Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,013,5855 Near-real-time export of cyber-security risk information
This disclosure provides an apparatus and method for near-real-time export of cyber-security risk information, including but not limited to in industrial...
US-1,013,5854 Method, apparatus, and computer-readable medium for generating a data proliferation graph
An apparatus, computer-readable medium, and computer-implemented method for generating a data proliferation graph, including receiving a selection of a target...
US-1,013,5853 Multi-tier aggregation for complex event correlation in streams
A system and method for detecting anomalous activity, the method includes collecting data from a plurality of data sources, wherein each data source generates a...
US-1,013,5852 Bot detection based on behavior analytics
A system automatically detects bots and/or botnets.
US-1,013,5851 Method for pattern processing
The invention relates to a method for pattern processing on a processor platform, the method comprising: compiling a plurality of patterns into a plurality of...
US-1,013,5850 Data resource anomaly detection
Anomaly detection is provided. A first component of a first data resource of a plurality of data resources is identified. Each data resource of the plurality of...
US-1,013,5849 Securing medical devices through wireless monitoring and anomaly detection
A medical device monitor (MedMon), method and computer readable medium is disclosed. The MedMon is configured to operate in a system having communications...
US-1,013,5848 Network security threat detection using shared variable behavior baseline
A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security...
US-1,013,5847 Reverse shell network intrusion detection
A client system such as a database system may be vulnerable to intrusion by an unauthorized user or system through a reverse secure shell connection that...
US-1,013,5845 Context-aware network on a data exchange layer
In an example, a context-aware network is disclosed, including threat intelligence services provided over a data exchange layer (DXL). The data exchange layer...
US-1,013,5844 Method, apparatus, and device for detecting e-mail attack
A method, an apparatus, and a device for detecting an E-mail attack. The device receives a data flow; obtains an E-mail traffic parameter of each statistic...
US-1,013,5843 Client reputation driven role-based access control
The present disclosure discloses a system and method for dynamically modifying role based access control for a client based on the activity. Generally, a client...
US-1,013,5842 Content-based isolation for computing device security
The subject disclosure is directed towards securing a computing device using content-based isolation. When the computing device requests content data having...
US-1,013,5841 Integrated security system having threat visualization and automated security device control
Techniques are described for taking direct actions, such as selectively blocking or allowing traffic and applications, while monitoring events from a graphical...
US-1,013,5840 System and method for speed dialing information handling system configuration changes
Methods and systems for receiving speed dial configuration changes may involve receiving a packet, determining whether the packet is associated with a valid...
US-1,013,5839 Electronic devices having adaptive security profiles and methods for selecting the same
Adaptive security profiles are supported on an electronic device. One or more security profiles may be automatically or selectively applied to the device based...
US-1,013,5838 Method and system of network connection control for mobile terminals
A method of network connection control for mobile terminals, includes: classifying network access points accessible to a mobile terminal according to their...
US-1,013,5836 Managing data privacy and information safety
Automatically screen data associated with a user that may have already been shared on a social network or about to be shared on the social network for a...
US-1,013,5835 Passwordless and decentralized identity verification
Techniques include receiving request for verification of an identity, where the request includes no authentication information associated with the identity;...
US-1,013,5834 System and method of executing operations in a social network application
Embodiments are directed to improving social network applications using the power of the blockchain (or other repository of facts as a service). The embodiments...
US-1,013,5833 Credential driving an automatic lock update
An access control system including a data storage device configured to store a master credential database having a plurality of master identifiers and master...
US-1,013,5832 Privileged communication indication
Systems and methods, which can provide for an indication of a privileged communication, are provided. A method, according to an embodiment, uses at least one...
US-1,013,5831 System and method for combining an access control system with a traffic management system
A system and method for handling a request from a client device to access a service from a server. The method comprises receiving a request from a user using a...
US-1,013,5830 Utilizing transport layer security (TLS) fingerprints to determine agents and operating systems
A computer system receives, from a first set of computing devices, a first information. The computer system creates a model based on the first information,...
US-1,013,5829 System and method for secure machine-to-machine communications
Embodiments of the present invention include a method for providing a secure domain name system (DNS) for machine to machine communications. In one embodiment,...
