Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,009,1248 Context-aware pattern matching accelerator
Methods and systems for improving accuracy, speed, and efficiency of context-aware pattern matching are provided. According to one embodiment, a packet stream...
US-1,009,1247 Apparatus and method for using certificate data to route data
A method of routing data across a network receives a session request from a client node to access at least one node in a local network having a plurality of...
US-1,009,1246 Methods and systems for protecting a secured network
Methods and systems for protecting a secured network are presented. For example, one or more packet security gateways may be associated with a security policy...
US-1,009,1245 Decoupling hardware and software components of network security devices to provide security software as a...
Concepts and technologies are disclosed herein for decoupling hardware and software components of network security devices to provide security software as a...
US-1,009,1244 Method and system for providing security using a loopback interface
A method of providing security for data using a loopback interface, the method includes setting a security policy on a host device and a client device, the...
US-1,009,1243 Apparatus and method for securely connecting to a remote server
A method for securely connecting to a remote server that provides improved Internet security. In the method, a client receives a request to connect to a remote...
US-1,009,1242 System and method for establishing a secondary communication channel to control an internet of things (IOT) device
A system and method are described for establishing a secondary communication channel between an IoT device and a client device. For example, one embodiment of a...
US-1,009,1241 Method for purposes of making a "zero knowledge" connection between an electronic unit and a computer
A method of making a "zero knowledge" connection between a computer (2) and an electronic unit (5). At the start of the method, the configuration unit (1) is...
US-1,009,1240 Providing forward secrecy in a terminating TLS connection proxy
An infrastructure delivery platform provides a RSA proxy service as an enhancement to the TLS/SSL protocol to off-load, from an edge server to an external...
US-1,009,1239 Auditing and policy control at SSH endpoints
SSH sessions and other protocol sessions (e.g., RDP) may be audited using an interceptor embedded within an SSH server or other protocol server. Operations...
US-1,009,1238 Deception using distributed threat detection
Methods and systems for deception using distributed threat detection are provided. Exemplary methods by an enforcement point, the enforcement point...
US-1,009,1237 Systems and methods for network access control
Network access control systems and methods are provided herein. A method includes receiving at a network device a SYN packet from a client device over a...
US-1,009,1236 Methods apparatuses, and storage mediums for acquiring legitimate installation packages
Methods, apparatuses, and storage mediums are provided for acquiring a legitimate installation package the field of computer technology. The method includes:...
US-1,009,1235 Method, system, and apparatus for detecting and preventing targeted attacks
The disclosed computer-implemented method may include (1) detecting a request from a computing device of a member of an organization in connection with a...
US-1,009,1234 Combination of remote triggered source and destination blackhole filtering
A method for remote triggered black hole filtering can include advertising a first modified next hop address for a destination address of network traffic, and...
US-1,009,1233 Method and apparatus for controlling functionality using codes
Disclosed herein are a method and apparatus for controlling functionality of a mobile device. The operation of the element function of the mobile device is...
US-1,009,1232 Solution-centric reporting of security warnings
A new paradigm for security analysis is provided by transitioning code analysis reporting from the problem space (the warnings themselves), to a solution space...
US-1,009,1231 Systems and methods for detecting security blind spots
The disclosed computer-implemented method for detecting security blind spots may include (i) detecting, via an endpoint security program, a threat incident at a...
US-1,009,1230 Aggregating identity data from multiple sources for user controlled distribution to trusted risk engines
Identity data for a user is aggregated from multiple sources into a global profile, the contents of which is distributed under the control of the user to...
US-1,009,1229 Systems and methods of network security and threat management
The present disclosure generally provides systems and methods of network security and threat management. An exemplary system includes detection and prevention...
US-1,009,1228 Secured event monitoring leveraging blockchain
A method, computer system, and a computer program product for a monitor security process is provided. The present invention may include configuring monitors in...
US-1,009,1227 Detection of potential security threats based on categorical patterns
A metric value is determined for each event in a set of events that characterizes a computational communication or object. For example, a metric value could...
US-1,009,1226 Method and apparatus for service traffic security using DIMM channel distribution in multicore processing system
The present invention relates to a multicore communication processing service. More specifically, aspects of the present invention provide a technology for...
US-1,009,1225 Network monitoring method and network monitoring device
A device includes a processor configured to accumulate a plurality of logs in the memory, by repeating a capturing process and a logging process, the logging...
