Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,015,4058 Method and device for validating a timestamp of a data transmission
A method for validating a timestamp, including receiving a first data packet, including first useful data, from a first transmitter, receiving a second data...
US-1,015,4057 Network appliance for vulnerability assessment auditing over multiple networks
An apparatus, system, and method are directed towards enabling auditing of network vulnerabilities from multiple network vantage points virtually ...
US-1,015,4055 Real-time vulnerability monitoring
An apparatus is provided including at least one platform; an intrusion prevention system configured to communicative couple with the at least one platform; a...
US-1,015,4054 Emoji frequency detection and deep link frequency
Systems and methods are disclosed for generating term frequencies of known terms based on crowdsourced differentially private sketches of the known terms. An...
US-1,015,4053 Method and apparatus for grouping features into bins with selected bin boundaries for use in anomaly detection
In one embodiment, a method includes receiving network data at an analytics device, identifying features for the network data at the analytics device, grouping...
US-1,015,4052 Tracer cookies to detect web session compromise by insiders
Complex web applications may be susceptible to cyber-attacks that affect the security of customer sessions. Session theft and exploitation may be predicted and...
US-1,015,4051 Automatic detection of network threats based on modeling sequential behavior in network traffic
A computer-implemented data processing method comprises: executing a recurrent neural network (RNN) comprising nodes each implemented as a Long Short-Term...
US-1,015,4050 Device and a method for detecting and analyzing signals in the ultrasounds frequency spectrum for electronic...
A device and a method for monitoring continuously the activity of a microphone and a speaker of an electronic communications device, filtering any emitted or...
US-1,015,4049 System and method for providing an in-line sniffer mode network based identity centric firewall
The instant disclosure is directed to an attack/unwanted activity detecting firewall for use in protecting authentication-based network resources. The instant...
US-1,015,4048 Methods and systems for location-based authentication using neighboring sensors
Various embodiments include methods, and computing devices implementing the methods, for authenticating vehicle information by polling selected sensors. A...
US-1,015,4047 Method and system for generating a kill chain for monitoring computer network security
A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security...
US-1,015,4046 System and method for evaluation and response to cyber security exposure in an embedded control device
A system and method for evaluating and altering, if necessary, the potential for a cyber security attack on an individual embedded device located on a local...
US-1,015,4045 Method of communicating between secured computer systems as well as computer network infrastructure
A method of communicating between secured computer systems includes supplementing a prepared task file with specified information in a source computer system,...
US-1,015,4044 Method, system, and computer program product for providing security and responsiveness in cloud based data...
A storage controller that is coupled to a plurality of storage clouds is maintained. The storage controller determines security requirements for performing a...
US-1,015,4043 Management of social network group through the use of embedded limitations
A social networking system wherein an individual may set up a personal profile to share with a select group of friends and/or family. The system and method of...
US-1,015,4042 Account sharing detection
In one embodiment, a method includes receiving usage data regarding usage of a subscription-based media service account, generating a plurality of sharing...
US-1,015,4041 Website access control
A method of controlling access to content such as web sites on the intranet or interne is described. For example, the method comprises receiving an address of...
US-1,015,4040 Systems, methods, and devices for gathering display device usage data
A display device includes one or more sensors to sense activity in a physical region near the display, as well as a permission component, account component, and...
US-1,015,4039 Hierarchical policy-based shared resource access control
Access control for shared computing resources in a hierarchical system is provided herein. An as-needed, "lazy evaluation" approach to access control is...
US-1,015,4038 Access control in data processing systems
A policy data structure defines predetermined authorizations, each relating to authorization of at least one user to access at least one resource as well as to...
US-1,015,4037 Techniques for implementing a data storage device as a security device for managing access to resources
Techniques are disclosed for implementation of a data storage device as a security device for managing access to resources. These techniques can be implemented...
US-1,015,4036 Authorization delegation system, control method, authorization server, and storage medium
An authorization delegation system includes a resource server that provides a service and an authorization server that performs authorization delegation for...
US-1,015,4035 System and method for controlling access
Systems and methods for controlling access to multiple applications on a computing device are provided. One embodiment of a system includes an access device...
US-1,015,4034 Cooperative data access request authorization in a dispersed storage network
A method begins by storage units of a set of storage units receiving an access request regarding a set of encoded data slices from a user device. The method...
US-1,015,4033 Electronic device and method for establishing wireless connection
A connection method for a mobile device to access the Internet through wireless Local Area Network (WLAN) established by a wireless access point (WAP) includes...
