Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,010,4103 Data processing systems for tracking reputational risk via scanning and registry lookup
A domain scanning and website analysis system may be utilized to determine whether an entity is registering one or more websites maliciously in the name of a...
US-1,010,4102 Analytic-based security with learning adaptability
An analytics-based security monitoring system is adapted to receive data, such as in the form of event logs, from one or more network devices transferred...
US-1,010,4101 Method and apparatus for intelligent aggregation of threat behavior for the detection of malware
Embodiments disclosed herein are directed to intelligent malware detection. A scanner server is used to scan an endpoint device for malware. Various attributes...
US-1,010,4100 Systems and methods for detecting anomalies that are potentially indicative of malicious attacks
A computer-implemented method for detecting anomalies that are potentially indicative of malicious attacks may include (1) identifying a sequence of activities...
US-1,010,4099 System and method for monitoring a computer system using machine interpretable code
A computer implemented method of monitoring a collector computer system includes receiving machine interpretable code that is configured for interpretation by...
US-1,010,4098 Electromagnetic threat detection and mitigation in the Internet of Things
Systems and methods can support threat detection using electromagnetic signatures. One or more sensors comprising radio receivers may receive radio frequency...
US-1,010,4097 Systems and methods for preventing targeted malware attacks
The disclosed computer-implemented method for preventing targeted malware attacks may include (1) identifying at least one candidate risk factor for targets of...
US-1,010,4096 Host-based, network enabled, integrated remote interrogation system
An Enhanced Ethernet Network Interface Card (EENIC) interfaces with a host and a network. The EENIC includes an internal network interface controller (NIC), a...
US-1,010,4095 Automatic stability determination and deployment of discrete parts of a profile representing normal behavior to...
A system for automatic stability determination and deployment of discrete parts of a profile representing normal behavior to provide fast protection of web...
US-1,010,4094 On-vehicle communication system
An Electric Control Unit (ECU) device connected to an on-vehicle network and a network outside a vehicle. The ECU generating an ECU receiver code using an...
US-1,010,4093 Apparatus and method for securely managing the accessibility to content and applications
A system that incorporates the subject disclosure may perform, for example, receive secret information and non-secret information from a secure download...
US-1,010,4092 System and method for parallel secure content bootstrapping in content-centric networks
One embodiment of the present invention provides a system for retrieving a content collection over a network. During operation, the system determines additional...
US-1,010,4091 Authenticating apparatus, authenticating system and storage medium
In authentication based on an image region read from a surface of a target object, authentication based on a position corresponding to the image region is...
US-1,010,4090 Restrictive access control for modular reflection
Access to a module element within a first module by a second module is prohibited if the module element within the first module has not been exposed to the...
US-1,010,4089 Method and apparatus for providing security function
A method for providing a security function includes obtaining a request for executing a function of application through an electronic device if the electronic...
US-1,010,4088 Traitor tracing for obfuscated credentials
A method, computer program product, and system for providing verification processes associated with a commitment-based authentication protocol are described. A...
US-1,010,4087 Access control for user accounts using a parallel search approach
An example method is provided for a computing device to perform access control for a user account. The method may comprise receiving a request for the user...
US-1,010,4086 Techniques for fine grained protection of resources in an access management environment
In certain embodiments, techniques are provided (e.g., a method, a system, non-transitory computer-readable medium storing code or instructions executable by...
US-1,010,4085 Permission based access control for offloaded services
Systems and methods for network access control, including sending a service request from an on-premise system to one or more offloaded front-end services on one...
US-1,010,4084 Token scope reduction
Techniques are provided for augmenting the capabilities of the standard OAuth2 authorization framework in such a way as to allow clients to consume the services...
US-1,010,4083 Method and apparatus for MoCA network with protected set-up
Systems and methods for securing a network, for admitting new nodes into an existing network, and/or securely forming a new network. As a non-limiting example,...
US-1,010,4082 Aggregated information access and control using a personal unifying taxonomy
Techniques are described for providing users with aggregate access to and control over information from multiple storing applications and information services,...
US-1,010,4081 Privileged static hosted web applications
A method can include receiving a static web application at a trusted server, validating assurance characteristics of the static web application, and upon...
US-1,010,4080 Selective content accessibility in a social network
A social networking service encourages users to post content to a communication channel with varying levels of accessibility to other users. Users may select...
