Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2019/0109881 System and Method for Providing an Ethernet Interface
In one embodiment, an apparatus includes n electrical communication channels, m optical communication media interfaces, and a plurality of muxes. The plurality...
2019/0109880 VIRTUAL AGENT COMMUNICATION FOR ELECTRONIC DEVICE
Methods and apparatus for communicating between virtual agents associated with users of electronic devices connected via at least one network. A first user may...
2019/0109879 MEDIA SESSION BETWEEN NETWORK ENDPOINTS
A media session is configured between a first endpoint and a second endpoint on a communication network based on connectivity checks performed by the...
2019/0109878 NATURAL LANGUAGE PROCESSING ARTIFICIAL INTELLIGENCE NETWORK AND DATA SECURITY SYSTEM
According to an embodiment, a natural language processing artificial intelligence network and data security system determines an emotions model for one or more...
2019/0109877 SECURE APPLICATION METERING
Example of secure metering of modular applications and associated edge devices are described herein. In an example, a request to secure one or more modular...
2019/0109876 SERVER-INITIATED SECURE SESSIONS
Methods, systems, and devices for server-initiated secure sessions are described. A browser application may connect to a portal, where the portal may transmit...
2019/0109875 SYSTEM AND METHOD FOR PROVIDING DATA-DRIVEN USER AUTHENTICATION MISUSE DETECTION
Systems, methods, and other embodiments are disclosed for data-driven user authentication misuse detection. In one embodiment, for a user authentication...
2019/0109874 SECURE APPLICATION MONITORING
Example of secure monitoring of modular applications and associated edge devices are described herein. In an example, an accreditation request is initiated to...
2019/0109873 ADDRESSING LOGIN PLATFORM SECURITY RISKS
A computer-implemented method includes identifying a primary login platform and identifying one or more security developments associated with the primary login...
2019/0109871 TECHNIQUES FOR COMPUTING AN OVERALL TRUST SCORE FOR A DOMAIN BASED UPON TRUST SCORES PROVIDED BY USERS
The present disclosure relates to techniques for determining trustworthiness of a domain among users. The determination may be based upon trust scores provided...
2019/0109870 RANSOMWARE DETECTION AND INTELLIGENT RESTORE
This application relates to ransomware detection and intelligent restore. Ransomware typically involves an I/O heavy process of encrypting data files and/or...
2019/0109869 SYSTEMS AND METHODS FOR DETECTION AND MITIGATION OF MALICIOUS ENCRYPTION
The present disclosure describes systems and methods for detection and mitigation of malicious encryption. A security agent on an infected computing device may...
2019/0109868 Method and System for Generating An Interactive Kill Chain View for Training A Machine Learning Model for...
A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The...
2019/0109867 Method And Apparatus For Transmitting A Message Sequence Over A Data Bus And Method And Apparatus For Detecting...
The present invention relates to a method for transmitting a message sequence via a data bus. The method comprises the transmission of an informational message...
2019/0109866 MULTI-VERIFIER APPROACH FOR ATTESTATION OF NODES IN A NETWORK
This disclosure relates generally to contract management, and more particularly to contract management in a data marketplace. In an embodiment, a system for...
2019/0109865 Pre-Crime Method and System for Predictable Defense Against Hacker Attacks
A pre-crime method and system for predictable defense against attacks on an information network. The method comprises the steps of detecting current events,...
2019/0109864 NETWORK TRAFFIC INSPECTION
Methods, apparatuses, and embodiments related to a technique for inspecting network traffic. In an example, a user downloads and installs a security...
2019/0109863 SECURE PERSONALIZED TRUST-BASED MESSAGES CLASSIFICATION SYSTEM AND METHOD
Technologies are described for authenticating a sender identity of an online message. For example, an online message having a purported sender identity can be...
2019/0109862 METHOD FOR URL ANALYSIS AND ELECTRONIC DEVICE THEREOF
A method and apparatus for analyzing a URL included in contents and displaying the analyzed result is provided. The method includes detecting a URL from...
2019/0109861 METHOD AND DEVICE FOR PREVENTING SERVER FROM BEING ATTACKED
A page request is received from a browser. A page script corresponding to the page request is allocated from a plurality of page scripts corresponding to the...
2019/0109860 FORWARD AND BACKWARD NIAP MIGRATION OF CERTIFICATE STORES
A method of ensuring compliance of a plurality of certificate stores on a mobile device with a first security policy is disclosed. The method includes:...
2019/0109859 Real-Time Adaptive Receive Side Scaling Key Selection
Selecting a receive side scaling (RSS) key is provided. It is determined whether a defined time interval expired. In response to determining that the defined...
2019/0109858 Real-Time Adaptive Receive Side Scaling Key Selection
Selecting a receive side scaling (RSS) key is provided. It is determined whether a defined time interval expired. In response to determining that the defined...
2019/0109857 SECURING CLOUD DRIVES USING ENVIRONMENT-AWARE SECURITY TOKENS
The technology described in this document can be embodied in a method that includes receiving information about an electronic file stored on a primary cloud...
2019/0109856 LOGICAL ZONES FOR IOT DEVICES
Methods for logically grouping Internet of Things (IoT) devices are described. One or more logical zones are defined. Each logical zone includes one or more...
