Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,011,6700 Installing configuration information on a host
Certain embodiments provide means for managing automated access to computers, e.g., using SSH user keys and other kinds of trust relationships. Certain...
US-1,011,6699 Systems and methods for network security
Enhanced electronic security systems and methods are provided. A whitelist, blacklist, or both of resource access sources that are allowed to use a particular...
US-1,011,6698 Managing network firewall configuration utilizing source lists
Systems and methods for configuration of network-based firewall services based on network firewall configuration information provided by one or more sources are...
US-1,011,6697 System and method for geofencing
A managed container may have a managed cache storing content managed by or through an application gateway server computer. The managed container may receive a...
US-1,011,6696 Network privilege manager for a dynamically programmable computer network
A network security policy may be implemented at network switches as a set of active packet disposition directives. In a dynamically programmable network, the...
US-1,011,6695 Systems and methods for verifying that operators are human based on operator gaze
The disclosed computer-implemented method for verifying that operators are human based on operator gaze may include (1) presenting an image to a user of the...
US-1,011,6694 Network signaling interface and method with enhanced traffic management during signaling storms
A signaling controller (DSC) performs dynamic management in networks such as Evolved Packet Core (EPC) networks that rely on Diameter signaling interfaces. The...
US-1,011,6693 Server using proof-of-work technique for hardening against denial of service attacks
A computerized device and a process protect against denial-of-service (DoS) attacks by using a memory-time hard problem that a client (e.g., IoT device or...
US-1,011,6692 Scalable DDoS protection of SSL-encrypted services
A system for mitigating network attacks within encrypted network traffic is provided. The system includes a protected network including a plurality of devices....
US-1,011,6691 VoIP denial-of-service protection mechanisms from attack
A system and method for providing advanced voice services in a wireless communications network. The system also interfaces to an Internet Protocol (IP) network...
US-1,011,6690 System and method for the protection of computers and computer networks against cyber threats
Systems and methods for protecting against cyber threats are disclosed. The system includes an external network accessing layer (ENAL) and a core computing...
US-1,011,6689 Neutralizing propagation of malicious information
One embodiment provides a method including identifying malicious information spreading in an information-exchange network; classifying at least one topic of the...
US-1,011,6688 Systems and methods for detecting potentially malicious files
The disclosed computer-implemented method for detecting potentially malicious files may include (1) detecting an attempt by the computing device to execute a...
US-1,011,6687 Management of administrative incident response based on environmental characteristics associated with a...
Systems, methods, and software described herein provide for managing service level agreements (SLAs) for security incidents in a computing environment. In one...
US-1,011,6686 Systems and methods for selectively insulating a processor
The disclosure includes a method for protecting a computer processor system from a harmful communication session from a network linked to the processor. The...
US-1,011,6685 Security key derivation in dual connectivity
The invention relates to methods for establishing a secure communication link between a mobile station and a secondary base station in a mobile communication...
US-1,011,6684 Automatically detecting and correcting missing and misconfigured security attributes
Some embodiments provide automated and intelligent security configuration at the network edge. A server tasked with distributing content provider content...
US-1,011,6683 Computer security vulnerability assessment
Computer security vulnerability assessment is performed with product binary data and product vulnerability data that correspond with product identification...
US-1,011,6681 Method of detecting shared vulnerable code
A method of detecting shared vulnerable code across a plurality of applications to efficiently facilitate remediation of such shared vulnerabilities by the...
US-1,011,6680 Systems and methods for evaluating infection risks based on profiled user behaviors
The disclosed computer-implemented method for evaluating infection risks based on profiled user behaviors may include (1) collecting user-behavior profiles that...
US-1,011,6679 Privilege inference and monitoring based on network behavior
Embodiments are directed to monitoring network traffic. A monitoring engine may monitor network traffic associated with entities in one or more networks. A...
US-1,011,6678 System for detecting fraudulent electronic communications impersonation, insider threats and attacks
A system for detecting fraudulent emails from entities impersonating legitimate senders that are intended to cause the recipients to unknowingly conduct...
US-1,011,6677 Method and system for uniquely identifying a user computer in real time using a plurality of processing...
A method is provided for identifying a compromised client device from a masquerading device. The method includes capturing a plurality of attributes from a...
US-1,011,6676 Apparatus and methods for data collection, analysis and service modification based on online activity
Methods and apparatus for evaluating collected data relating to online activity, and modification of services within a service provider network. In one...
