Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,020,5756 Dynamic virtual private network
Various embodiments establish a virtual private network (VPN) between a remote network and a private network. In one embodiment, a first system in the remote...
US-1,020,5755 Distributed connectivity policy enforcement with ICE
Instead of utilizing a centralized server or hardware (routers/gateways) to enforce connectivity policy restrictions, the policy connectivity restrictions for...
US-1,020,5754 Transmission system, transmission management apparatus and non-transitory computer-readable information...
A transmission system that manages sessions established among a plurality of transmission terminals. The transmission system includes a terminal information...
US-1,020,5753 Methods, apparatus and systems to increase media resource function availability
Communications methods, apparatus and systems for detecting a status condition indicative of a failure of a media processing entity and providing media...
US-1,020,5752 Lawful intercept provisioning system and method for a network domain
A network provisioning system includes a computer-based set of instructions that receive, from a third party network provisioning system managed by a third...
US-1,020,5751 System, method and computer program product for sharing content via links
In accordance with embodiments, there are provided mechanisms and methods for sharing content via links. These mechanisms and methods for sharing content via...
US-1,020,5750 Policy-based secure web boot
A system, device, and method for providing policy-based secure cloud booting include a mobile computing device and a web server. The mobile computing device...
US-1,020,5749 Detection and prevention of automatic redirects of main html document from within nested sub-document
A method comprising: receiving, from a web browser, a request for content to be inserted into a sub-document that is nested inside a main document; and...
US-1,020,5748 Protection for computing systems from revoked system updates
A computing system may be protected from revoked system updates. A computing system receives an object and scans it for revocation updates to a security...
US-1,020,5747 Protection for computing systems from revoked system updates
A computing system may be protected from revoked system updates. A computing system receives an object and scans it for revocation updates to a security...
US-1,020,5746 Anti-spoofing protection in an automotive environment
To automatically identify an attempt at presenting falsified vehicle identifiers to portable devices, (i) a vehicle identifier reported by a vehicle with which...
US-1,020,5745 Method for addressing, authentication, and secure data storage in computer systems
A method which facilitates the secure addressing and authentication for the establishment of connections as well as the secure storage of data and the avoidance...
US-1,020,5744 Remote malware remediation
An opportunity to assist with remediation of a file at a remote particular host device is identified. One or more remediation techniques are identified that can...
US-1,020,5743 Agent assisted malicious application blocking in a network environment
Embodiments are configured to receive metadata of a process intercepted on an end host when attempting to access a network. The metadata includes a hash of an...
US-1,020,5741 Method and apparatus enabling browsers to perform security scan of devices
A method and an apparatus enabling browsers to perform security scan of devices is described. The method includes receiving a device scan request triggered when...
US-1,020,5740 Cyber-semantic account management system
Systems, methods, and apparatus for identifying anomalous behavior are provided. For example, a method may include receiving raw data, generating a behavior...
US-1,020,5739 Security protocol monitoring
Preventing unintentional communication of data over a network by monitoring an outbound memory buffer of a computer system, the outbound memory buffer storing...
US-1,020,5738 Advanced persistent threat mitigation
A method is presented in which a system reduces the risk of an advanced persistent threat ("APT") detected at one or more network devices by implementing one or...
US-1,020,5737 Addressing login platform security risks
A computer-implemented method includes identifying a primary login platform and identifying one or more security developments associated with the primary login...
US-1,020,5736 Behavioral baselining of network systems
Systems and methods for behavioral baselining of network systems. In one embodiment, a method includes: storing, in an asset attribute database, information...
US-1,020,5735 Graph-based network security threat detection across time and entities
The disclosed techniques relate to a graph-based network security analytic framework to combine multiple sources of information and security knowledge in order...
US-1,020,5734 Network sampling based path decomposition and anomaly detection
According to examples, network sampling based path decomposition and anomaly detection may include evaluating computer-generated log file data to generate a...
US-1,020,5733 Cyber signal isolator
A cyber signal isolator system and a cyber signal isolator method for protecting a component of an Industrial Control System are described. The cyber signal...
US-1,020,5732 Method, apparatus, system, and non-transitory medium for protecting a file
A file protection method may include receiving a package that includes files for installing and executing an application, adding a protection file for an...
US-1,020,5731 Contextually-aware location sharing services
Technologies are described herein for providing contextually-aware location sharing services for computing devices. In some configurations, the techniques...
