Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,017,1507 Microsegmentation in heterogeneous software defined networking environments
Microsegmentation in a heterogeneous software-defined network can be performed by classifying endpoints associated with a first virtualized environment into...
US-1,017,1506 Network security management via social media network
Systems and methods for managing users' local security policies based on social media network information are provided. According to one embodiment, a network...
US-1,017,1505 Preventative enterprise change management
Embodiments for implementing change control management in computing center environments by a processor. A physical activity of a user performing an action in...
US-1,017,1504 Network access with dynamic authorization
In one embodiment, a method includes receiving at an enforcement node, a request to access a network from an endpoint, transmitting at the enforcement node, the...
US-1,017,1503 Methods for scaling infrastructure in a mobile application environment and devices thereof
A method, non-transitory computer readable medium and device that assists with scaling infrastructure in a mobile application environment obtaining a number of...
US-1,017,1502 Managed applications
Embodiments relate to a system that includes a computing device and a managed application executable by the computing device. The managed application initiates...
US-1,017,1501 System and method for remote wipe
A remote wipe message or notification may be sent from a server computer to one or more target client devices associated with a user. A managed container...
US-1,017,1500 Systems, apparatuses, and methods for enforcing security on a platform
Embodiments of a system, apparatus, and method of platform security are describe. In some embodiments, a system comprises a manageability engine to detect if a...
US-1,017,1499 Zone-based security architecture for intra-vehicular wireless communication
Systems and methods provide secure and wireless intra-vehicular communication. An intra-vehicular communication system has a secured network segment including a...
US-1,017,1498 Secure crypto module including electrical shorting security layers
A security matrix layer between a first and second conductive shorting layers are located within a printed circuit board (PCB) that carries out cryptographic...
US-1,017,1497 Systems and methods for detecting online fraud
Described systems and methods enable a swift and efficient detection of fraudulent Internet domains, i.e., domains used to host or distribute fraudulent...
US-1,017,1496 Beacon spoofing prevention
In one embodiment, a beacon signal is received from a beacon device. Either a mobile device or a server identifies a beacon authentication value from the beacon...
US-1,017,1495 Detection of modified requests
Suspicious connection requests can be detected by analyzing connection parameters at multiple levels of a network framework. For Internet-based requests,...
US-1,017,1494 Scarecrow for data security
A method, computer program product and/or system receives information pertaining to network data traffic from and/or to a network accessible resource, analyzes...
US-1,017,1493 Method and system to dynamically obfuscate a web services interface
The present application relates to the handling of what are generally referred to as denial of service (DoS) attacks. More specifically, the present application...
US-1,017,1492 Denial-of-service (DoS) mitigation based on health of protected network device
Systems and methods for improving the performance of DDoS mitigation by monitoring the health of a protected network resource are provided. According to one...
US-1,017,1491 Near real-time detection of denial-of-service attacks
Methods and systems for detection and mitigation of denial-of-service (DoS) attacks against network applications/services/devices in near real-time are...
US-1,017,1490 System and method for strategic anti-malware monitoring
The system and method described herein may leverage active network scanning and passive network monitoring to provide strategic anti-malware monitoring in a...
US-1,017,1487 Generating a virtual database to test data security of a real database
Determining a data security risk level of a virtual database is provided. An object catalog corresponding to a real database is imported into the virtual...
US-1,017,1486 Security and authentication daisy chain analysis and warning system
An approach is disclosed that provides a security and authentication daisy chain analysis and warning system to a user. The approach monitors sets of user...
US-1,017,1485 System conversion in a networked computing environment
Approaches for providing security in a networked computing environment are provided. The method includes detecting, by at least one computer device, a breach of...
US-1,017,1484 Securing services in a networked computing environment
A system includes: a CPU, a computer readable memory and a computer readable storage medium associated with a computer device of a service provider; program...
US-1,017,1483 Utilizing endpoint asset awareness for network intrusion detection
An intrusion device identifies network data to be sent to a destination endpoint and determines a sensitivity level of the destination endpoint based on asset...
US-1,017,1482 Pre-processing before precise pattern matching
Pre-processing before precise pattern matching of a target pattern from a stream of patterns. Including acquiring occurrence numbers of target elements in the...
US-1,017,1481 System and method for enhanced display-screen security and privacy
A security method that includes assigning a sensitivity value for a communication with a sensitivity determining module including at least one hardware...
