Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0007101 AUTONOMIC MEETING EFFECTIVENESS AND CADENCE FORECASTING
Meeting participation data of a meeting of a group of participants in-progress is collected. The meeting participation data is analyzed to identify a topic...
2018/0007100 CANDIDATE PARTICIPANT RECOMMENDATION
A computing system for organizing meetings, projects, and other collaborative engagements comprises a logic machine and a storage machine holding instructions....
2018/0007098 Multifunction Collaboration Within An Electronic Meeting
Techniques provided for a computing device to determine device capabilities and privileges of the computing device to enable privileges for one or more meeting...
2018/0007097 Multifunction Collaboration Within An Electronic Meeting
Techniques provided for a system to determine and enable privileges for one or more meeting windows displayed on a computing device within an electronic...
2018/0007095 COMMUNICATION CONTROL DEVICE, COMMUNICATION SYSTEM, AND COMMUNICATION CONTROL METHOD
A communication control device is configured to control data communication between terminals using a communication network. The communication control device...
2018/0007094 PROVIDING CELLULAR-SPECIFIC TRANSPORT LAYER SERVICE BY WAY OF CELL-SITE PROXYING IN A NETWORK ENVIRONMENT
A method is provided in one example embodiment and includes receiving a first request from a first user equipment by a first transport layer proxy located...
2018/0007092 BROADCAST NOTIFICATIONS USING SOCIAL NETWORKING SYSTEMS
A method and notification system for notifying broadcast streams to multiple users. A notifier receives, from a broadcaster, a request to notify a broadcast...
2018/0007089 NETWORK EVALUATOR
A given network evaluator can be configured to execute a network test based on a test file. The execution of the network test can include attempting to...
2018/0007088 DETECTION OF DOMAIN NAME SYSTEM HIJACKING
Detecting a Domain Name Service (DNS) hijacking includes resolving names in a hijack target group list to their respective Internet Protocol (IP) addresses. In...
2018/0007085 Mitigating a Denial-of-Service Attack in a Cloud-Based Proxy Service
A proxy server in a cloud-based proxy service receives a message that indicates that a domain, whose traffic passes through the proxy server, may be under a...
2018/0007084 AUTOMATIC RETRAINING OF MACHINE LEARNING MODELS TO DETECT DDOS ATTACKS
In one embodiment, a device in a network receives an attack mitigation request regarding traffic in the network. The device causes an assessment of the...
2018/0007081 SYSTEM AND METHOD FOR PREVENTING ATTACKS IN COMMUNICATIONS
A system can connect multiple disparate web products and services through a common interface. Each product can function with or without other plugins as the...
2018/0007079 PROVISION OF RISK INFORMATION ASSOCIATED WITH COMPROMISED ACCOUNTS
Processes and systems described herein enable a computing device to detect compromised accounts. The computing device may obtain a user credential including a...
2018/0007078 RELAY-ATTACK RESISTANT COMMUNICATIONS
A method of relay-attack resistant communications in a wireless communications system that includes a master wireless device (Master) sending a synchronization...
2018/0007075 MONITORING DYNAMIC DEVICE CONFIGURATION PROTOCOL OFFERS TO DETERMINE ANOMALY
Example embodiments disclosed herein relate to monitoring Dynamic Device Configuration Protocol offers via a control plane. In one example, an address range or...
2018/0007074 ANOMALY AND MALWARE DETECTION USING SIDE CHANNEL ANALYSIS
The present disclosure describes systems and methods for detecting malware. More particularly, the system includes a monitoring device that monitors...
2018/0007073 Network Operation Application Monitoring
Systems and methods that determine an anomaly in a network are provided. A monitoring engine is installed on a computing device that monitors network...
2018/0007071 COLLABORATIVE INVESTIGATION OF SECURITY INDICATORS
Examples relate to collaborative investigation of security indicators. The examples disclosed herein enable presenting, via a user interface, community-based...
2018/0007070 STRING SIMILARITY SCORE
Particular embodiments described herein provide for an electronic device that can be configured to acquire a string, convert the string to an image, compare...
2018/0007067 DETECTING POISONING ATTACKS OF INTERNET OF THINGS (IOT) LOCATION BEACONS IN WIRELESS LOCAL AREA NETWORKS...
Poisoning attacks by spoofing location beacons in a WLAN are detected using silence periods. A location beacon identifier is received from a mobile device...
2018/0007065 Neutralizing malicious locators
Methods and systems for neutralizing malicious locators. Threat actors may shut down their web pages or applications (i.e., resources) that serve malicious...
2018/0007064 MALWARE DETECTION USING INTERNAL AND/OR EXTERNAL MALWARE DETECTION OPERATIONS
A system may determine to perform an internal and an external malware detection operation to detect a malware infection associated with a client device. The...
2018/0007063 SELECTIVE VERIFICATION OF SIGNATURES BY NETWORK NODES
A network node may include one or more processors. The one or more processors may receive a message that is associated with one or more signatures and one or...
2018/0007059 Dynamic Access Control to Network Resources Using Federated Full Domain Logon
Methods and systems for granting or denying a client device access to one or more resources in a remote computing environment are described herein. During...
2018/0007058 PRIVATE CLOUD CONTROL
Management of IoT devices through a private cloud. An IoT device is coupled to a gateway. A request from the IoT device to connect to a private cloud, wherein...
2018/0007056 Leveraging Social Relationships to Enhance Computer Security
An approach is provided that enhances computer system security. In the approach, a set of users is authorized to be notified when any of a selected set of...