US-1,020,5730 Access control for database
In an embodiment of the present invention, a command for performing a database operation with respect to a table of a database is received, whereby the table...
US-1,020,5729 Automation tool for providing users with security access to an electronic system
A method for providing multiple users with security access to an electronic system is provided. The method comprising: providing a plurality of parent security...
US-1,020,5728 Systems and methods for objective-based scoring using machine learning techniques
Certain aspects and features of the present disclosure relate to systems and methods that generate machine-learning models to predict whether user devices are...
US-1,020,5726 Apparatus and method for preventing file access by nodes of a protected system
A method includes detecting a storage device at a protected node and determining whether the storage device has been checked-in for use with at least the...
US-1,020,5725 Source device and systems and methods of verifying an identity using dynamic scoring
A source device for systems and methods of verifying an authentication based on dynamic scoring is disclosed, wherein the source device is configured to receive...
US-1,020,5724 Cloud-based onboarding of cloud-controlled Wi-Fi network devices
A cloud-based onboarding server receives first identification information associated with a network device, from a wireless station authenticated to the...
US-1,020,5723 Distributed storage of authentication data
A biometric server receives, a transmission of a biometric sample and an encrypted enrollment template of the user from a client device, wherein the encrypted...
US-1,020,5722 Mechanism for facilitating remote access of user and device credentials for remoting device activities between...
A mechanism is described for facilitating remote access of device and user credentials for at computing devices according to one embodiment of the invention. A...
US-1,020,5721 System and method for distributing personal identification numbers over a computer network
The present invention comprises a system and method for providing a personal identification number (PIN) to a client terminal over a computer network. In...
US-1,020,5720 Password manipulation for secure account creation and verification through third-party servers
A method and system for deterring attacks at potential breach points between servers and an account and login server for creating and subsequent verification of...
US-1,020,5719 Network function virtualization-based certificate configuration method, apparatus, and system
The invention discloses a network function virtualization-based certificate configuration method, apparatus, and system. A virtualized network management entity...
US-1,020,5718 Authentication transfer across electronic devices
The disclosed embodiments provide a system that authenticates a user. During operation, the system obtains a request to transfer an authentication of the user...
US-1,020,5717 Virtual machine logon federation
Systems and methods are described for providing federated access to end-users of virtual machines. The method includes receiving a request from a user to access...
US-1,020,5716 System, apparatus, and method for authenticated request to be placed in a changed folder structure
An information processing system includes a terminal apparatus and an information processing apparatus that is connected to the terminal apparatus via a...
US-1,020,5715 System and method of providing personal content
Provided is a personal content providing system for providing customized content according to a personalization context. The personal content providing system...
US-1,020,5714 Apparatus and method for process authentication in redundant system
Disclosed herein is an apparatus and method for authenticating a process. According to the method for authenticating a process, a neighboring node transmits...
US-1,020,5713 Private and mutually authenticated key exchange
A method of private mutually authenticated key exchange is provided. The method may include receiving, at the first device, a message transmitted from a second...
US-1,020,5712 Sentinel appliance in an internet of things realm
In an example, there is disclosed a computing apparatus, comprising: a trusted execution environment (TEE); and a security engine operable to: identify a key...
US-1,020,5711 Multi-user strong authentication token
A strong authentication token supporting multiple instances associated with different users and protected by a user identity verification mechanism is...
US-1,020,5710 Cryptographic systems and methods
Systems and methods are described that use cryptographic techniques to improve the security of applications executing in a potentially untrusted environment...
US-1,020,5709 Key pair infrastructure for secure messaging
Embodiments of the present invention use a limited-use public/private key pair to encrypt and decrypt messages sent through an intermediary. The messages may...
US-1,020,5708 Systems and methods for digital content protection and security in multi-computer networks
Computer-implemented systems and methods for digital content protection and security in multi-computer networks are provided. In one embodiment, a system for...
US-1,020,5707 Content consumption frustration
A Headend system including a packer to pack media content into a plurality of packets including a first packet and a second packet, a packet scheduler to...
US-1,020,5706 System and method for programmable network based encryption in software defined networks
Sensitive data is sent through insecure network regions across different software defined networks (SDNs) over an encrypted path without requiring encryption...
US-1,020,5705 Method and system for managing a VPN connection
A method and computing device configured to send and receive traffic over a virtual private network (VPN) connection, the computing device having a processor;...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.