US-1,010,4079 Authentication proxy agent
An authentication engine may be configured to receive an authentication request and credentials from a client. The authentication engine may then generate a...
US-1,010,4078 Method and apparatus for associating sim card with a group of mobile communications devices
Method and apparatus for associating a subscriber identity module to a group of mobile communications devices is provided. One embodiment provides a method...
US-1,010,4077 Enabling multitenant data access on a single industrial network
In an embodiment, a computer-implemented method comprises receiving a first authentication request from one or more first computing devices; in response to...
US-1,010,4076 Authentication method and authentication system
A system performs mutual authentication between a controller and a first device, creates a group key, shares the group key, and sets the first device as a...
US-1,010,4075 Image forming system for authorizing the use of a multifunction peripheral
This image forming system includes an information processing device, a server, and a multifunction peripheral. The server stores in advance fingerprint...
US-1,010,4074 Independent biometric identification system
The inventive data processing system and method enable verifiable secure transfer of information between two or more parties, each having access to at least one...
US-1,010,4073 Media services with access control
Systems and methods are describe wherein a service provider provides media services that can include, but are not limited to, telephone, radio, interactive and...
US-1,010,4072 System and method for verifying liveliness
A machine-assisted method for verifying a video presence that includes: receiving, at a computing device of an identity provider, an authentication request...
US-1,010,4071 Revoking sessions using signaling
Embodiments are directed to revoking user sessions using signaling. In one scenario, an identity platform operating on a computer system receives an indication...
US-1,010,4070 Code sequencing
A system, method, and computer-readable medium for challenge-response authentication are provided. A plurality of codes is received over a communication network...
US-1,010,4069 Request-specific authentication for accessing web service resources
Requests for access to Web service resources are evaluated based on the type of request that is received. Requests are not granted unless sufficient proof of...
US-1,010,4068 Service provider invocation
A service provider may provide one or more services to and/or for a client. Providing a service may involve receiving a service request including a security...
US-1,010,4067 Providing a masked short message service in a wireless network
A method and apparatus for providing a masked short message service in a wireless network are disclosed. For example, the method receives a message from a first...
US-1,010,4066 User login methods, devices, and systems
A user login method for use in a terminal is provided. The method includes: receiving an automatic login request; acquiring a terminal identifier of the...
US-1,010,4065 Token-based authentication and authorization information signaling and exchange for adaptive streaming
A method implemented by a network element (NE) configured as a streaming client, the method comprising obtaining, via a processor of the NE, a first...
US-1,010,4064 Secure authentication systems and methods
Systems and methods are provided for authentication by combining a Reverse Turing Test (RTT) with password-based user authentication protocols to provide...
US-1,010,4063 Android-based mobile equipment security protection method, and device
The present invention discloses a method and device for the security protection of Android-based mobile equipment, the method comprising: parsing a short...
US-1,010,4062 Apparatus and method for secure authentication of a communication device
A system that incorporates the subject disclosure may perform, for example, receiving a baseline credential and an external credential, mapping the external...
US-1,010,4061 Method and system for distinguishing humans from machines and for controlling access to network services
A method and an apparatus for distinguishing humans from computers and for controlling access to network services. One intended application of the method is a...
US-1,010,4060 Authenticating applications to a network service
Authenticating applications to a network service includes authenticating an application with a certificate to access a service provider over a logical...
US-1,010,4059 Secure permissioning of access to user accounts, including secure deauthorization of access to user accounts
A permissions management system is disclosed for enabling a user to securely authorize a third-party system to access user account data and initiate...
US-1,010,4058 Content restriction compliance using reverse DNS lookup
A method for alerting Internet content providers of the age or other personal information of a computer user, which includes receiving a reverse DNS lookup...
US-1,010,4057 User authentication of applications on third-party devices via user devices
In one embodiment, a first computing device receives an access token from a second computing device, the access token being generated by the second computing...
US-1,010,4056 Method and network node device for running push-button configuration sessions within heterogeneous network and...
A heterogeneous home network (with possibly multiple hops between devices) uses a push button configuration mechanism that ensures only one single new network...
US-1,010,4055 System and process of protecting client side information in electronic transactions
A system, method and computer program product protects client information used for online transactions by storing transaction details on the client side of a...
US-1,010,4054 System and method for providing a content delivery network via a motor vehicle
A cache server disposed in a motor vehicle receives and caches content from a content distribution network when a load of a cellular link to the content...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.