2019/0109855 CAR SHARING SYSTEM
The car sharing system includes a car share device and an encryption code updating unit. The car share device is configured to perform wireless communicate...
2019/0109854 CAR SHARING SYSTEM
A car sharing system includes a car share device and a usage right lending unit that allows multiple users including a first user and a second user to use the...
2019/0109853 ENTITY VALIDATION FOR RESOURCE DISTRIBUTION LOCATION
Provide improved validation of a recipient entity when the recipient entity is involved in an interaction with a provider entity. One or more application...
2019/0109852 EFFICIENT AUTHENTICATION IN A FILE SYSTEM WITH MULTIPLE SECURITY GROUPS
Efficient authentication in a file system with multiple security groups is disclosed. A file system (FS) executing on at least one processor device receives,...
2019/0109851 HIGHLY SCALABLE FINE GRAINED RATE LIMITING
Techniques of the present disclosure provide an embodiment of a multistage filter (MSF) that takes a rate limiting parameter. The entries of the MSF are...
2019/0109850 APPARATUS AND METHODS FOR DEVICE AUTHORIZATION IN A PREMISES NETWORK
Apparatus and methods for enabling protected premises networking capabilities. In one embodiment, a white list of devices authorized to access a premises...
2019/0109849 AUTHENTICATION INTEGRITY PROTECTION
Systems, methods, and processor-readable media are disclosed to adaptively secure access operations with respect to electronic resources. A request from an...
2019/0109848 Methods for Internet Communication Security
The present disclosure relates to network security software cooperatively configured on plural nodes to authenticate and authorize devices, applications,...
2019/0109847 SYSTEM, CONTROL METHOD FOR SYSTEM, VOICE OPERATION DEVICE, CONTROL METHOD FOR VOICE OPERATION DEVICE, AND...
A system including a mobile terminal having an authenticator, a TPM with tamper resistance and a voice assistant. The voice assistant makes a process request...
2019/0109846 ENABLING/DISABLING APPLICATIONS USING FACE AUTHENTICATION
A first processor may receive a first request, from a first user, to initiate a first application. The first processor may initiate a first recording device....
2019/0109845 ENABLING/DISABLING APPLICATIONS USING FACE AUTHENTICATION
A first processor may receive a first request, from a first user, to initiate a first application. The first processor may initiate a first recording device....
2019/0109844 COMMUNICATION APPARATUS, METHOD OF CONTROLLING THE SAME, AND STORAGE MEDIUM
An MFP (communication apparatus) accepts, as an operation for making an electronic data transmission destination setting, an operation using a local UI (LUI)...
2019/0109843 Network Request Handling Based on Optically-Transmitted Codes
A computing device determines whether or not to authorize a network request. In particular, responsive to the computing device receiving the network request...
2019/0109842 SYSTEM AND METHOD FOR REGISTERING AND AUTHORIZING SECONDARY DEVICES FOR CONDUCTING TRANSACTIONS
According to an embodiment of the present disclosure, a method by a server includes receiving, by the server, a request to register a computing device for...
2019/0109841 METHOD AND ARRANGEMENTS FOR INTERMEDIARY NODE DISCOVERY DURING HANDSHAKE
A method executed by an Intermediary Node arranged between a Client and a Server for participating in the setting up of a connection between the Client and a...
2019/0109840 LOCATION DETERMINATION FOR USER AUTHENTICATION
User authentication techniques based on geographical locations associated with a client device are provided. An example method for authentication of the client...
2019/0109839 MULTI-LEVEL AUTHENTICATION SYSTEM WITH PERSISTENT INTEGRATION PLATFORM
Embodiments of the present invention provide a persistent integration platform for conducting a multichannel resource transfer. In particular, the system may...
2019/0109838 SECURE AUTHENTICATION FOR ACCESSING REMOTE RESOURCES
Methods, systems, and apparatus, including computer program products, for secure authentication for accessing remote resources are disclosed. In some...
2019/0109837 SYSTEMS AND METHODS OF USER AUTHENTICATION FOR DATA SERVICES
Embodiments of the invention are directed to systems and methods of user authentication for data services. The data services may include accessing a tax return...
2019/0109836 INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND PROGRAM
[Object] To propose an information processing apparatus, an information processing method, and a program which enable a user to appropriately restrict control...
2019/0109835 USER AUTHENTICATION USING UNIQUE HIDDEN IDENTIFIERS
Systems and methods are provided for user authentication using hidden unique identifiers in networks. In some example embodiments these systems and methods...
2019/0109834 METHODS FOR AUTHENTICATING PHOTOGRAPHIC IMAGE DATA
Systems and methods are provided for authenticating image files when network connections should not or cannot be used to transfer image files. A user device...
2019/0109833 ADAPTIVE SELECTION OF AUTHENTICATION SCHEMES IN MFA
A method of dynamic adaptive authentication includes receiving a request from a user to access a resource of a network and determining whether the resource is...
2019/0109832 Sharing Resources Between Wireless Networks
A wireless device establishes a first link for communications with a cellular base station, wherein the first link uses a first channel as a carrier. The...
2019/0109831 TECHNIQUES FOR SECURITY ARTIFACTS MANAGEMENT
Techniques are provided to manage security artifacts. Specifically, a security management system is disclosed for implementing security artifact archives to...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.