Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,006,9867 Method and apparatus for determining privacy policy for devices based on brain wave information
An approach is provided for processing sensor data to determine an identification of at least one object. The approach involves determining brain wave data...
US-1,006,9866 Dynamic secure packet block sizing
Disclosed herein are methods, systems, and software for handling secure transport of data between end users and content serving devices. In one example, a...
US-1,006,9865 Anti-phishing protection
Anti-Phishing protection assists in protecting against phishing attacks. Any links that are contained within a message that has been identified as a phishing...
US-1,006,9864 Method and system for using smart images
Embodiments of the invention provide systems and methods for using an anti-phishing image. More specifically, embodiments of the present invention provide for...
US-1,006,9863 Fake web address detection
A destination address is processed to determine if the destination address is a fake web address or hyperlink. The destination address may be compared with a...
US-1,006,9862 Techniques for predicting and protecting spearphishing targets
Techniques for predicting and protecting spearphishing targets are disclosed. In one particular exemplary embodiment, the techniques may be realized as a system...
US-1,006,9861 Employing physical location geo-spatial co-ordinate of communication device as part of internet protocol
A current physical location value associated is incorporated with a communication device as part of internet protocol (IP). An IP management component obtains...
US-1,006,9860 Protection for computing systems from revoked system updates
A computing system may be protected from revoked system updates. A computing system receives an object and scans it for revocation updates to a security...
US-1,006,9859 Distributed rate limiting
Some embodiments provide distributed rate limiting to combat network based attacks launched against a distributed platform or customers thereof. The distributed...
US-1,006,9858 Secure and private mobile web browser
A mobile web browser embedded in a smartphone operative to open a secure and private session with a web server on the Internet via one or more cell towers,...
US-1,006,9857 Performing rule-based actions based on accessed domain name registrations
Domain names are determined for each computational event in a set, each event detailing requests or posts of webpages. A number of events or accesses associated...
US-1,006,9856 System and method of comparative evaluation for phishing mitigation
The present disclosure generally relates to information security and, more particularly, to systems and methods of comparative evaluation for phishing...
US-1,006,9855 Automated security analysis of software libraries
A method for identifying security vulnerabilities in a third party software component includes generating a test application for the third party software...
US-1,006,9854 Methods, systems and media for evaluating layered computer security products
Methods, systems and media for evaluating layered computer security products are provided. In some embodiments, the method comprises: (a) identifying portions...
US-1,006,9853 Reparsing unsuccessfully parsed event data in a security information and event management system
A mechanism is provided for reparsing unsuccessfully parsed event data. Responsive to determining that one or more unsuccessfully parsed event data items exist...
US-1,006,9852 Detection of computerized bots and automated cyber-attack modules
Devices, systems, and methods of detecting whether an electronic device or computerized device or computer, is being controlled by a legitimate human user, or...
US-1,006,9851 Managing infectious forwarded messages
Systems and methods for managing forwarded infectious messages are provided. Managing electronic message comprises receiving a message, forwarding the message,...
US-1,006,9850 System and method for triggering and performing scans to protect virtual environments
A system and method in a virtual universe system for triggering scans of virtual items and inventories of virtual items and for scanning the virtual items and...
US-1,006,9849 Machine-generated traffic detection (beaconing)
A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security...
US-1,006,9848 Method and system for data security
A method for data security is provided. The method may include obtaining a first object which is set as a sensitive object. The method may also include...
US-1,006,9847 Computerized system for complying with certain critical infrastructure protection requirements
A computerized system for complying with critical infrastructure protection ("CIP") standards concerning system configuration changes. The system can be used to...
US-1,006,9846 System, method and computer readable medium for processing unsolicited electronic mail
An internet service provider (ISP) is configured to analyze a subscriber's sent e-mail packets to determine a subscriber identity associated with the e-mail...
US-1,006,9845 System and methods for secure short message service encryption and provisioning
A device may receive an encrypted short message service (SMS) message en route from an originating device to a recipient device, the encrypted SMS message to be...
US-1,006,9844 Virtual network function (VNF) hardware trust in a network function virtualization (NFV) software defined...
A Network Function Virtualization (NFV) Software Defined Network (SDN) maintains hardware trusted communications. A source trust controller and a target trust...
