Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,023,7305 Methods and systems for enabling legal-intercept mode for a targeted secure element
Disclosed herein are methods and systems for enabling legal-intercept mode for a targeted secure element. In an embodiment, a method includes embedding a first...
US-1,023,7304 Systems and methods of administering computer activities based upon emotional intelligence
Systems and methods of administering computer activities based upon user emotional intelligence are provided. One method may include receiving a user request...
US-1,023,7303 Prevalence-based reputations
In an example, there is disclosed a method and system for calculating an object's trust level for security purposes based on prevalence in a context-aware...
US-1,023,7302 System and methods for reverse vishing and point of failure remedial training
Embodiments of the disclosure describe a simulated phishing campaign manager that communicates a simulated phishing communication that includes at least the...
US-1,023,7301 Management of cellular data usage during denial of service (DoS) attacks
Systems and methods for managing data usage of a cellular modem during DoS/DDoS attacks are provided. According to one embodiment, a network security device of...
US-1,023,7300 System and method for detecting directed cyber-attacks targeting a particular set of cloud based machines
A system for detecting a targeted attack by a first machine on a second machine is provided. The system includes an application including instructions to:...
US-1,023,7299 Browser extension for contemporaneous in-browser tagging and harvesting of internet content
Exemplary embodiments of the present disclosure relate to systems, methods, and non-transitory computer-readable media for contemporaneous in-browser searching,...
US-1,023,7298 Session management
One or more embodiments of techniques or systems for session management, security scoring, and friction management are provided herein. Sessions may be...
US-1,023,7297 System and method for threat incident corroboration in discrete temporal reference using 3D dynamic rendering
A system and method for evaluating cyber-security threat incidents of a computer network is described in this document. In particular, it is described that...
US-1,023,7296 Automated penetration testing device, method and system
A method for performing automatic penetration testing (PT) in an organization having at least one end unit, the method comprising: providing a PT device having...
US-1,023,7295 Automated event ID field analysis on heterogeneous logs
A system, program, and method for anomaly detection in heterogeneous logs. The system having a processor configured to identify pattern fields comprised of a...
US-1,023,7294 Fingerprinting entities based on activity in an information technology environment
Techniques are described for analyzing data regarding activity in an IT environment to determine information regarding the entities associated with the activity...
US-1,023,7293 Dynamic reputation indicator for optimizing computer security operations
Described systems and methods allow protecting a computer system from malware such as viruses, worms, and spyware. A reputation manager executes on the computer...
US-1,023,7292 Selecting network security investigation timelines based on identifiers
Techniques and mechanisms are disclosed that enable network security analysts and other users to efficiently conduct network security investigations and to...
US-1,023,7291 Session processing method and device, server and storage medium
A method for processing session and a device thereof, a server and a storage medium are provided. The method includes: capturing packets sent from a client...
US-1,023,7290 Methodology for intelligent pattern detection and anomaly detection in machine to machine communication network
The present invention relates generally to network communications, and more particularly to machine-to-machine (M2M) data communications. The present invention...
US-1,023,7289 Method and device for detecting network intrusion
The present disclosure provides a method and a device for detecting network intrusion. The method includes: obtaining a feature vector of a network flow to be...
US-1,023,7288 Method for deep data inspection over an industrial internet field broadband bus
The invention discloses a method for deep data inspection over an industrial internet field broadband bus, the method including: obtaining, by a first node, a...
US-1,023,7287 System and method for detecting a malicious activity in a computing environment
System and method for detecting a likely threat from a malicious attack is disclosed. Communication between a user computer and a destination computer is...
US-1,023,7286 Content delivery network protection from malware and data leakage
Content Delivery Network (CDN) protection systems and methods, performed by a cloud node in a distributed security system include receiving traffic between one...
US-1,023,7285 Method and apparatus for detecting macro viruses
Disclosed are a method and an apparatus for detecting macro viruses. The method includes: if a data file processing program has already performed an opening...
US-1,023,7283 Malware domain detection using passive DNS
Techniques for malware domain detection using passive Domain Name Service (DNS) are disclosed. In some embodiments, malware domain detection using passive DNS...
US-1,023,7282 Data leak protection
Methods and systems for Data Leak Prevention (DLP) in an enterprise network are provided. According to one embodiment, a network security device maintains a...
US-1,023,7281 Access policy updates in a dispersed storage network
A method for execution in a dispersed storage network operates to determine one or more slice names of one or more slices and determine whether to establish a...
