At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Patent # | Description |
---|---|
US-1,010,4103 |
Data processing systems for tracking reputational risk via scanning and
registry lookup A domain scanning and website analysis system may be utilized to determine whether an entity is registering one or more websites maliciously in the name of a... |
US-1,010,4102 |
Analytic-based security with learning adaptability An analytics-based security monitoring system is adapted to receive data, such as in the form of event logs, from one or more network devices transferred... |
US-1,010,4101 |
Method and apparatus for intelligent aggregation of threat behavior for
the detection of malware Embodiments disclosed herein are directed to intelligent malware detection. A scanner server is used to scan an endpoint device for malware. Various attributes... |
US-1,010,4100 |
Systems and methods for detecting anomalies that are potentially
indicative of malicious attacks A computer-implemented method for detecting anomalies that are potentially indicative of malicious attacks may include (1) identifying a sequence of activities... |
US-1,010,4099 |
System and method for monitoring a computer system using machine
interpretable code A computer implemented method of monitoring a collector computer system includes receiving machine interpretable code that is configured for interpretation by... |
US-1,010,4098 |
Electromagnetic threat detection and mitigation in the Internet of Things Systems and methods can support threat detection using electromagnetic signatures. One or more sensors comprising radio receivers may receive radio frequency... |
US-1,010,4097 |
Systems and methods for preventing targeted malware attacks The disclosed computer-implemented method for preventing targeted malware attacks may include (1) identifying at least one candidate risk factor for targets of... |
US-1,010,4096 |
Host-based, network enabled, integrated remote interrogation system An Enhanced Ethernet Network Interface Card (EENIC) interfaces with a host and a network. The EENIC includes an internal network interface controller (NIC), a... |
US-1,010,4095 |
Automatic stability determination and deployment of discrete parts of a
profile representing normal behavior to... A system for automatic stability determination and deployment of discrete parts of a profile representing normal behavior to provide fast protection of web... |
US-1,010,4094 |
On-vehicle communication system An Electric Control Unit (ECU) device connected to an on-vehicle network and a network outside a vehicle. The ECU generating an ECU receiver code using an... |
US-1,010,4093 |
Apparatus and method for securely managing the accessibility to content
and applications A system that incorporates the subject disclosure may perform, for example, receive secret information and non-secret information from a secure download... |
US-1,010,4092 |
System and method for parallel secure content bootstrapping in
content-centric networks One embodiment of the present invention provides a system for retrieving a content collection over a network. During operation, the system determines additional... |
US-1,010,4091 |
Authenticating apparatus, authenticating system and storage medium In authentication based on an image region read from a surface of a target object, authentication based on a position corresponding to the image region is... |
US-1,010,4090 |
Restrictive access control for modular reflection Access to a module element within a first module by a second module is prohibited if the module element within the first module has not been exposed to the... |
US-1,010,4089 |
Method and apparatus for providing security function A method for providing a security function includes obtaining a request for executing a function of application through an electronic device if the electronic... |
US-1,010,4088 |
Traitor tracing for obfuscated credentials A method, computer program product, and system for providing verification processes associated with a commitment-based authentication protocol are described. A... |
US-1,010,4087 |
Access control for user accounts using a parallel search approach An example method is provided for a computing device to perform access control for a user account. The method may comprise receiving a request for the user... |
US-1,010,4086 |
Techniques for fine grained protection of resources in an access
management environment In certain embodiments, techniques are provided (e.g., a method, a system, non-transitory computer-readable medium storing code or instructions executable by... |
US-1,010,4085 |
Permission based access control for offloaded services Systems and methods for network access control, including sending a service request from an on-premise system to one or more offloaded front-end services on one... |
US-1,010,4084 |
Token scope reduction Techniques are provided for augmenting the capabilities of the standard OAuth2 authorization framework in such a way as to allow clients to consume the services... |
US-1,010,4083 |
Method and apparatus for MoCA network with protected set-up Systems and methods for securing a network, for admitting new nodes into an existing network, and/or securely forming a new network. As a non-limiting example,... |
US-1,010,4082 |
Aggregated information access and control using a personal unifying
taxonomy Techniques are described for providing users with aggregate access to and control over information from multiple storing applications and information services,... |
US-1,010,4081 |
Privileged static hosted web applications A method can include receiving a static web application at a trusted server, validating assurance characteristics of the static web application, and upon... |
US-1,010,4080 |
Selective content accessibility in a social network A social networking service encourages users to post content to a communication channel with varying levels of accessibility to other users. Users may select... |
US-1,010,4079 |
Authentication proxy agent An authentication engine may be configured to receive an authentication request and credentials from a client. The authentication engine may then generate a... |
