Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0359889 TECHNOLOGIES FOR MANAGING COMPROMISED SENSORS IN VIRTUALIZED ENVIRONMENTS
Systems, methods, and computer-readable media for managing compromised sensors in multi-tiered virtualized environments. In some embodiments, a system can...
2016/0359888 SYSTEM AND METHOD OF ASSIGNING REPUTATION SCORES TO HOSTS
A method provides for receiving network traffic from a host having a host IP address and operating in a data center, and analyzing a malware tracker for IP...
2016/0359887 DOMAIN NAME SYSTEM (DNS) BASED ANOMALY DETECTION
In one embodiment, a method includes receiving at an analytics module operating at a network device, network traffic data collected from a plurality of sensors...
2016/0359886 METHOD AND APPARATUS FOR GROUPING FEATURES INTO BINS WITH SELECTED BIN BOUNDARIES FOR USE IN ANOMALY DETECTION
In one embodiment, a method includes receiving network data at an analytics device, identifying features for the network data at the analytics device, grouping...
2016/0359885 UNAUTHORIZED BEACON DETECTION
A method to detect unauthorized beacons includes receiving position information that defines a positional pattern for a plurality of authorized beacons,...
2016/0359884 Method and Apparatus for Classifying and Combining Computer Attack Information
A method and apparatus for classifying and combining computer attack information identifying as malicious events, events in a network that cause...
2016/0359883 METHOD AND SYSTEM FOR DETECTING RESTRICTED CONTENT ASSOCIATED WITH RETRIEVED CONTENT
In embodiments of the present invention improved capabilities are described for detecting restricted content associated with retrieved content. The method and...
2016/0359882 MANAGING DYNAMIC DECEPTIVE ENVIRONMENTS
A deception management system to detect attackers within a dynamically changing network, including a deployment governor dynamically designating a deception...
2016/0359881 ANOMALY DETECTION THROUGH HEADER FIELD ENTROPY
An approach for detecting anomalous flows in a network using header field entropy. This can be useful in detecting anomalous or malicious traffic that may...
2016/0359880 GEO VISUALIZATION OF NETWORK FLOWS
The present technology is directed to mapping flow data and overlaying it on a geographic map. Furthermore the geographical map can also display attacks and...
2016/0359879 SYSTEM AND METHOD OF DETECTING HIDDEN PROCESSES BY ANALYZING PACKET FLOWS
A method includes capturing first data associated with a first packet flow originating from a first host using a first capture agent deployed at the first host...
2016/0359878 SYNTHETIC DATA FOR DETERMINING HEALTH OF A NETWORK SECURITY SYSTEM
An example method can include choosing a pattern or patterns of network traffic. This pattern can be representative of a certain type of traffic such as an...
2016/0359877 INTRA-DATACENTER ATTACK DETECTION
An example method can include receiving a traffic report from a sensor and using the traffic report to detect intra-datacenter flows. These intra-datacenter...
2016/0359876 SYSTEM AND METHOD FOR CREATION, DEPLOYMENT AND MANAGEMENT OF AUGMENTED ATTACKER MAP
A network surveillance system including a deception management server within a network, including a deployment module managing and planting decoy attack...
2016/0359875 APPARATUS, SYSTEM AND METHOD FOR DETECTING AND PREVENTING MALICIOUS SCRIPTS USING CODE PATTERN-BASED STATIC...
Provided are an apparatus, a system and a method for detecting and preventing malicious scripts. The apparatus for detecting and preventing malicious scripts...
2016/0359874 Routing Systems and Methods
Example routing systems and methods are described. In one implementation, an apparatus includes a network interface, a secure system, and a routing system...
2016/0359873 Rapid Configuration Security System for Industrial Control Infrastructure
A template for implementing a control system with security features provides a generic control program and device programs for distribution to industrial...
2016/0359872 SYSTEM FOR MONITORING AND MANAGING DATACENTERS
An example method includes detecting, using sensors, packets throughout a datacenter. The sensors can then send packet logs to various collectors which can...
2016/0359871 STATELESS WEB CONTENT ANTI-AUTOMATION
A computer-implemented method for coordinating content transformation includes receiving, at a computer server subsystem and from a web server system, computer...
2016/0359870 METHOD AND APPARATUS FOR DETECTING MALWARE INFECTION
In one embodiment, the present invention is a method and apparatus for detecting malware infection. One embodiment of a method for detecting a malware...
2016/0359869 Evolving Rule Based Contact Exchange
Methods and systems are described for managing a user's contact data which use evolving sequential sets of rules where the applicability of each set depends...
2016/0359868 SYSTEM AND METHOD FOR TARGETED MESSAGING, WORKFLOW MANAGEMENT, AND DIGITAL RIGHTS MANAGEMENT FOR GEOFEEDS
The disclosure relates to systems and methods for targeted messaging, workflow management, and digital rights management for geofeeds, including content that...
2016/0359867 ADJUSTING ENTERPRISE SECURITY USING A MOBILE DEVICE
A system and method for facilitating configuring software security functionality. An example method includes employing a first computing device to collect...
2016/0359866 METHODS AND APPARATUS TO CONTROL COMMUNICATIONS OF ENDPOINTS IN AN INDUSTRIAL ENTERPRISE SYSTEM BASED ON INTEGRITY
Methods and apparatus to control communications of endpoints in an industrial enterprise system based on integrity are disclosed. An example apparatus includes...
2016/0359865 UTILIZATION OF MULTIPLE KEYPADS FOR PASSWORD INPUTS
A computer program product includes program instructions to generate a first virtual keypad for entry of a first portion of a password, wherein the first...