US-1,023,7280 Management and control of mobile computing device using local and remote software agents
Devices, systems, and methods for allowing parents to view and track smart phone activities of their children can include one or more child software modules....
US-1,023,7279 Enhancing integrity of data center specific information
There is provided a method comprising: receiving, by an apparatus of a data center, a request message from a server computer of said data center, the apparatus...
US-1,023,7278 Permission delegation technology
In one implementation, a computer system maintains one or more permissions associated with a credential held by a first user, where at least one of the one or...
US-1,023,7277 Generating and utilizing digital visual codes to grant privileges via a networking system
One or more embodiments of the disclosure include systems and methods that generate and utilize digital visual codes. In particular, in one or more embodiments,...
US-1,023,7276 Managing access rights to a group directory
Systems and methods for group-sourced contacts directories are presented. A first member of a shared contacts directory can add contact information of a second...
US-1,023,7275 Wireless network access
A system and machine-implemented method of wireless network access are provided. An authentication request comprising credentials for a user account of a...
US-1,023,7274 Software defined network (SDN) application integrity
A Network Function Virtualization Infrastructure (NFVI) controls a Software Defined Network (SDN) Application Programming Interface (API) between a source SDN...
US-1,023,7273 System and method for communicating with inmates in a privileged communication
A system and method for with an inmate in a privileged communication are disclosed. A communication system includes a portal subsystem that determines whether a...
US-1,023,7272 Methods, apparatus, and systems for identity authentication
An identity authentication method is provided. The method comprises receiving request information transmitted by an online terminal device for determining...
US-1,023,7271 Access terminal
A network access device may obtain user fingerprint information of a terminal. The network access device may transmit the user fingerprint information of the...
US-1,023,7270 Distributed storage of authentication data
A biometric server receives, a transmission of a biometric sample and an encrypted enrollment template of the user from a client device, wherein the encrypted...
US-1,023,7269 Method of providing information security and electronic device thereof
A method of operating an electronic device and an electronic device are provided. The method includes generating biometric information using at least one sensor...
US-1,023,7268 Secure passcode processing device
A computing system is described that at least one microphone, a secure processing unit, and a general processing unit. The microphone is coupled to an audio...
US-1,023,7267 Rights control method, client, and server
The present invention relates to the field of mobile communications technologies, and in particular, to a right control method, a client, and a server, so as to...
US-1,023,7266 Privileged shared account password sanitation
Sanitizing passwords used in a shared, privileged account includes providing a password of a shared account to a user; identifying a first machine logged into...
US-1,023,7265 Providing authorization data over a validated connection to access a provider service
A method, system, and computer program product for automatically receiving authorization data required to log into a service portal from a second device to a...
US-1,023,7264 Computer readable storage media for legacy integration and methods and systems for utilizing same
Systems and methods for integrative legacy context management are disclosed herein. An example computer hardware system may include at least one processing unit...
US-1,023,7263 Method and apparatus of providing messaging service and callback feature to mobile stations
Disclosed are an apparatus and method of performing automated administrative operations on a mobile device. One example method may include determining via a...
US-1,023,7262 Assembly manager
An assembly management system allows a software service provider (SSP) to compile and upload client-specific client application code into a repository. The SSP...
US-1,023,7261 Systems and methods for location-based authentication
Systems and methods are disclosed for performing location-based authentication using location-aware devices. One method includes: receiving an access request...
US-1,023,7260 Increased communication security
A system may include a first computer system and a second computer system. The first computer system may be configured to generate a Constrained Application...
US-1,023,7259 Systems and methods for distributed identity verification
Systems and methods for decentralized and asynchronous authentication flow between users, relying parties and identity providers. A trusted user agent...
US-1,023,7258 Single key authentication method
Systems, methods, and computer-readable media are disclosed for obtaining authenticated access to a service provider system, or more specifically, to a user...
US-1,023,7257 Network service header used to relay authenticated session information
In one embodiment, a system, method, and computer program product are disclosed for authenticating a packet received from a client node, storing the results of...
US-1,023,7256 Dynamic identity profiles
Systems, methods, and apparatus, including computer-readable storage media storing executable instructions, for providing dynamic identity profiles are...
US-1,023,7255 Data synchronizing system, control method thereof, authorization server, and storage medium thereof
wherein the server system is configured to cause said other device to synchronize with the updated data in response to confirmation of identification...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.