Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0191570 METHOD AND APPARATUS FOR DISTRIBUTING FIREWALL RULES
Some embodiments of the invention provide a novel method for specifying firewall rules. In some embodiments, the method provides the ability to specify for a...
2016/0191569 DISTRIBUTED SECURE CONTENT DELIVERY
Techniques for distributed and secure content delivery are provided. Requests for content are routed to a centralized service where the requestors are...
2016/0191568 SYSTEM AND RELATED METHOD FOR NETWORK MONITORING AND CONTROL BASED ON APPLICATIONS
A network architecture system that expands the control network administrators have on existing networks. The system provides application identification and...
2016/0191567 REAL-TIME MOBILE SECURITY POSTURE
In an example, a system and method for real-time mobile security posture updates is provided. A mobile device management (MDM) agent may run on the mobile...
2016/0191566 WIDE AREA NETWORK ACCESS MANAGEMENT COMPUTER
A system and method for connecting a classified internet protocol (IP) network to a public IP network including an unclassified computing device. The...
2016/0191565 TECHNOLOGIES FOR MANAGING NETWORK PRIVILEGES BASED ON PHYSICAL PRESENCE
Technologies for managing network privileges of members of graft-network include detecting a computing device in physical presence with a network ...
2016/0191564 PLUGGABLE API FIREWALL FILTER
A web server includes a servlet and a pluggable API firewall filter coupled to the servlet. The pluggable filter protects the web server from content based...
2016/0191563 SYSTEM FOR DETECTING THREATS USING SCENARIO-BASED TRACKING OF INTERNAL AND EXTERNAL NETWORK TRAFFIC
Disclosed is an improved approach to implement a system and method for detecting insider threats, where models are constructed that is capable of defining what...
2016/0191562 CLOUD BASED LOGGING SERVICE
Methods and systems are provided for facilitating access to a cloud-based logging service. According to one embodiment, access to a cloud-based logging service...
2016/0191561 METHODS OF UNSUPERVISED ANOMALY DETECTION USING A GEOMETRIC FRAMEWORK
A method for unsupervised anomaly detection, which are algorithms that are designed to process unlabeled data. Data elements are mapped to a feature space...
2016/0191560 SYSTEM FOR IMPLEMENTING THREAT DETECTION USING DAILY NETWORK TRAFFIC COMMUNITY OUTLIERS
A method and system for identifying insider threats within an organization is provided. The approach constructs an internal connectivity graph to identify...
2016/0191559 SYSTEM FOR IMPLEMENTING THREAT DETECTION USING THREAT AND RISK ASSESSMENT OF ASSET-ACTOR INTERACTIONS
Disclosed is an approach to detect insider threats, by tracking unusual access activity for a specific user or computer with regard to accessing key assets...
2016/0191558 ACCELERATED THREAT MITIGATION SYSTEM
An intrusion detection and prevention system and method for dealing with threats to computers and computer networks, and in particular to computers and...
2016/0191557 Methods and Systems of Detecting and Analyzing Correlated Operations in a Common Storage
A method of detecting correlated operations in a common storage. The method comprises providing at least one input operation, each the input operation being...
2016/0191556 BLOCKING INTRUSION ATTACKS AT AN OFFENDING HOST
A method, apparatus, and program product are provided for protecting a network from intrusions. An offending packet communicated by an offending host coupled...
2016/0191555 Secured Automated or Semi-Automated Systems
Secured automated or semi-automated systems are provided herein. In one embodiment, a sensor system includes a sensor, a legacy computing environment that is...
2016/0191554 SYSTEM AND METHOD FOR IDENTIFICATION OF AUTOMATED BROWSER AGENTS
Disclosed herein are methods and systems for evaluating web browser behavior to report on human versus non-human activity, based on varying analyses of...
2016/0191553 ALERT TRANSMISSION METHOD, COMPUTER-READABLE RECORDING MEDIUM, AND ALERT TRANSMISSION APPARATUS
An alert transmission method is disclosed. Behavior logs of multiple users are collected from multiple terminals. A computer groups users having a high...
2016/0191552 NETWORK MONITORING SYSTEM AND METHOD
A disclosed network monitoring method includes: obtaining, by a first apparatus, packets from a node outside a network to a first terminal in the network, and...
2016/0191551 METHOD AND SYSTEM FOR DETECTING THREATS USING METADATA VECTORS
An approach for detecting network attacks using metadata vectors may initially involve receiving network communications or packets, extracting metadata items...
2016/0191550 MICROVISOR-BASED MALWARE DETECTION ENDPOINT ARCHITECTURE
A threat-aware microvisor may be deployed in a malware detection endpoint architecture and execute on an endpoint to provide exploit and malware detection...
2016/0191549 RICH METADATA-BASED NETWORK SECURITY MONITORING AND ANALYSIS
Network security monitoring for external threats is provided that is based on rich metadata collected from internal network traffic that is analyzed for...
2016/0191548 METHOD AND SYSTEM FOR MISUSE DETECTION
This disclosure discusses methods, systems, and an apparatus that can determine whether email content is potentially malicious, contains potentially malicious...
2016/0191547 Zero-Day Rotating Guest Image Profile
According to one embodiment, a threat detection platform features a housing, a communication interface, a processor coupled to the communication interface, and...
2016/0191546 APPLICATION MALWARE ISOLATION VIA HARDWARE SEPARATION
A system for application malware isolation via hardware separation for use in a networked server-client system in the event of a possible malicious intrusion...