2016/0359864 SYSTEM AND METHOD FOR CONTROLLING RESOURCES IN AN INTERNET OF THINGS NETWORK
The present disclosure relates to system(s) and method(s) for systems and methods for controlling resources in an Internet of Things (IoT) network. The system...
2016/0359863 Account Access Recovery System, Method And Apparatus
Some embodiments of the invention provide a program for recovering access to a service associated with an account. The program provides a login credential to...
2016/0359862 SYSTEM AND METHOD FOR USING PER-APPLICATION PROFILES IN A COMPUTING DEVICE
Systems and methods for creating and managing per-application profiles are disclosed. A method may include receiving input designating at least a first profile...
2016/0359861 ACCESSING AN APPLICATION THROUGH APPLICATION CLIENTS AND WEB BROWSERS
A request from an application client is received at a protected application. The request includes an access token. A grant information associated with the...
2016/0359860 SYSTEMS AND METHODS FOR PERFORMING OPERATIONS ON A COMPUTING DEVICE
Methods and systems for performing one or more operations on a first computing device are disclosed. A method includes receiving, from a second computing...
2016/0359859 System For Secure File Access
A virtual local file system for managing file access, such as read, write and execute, of files on local media is disclosed. An access manager, executable by...
2016/0359858 METHOD FOR SECURING ELECTRONIC DATA BY RESTRICTING ACCESS AND TRANSMISSION OF THE DATA
A method for securing data by embedding the data in a data structure and utilizing a sensor to detect transfer of the data structure. The data is embedded such...
2016/0359857 INACTIVE NON-BLOCKING AUTOMATED AGENT DETECTION
Online retailers may operate one or more services configured to detect requests generated by automated agents. A CAPTCHA may be transmitted in response to...
2016/0359856 METHOD, APPARATUS, AND SYSTEM FOR ACCESS CONTROL OF SHARED DATA
A method for access control of shared data includes a data access requester transmitting a request for accessing a shared data to a data storage dealer,...
2016/0359855 Internetwork Authentication
A technique for network authentication interoperability involves initiating an authentication procedure on a first network, authenticating on a second network,...
2016/0359854 INTEGRATED HOSTED DIRECTORY
Methods, systems, and devices for enterprise-wide management of disparate devices, applications, and users are described. A cloud-based central server may...
2016/0359853 PROVIDING DEVICES AS A SERVICE
Devices, such as hardware security modules, are provided as a service. A customer of a computing resource provider is able to request the addition of a device...
2016/0359852 Methods and Systems for Using Deep-Strings in Computation and Communication
Computer and communications systems and methods are provided in which a first computing system sends a second computing system a message and an associated...
2016/0359851 FACIAL CAPTURE MANAGING ACCESS TO RESOURCES BY A DEVICE
Disclosed are various embodiments for controlling access to resources by a client device. Methods may include receiving a user request to access a resource on...
2016/0359850 APPARATUS, SYSTEM AND METHOD EMPLOYING A WIRELESS USER-DEVICE
Embodiments of the invention generally relate to apparatus, systems and methods for authenticating an entity for computer and/or network security and for...
2016/0359849 SERVICE PROVISION SYSTEM, INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING APPARATUS, AND SERVICE...
A service provision system includes a processor configured to provide a predetermined service based on first authentication information issued by an external...
2016/0359848 TRUSTED STATUS TRANSFER BETWEEN ASSOCIATED DEVICES
The embodiments set forth systems and techniques to authenticate a user device for device services, such as by transferring or extending a trusted device...
2016/0359847 CONTROLLING A DISCOVERY COMPONENT, WITHIN A VIRTUAL ENVIRONMENT, THAT SENDS AUTHENTICATED DATA TO A DISCOVERY...
A discovery bundle component is applied in a virtual image deployed within a virtual environment, wherein the discovery bundle automatically discovers asset...
2016/0359846 SERVICE PROVIDING METHOD, SERVICE REQUESTING METHOD, INFORMATION PROCESSING DEVICE, AND CLIENT DEVICE
A service providing method, the method includes generating, by an information processing device, data relating to a session and a cookie relating to a...
2016/0359845 SECURE AUTHENTICATED DISTANCE MEASUREMENT
The invention relates to a method for a first communication device to perform authenticated distance measurement between the first communication device and a...
2016/0359844 AUTOMATIC PROVISIONING OF A DEVICE TO ACCESS AN ACCOUNT
A system for bootstrap provisioning of a device is provided. A vouching device is provisioned to access a bootstrap account of a bootstrap account provider and...
2016/0359843 DISTRIBUTED WHITE LIST FOR SECURITY RENEWABILITY
To provide for security and robustness in distribution of high value video content such as UHD video, a white list is provided that does not grant default...
2016/0359842 SYSTEM AND METHOD FOR ANTIVIRUS CHECKING OF FILES BASED ON LEVEL OF TRUST OF THEIR DIGITAL CERTIFICATES
Disclosed are systems, methods and computer program products for antivirus checking of files based on level of trust of their digital certificates. An example...
2016/0359841 RESET AND RECOVERY OF MANAGED SECURITY CREDENTIALS
Disclosed are various embodiments for management functions relating to security credentials. Account data, which includes multiple security credentials for...
2016/0359840 PRIVATE SIMULTANEOUS AUTHENTICATION OF EQUALS
A passphrase is assigned to an end user device for use in authenticating the end user device for a network using SAE. An identification of the end user device...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.