Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0069913 FACILITATING SECURE WEB BROWSING ON UNTRUSTED NETWORKS
Systems and methods described herein are directed to a browser mode that provides a secure type of browsing window or a public type of browsing window. Within...
2018/0069912 PRE-FETCHED ENCODING FOR APPLICATION STREAMING
Systems and methods for pre-fetched encoding for application streaming. In some implementations, an indication at a server computer system that a client device...
2018/0069911 TRANSMISSION APPARATUS, TRANSMISSION METHOD, RECEPTION APPARATUS, AND RECEPTION METHOD
To make it possible to apply optimal decoding processing to an encoded stream including a plurality of pieces of encoded data having degree-of-priority...
2018/0069910 Systems and Methods for Live Voice-Over Solutions
Systems and methods provide real time custom audio in accordance with embodiments of the invention. One method includes selecting a video stream from source...
2018/0069909 Systems and Methods for Adaptive Buffering for Digital Video Streaming
Systems and methods for adaptive buffering in accordance with embodiments of the invention enable a reduced minimum buffer time. One embodiment includes a...
2018/0069908 SYSTEM AND METHOD FOR PERFORMING LOSSLESS SWITCHING IN A REDUNDANT MULTICAST NETWORK
A system and method is provided for performing lossless switching in a redundant multicast network. An exemplary method includes receiving a primary media...
2018/0069907 MANAGING DATA COMMUNICATIONS BASED ON PHONE CALLS BETWEEN MOBILE COMPUTING DEVICES
An example method comprises receiving, by at least one computing device, a first notification from a first mobile computing device and a second notification...
2018/0069906 METHOD AND SYSTEM FOR PRIVATE COMMUNICATION WITH MULTIPLE PARTIES
Embodiments of the present application provide a method and system for communication. During operation, the system may receive a message sent by a sender to...
2018/0069905 SWITCH CONTROLLER FOR SEPARATING MULTIPLE PORTIONS OF CALL
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for collecting call data, feeding call data to applications, and...
2018/0069904 Automatic Call Initiation in Response to Selecting Tags in Electronic Documents and Applications
The present invention provides a telecom control function in a communication terminal. The telecom control function is configured to receive call indicia when...
2018/0069903 FPGA OFFLOAD MODULE AND PROCESSES FOR SEAMLESS FRAME-LEVEL SWITCHING OF MEDIA STREAMS IN REAL-TIME
A combined hardware and software solution for real-time seamless switching of media streams using standard Ethernet switches and compliant end-points is...
2018/0069902 MEETING INVITEE AS PROXY
An electronic invitation, including invitation proxy information, for a meeting is communicated to at least a first and a second invitee. A response is...
2018/0069901 CLOUD-BASED VIRTUAL LOCAL NETWORKS
Systems and methods are described for providing cloud-based virtual local networks. A computerized method for providing cloud-based virtual local networks...
2018/0069900 IMPLEMENTING SECURITY IN A SOCIAL APPLICATION
Implementing security in social applications includes inferring a closeness level of a connection to a user's profile of a social application based on a...
2018/0069899 METHOD AND SYSTEM FOR POLICY MANAGEMENT, TESTING, SIMULATION, DECENTRALIZATION AND ANALYSIS
A policy management method and system, which determines at least one functional model for the IT system; loads at least one pre-configured policy selection...
2018/0069898 Methods and Systems for Managing Carrier Configurations in a Zero-Rated System
A request by a user device for accessing content in a first web-based product is received from a first network carrier. An identity of the first network...
2018/0069897 VISUALIZATION OF SECURITY ENTITLEMENT RELATIONSHIPS TO IDENTIFY SECURITY PATTERNS AND RISKS
A visualization depicting visual relationships between identities and entitlements is provided by a visualization device to enable patterns corresponding to...
2018/0069896 SYSTEM AND METHOD PROVIDING DATA-DRIVEN USER AUTHENTICATION MISUSE DETECTION
Systems, methods, and other embodiments are disclosed for data-driven user authentication misuse detection. In one embodiment, for each of multiple...
2018/0069895 DETECTION OF SPOOF ATTACKS ON INTERNET OF THINGS (IOT) LOCATION BROADCASTING BEACONS
Spoof attacks on location based beacons are detected. A stream of beacons (e.g., IBEACONS) comprising at least a unique source identifier is generated. The...
2018/0069894 SECURE BROWSING VIA A TRANSPARENT NETWORK PROXY
A system for providing secure browsing via a transparent network proxy is disclosed. The system may receive, from a client, a request to access a resource. The...
