Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2017/0163685 NETWORK ROUTING AND SECURITY WITHIN A MOBILE RADIO NETWORK
In an example embodiment, A PICNEEC is provided. It includes one or more Virtual Customized Rules Enforcer (VCRE) instances, each VCRE instance corresponding...
2017/0163684 ELECTRONIC ACCESS CONTROLS
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for accessing an electronic access control model and data...
2017/0163683 COMMUNICATION SYSTEM, USER APPARATUS, CONTENT SOURCE AND METHOD FOR SECURE CONTENT DELIVERY
A user apparatus configured to request and receive data divided into chunks from a content source over a network, the apparatus comprising: a network module...
2017/0163682 DYNAMICALLY UPDATED COMPUTING ENVIRONMENTS FOR DETECTING AND CAPTURING UNAUTHORIZED COMPUTER ACTIVITIES
Disclosed is a computerized system for dynamically updating a honeypot computer environment. The system typically includes a processor, a memory, and a...
2017/0163681 IDENTIFYING AN IMPOSTER ACCOUNT IN A SOCIAL NETWORK
A system for identifying an imposter account in a social network includes a monitoring engine to monitor user accounts of a social network, an identifying...
2017/0163680 METHOD AND APPARATUS FOR DDOS ATTACK DETECTION
Provided are a DDoS attack detection method and apparatus. The method comprises: acquiring network traffic of a target moment within a first period by...
2017/0163679 Method of Distributed Denial of Service (DDos) and Hacking Protection for Internet-Based Servers Using a...
A method of DDoS and hacking protection for internet-based servers using a private network of internet servers utilizes multiple data streams sent over a...
2017/0163678 NETWORK SECURITY ASSESSMENT SYSTEM
A network security assessment apparatus includes a memory and a processor. The memory stores first, second, and third values of a metric. The metric indicates...
2017/0163677 DATA SECURITY THREAT CONTROL MONITORING SYSTEM
A data security threat control and monitoring system and method described herein may provide visibility into users' activities and their access to sensitive...
2017/0163676 Security and Authentication Daisy Chain Analysis and Warning System
An approach is disclosed that provides a security and authentication daisy chain analysis and warning system to a user. The approach monitors sets of user...
2017/0163675 DISTRIBUTED SPLIT BROWSER CONTENT INSPECTION AND ANALYSIS
Distributed split browser content inspection and analysis are described. A server, comprising a browser engine, stores a definition of sets of browser...
2017/0163674 SECURITY THREAT DETECTION
Systems and methods for retrospective scanning of network traffic logs for missed threats using updated scan engines are provided. According to an embodiment,...
2017/0163673 PRESENTATION OF THREAT HISTORY ASSOCIATED WITH NETWORK ACTIVITY
Methods and systems for extracting, processing, displaying, and analyzing events that are associated with one or more threats are provided. According to one...
2017/0163672 COGNITIVE INFORMATION SECURITY USING A BEHAVIORAL RECOGNITION SYSTEM
Embodiments presented herein describe a method for processing streams of data of one or more networked computer systems. According to one embodiment of the...
2017/0163671 System and method for Using Simulators in network security and useful in IoT Security
The invention provides a system and method for detecting intrusion is an intranet, determining of attack intent; identifying compromised servers and network...
2017/0163670 PACKET LOGGING
Systems and methods associated with packet logging are described. One example method includes testing a packet obtained from a packet stream against a...
2017/0163669 METHODS AND SYSTEMS TO DETECT ANOMALIES IN COMPUTER SYSTEM BEHAVIOR BASED ON LOG-FILE SAMPLING
Methods and systems that detect computer system anomalies based on log file sampling are described. Computers systems generate log files that record various...
2017/0163668 PATH SCANNING FOR THE DETECTION OF ANOMALOUS SUBGRAPHS AND USE OF DNS REQUESTS AND HOST AGENTS FOR...
A system, apparatus, computer-readable medium, and computer-implemented method are provided for detecting anomalous behavior in a network. Historical...
2017/0163667 SYSTEM AND METHOD FOR DETECTING NETWORK ACTIVITY OF INTEREST
A network activity detection system is trained to detect network activities of interest such as threats by malicious computer data. The training involves...
2017/0163666 Systems and Methods for Detecting and Responding To Security Threats Using Application Execution and...
Systems and methods for detecting and responding to security threats using application execution and connection lineage tracing in accordance with embodiments...
2017/0163665 SYSTEMS AND METHODS FOR MALWARE LAB ISOLATION
Generally discussed herein are systems, devices, and methods for malware analysis lab isolation. A system can include a malware analysis zone LAN in which...
2017/0163664 METHOD TO SECURE PROTECTED CONTENT ON A MOBILE DEVICE
A method and device for securing data accessed by a mobile device. The mobile device detects a request to record content displayed on a display of the mobile...
2017/0163663 FALSE POSITIVE DETECTION REDUCTION SYSTEM FOR NETWORK-BASED ATTACKS
A system detects a security attack through a network-based application. The system receives a runtime request for invocation of a function and dynamically...
2017/0163662 DIRECT CACHE ACCESS FOR NETWORK INPUT/OUTPUT DEVICES
Methods and systems for improving efficiency of direct cache access (DCA) are provided. According to one embodiment, a set of DCA control settings are defined...