US-1,011,6675 Methods and systems to detect anomalies in computer system behavior based on log-file sampling
Methods and systems that detect computer system anomalies based on log file sampling are described. Computers systems generate log files that record various...
US-1,011,6674 Framework for explaining anomalies in accessing web applications
The present disclosure is directed towards systems and methods for characterizing anomalous network traffic. The system includes a device intermediary to...
US-1,011,6673 System and method for uploading and verifying a document
A computer implemented method may allow for the upload and verification of a document. In one aspect, the method may receive a file at a data server associated...
US-1,011,6672 Distributed denial-of-service attack detection based on shared network flow information
A method for detecting distributed denial-of-service (DDoS) attacks is provided. Current aggregated flow information for a defined period of time is analyzed....
US-1,011,6671 Distributed denial-of-service attack detection based on shared network flow information
A system and computer program product for detecting distributed denial-of-service (DDoS) attacks is provided. Current aggregated flow information for a defined...
US-1,011,6670 Event specific relationship graph generation and application in a machine data processing platform
A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security...
US-1,011,6669 Detecting and mitigating wardriving
Determining the physical location of wirelessly connected devices within a network can provide a number of security benefits. However, manually determining and...
US-1,011,6668 System and method for enhanced display-screen security and privacy
A security method that includes assigning a sensitivity value for a communication with a sensitivity determining module including at least one hardware...
US-1,011,6667 System for conversion of an instrument from a non-secured instrument to a secured instrument in a process data...
Embodiments of the invention are directed to a system, method, or computer program product for generating and using a block chain distributed network for...
US-1,011,6666 Secure debug trace messages for production authenticated code modules
Methods of extending capabilities of authenticated code modules (ACM) with minimal increase in code size comprises defining an authenticated code module (ACM)...
US-1,011,6665 Secured distributed computing across multiple firewalls
This disclosure is directed to securely exchanging information between private domains. Methods and systems of the disclosure perform operations including...
US-1,011,6664 Authorization policy for group-centric secure information sharing
In the present specification, a methodology for incremental security policy specification at varying levels of abstraction is disclosed. The method maintains...
US-1,011,6663 Identity proxy to provide access control and single sign on
Techniques to provide secure access to a cloud-based service are disclosed. In various embodiments, a request is received from a client app on a device to...
US-1,011,6662 On-demand security policy activation
On-demand activation of a security policy may be provided. Upon receiving a selection of a link, a profile identified by a security policy associated with the...
US-1,011,6661 Method and system for classifying network requests
Methods, systems and programming for classifying network requests. In one example, a network request for content to be fetched by a content server is received...
US-1,011,6660 Security modes for a component-based web security model
Disclosed are examples of systems, apparatus, methods and computer program products for providing a security model for component-based web applications....
US-1,011,6659 System for regulating access to and distributing content in a network
There is provided a system for regulating access and managing distribution of content in a network, such as the Internet. The system includes communication...
US-1,011,6658 Privileged access to target services
A method of providing a client with a privileged access ticket (PAT) to access a target service is performed at a credentials management service (CMS) in...
US-1,011,6657 Systems and methods for providing block chain-based multifactor personal identity verification
Block chain-based multifactor personal identity verification may be provided. Verification addresses may be established on a block chain by: associating...
US-1,011,6656 Systems and methods for enabling calls to bypass call-blocking functions
The disclosed computer-implemented method for enabling calls to bypass call-blocking functions may include (1) transmitting, from the computing device that is...
US-1,011,6655 Hybrid data managed lock system
A residential key may be programmed by a computer with access rights information. A lock device may receive the access rights information from the residential...
US-1,011,6654 Method for cloning a secure element
The invention proposes a method for cloning a first secure element from a backup secure element of a user, said backup secure element comprising at least...
US-1,011,6653 System and method for securing IPMI remote authenticated key-exchange protocol (RAKP) over hash cracks
Systems and methods for continuously secure Intelligent Platform Management Interface (IPMI) Remote Authenticated Key-Exchange Protocol (RAKP) over hash cracks....
US-1,011,6652 Sharing access to a media service
Examples provided herein are directed to a computing device and media playback system sharing access to a media service corresponding to a media application...
US-1,011,6651 Technologies for enhancing computer security
A method of securely transmitting data comprising (1) obtaining an unencrypted data stream comprising a first sequence of values, (2) segmenting a first portion...
US-1,011,6650 Methods and systems for contact importing using a mobile device
Techniques to allow a social networking system to import contact information from an external system. In one embodiment, a QR code is provided to a non-mobile...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.