Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0063208 JOIN FEATURE RESTORATION TO ONLINE MEETING
Features to join an online meeting are crucial to successfully conducting the online meeting. Accordingly, embodiments are directed to restoration of such...
2018/0063207 TECHNIQUES FOR IMPLEMENTING TELEPHONE CALL BACK FOR A MULTIMEDIA CONFERENCING PLATFORM
A method is described and in one embodiment includes receiving a request to participate in a web-based conferencing session using an IP phone, wherein the...
2018/0063206 Media Communication
A method and apparatus for providing communication between participants of a shared user event, in which inputs from participants of the event cause a...
2018/0063205 MIXED REALITY COLLABORATION
Mixed reality collaboration applications and a mixed reality collaboration platform providing mixed reality collaboration are described. The platform can...
2018/0063204 METHOD, APPARATUS AND SYSTEM FOR ESTABLISHING A REAL-TIME TELECOMMUNICATION SESSION
Methods, apparatuses and systems for establishing a telecommunication session may include receiving a plurality of communication identifiers of a first type,...
2018/0063203 PAIRING COMPUTER SYSTEMS WITH CONFERENCING SYSTEMS USING A VIDEO INTERFACE
A conferencing system includes a computer system coupled to a base station via a first connection. The computer system receives display identification data...
2018/0063202 HIGH-QUALITY ADAPTIVE BITRATE VIDEO THROUGH MULTIPLE LINKS
Delivery of high quality video in an adaptive bit rate (ABR) download session is achieved using obtained using lower quality communication paths. The method...
2018/0063201 DEVICE AND METHOD FOR MANAGING A COMMUNICATION INTERFACE OF A COMMUNICATION DEVICE
Methods and devices for managing a physical communication interface can include operating a first communication interface management unit in a first container...
2018/0063200 MEETING INVITEE AS PROXY
An electronic invitation, including invitation proxy information, for a meeting is communicated to at least a first and a second invitee. A response is...
2018/0063199 ISOLATING A SOURCE OF AN ATTACK THAT ORIGINATES FROM A SHARED COMPUTING ENVIRONMENT
A method and associated systems for isolating a source of an attack that originates from a shared computing environment. A computer-security system tags...
2018/0063198 DYNAMIC FILTERING OF POSTED CONTENT
Systems and methods for dynamic filtering of content posted to a social network are disclosed. In aspects, a method of the system includes generating, by a...
2018/0063197 System and Apparatus for Providing Network Security
A rule engine receives data flows. The data flows are between a network and an application. The rule engine determines data flow information and in dependence...
2018/0063196 Directing Audited Data Traffic to Specific Repositories
Data traffic is monitored on a network with data access elements thereof collected and compared to security rules. An audit data collection is sent to a...
2018/0063195 ADAPTABLE NETWORK EVENT MONITORING CONFIGURATION IN DATACENTERS
Some embodiments provide a method for defining an adaptable monitoring profile for a network. The defined network monitoring profile is independent of the...
2018/0063194 POLICY DEFINITION AND ENFORCEMENT FOR A NETWORK VIRTUALIZATION PLATFORM
A method of defining policy for a network virtualization platform of a data center is provided. The method receives a registration of one or more actions...
2018/0063193 Distributed Network Encryption for Logical Network Implemented in Public Cloud
Some embodiments provide a method for a first data compute node (DCN) operating in a public datacenter. The method receives an encryption rule from a...
2018/0063192 EXTENSIBLE MODERATION FRAMEWORK
A moderation framework monitors content posted in a database network and uses a declarative configuration scheme that defines moderation rules without having...
2018/0063191 SYSTEM AND METHOD FOR USING A VIRTUAL HONEYPOT IN AN INDUSTRIAL AUTOMATION SYSTEM AND CLOUD CONNECTOR
A system includes a first network including a network device, a second network including a cloud-computing infrastructure, a module including a first interface...
2018/0063190 METHOD FOR IDENTIFYING PHISHING WEBSITES AND HINDERING ASSOCIATED ACTIVITY
Systems and methods for hindering cyber-attacks include: modifying a target website of a remote service provider, wherein modifying the target website...
2018/0063189 PASSWORD BREACH REGISTRY
A password breach registry is utilized to secure a service provided by a service provider. The password breach registry is a publicly accessible registry and...
2018/0063188 Clustering Approach for Detecting DDoS Botnets on the Cloud from IPFix Data
Use machine learning to train a classifier to classify entities to increase confidence with respect to an entity being part of a distributed denial of service...
2018/0063187 ADAPTIVE SELF-OPTIMZING DDOS MITIGATION
A system for mitigating network attacks includes a protected network including a plurality of devices. The system further includes attack mitigation devices...
2018/0063185 METHOD AND SYSTEM FOR PREVENTING UNAUTHORIZED ACCESS TO SMART CARD DEVICES IN A REMOTE DESKTOP INFRASTRUCTURE
The disclosure provides an approach for permission checking in virtualized desktop infrastructure (VDI) redirection so that only a rightful owner can access a...
2018/0063184 SOFTWARE SECURITY VERIFICATION METHOD, DEVICE, AND SYSTEM
The present invention discloses a software security verification method, a device, and a system, and relates to the communications field, so as to resolve a...
2018/0063183 INTERACTING WITH A REMOTE SERVER OVER A NETWORK TO DETERMINE WHETHER TO ALLOW DATA EXCHANGE WITH A RESOURCE AT...
Provided are a computer program product, system, and method for interacting with a remote server over a network to determine whether to allow data exchange...