2018/0007055 TECHNOLOGIES FOR DISTRIBUTED ACTING AND KNOWLEDGE FOR THE INTERNET OF THINGS
Technologies for a distributed Internet of Things (IoT) system are disclosed. Several IoT devices may form a peer-to-peer network without requiring a central...
2018/0007054 WEBSITE FILTERING USING BIFURCATED DOMAIN NAME SYSTEM
Systems and techniques for website filtering using bifurcated domain name system are described herein. A domain name system (DNS) request may be received. An...
2018/0007053 Dynamic Cognitive Access Control List Management
Mechanisms are provided for implementing a cognitive access control. The mechanisms receive an access request from a requestor for accessing a resource and...
2018/0007052 METHOD FOR PROCESSING AN AUTHORIZATION TO IMPLEMENT A SERVICE, DEVICES AND CORRESPONDING COMPUTER PROGRAM
A method for processing, by a processing entity, of an authorization to implement a service and/or access an item. The method includes: reception, from a...
2018/0007051 PROTECTED CONTAINER KEY MANAGEMENT PROCESSORS, METHODS, SYSTEMS, AND INSTRUCTIONS
A processor of an aspect includes a decode unit to decode an instruction. The instruction to indicate a first structure in a protected container memory and to...
2018/0007050 SENSITIVE DATA SERVICE STORAGE
A system for data storage includes and an interface or a processor. The interface is to receive a request to store data, a data, and a data location context....
2018/0007049 COMPUTERIZED SYSTEMS AND METHODS FOR AUTHENTICATING USERS ON A NETWORK DEVICE VIA DYNAMICALLY ALLOCATED...
Disclosed are systems and methods for improving interactions with and between computers in an authentication system supported by or configured with personal...
2018/0007045 SECURE CODING AND MODULATION FOR OPTICAL TRANSPORT
Transmitter, receiver, system and method for secure data communications are provided. The transmitter encodes data as a spatial symbol in accordance with a...
2018/0007041 EVENT DRIVEN SECOND FACTOR CREDENTIAL AUTHENTICATION
A reader configured to perform dual-factor authentication is provided. The reader is configured to analyze credential data as well as event-based user inputs....
2018/0007039 VIRTUAL SMART CARDS WITH AUDIT CAPABILITY
Virtual smart card system includes a virtual smart card server (VSS) which controls access to content respectively associated with a plurality of virtual smart...
2018/0007037 TRANSACTION-SPECIFIC SHARED SECRET IN ONE-TIME PASSWORD DEVICE
Embodiments are directed to generation and verification of one-time passwords. A one-time password is generated by an apparatus of an authenticating party in...
2018/0007035 Systems and Methods for Authenticating Network Messages
Networks and methods for use in authenticating messages are provided. One exemplary method generally includes receiving a message from a client, where the...
2018/0007034 ESTABLISHING TRUST WITHIN A CLOUD COMPUTING SYSTEM
A cloud computing system includes a cloud system managing unit, a plurality of sets of devices, where a set of devices includes one or more devices having a...
2018/0007033 COMMUNICATION DEVICE, COMMUNICATION METHOD, COMMUNICATION SYSTEM, AND NON-TRANSITORY COMPUTER READABLE MEDIUM
According to one embodiment, a communication device includes a first communicator capable of communicating with a server through a first network; a second...
2018/0007032 SYSTEMS, METHODS, AND APPARATUSES FOR IMPLEMENTING A VIRTUAL DEVICE OBSERVATION AND DEBUG NETWORK FOR HIGH...
In accordance with disclosed embodiments, there are provided systems, methods, and apparatuses for implementing virtual device observation and debug network...
2018/0007031 SECURE VIRTUALIZED SERVERS
A system may be configured to provide secure access to a physical resource through the use of a partitionable virtual input/output server in a virtualized...
2018/0007030 Authenticating Devices to a Network
In one embodiment, a method includes receiving, from a device via a wireless signal, a request to access a WLAN of a router, the request including a device...
2018/0007028 DISPLAYING THE ACCESSIBILITY OF HYPERLINKED FILES
The accessibility of a hyperlinked files is displayed. A hyperlink that references a resource is extracted from a target file. An attempt to acquire the...
2018/0007027 ON-PREMISES AGENT FOR MOBILE CLOUD SERVICE
Systems, devices, and methods are disclosed for an agent device within a company's network firewall to initiate an HTTP connection with a cloud-based gateway...
2018/0007025 METHOD FOR KEY ROTATION
A method for key rotation includes initiating key rotation for a user account of a multi-factor authentication platform enabling one-time password...
2018/0007021 PUBLIC KEY PINNING FOR PRIVATE NETWORKS
Disclosed are various approaches for validating public keys pinned to services or servers on private networks. A client device can request a first certificate...
2018/0007020 SECURE TRANSFER AND USE OF SECRET MATERIAL IN A SHARED ENVIRONMENT
Aspects related to the secure transfer and use of secret material are described. In one embodiment, an encrypted secret key and encrypted revocation data are...
2018/0007019 METHOD AND APPARATUS FOR ENCRYPTING AND DECRYPTING PICTURE, AND DEVICE
The present disclosure relates to the field of computer technologies and it discloses a method for encrypting a picture performed at a sending device, the...
2018/0007014 PERIMETER ENCRYPTION
Encryption keys for an enterprise are stored at a perimeter device such as a gateway, and rules are applied at the network perimeter to control whether and how...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.