCTV monitoring system for registering camera and managing permission and control method thereof
The present invention provides a CCTV monitoring system for registering a camera and managing permission, and a control method of the system. In other words,...
US-1,007,9827 Information processing apparatus, information processing method, and information processing system
An information processing apparatus for authenticating a user includes a wireless communication unit configured to obtain predetermined information from a...
US-1,007,9826 Methods and systems for data entry
User identities, password, etc. represent the barrier between a user's confidential data and any other third party seeking to access this data. As multiple...
US-1,007,9825 Method and apparatus for authenticating RFID tags
In an RFID system, a method and apparatus for linking an RFID tag to an associated object. The system includes a relatively simple tag, a reader, a linker, and...
US-1,007,9824 Transaction query engine
Example implementations described herein are directed to a transaction query engine involving a token that is generated by the server and sent to the...
US-1,007,9823 Performing authentication
Preference data is received. The received preference data is compared to stored preference data associated with a user with which the received preference data...
US-1,007,9822 Techniques for securely receiving critical communication content associated with a critical communication service
Examples may include techniques for securely receiving critical communication content associated with a critical communication service. Examples may include a...
US-1,007,9821 System and method for web single sign-on through a browser extension
The embodiments herein disclose a system and method for enabling single sign-on for a user on a plurality of web applications through a browser extension. The...
US-1,007,9820 Web-based single sign-on logon manager
Web-based single sign-on can enable a user to log in to a single interface (such as through a web browser or thin client) and then provide SSO services to the...
US-1,007,9819 Systems and methods for authenticating an avatar
Systems and methods for authenticating an avatar are provided. This system is useful with an avatar having an identifier, virtual environments, and a user who...
US-1,007,9818 Providing domain-joined remote applications in a cloud environment
Embodiments are directed to provisioning private virtual machines in a public cloud and to managing private virtual machines hosted on a public cloud. In one...
US-1,007,9817 Techniques for invite enforcement and domain capture
Techniques for invite enforcement and domain capture. In one embodiment, for example, a method performed in an online service computing environment comprises...
US-1,007,9816 Method and device for managing profile
An electronic device and a method for operating the electronic device are provided. The electronic device includes a secure memory including at least one...
US-1,007,9815 Credential entry and management
The present embodiments relate to entry and management of identifiers and credentials. The present embodiments display a credential affordance that, upon...
US-1,007,9814 Secure node-to-multinode communication
The present disclosure relates to communication sessions between a first node and a plurality of other nodes. Two cryptographic keys are generated. A first...
US-1,007,9813 Method and apparatus for secure network enclaves
Methods and apparatus are disclosed to provide for security within a network enclave. In one embodiment authentication logic initiates authentication with a...
US-1,007,9812 Secure content storage by customer-premises equipment
Techniques are disclosed for intercepting, by a customer-premises equipment (CPE), a request for a content file. The request may originate from a computing...
US-1,007,9811 Computational systems and methods for encrypting data for anonymous storage
Methods, apparatuses, computer program products, devices and systems are described that carry out accepting from a user identifier encryption entity at least...
US-1,007,9810 Decryption and analysis of network traffic using key material collected from endpoint devices of a computer network
An apparatus in one embodiment comprises a first endpoint device having a processor coupled to a memory. The first endpoint device is adapted for communication...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.