2016/0191545 SYSTEMS AND METHODS FOR MONITORING VIRTUAL NETWORKS
The disclosed computer-implemented method for monitoring virtual networks may include (1) identifying a virtual network containing at least one virtualized...
2016/0191544 USER TERMINAL, SERVICE PROVIDING APPARATUS, DRIVING METHOD OF USER TERMINAL, DRIVING METHOD OF SERVICE...
A user terminal, a service providing apparatus, a driving method of a user terminal, a driving method of a service providing apparatus, and an encryption...
2016/0191543 SECURE NEIGHBOR DISCOVERY (SEND) USING PRE-SHARED KEY
An extension is provided to the SEND protocol without requiring a CGA or third party trust anchor. A shared key is provided to both a sender and receiver of a...
2016/0191542 MESSAGE SENDER AUTHENTICITY VALIDATION
In an example, a system and method are provided for validating the sender of a message, such as an e-mail, text message, voice mail, network message, internet...
2016/0191541 METHOD AND SYSTEM FOR NETWORK VALIDATION OF INFORMATION
Embodiments of the present application relate to a method for network validation of information, a system for network validation of information, and a computer...
2016/0191540 AUTHENTICATION BASED ON PROXIMATE DEVICES
In one embodiment, a computer-implemented method includes, in response to an attempt by a user to perform a transaction using a computing device, accessing a...
2016/0191539 SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR PUBLICLY PROVIDING WEB CONTENT USING A MULTI-TENANT SYSTEM
In accordance with embodiments, there are provided mechanisms and methods for publicly providing web content of a tenant using a multi-tenant on-demand...
2016/0191538 CROSS PLATFORM SOCIAL NETWORKING AUTHENTICATION SYSTEM
Disclosed in one example is a method of authenticating with multiple social network services. The method may include storing first authentication information...
2016/0191537 IMPLEMENTING USER-SPECIFIED TRANSACTION PARAMETERS FOR TRANSFERRING DIGITAL CONTENT ITEMS AMONGST USERS
A computing system and/or network environment in which users can transfer (or initiate transfer of) digital content items to other users in accordance with a...
2016/0191536 Access Requests at IAM System Implementing IAM Data Model
Systems and methods are provided for provisioning access rights to physical computing resources using an IAM system implementing an IAM data model. The IAM...
2016/0191535 METHOD AND APPARATUS FOR CONTROLLING DATA PERMISSIONS
Methods and apparatus for controlling data permission are disclosed herein, and embodiments include generating a relational database that includes entity...
2016/0191534 Methods and Systems for Managing Permissions to Access Mobile Device Resources
In an electronic device, a first application sends a request to a second application for access by the first application to a resource of the electronic...
2016/0191533 METHOD, APPARATUS, AND SYSTEM FOR RESTRICTING ACCESS
Techniques for restricting access to sensitive application(s) or data to a limited physical area are disclosed. Various embodiments are described in which a...
2016/0191532 SYSTEMS FOR NETWORK RISK ASSESSMENT INCLUDING PROCESSING OF USER ACCESS RIGHTS ASSOCIATED WITH A NETWORK OF DEVICES
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for network risk assessment. One of the methods includes...
2016/0191531 METHOD FOR FILE SCRUBBING IN A SECURITY GATEWAY FOR THREAT PREVENTION
Methods and systems for blocking reception of digital content elements by devices are disclosed. These methods and systems comprise elements of hardware and...
2016/0191530 TECHNOLOGIES FOR ACCESS CONTROL
Technologies for performing access control include a computing device that parses a network packet received by the computing device to identify an n-tuple of a...
2016/0191529 CAPTCHA CHALLENGE INCORPORATING OBFUSCATED CHARACTERS
A method for determining if a user of a computer system is a human. A processor receives an indication that a computer security program is needed and acquires...
2016/0191528 REQUEST-SPECIFIC AUTHENTICATION FOR ACCESSING WEB SERVICE RESOURCES
Requests for access to Web service resources are evaluated based on the type of request that is received. Requests are not granted unless sufficient proof of...
2016/0191527 Method for Operating a Security Element
A method for operating a security element, preferably in the form of a chip card, having a processor, and a memory. stores an operating system comprising an...
2016/0191526 PEER TO PEER ENTERPRISE FILE SHARING
Disclosed are various embodiments for facilitating the distribution of files from a file repository. Files from a file repository can be distributed via peer...
2016/0191525 PROTECTING SUPERVISOR MODE INFORMATION
Embodiments of an invention for protecting supervisor mode information are disclosed. In one embodiment, an apparatus includes a storage location, instruction...
2016/0191524 RELAYED NETWORK ACCESS CONTROL SYSTEMS AND METHODS
A computer system for authenticating and managing network traffic may comprise a network link providing a connection to a network, an authentication,...
2016/0191523 SERVICE AUTHORITY DETERMINATION METHOD AND DEVICE
Provided are a service authority determination method and device. The method comprises: receiving a web (Web) application identifier sent by access equipment;...
2016/0191522 METHOD AND APPARATUS FOR ACCESSING WEBSITE
Disclosed are methods and apparatus for accessing a website. A method may comprise: acquiring a web address that meets a preset condition; determining a server...
2016/0191521 INTROSPECTION METHOD AND APPARATUS FOR NETWORK ACCESS FILTERING
Some embodiments of the invention provide a method for performing network access filtering and/or categorization through guest introspection (GI) on a device....
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.