US-1,015,4032 Methods for security system-agnostic uniform device identification
Systems and methods can comprise receiving an authentication request according to a first security protocol from a user device. Responsive to a determination...
US-1,015,4031 User-wearable secured devices provided assuring authentication and validation of data storage and transmission
Described are user-wearable devices utilizing encryption authentication techniques to ensure security of any data transmission to and from these devices. In...
US-1,015,4030 Analyzing facial recognition data and social network data for user authentication
Tools, strategies, and techniques are provided for evaluating the identities of different entities to protect business enterprises, consumers, and other...
US-1,015,4029 Biometric knowledge extraction for mutual and multi-factor authentication and key exchange
Various embodiments relate to a method performed by a processor of a computing system. An example method includes receiving a user identifier and encrypted...
US-1,015,4028 Systems and methods for authenticating users accessing a secure network
Systems and methods are disclosed for providing an unregistered user with access to a network in a secure and efficient manner. A random, on-demand password is...
US-1,015,4027 Private simultaneous authentication of equals
A passphrase is assigned to an end user device for use in authenticating the end user device for a network using SAE. An identification of the end user device...
US-1,015,4026 Secure remote modification of device credentials using device-generated credentials
Methods, systems, and computer program products are provided that enable secure remote modification of device credentials using device-generated credentials. A...
US-1,015,4025 Seamless device configuration in a communication network
One embodiment of seamless device configuration between a network device and an access point sends a device credential associated with the network device to the...
US-1,015,4024 Push notification activation
A mobile computing device is operated to receive a trigger at a first instance. The trigger may be associated with a predefined condition or event or action....
US-1,015,4023 Method and system for secure instantiation of an operation system within the cloud
A method is disclosed for executing a secure virtual machine stored in encrypted form in IaaS cloud such as Microsoft Azure or Amazon Web Services. A first...
US-1,015,4022 Authentication server and method to enable content to be pushed to a currently utilized device among client devices
In one example, a system includes an authentication server that is configured to receive an authentication request for a primary application, provide time-based...
US-1,015,4021 Securitization of temporal digital communications with authentication and validation of user and access devices
One more devices and/or access control systems are described that securitize data and data transmissions using three sets of computing operations including...
US-1,015,4020 Referral identity system and method of operation thereof
Approaches, techniques, and mechanisms are disclosed for providing referral identity systems and services. The referral identity system can provide a hardware...
US-1,015,4019 End-to-end trusted communications infrastructure
A method establishing a trusted end-to-end communication link is disclosed. The method comprises executing a communication application in a trusted security...
US-1,015,4018 Method and system for facilitating network joining
A method for facilitating network joining is disclosed, wherein, while a communication session is active between a network gateway and an NFC device comprised...
US-1,015,4017 Device pairing in a local network
Particular embodiments described herein provide for an electronic device that can be configured to receive registration data for a local network device, receive...
US-1,015,4016 Devices for transmitting and communicating randomized data utilizing sub-channels
The disclosure provides for two or more transceiver devices and a system that utilizes one or more encrypters and one or more decrypters comprising one or more...
US-1,015,4015 Executable coded cipher keys
The disclosure provides for two or more devices that securitize transmission(s) transmitted to and received from these devices comprising at least one...
US-1,015,4014 Method and system for efficient encryption, transmission, and decryption of video data
One embodiment provides a system for efficiently and securely encrypting, transmitting, and decrypting video data, including selective encryption of image...
US-1,015,4013 Updating encrypted cryptographic key
A computing device has a processor and a first memory, e.g., a fuse-based memory, storing a first cryptographic key. The processor is configured to receive...
US-1,015,4012 Systems and methods for protecting internet advertising data
Systems and methods are disclosed for protecting user privacy in, for example, online advertising environments. The method includes receiving data related to a...
US-1,015,4011 Secure data sharing with publicly accessible computing nodes
An embodiment of the invention includes determining a first security status for first information and a second security status for second information, the...
US-1,015,4010 Methods and apparatus for providing a secure overlay network between clouds
A process capable of automatically establishing a secure overlay network ("SON") across different clouds is disclosed. The process, in one aspect, receives a...
US-1,015,4009 Providing a basic firewall using a virtual networking function
Concepts and technologies are disclosed herein for providing a basic firewall using a virtual networking function. A control system having a processor can...
US-1,015,4008 Scanner enabled with a secure input/output (I/O) module (SIOM)
A scanner is enabled for communication with a Secure Input/Output (I/O) Module (SIOM) using a secure communication protocol. The SIOM is provisioned with a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.