2017/0163661 METHOD OF DETECTING ATTACKS IN A CLOUD COMPUTING ARCHITECTURE
A method and a detection entity for detecting attacks in a system including at least two host servers. Each host server hosts a set of virtual machines. The...
2017/0163660 METHOD AND APPARATUS FOR PROVIDING FORENSIC VISIBILITY INTO SYSTEMS AND NETWORKS
Methods and systems for providing forensic visibility into systems and networks are provided. More particularly, a sensor agent may receive events defining an...
2017/0163659 SECURED DISTRIBUTED COMPUTING ACROSS MULTIPLE FIREWALLS
This disclosure is directed to securely exchanging information between private domains. Methods and systems of the disclosure perform operations including...
2017/0163658 Session Security Splitting and Application Profiler
Intelligent methods of providing online security against hackers, which prevents the hackers from obtaining unauthorized access to secure resources. A first...
2017/0163657 Method and Secure Element for Using a Network
A method for using a network and a secure element, whereby the secure element of a device receives a request for usages data from the device. The secure...
2017/0163656 System And Method For Implementing A Two-Person Access Rule Using Mobile Devices
A system using mobile devices and a network provides access authentication, authorization and accounting to computing resources using a two-person access rule...
2017/0163655 TRANSACTION COMPLETION BASED ON GEOLOCATION ARRIVAL
Techniques for providing friction-free transactions using geolocation and user identifiers are described herein. These techniques may ascertain a user's...
2017/0163654 SECURE DATA CORRIDORS FOR DATA FEEDS
A system and method of providing a secure data corridor are provided. A request from a subject for at least one data element of a data feed is received. A...
2017/0163653 SERVICING OF NETWORK SOFTWARE COMPONENTS OF NODES OF A CLUSTER STORAGE SYSTEM
Described herein are method and apparatus for servicing software components of nodes of a cluster storage system. During data-access sessions with clients,...
2017/0163652 SECURE DATA CORRIDORS
A system and method of providing a secure data corridor are provided. A request is received from a subject for a data feed comprising one or more data...
2017/0163651 DYNAMIC PERMISSION ASSESSMENT AND REPORTING ENGINES
Methods and systems of the present disclosure provide techniques for dynamically assessing a permission of a user that one of modifies or adds at least one...
2017/0163650 USAGE-BASED MODIFICATION OF USER PRIVILEGES
Systems and techniques to identify and modify unused (or seldom used) access privileges are described. Group membership data may be correlated with access map...
2017/0163649 ENABLING TRUSTED CONFERENCING SERVICES
Architecture for providing a superuser privilege in a conferencing environment. A pre-configured entity such as a bot program receives special conferencing...
2017/0163648 FILE AND BIT LOCATION AUTHENTICATION
An approach for authentication is provided. The approach performs identifying, by one or more computer processors, an account attempting to access content. The...
2017/0163647 SYSTEMS AND METHODS FOR SCALABLE-FACTOR AUTHENTICATION
Authentication systems and methods can selectively authenticate a request to access a resource data store storing access rights associated with a user device....
2017/0163646 METHOD OF UNBLOCKING EXTERNAL COMPUTER SYSTEMS IN A COMPUTER NETWORK INFRASTRUCTURE, DISTRIBUTED COMPUTER...
A method of unblocking external computer systems includes transmitting an authentication packet from an external computer system, configured outside the...
2017/0163645 Interoperable Systems and Methods for Peer-to-Peer Service Orchestration
Systems and methods are described for performing policy-managed, peer-to-peer service orchestration in a manner that supports the formation of self-organizing...
2017/0163644 PERMISSION BASED ACCESS CONTROL FOR OFFLOADED SERVICES
Systems and methods for network access control, including sending a service request from an on-premise system to one or more offloaded front-end services on...
2017/0163643 DEVICE, METHOD AND SYSTEM FOR ENABLING MULTIPLE WIRLESS COMMUNICATION DEVICES TO COMMUNICATE WITH A TRUSTED...
The present disclosure provides a device, method, and system for enabling multiple wireless communication devices to communicate with a trusted network over a...
2017/0163642 Method, Electronic Device and System for Content Pushing
Disclosed are a method and an electronic device for content pushing. The method mainly includes: obtaining, by a client, a device identity (ID) from an...
2017/0163641 Systems and Methods for Authentication of Printer Supply Items
Methods for authenticating printer supply items using revocation lists are disclosed. Revocation lists are updated using DNSSEC to communicate between a...
2017/0163640 Systems and Methods for Authentication of Printer Supply Items
Systems and methods for authenticating printer supply items using revocation lists are disclosed. Revocation lists are updated using DNSSEC to communicate...
2017/0163639 Voice Over IP Based Biometric Authentication
A request from a party is received by a receiver from a remote system. The request from the party is received when the party attempts to obtain a service using...
2017/0163638 AUTHENTICATION SYSTEM
The invention relates to an authentication system, comprising a security element (1) having a changing or changeable surface (6), structure, volume,...
2017/0163637 DETERMINATION OF DEVICE WITH WHICH TO ESTABLISH COMMUNICATION BASED ON BIOMETRIC INPUT
In one aspect, a first device includes a processor, a wireless transceiver accessible to the processor, at least one biometric sensor accessible to the...
2017/0163636 AUTHORIZATION SERVER, AUTHENTICATION COOPERATION SYSTEM, AND STORAGE MEDIUM STORING PROGRAM
An authorization token verification request including a second authorization token is received from an application server having received a processing request...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.