US-1,010,4078 |
Method and apparatus for associating sim card with a group of mobile
communications devices Method and apparatus for associating a subscriber identity module to a group of mobile communications devices is provided. One embodiment provides a method... |
US-1,010,4077 |
Enabling multitenant data access on a single industrial network In an embodiment, a computer-implemented method comprises receiving a first authentication request from one or more first computing devices; in response to... |
US-1,010,4076 |
Authentication method and authentication system A system performs mutual authentication between a controller and a first device, creates a group key, shares the group key, and sets the first device as a... |
US-1,010,4075 |
Image forming system for authorizing the use of a multifunction peripheral This image forming system includes an information processing device, a server, and a multifunction peripheral. The server stores in advance fingerprint... |
US-1,010,4074 |
Independent biometric identification system The inventive data processing system and method enable verifiable secure transfer of information between two or more parties, each having access to at least one... |
US-1,010,4073 |
Media services with access control Systems and methods are describe wherein a service provider provides media services that can include, but are not limited to, telephone, radio, interactive and... |
US-1,010,4072 |
System and method for verifying liveliness A machine-assisted method for verifying a video presence that includes: receiving, at a computing device of an identity provider, an authentication request... |
US-1,010,4071 |
Revoking sessions using signaling Embodiments are directed to revoking user sessions using signaling. In one scenario, an identity platform operating on a computer system receives an indication... |
US-1,010,4070 |
Code sequencing A system, method, and computer-readable medium for challenge-response authentication are provided. A plurality of codes is received over a communication network... |
US-1,010,4069 |
Request-specific authentication for accessing web service resources Requests for access to Web service resources are evaluated based on the type of request that is received. Requests are not granted unless sufficient proof of... |
US-1,010,4068 |
Service provider invocation A service provider may provide one or more services to and/or for a client. Providing a service may involve receiving a service request including a security... |
US-1,010,4067 |
Providing a masked short message service in a wireless network A method and apparatus for providing a masked short message service in a wireless network are disclosed. For example, the method receives a message from a first... |
US-1,010,4066 |
User login methods, devices, and systems A user login method for use in a terminal is provided. The method includes: receiving an automatic login request; acquiring a terminal identifier of the... |
US-1,010,4065 |
Token-based authentication and authorization information signaling and
exchange for adaptive streaming A method implemented by a network element (NE) configured as a streaming client, the method comprising obtaining, via a processor of the NE, a first... |
US-1,010,4064 |
Secure authentication systems and methods Systems and methods are provided for authentication by combining a Reverse Turing Test (RTT) with password-based user authentication protocols to provide... |
US-1,010,4063 |
Android-based mobile equipment security protection method, and device The present invention discloses a method and device for the security protection of Android-based mobile equipment, the method comprising: parsing a short... |
US-1,010,4062 |
Apparatus and method for secure authentication of a communication device A system that incorporates the subject disclosure may perform, for example, receiving a baseline credential and an external credential, mapping the external... |
US-1,010,4061 |
Method and system for distinguishing humans from machines and for
controlling access to network services A method and an apparatus for distinguishing humans from computers and for controlling access to network services. One intended application of the method is a... |
US-1,010,4060 |
Authenticating applications to a network service Authenticating applications to a network service includes authenticating an application with a certificate to access a service provider over a logical... |
US-1,010,4059 |
Secure permissioning of access to user accounts, including secure
deauthorization of access to user accounts A permissions management system is disclosed for enabling a user to securely authorize a third-party system to access user account data and initiate... |
US-1,010,4058 |
Content restriction compliance using reverse DNS lookup A method for alerting Internet content providers of the age or other personal information of a computer user, which includes receiving a reverse DNS lookup... |
US-1,010,4057 |
User authentication of applications on third-party devices via user
devices In one embodiment, a first computing device receives an access token from a second computing device, the access token being generated by the second computing... |
US-1,010,4056 |
Method and network node device for running push-button configuration
sessions within heterogeneous network and... A heterogeneous home network (with possibly multiple hops between devices) uses a push button configuration mechanism that ensures only one single new network... |
US-1,010,4055 |
System and process of protecting client side information in electronic
transactions A system, method and computer program product protects client information used for online transactions by storing transaction details on the client side of a... |
US-1,010,4054 |
System and method for providing a content delivery network via a motor
vehicle A cache server disposed in a motor vehicle receives and caches content from a content distribution network when a load of a cellular link to the content... |