Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,014,2360 System and method for iteratively updating network attack mitigation countermeasures
A system and computer-implemented method for mitigating a malicious network attack. The method includes receiving an attack alert that a network attack has been...
US-1,014,2359 System and method for identifying security entities in a computing environment
System and method to identify a security entity in a computing environment is disclosed. Communication between a user computer and at least one destination...
US-1,014,2358 System and method for identifying an invalid packet on a controller area network (CAN) bus
A system and method for detecting an invalid packet on a Controller Area Network (CAN) bus having a plurality of CAN nodes coupled thereto is provided. The...
US-1,014,2357 Systems and methods for preventing malicious network connections using correlation-based anomaly detection
The disclosed computer-implemented method may include (i) monitoring computing activity, (ii) detecting, during a specific time period, at least one malicious...
US-1,014,2356 Channel data encapsulation system and method for use with client-server data channels
Systems and methods are disclosed that relate to network security to monitor and report threats in network traffic of a datacenter. For example, one embodiment...
US-1,014,2355 Protection of telecommunications networks
A protection system for a telecommunications network includes an evaluation engine that receives information about threats from user devices using the network...
US-1,014,2354 Cloud-based communication account security
A request is received over a network to resolve a problem relating to a networked user device. The request is accepted in order to provide user service. Based...
US-1,014,2353 System for monitoring and managing datacenters
An example method includes detecting, using sensors, packets throughout a datacenter. The sensors can then send packet logs to various collectors which can then...
US-1,014,2352 Configuration management for virtual machine environment
A computer-implemented method for controlling a connection between a virtual machine and a physical device comprises receiving a connection request for...
US-1,014,2351 Retrieving contact information based on image recognition searches
A system and method for retrieving contact information based on image recognition searches is disclosed. A requestor takes a picture of a user or retrieves a...
US-1,014,2350 Information processing apparatus permitting execution of an application program by a terminal apparatus based...
An information processing apparatus includes a memory and a processor configured to transmit an application to a terminal apparatus in accordance with...
US-1,014,2349 Verifying network-based permissioning rights
Methods, systems and computer programs for verifying permissioning rights to one or more data resources associated with a data processing platform are...
US-1,014,2348 Enhanced data interface for contactless communications
Embodiments of the invention are directed at an enhanced data interface (EDI) for contactless communications between a mobile application operating on a mobile...
US-1,014,2347 System for centralized control of secure access to process data network
A distributed block chain network having at least a private block chain portion, and in some cases a public block chain portion, allows users to take actions...
US-1,014,2346 Extension of a private cloud end-point group to a public cloud
Disclosed are systems, methods and computer-readable storage medium for extending a private cloud to a public cloud. The private cloud can be extended to the...
US-1,014,2345 Method and apparatus for multi-users registering home network supporting application based device
Provide is a device and a method for registering the device supporting home networking, by a server. The method includes receiving a registration request for...
US-1,014,2344 Credential management system
System, method and media for managing user credentials by securely caching credentials to access shared, secure resources for subsequent reuse. When a user...
US-1,014,2343 Unauthorized access detecting system and unauthorized access detecting method
In an unauthorized access detecting system, authentication information to be leaked outside is generated. In the unauthorized access detecting system, the...
US-1,014,2342 Authentication of client devices in networks
Implementations relate to authentication of end devices in networks. In some implementations, a method includes receiving identity information at an edge...
US-1,014,2341 Apparatus, system and method for webRTC
There is provided a solution as to how the authentication and thus the authorization of the webRTC IMS Client can be achieved in the IMS of the mobile network...
US-1,014,2340 System for detection and identification of electronic devices and allocation of proxy identifiers for same
Embodiments are directed to detection and identification of electronic devices and allocation of proxy identifiers for the same. Embodiments detect one or more...
US-1,014,2339 Identity authentication system, apparatus, and method, and identity authentication request apparatus
The present invention provides an identity authentication system, apparatus and method and an identity authentication request apparatus. The system includes: an...
US-1,014,2338 Systems and methods for online third-party authentication of credentials
Systems and methods are disclosed for online authentication of online attributes. One method includes receiving an authentication request from a rely party, the...
US-1,014,2337 Hardware identification through cookies
Multiple cookies of a client device are used to form an identifier of the client device such that a change in one or even several browser cookies does not...