2018/0063182 SYSTEMS AND METHODS FOR IDENTIFYING AND MAPPING SENSITIVE DATA ON AN ENTERPRISE
Embodiments of the present invention provide techniques, systems, and methods for remote, agent-less enterprise computer threat data collection, malicious...
2018/0063181 SYSTEMS AND METHODS FOR REMOTE IDENTIFICATION OF ENTERPRISE THREATS
Embodiments of the present invention provide techniques, systems, and methods for remote, agent-less enterprise computer threat data collection, malicious...
2018/0063180 JAVASCRIPT SECURITY TESTING
In one example in accordance with the present disclosure, a method may include receiving an initial document object model (DOM) corresponding to an HTML page...
2018/0063179 System and Method Of Performing Online Memory Data Collection For Memory Forensics In A Computing Device
Various embodiments include methods and a memory data collection processor for performing online memory data collection for memory forensics. Various...
2018/0063178 METHOD AND SYSTEMS FOR REAL-TIME INTERNAL NETWORK THREAT DETECTION AND ENFORCEMENT
A method for threat detection and enforcement in an internal network is disclosed. The method includes: receiving a network packet of a plurality of network...
2018/0063177 NON-TRANSITORY RECORDING MEDIUM RECORDING CYBER-ATTACK ANALYSIS SUPPORTING PROGRAM, CYBER-ATTACK ANALYSIS...
A non-transitory recording medium recording a cyber-attack analysis supporting program that causes a computer to execute a process, the process includes:...
2018/0063176 Identifying and Handling Threats to Data Compute Nodes in Public Cloud
Some embodiments provide a method for a public cloud manager that interacts with a management system of a public datacenter. The method receives a notification...
2018/0063175 Detection Dictionary System Supporting Anomaly Detection Across Multiple Operating Environments
A detection dictionary system provides a framework for describing, detecting, and reporting anomalies across multiple operating environments each including...
2018/0063174 ILLEGITIMATE TYPOSQUATTING DETECTION WITH INTERNET PROTOCOL INFORMATION
Detecting illegitimate typosquatting with Internet Protocol (IP) information includes, at a computing device having connectivity to a network, obtaining a list...
2018/0063173 APPARATUS FOR INFORMATION PROCESSING, SYSTEM FOR INFORMATION PROCESSING, AND METHOD FOR INFORMATION PROCESSING
An information processing apparatus includes a memory configured to store identifying information of a web page conforming to a predetermined condition and a...
2018/0063172 NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM STORING CONTROL PROGRAM, CONTROL METHOD, AND INFORMATION...
A non-transitory computer-readable recording medium storing a control program causing a computer to execute processing, the processing includes: displaying a...
2018/0063171 NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM STORING CYBER ATTACK ANALYSIS SUPPORT PROGRAM, CYBER ATTACK...
A non-transitory computer readable recording medium storing a computer executable program that, when executed, causes a computer to perform a cyber attack...
2018/0063170 NETWORK SECURITY SCORING
In one general aspect, a network security system is disclosed that includes a network interface operative to connect the system to a public wide area network...
2018/0063169 CONTAINER FILE ANALYSIS USING MACHINE LEARNING MODEL
In one respect, there is provided a system for training a machine learning model to detect malicious container files. The system may include at least one...
2018/0063168 AUTOMATIC DETECTION OF NETWORK THREATS BASED ON MODELING SEQUENTIAL BEHAVIOR IN NETWORK TRAFFIC
A computer-implemented data processing method comprises: executing a recurrent neural network (RNN) comprising nodes each implemented as a Long Short-Term...
2018/0063167 LOCATION ENRICHMENT IN ENTERPRISE THREAT DETECTION
Subnet information and location information is received from a database by a smart data streaming engine (SDS). A particular subnet of the subnet information...
2018/0063166 ROOTKIT DETECTION SYSTEM AND METHOD
A rootkit detection method includes obtaining, from a target system, first data comprising raw data stored in a data block of a storage drive, checking the...
2018/0063165 DETECTING AND MITIGATING WARDRIVING
Determining the physical location of wirelessly connected devices within a network can provide a number of security benefits. However, manually determining and...
2018/0063164 SECURING SERVICES IN A NETWORKED COMPUTING ENVIRONMENT
A system includes: a CPU, a computer readable memory and a computer readable storage medium associated with a computer device of a service provider; program...
2018/0063163 LEARNING INDICATORS OF COMPROMISE WITH HIERARCHICAL MODELS
Presented herein are techniques for classifying devices as being infected with malware based on learned indicators of compromise. A method includes receiving...
2018/0063162 DNS TUNNELING PREVENTION
Embodiments for domain name service (DNS) tunneling prevention by a processor. A DNS tunneling detection operation is requested to be performed upon receiving...
2018/0063161 RAPID, TARGETED NETWORK THREAT DETECTION
Rapidly detecting network threats with targeted detectors includes, at a computing device having connectivity to a network, determining features of background...
2018/0063160 Isolated Network Stack to Manage Security for Virtual Machines
Some embodiments provide a novel method for monitoring network requests from a machine. The method captures the network request at various layers of a protocol...
2018/0063159 APPARATUS AND METHOD FOR PROVIDING SECURITY SERVICE IN COMMUNICATION SYSTEM
An apparatus and a method for providing a security service in a communication system are provided. The security device includes a receiver configured to...
2018/0063158 CRYPTOGRAPHIC EVIDENCE OF PERSISTED CAPABILITIES
Example implementations relate to cryptographic evidence of persisted capabilities. In an example implementation, in response to a request to access a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.