US-1,017,1480 Cloud-based surveillance with intelligent tamper protection
In one embodiment, a security system includes a central communication unit and a first surveillance device. The central communication unit is communicatively...
US-1,017,1479 Fast multicast messaging encryption and authentication
To prevent legitimate message recipients from forging new messages and to encrypt messages for a specific set of recipients (channel), a root key is encrypted...
US-1,017,1478 Efficient and secure method and apparatus for firmware update
This relates to a vehicle and, more particularly to, a vehicle configured to perform a secure firmware update. Some examples of the disclosure include receiving...
US-1,017,1477 Authenticated data streaming
A data-collecting device acquires data associated with a real-time data stream and transmits the data to a data-consuming service hosted on a server computer...
US-1,017,1476 System and method for protecting the privacy of identity and financial information of the consumer conducting...
The migration of identity documents, such as driving licenses, from physical documents to electronic documents creates new problems for those seeking to verify...
US-1,017,1475 Cloud email message scanning with local policy application in a network environment
A method for applying policies to an email message includes receiving, by an inbound policy module in a protected network, message metadata of an email message....
US-1,017,1474 Network access based on social-networking information
In one embodiment, a method includes receiving a request at a wireless access point from a client system to access a network through the wireless access point....
US-1,017,1473 Content filtering for personal productivity applications
A set of context profiles containing profile content rules for filtering which content within a set of personal productivity applications (such as e-mail, chat,...
US-1,017,1472 Role-specific service customization
In many computing scenarios, an individual may choose to interact with a service in a variety of roles, and may therefore create a set of accounts respectively...
US-1,017,1471 Evidence-based role based access control
Methods, computing systems and computer program products implement embodiments of the present invention that include assigning, to multiple users, respective...
US-1,017,1470 Techniques for secure debugging and monitoring
Techniques for secure debugging and monitoring are presented. An end user requests a secure token for logging information with a remote service. A secure...
US-1,017,1469 Information processing system, access method, and terminal device
An system comprises: a first storage that stores access destination information, characteristic information, and first identification information in a manner...
US-1,017,1468 Selective processing of application permissions
An application permissions processing system and method for processing application permission requests is provided. The method includes the steps of detecting...
US-1,017,1467 Detection of authorization across systems
Example embodiments of the present disclosure provide methods, devices, and computer programs for authorization detection. The first system receives, from the...
US-1,017,1466 Maintaining a common identifier for a user session on a communication network
A wireless system receives a registration from a user device and transfers a request for the user device to an authorization server. The authorization server...
US-1,017,1465 Network authorization system and method using rapidly changing network keys
A method for authenticating a client device for access to a host device based on timestamps. When the client device wants to access the host, it generates a...
US-1,017,1464 Data process apparatus, data sharing method, and data process system
A data process apparatus includes a management unit that receives a creation request for creating a sharable data storage space from an unauthenticated data...
US-1,017,1463 Secure transport layer authentication of network traffic
Technologies are disclosed herein for transport layer network data authentication. A token packet is attached to network data sent from a client software...
US-1,017,1462 System and method for secure internet of things (IOT) device provisioning
A system and method are described for provisioning an IoT device using an association ID code. For example, one embodiment of a method comprises: generating an...
US-1,017,1461 System and method of secure encryption for electronic data transfer
A system for secure transfer of encrypted data involves a sender client, a recipient client, a main server, and a key server. The sender client receives...
US-1,017,1460 Proximity-based system for automatic application or data access and item tracking
A system and method provide automatic access to applications or data. A portable physical device, referred to herein as a Personal Digital Key or "PDK", stores...
US-1,017,1459 Method of processing a ciphertext, apparatus, and storage medium
A method of processing a ciphertext, the method includes: acquiring a part of a plurality of encrypted elements included in the ciphertext, each of the...
US-1,017,1458 Wireless pairing and communication between devices using biometric data
In a first implementation, a host determines to pair with a device and transmits biometric data for a user to the device. The device receives the transmitted...
US-1,017,1457 Service provider initiated additional authentication in a federated system
An indication is received that a user has initiated an access to a website hosted by a service provider. Access to the website requires an authorization of a...
US-1,017,1456 Wireless authentication system and wireless authentication method for one time password of mobile communication...
Provided is a one time password (OTP) authentication system and an OTP authentication method using a mobile communication terminal having a near field...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.