US-1,014,2336 Communication system and method
A communication analysis method is implemented in a first device that receives communication frames originating from a second device. The first device and the...
US-1,014,2335 Dynamic intrinsic chip identification
An apparatus, method, system, and program product are disclosed for intrinsic chip identification. One method includes receiving first counter information from...
US-1,014,2334 Communicating apparatus, method, and communicating system
A communicating apparatus, method, and system that capture an image, authenticate a person in the image that has been captured, determine a direction of the...
US-1,014,2333 Biometric reference template record
Systems and methods provide for secure and efficient token generation, management, transfer, and authentication services in a biometric data environment....
US-1,014,2332 Method and apparatus for a wearable based authentication for improved user experience
A wearable device is provided for authentication that includes a memory element and processing circuitry coupled to the memory element. The memory element...
US-1,014,2331 Authentication for application
The present disclosure provides a method, terminal, and system for authentication with respect to an application. The present techniques may be applicable at a...
US-1,014,2330 Locking systems with multifactor authentication and changing passcodes
A computer-based locking system using changing passcodes includes an application server and an application in electronic communication with the application...
US-1,014,2329 Multiple-factor authentication
Multiple factor authentication of a user is provided by verifying a first authentication factor for the user. At least one target endpoint device is identified...
US-1,014,2328 Account enrollment systems and processes
Systems and methods, which can provide for user enrollment of an account, are provided. The enrollment of an account can be performed in a ...
US-1,014,2326 Attribute-based access control
A received security token includes first access control attributes and a signature of a first identity provider of a first security domain. Additional access...
US-1,014,2325 Systems and methods for credentials distribution
A method by a management server is described. The method includes receiving a credentials request from a requesting management node. The credentials request...
US-1,014,2324 Method for reading attributes from an ID token
The invention relates to a method for reading at least one attribute stored in an ID token, wherein the ID token is assigned to a user, comprising the following...
US-1,014,2323 Activation of mobile devices in enterprise mobile management
The present disclosure is drawn to systems and methods for activating a mobile device in an enterprise mobile management context. The mobile device is...
US-1,014,2322 Methods and apparatus for authenticating identity of web access from a network element
A network configuration having various network elements and user equipments configured to authenticate web access requests is disclosed. Upon receipt of web...
US-1,014,2321 Single sign-on processing for associated mobile applications
Systems, methods and computer-readable media are disclosed for performing single sign-on processing between associated mobile applications. The single sign-on...
US-1,014,2320 System and method for establishing and monetizing trusted identities in cyberspace with personal data service...
A system and method for establishing and monetizing trusted identities in cyberspace relying upon user opt in. Users request to attain secure IDs for accessing...
US-1,014,2319 Protecting network communication security
A method and apparatus for protecting a network communication security. In one embodiment, there is provided a method for protecting network communication...
US-1,014,2318 Self-adaptive communication method for encryption dongle
A self-adaptive communication method for an encryption dongle, comprising: an upper-layer software platform sets communication mode information of self, when...
US-1,014,2317 System and method for processing user rights
A system and method for processing entitlement rights are disclosed. The method, in one aspect, provides for storing content at a first time, receiving a...
US-1,014,2316 Computerized method and system for managing an email input facility in a networked secure collaborative...
In embodiments of the present invention improved capabilities are described for managing an email input facility in a networked secure collaborative computer...
US-1,014,2315 Method and apparatus of providing messaging service and callback feature to mobile stations
Disclosed are an apparatus and method of performing automated administrative operations on a mobile device. One example method may include determining via a...
US-1,014,2314 Method and apparatus for processing authentication request message in a social network
The present disclosure presents a method and apparatus for processing an authentication request message in a social network. In order to resolve the problems of...
US-1,014,2313 System and method for authenticating user using contact list
A user authentication system and method uses a contact list that may receive contact list information stored in an electronic device from the electronic device...
US-1,014,2312 System for establishing secure access for users in a process data network
Systems, computer program products, and methods are described herein for a system for establishing secure access for users in a process data network. The...
US-1,014,2311 Communication system and communication device
Devices between which packets are transmitted and received include mutually corresponding packet counters. The same random number value is given to the packet...
US-1,014,2310 Method and cloud server for managing device
A method of managing a device is provided. The method includes registering execution authorization information regarding a function provided by a first device,...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.