Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2017/0230401 FORECASTING AND CLASSIFYING CYBER-ATTACKS USING NEURAL EMBEDDINGS BASED ON PATTERN OF LIFE DATA
A first collection including a pattern of life (POL) feature vector and a Q&A feature vector is constructed. A second collection is constructed from the first...
2017/0230400 FORECASTING AND CLASSIFYING CYBER-ATTACKS USING ANALYTICAL DATA BASED NEURAL EMBEDDINGS
A first collection including an analytical feature vector and a Q&A feature vector is constructed. A second collection is constructed from the first collection...
2017/0230399 FORECASTING AND CLASSIFYING CYBER ATTACKS USING NEURAL EMBEDDINGS MIGRATION
A first collection including a first feature vector and a Q&A feature vector is constructed. A second collection is constructed from the first collection by...
2017/0230398 FORECASTING AND CLASSIFYING CYBER-ATTACKS USING NEURAL EMBEDDINGS
A first collection including a first feature vector and a Q&A feature vector is constructed. A second collection is constructed from the first collection by...
2017/0230397 SYSTEM AND METHOD FOR ASSESSING DATA OBJECTS ON MOBILE COMMUNICATIONS DEVICES
A server receives from a mobile communication device information about a data object (e.g., application) on the device when the device cannot assess the data...
2017/0230396 NETWORK SYSTEM
A control apparatus performs analysis by using partial information and determines whether or not communication is abnormal. If the communication is determined...
2017/0230395 DETECTING NETWORK ADDRESS TRANSLATION DEVICES IN A NETWORK BASED ON NETWORK TRAFFIC LOGS
Actual traffic logs of network traffic to and from host devices in a network are collected over time. Artificial traffic logs for each of multiple artificial...
2017/0230394 PROTECTION SYSTEM INCLUDING MACHINE LEARNING SNAPSHOT EVALUATION
This disclosure is directed to a protection system including machine learning snapshot evaluation. A device may comprise a machine learning engine (MLE) to...
2017/0230393 SYSTEMS AND METHODS FOR TRAFFIC CLASSIFICATION
Systems and methods of classifying network traffic may monitor network traffic. Monitored traffic may be compared with a control protocol template (CPT). When...
2017/0230391 CYBER SECURITY
Disclosed herein is a method for use in detection of abnormal behavior of a group of a plurality of entities of a computer system. The method is arranged to be...
2017/0230390 Method And System For Uniquely Identifying A User Computer In Real Time Using A Plurality Of Processing...
A method is provided for identifying a compromised client device from a masquerading device. The method includes capturing a plurality of attributes from a...
2017/0230389 BEHAVIORAL MODEL BASED MALWARE PROTECTION SYSTEM AND METHOD
A method includes identifying an attempt to access protected data accessible by way of a computing device as a malicious process based, at least in part, on a...
2017/0230388 IDENTIFYING MALICIOUS EXECUTABLES BY ANALYZING PROXY LOGS
Identifying malicious executables by analyzing proxy logs includes, at a server having connectivity to the Internet, retrieving sets of proxy logs from a...
2017/0230387 Monitoring Social Media for Breach of Organizational Privacy
This document describes apparatuses and techniques for monitoring social media for breach of organizational privacy. In some aspects, these techniques receive...
2017/0230386 SYSTEMS AND METHODS OF VIRAL ENABLEMENT OF FEATURES BY PEER-TO-PEER CONNECTION
The technology disclosed relates to identifying and notifying a user of nearby attendees at a mega attendance event who are in user's social graph by comparing...
2017/0230385 VEHICLE CORRELATION SYSTEM FOR CYBER ATTACKS DETECTION AND METHOD THEREOF
A system and method for detection of at least one cyber-attack on one or more vehicles including steps of transmitting and/or receiving by a first on-board...
2017/0230384 MULTI-FACTOR DECEPTION MANAGEMENT AND DETECTION FOR MALICIOUS ACTIONS IN A COMPUTER NETWORK
A network surveillance system, including a management server within a network of resources in which users access the resources in the network based on...
2017/0230383 INTER-COMMUNICATION UNIT MESSAGE ROUTING AND VERIFICATION OF CONNECTIONS
Techniques concerning the communication of messages, and verification of connections, between communication units in a network of communication units are...
2017/0230382 APPARATUS AND METHODS FOR THE SECURE TRANSFER OF ELECTRONIC DATA
An embodiment of the invention provides a method for processing a secure electronic transaction over a network from a sender to a receiver, which includes the...
2017/0230380 SECURITY ACCESS FOR A SWITCH DEVICE
A method for providing user access to a network switch appliance, includes: receiving from a user a request to access configuration item for the network switch...
2017/0230379 SYSTEMS AND METHODS OF MANAGING ACCESS TO REMOTE RESOURCES
A method and system are provided for managing access to resources available remotely from at least one computing device. The resources include at least one...
2017/0230378 BEACON-BASED INDUSTRIAL AUTOMATION ACCESS AUTHORIZATION
Techniques to implement beacon-based access authorization to industrial assets in an industrial automation environment are disclosed herein. In at least one...
2017/0230377 ACCESS ENFORCEMENT AT A WIRELESS ACCESS POINT
A first set of access rules is received from an access configuration service. The first set of access rules specifies addresses of devices authorized for a...
2017/0230376 ENHANCED TASK SCHEDULING FOR DATA ACCESS CONTROL USING QUEUE PROTOCOLS
A system and method for scheduling tasks associated with controlling access to databases. The system and method relate to scheduling tasks for data requesting...