US-1,009,1224 Implicit crowdsourcing for untracked correction or verification of categorization information
Embodiments of the present disclosure are directed to updating categorization of online content. An analytics engine implemented at least partially in hardware...
US-1,009,1223 Method for detecting anomalies in network traffic
The invention concerns a method for detecting anomalies in network traffic, said traffic being transmitted by a server (10) in response to requests from at...
US-1,009,1222 Detecting data exfiltration as the data exfiltration occurs or after the data exfiltration occurs
A device may identify exfiltration information to be used to detect data exfiltration. The exfiltration information may be associated with a file being tested...
US-1,009,1221 Systems and methods for IP-based intrusion detection
Systems and methods for account security are provided. In one example embodiment, a first login request including a username and a password is analyzed to...
US-1,009,1220 Platform for protecting small and medium enterprises from cyber security threats
A device for protecting a network environment from cyber security threats includes a processing unit and a non-transitory memory having processor-executable...
US-1,009,1219 Methods and apparatus for detecting remote control of a client device
A system, method, and apparatus for detecting remote control of a client device are disclosed. An example network security apparatus includes a network switch...
US-1,009,1218 System and method to detect attacks on mobile wireless networks based on network controllability analysis
Described is a system for detecting attacks of misinformation on communication networks. Network controllability metrics on a graphical representation of a...
US-1,009,1217 Risk based priority processing of data
Utilities (e.g., methods, systems, apparatuses, etc.) for use in generating and making use of priority scores for data generated by one or more data systems...
US-1,009,1216 Method, apparatus, system, and computer readable medium for providing apparatus security
Technologies are provided in embodiments for receiving policy information associated with at least one security exception, the security exception relating to...
US-1,009,1215 Client isolation in a distributed queue
Methods and systems for implementing client isolation in a distributed queue are disclosed. Messages are enqueued in one or more logical queues. Individual...
US-1,009,1214 Malware warning
A malware warning system, including a client sending requests to and receiving replies from a server, and a server, including a first warning generator sending...
US-1,009,1213 Systems and methods to provide secure storage
Systems and method to provide secure storage are disclosed. An example method includes establishing a secure tunnel between a storage device and an agent,...
US-1,009,1212 Policy management, enforcement, and audit for data security
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for managing, and enforcing policies on data security. A policy...
US-1,009,1211 Multiple data store authentication
Systems and methods for authenticating access to multiple data stores substantially in real-time are disclosed. The system may include a server coupled to a...
US-1,009,1210 Policy enforcement of client devices
A method may include sending, by a client device, an access request to an authentication server device. The access request may include a request to access an...
US-1,009,1209 Access enforcement at a wireless access point
A first set of access rules is received from an access configuration service. The first set of access rules specifies addresses of devices authorized for a...
US-1,009,1208 Firewall method and apparatus for industrial systems
Selectively enabling communication of dual protocol packets from a source device directed to a service of an object class at target devices is provided. Steps...
US-1,009,1207 Social network based mobile access
In one embodiment, a method includes retrieving one or more access rules of a first user account of a plurality of accounts of a social network and storing the...
US-1,009,1205 Zeroconf profile transferring to enable fast roaming
Example embodiments relate to zeroconf profile transferring to enable fast roaming. In example embodiments, user identification is received from a user...
US-1,009,1204 Controlling user access to protected resource based on outcome of one-time passcode authentication token and...
Techniques are provided for controlling user access to a protected resource based on an outcome of a one-time passcode authentication token and one or more...
US-1,009,1203 Specialized network fileserver
A method and apparatus of a portable storage device that provides a specialized network fileserver is described. In an exemplary method, the portable storage...
US-1,009,1202 Text suggestions for images
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for receiving image data corresponding to an image,...
US-1,009,1201 Mobile device identify factor for access control policies
A secure VPN connection is provided based on user identify and a hardware identifier. A client application may initiate the VPN connection. A client device user...
US-1,009,1200 Information processing apparatus, policy management apparatus, security policy management method, and storage...
When an expanded application (AP) is installed, an information processing apparatus analyzes port control information relating to a unique port to be used by...
US-1,009,1199 System and method for collaborative authentication
Systems and methods are disclosed for collaborative authentication of a person based on an interaction with another person. A request for collaborative...
US-1,009,1198 Rule-based fingerprint generation methods and apparatus
A device information gathering method is provided. The device information gathering method includes: allowing a device information gathering apparatus to...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.