US-1,013,5828 Technologies for secure server access using a trusted license agent
Technologies for secure server access include a client computing device that loads a license agent into a secure enclave established by a processor of the...
US-1,013,5827 Secure access to remote resources over a network
A client computer hosts a virtual private network tool to establish a virtual private network connection with a remote network. Upon startup, the virtual...
US-1,013,5826 Leveraging security as a service for cloud-based file sharing
A method of leveraging security-as-a-service for cloud-based file sharing includes receiving, at a cloud-based file sharing server external to an enterprise...
US-1,013,5825 Protecting supervisor mode information
Embodiments of an invention for protecting supervisor mode information are disclosed. In one embodiment, an apparatus includes a storage location, instruction...
US-1,013,5824 Method and system for determining whether a terminal logging into a website is a mobile terminal
Embodiments of the present application relate to a method and system for determining whether a terminal logging into a website is a mobile terminal. The method...
US-1,013,5823 Input redirection with a cloud client device
In one embodiment, a cloud client device identifies one or more devices within a pre-determined range of the cloud client device operable to communicate with...
US-1,013,5822 Biometric authentication of individuals utilizing characteristics of bone and blood vessel structures
Biometric authentication of a subject utilizing bone and/or blood vessel (vein or artery) structures is provided. A vertice profile is generated from a...
US-1,013,5821 Systems and methods for authenticating a user based on a biometric model associated with the user
Systems and methods as provided herein may create a biometric model associated with a user. The created biometric model may be used to generate challenges that...
US-1,013,5819 Wearable device authentication
A wearable device is used to authenticate a user into a user account at a user device of the user. In particular, the wearable device may include a sensor...
US-1,013,5818 User biological feature authentication method and system
The disclosure discloses a user biological feature authentication method and system. The method includes the following: a client sends an authentication request...
US-1,013,5817 Enhancing authentication and source of proof through a dynamically updatable biometrics database
The present invention provides for biometric authentication of users using current, updatable biometric data/standards. In this regard, the present invention...
US-1,013,5816 Electronic device and method of transceiving data
An electronic device and a method of transceiving data are disclosed. A method of transceiving data by an electronic device includes: storing one or more pieces...
US-1,013,5815 System and method for biometric authentication in connection with camera equipped devices
The present invention relates generally to the use of biometric technology for authentication and identification, and more particularly to non-contact based...
US-1,013,5814 Self-authenticating chips
A self-authenticating chip includes first and second memory regions storing, respectively, first and second authentication codes. The second memory region is...
US-1,013,5813 Computing device with integrated authentication token
Disclosed are various embodiments for a computing device with an integrated authentication token. The computing device includes first circuitry having a...
US-1,013,5812 Authenticating system, information processing device, authenticating method and non-transitory computer...
An authenticating system comprises an information processing device and an authentication server connected over a network. The information processing device...
US-1,013,5811 Using temporary credentials in guest mode
A method may receive, over a network and at a host's media player that is logged in to a host's media account, a play request from a guest's device. The play...
US-1,013,5810 Selective authentication system
A method and authentication mechanism is provided. A request is sent to authenticate a user of the application from a mobile device to an authentication server....
US-1,013,5809 Method, system and apparatus for authentication using application
The present invention relates to a method, system and apparatus for authentication using an application. Particularly, this invention can use an integrated ID...
US-1,013,5808 Preventing inter-application message hijacking
Various approaches discussed herein enable validation of an application on a computing device, such as a mobile computing device, prior to that application...
US-1,013,5807 Storage and distribution of secure or cryptographic material
A user having remote device wants to access an application that requires that the user possess a user application cryptographic credential. If the application...
US-1,013,5806 Method and system for creating a virtual SIP user agent by use of a WEBRTC enabled web browser
A method for creating a virtual SIP user agent by use of a webRTC enabled web browser (200) comprises a user logging in to a web application server (400) via a...
US-1,013,5804 Mobile application based account aggregation
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for automating the collection of user information for account...
US-1,013,5803 Dynamic identity switching
Techniques are disclosed for dynamically switching user identity when generating a web service request by receiving, at a client application, an invocation of a...
US-1,013,5802 System and method for identity management
Some implementations may provide a machine-assisted method for determining a trustworthiness of a requested transaction, the method including: receiving, from a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.