US-1,006,9843 Transport communication management
Methods and systems for communicating information are disclosed. An example method can comprise receiving information at a first device based on a first...
US-1,006,9842 Secure resource access based on psychometrics
Access to a secure resource is controlled. Data relating to social media history information, demographic information, and psychometric information regarding a...
US-1,006,9841 Computer implemented methods and apparatus for sharing data of an information feed of an online social network
Methods, apparatus, systems, and computer program products are disclosed for sharing data of an online social network. In some implementations, a selection of...
US-1,006,9840 Security determination
A method and system for determining user security is provided. The method includes registering a first user associated with a service provider system by...
US-1,006,9839 Determine approximate current time on a client using secure protocol metadata
Establishing secure connections from a computing device to secure servers when the computing device starts with an incorrect system clock time that would...
US-1,006,9838 Controlling consumption of hierarchical repository data
One exemplary embodiment involves receiving, from an administrator device, a first request to provide a set of privileges to at least one of a set of users and...
US-1,006,9837 Detection of proxy server
Devices, systems, and methods of detecting whether an electronic device or computerized device or computer, is communicating with a computerized service or a...
US-1,006,9836 Methods and apparatus for premises content distribution
Apparatus and methods for protected content access, browsing and transfer over a network. In one embodiment, the network comprises a premises (e.g.,...
US-1,006,9835 Third party program integrity and integration control in web-based applications
Disclosed herein are a resource control service, system, method and architecture. A client device's resource access is limited to an approved resource, or...
US-1,006,9834 Using mobile devices as gateways for internet of things devices
A mobile device may include first and second communication interfaces. The mobile device may receive, from another device, a dispatch message to receive data...
US-1,006,9833 Computer network cross-boundary protection
A computer security method including detecting access, by a computer in a first computer network, to a computer-readable document, determining whether the...
US-1,006,9832 Ephemeral applications
A method of executing an application in a direct launch mode includes receiving a user input to download an application from a remote server to a client...
US-1,006,9831 Using third party information to improve predictive strength for authentications
Embodiments of the present invention are directed to methods and systems for utilizing the history of previous authentications and authorizations related to...
US-1,006,9830 Communication system, communication method, and computer-readable recording medium
A communication system comprising a plurality of terminals, comprising: a start request information obtaining unit that obtains information for requesting start...
US-1,006,9829 Multi-party secure global attestation
In authentication in global attestation, a server receives a request for access to a location based service. The server establishes a connection with a first...
US-1,006,9828 Systems, methods, and media for authenticating multiple devices
Systems, methods, and media for authentication are provided. In accordance with some implementations, the system comprises: a hardware processor that is...
US-1,006,9827 Extending authentication and authorization capabilities of an application without code changes
A generic approach to extending the authentication and authorization capabilities of a client-server application (e.g., a VPN) without any code changes. To this...
US-1,006,9826 Secure sensor data transport and processing
The present disclosure is directed to secure sensor data transport and processing. End-to-end security may prevent attackers from altering data during the...
US-1,006,9825 Electronic device identification
A method of generating an identifier for an electronic device, wherein the electronic device includes a processor and a memory. The memory is communicatively...
US-1,006,9824 Biometric signature authentication and centralized storage system
A biometric authentication system may include a centralized database including stored biometric signature information for authenticating a user of one or more...
US-1,006,9823 Indirect access control
Indirect access control is performed between a requestor computing device and a requestee computing device. Peer data is transmitted from the requestor to the...
US-1,006,9822 Authenticated network time for mobile device smart cards
A mobile device sends a network attach request to a network node, and receives an authentication challenge from the network node, where the authentication...
US-1,006,9821 Operating method for one-time password with updatable seed
An operating method for a one-time password with an updatable seed. The method comprises: a one-time password entering a dormancy mode after being powered on...
US-1,006,9820 Linked registration
Secure registration of a new application with a server system is provided. An old application has been registered with the system. A first link between the new...
US-1,006,9819 Information processing apparatus, information processing method, and information processing system
An information processing apparatus includes a storage that stores access-limited identification information and access-unlimited identification information,...
US-1,006,9818 Method, system, device, and terminal for network initialization of multimedia playback device
The present disclosure provides a method, system, device, and terminal for network initialization of a multimedia playback device. The method includes:...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.