2017/0230375 SYSTEM FOR CENTRALIZED CONTROL OF SECURE ACCESS TO PROCESS DATA NETWORK
A distributed block chain network having at least a private block chain portion, and in some cases a public block chain portion, allows users to take actions...
2017/0230374 SECURE COMMUNICATION SYSTEM AND METHOD
A secure communication system comprises a software program client operating on a host computing device, a service manager configured to manage client access to...
2017/0230373 CAPTIVE PORTAL HAVING DYNAMIC CONTEXT-BASED WHITELISTING
Methods, systems and computer readable media for a captive portal having dynamic, context-based whitelisting are described.
2017/0230372 INFORMATION SECURITY APPARATUS AND METHODS FOR CREDENTIAL DUMP AUTHENTICITY VERIFICATION
In some embodiments, an apparatus includes a memory, storing processor-executable instructions, blacklist terms, and credential dump records, and a processor....
2017/0230371 LICENSE MANAGEMENT SYSTEM
In the disclosed method, a current state of a network device indicative of no license key being associated with a network device is stored in a license...
2017/0230370 SYSTEM AND METHOD FOR EFFICIENTLY ACCESSING INTERNET RESOURCES
A system, method and apparatus for efficiently accessing Internet resources are disclosed. The system, method and apparatus employ a portable device for...
2017/0230369 ACCESS CONTROL FOR DIGITAL DATA
A system and method to control access to data are disclosed. An access request is received from a requesting device to access requested data and a context for...
2017/0230368 SYSTEM AND METHOD OF LOGGING INTO A WEB SERVER
A system and method of logging into an information system without the use of a password. The information system first registers with a verification server. A...
2017/0230367 AUTHENTICATION OF COMMUNICATION UNITS
Techniques concerning the authentication of communication units in a network of communication units are disclosed. At the request of an initiating...
2017/0230365 METHOD AND SYSTEM FOR SECURING ELECTRONIC DATA EXCHANGE BETWEEN AN INDUSTRIAL PROGRAMMABLE DEVICE AND A...
A method and device for securing electronic data exchange between an industrial programmable device implementing industrial process control and a portable...
2017/0230364 LIGHTING FIXTURE WITH ENHANCED SECURITY
A lighting fixture includes a solid-state light source, communications circuitry, a memory, and processing circuitry. The memory stores common security...
2017/0230363 Method, computer program, and system for identifying multiple users based on their behavior
A computer-implemented method, computer device and computer system for detecting multiple users based on a biometric user profile and/or a behavioral user...
2017/0230362 Identity Authentication Method and Apparatus, and User Equipment
An identity authentication method includes detecting a scenario in which the user equipment is located, determining, from at least two different authentication...
2017/0230361 Electronic Identity Credentialing System
Described is an electronic credentialing system that allows personal identity devices to interact; each interacting device has an installed identity engine...
2017/0230360 CONTINUOUS AUTHENTICATION SYSTEM AND METHOD BASED ON BIOAURA
A user authentication system for an electronic device for use with a plurality of wireless wearable medical sensors (WMSs) and a wireless base station that...
2017/0230359 System and Method for Confirmation of Information
A system for information confirmation using a cloud computing platform to provide a service by which an individual's video recorded and fingerprint ...
2017/0230358 PORTABLE TERMINAL AND METHOD OF CONTROLLING LOCKING OF PORTABLE TERMINAL
At least one processor controls unlocking based on received acceleration data and data representing a position on a touch panel where proximity or contact of...
2017/0230357 Multi-Factor Authentication with Increased Security
A multi-factor authentication method and system is provided such that a push notification during an authentication process is only received if a mobile device...
2017/0230356 SECURING A COMPUTING DEVICE ACCESSORY
Various embodiments are disclosed that relate to security of a computer accessory device. For example, one non-limiting embodiment provides a host computing...
2017/0230355 CERTIFICATE PINNING USING A DIRECTORY SERVICE
A user device obtains a set of one or more public key certificates for a server received from a directory service, and a current public key certificate of the...
2017/0230354 AUTOMATIC LOGIN ON A WEBSITE BY MEANS OF AN APP
The present disclosure relates to a method performed for facilitating login on a website. In accordance with an embodiment, the method comprises, by means of a...
2017/0230352 Method and System for Securing Data
A method and system for securing user data, or data, possessed by a data owner, are disclosed. In one aspect data is concealed and encrypted to ensure data...
2017/0230351 METHOD AND SYSTEM FOR AUTHENTICATING A USER
Method for authenticating a user, comprising the steps of a) providing a central server (101), in communication with at least two authentication service...
2017/0230350 NETWORK ELEMENT AND METHOD FOR IMPROVED USER AUTHENTICATION IN COMMUNICATION NETWORKS
The present invention proposes a method and network element which allows improving, in different aspects, existing user authentication mechanisms in a...
2017/0230349 MICROSERVICES INTER-OPERATIONAL TRUST MANAGEMENT
A microservice join request is received by a first microservice from a second microservice within a microservices system. The microservice join request...
2017/0230348 METHOD FOR CHECKING A PARAMETER INDICATING A CONFIDENCE LEVEL ASSOCIATED WITH A USER ACCOUNT OF AN ONLINE SERVICE
A method for checking a confidence level associated with a first user account of an online service, each user account including associated user data and...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.