2018/0069893 Identifying Changes in Use of User Credentials
A method including extracting, from initial data transmitted on a network, multiple events, each of the events including a user accessing a resource. First and...
2018/0069892 WEB SERVICE TESTING
Disclosed is a computer-implemented method and system of inferring a web service infrastructure from a web service hosted on a web server. The method includes:...
2018/0069891 System and Method of Mitigating Cyber Attack Risks
A security system comprising a computer, a memory, a data store comprising a cyber threat intent dictionary and a technology dictionary; and an application...
2018/0069890 METHOD AND DEVICE FOR PROCESSING AND TRANSMITTING DATA WITHIN A FUNCTIONALLY SECURE, ELECTRICAL, ELECTRONIC...
Processing and transmitting of data within a functionally safe electronic system having at least two subsystems, each of which comprises at least one safety...
2018/0069889 DETERMINING AN ASSESSMENT OF A SECURITY BREACH FOR AN ASSET OF A NETWORK INFRASTRUCTURE
An identification of an asset that is associated with a network infrastructure may be received. Additional assets of the network infrastructure that are...
2018/0069888 IDENTITY RESOLUTION IN DATA INTAKE OF A DISTRIBUTED DATA PROCESSING SYSTEM
A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The...
2018/0069887 Storyboard Displays of Information Technology Investigative Events Along a Timeline
Techniques and mechanisms are disclosed that enable network security analysts and other users to efficiently conduct network security investigations and to...
2018/0069886 CONFIGURING THE GENERATION OF EVENT DATA BASED ON A TRIGGERING SEARCH QUERY
The disclosed embodiments provide a system that facilitates the processing of network data. During operation, the system provides a risk-identification...
2018/0069885 GRAPH DATABASE ANALYSIS FOR NETWORK ANOMALY DETECTION SYSTEMS
Graph database analysis for network anomaly detection systems, in which a data analysis device receives multiple log data entries including parameters...
2018/0069884 Identifying Bulletproof Autonomous Systems
A method, including collecting data transmitted from endpoints to Internet sites having respective domains and respective IP addresses, and transmissions to IP...
2018/0069883 Detection of Known and Unknown Malicious Domains
A method, including collecting information on data transmitted at respective times between multiple endpoints and multiple Internet sites having respective...
2018/0069882 METHOD AND SYSTEM FOR RISK MEASUREMENT AND MODELING
A method and system for risk measurement and modeling, which may be used to identify and mitigate information security risks for an information system, and...
2018/0069881 FORENSIC ANALYSIS
The present invention relates to a forensic analysis method performed on a Distributed Computing System (DCS) (10) comprising a server (18) and at least one...
2018/0069880 SYSTEM AND METHOD FOR DETECTING ANOMALOUS ELEMENTS OF WEB PAGES
Disclosed are system and method for detecting anomalous elements of web pages. One exemplary method comprises: obtaining access to a web site, by a client...
2018/0069879 SMART HOME SECURITY SYSTEM
In one embodiment, a system is described, the system including a network gateway in communication with a plurality of original equipment manufacturer (OEM)...
2018/0069878 MALWARE DETECTION FOR PROXY SERVER NETWORKS
This specification generally relates to methods and systems for applying network policies to devices based on their current access network. One example method...
2018/0069877 SYSTEM AND METHOD FOR DETECTING NETWORK ACTIVITY OF INTEREST
A network activity detection system is trained to detect network activities of interest such as threats by malicious computer data. The training involves...
2018/0069876 SYSTEM AND METHOD FOR PREDICTIVE ATTACK SEQUENCE DETECTION
A method for a predictive detection of cyber-attacks are provided. In an embodiment, the method includes receiving security events; matching each received...
2018/0069875 SYSTEM AND METHOD FOR ATTACK SEQUENCE MATCHING
A method and system for matching event sequences for predictive detection of cyber-attacks are discussed. The method comprises receiving a reference event...
2018/0069874 ATTACK DETECTION APPARATUS
The present invention relates to an attack detection apparatus that detects an attack against a communication network between devices, and improves information...
2018/0069873 PRE-PROCESSING BEFORE PRECISE PATTERN MATCHING
Pre-processing before precise pattern matching of a target pattern from a stream of patterns. Including acquiring occurrence numbers of target elements in the...
2018/0069872 ROUTE UPDATING METHOD, COMMUNICATION SYSTEM, AND RELEVANT DEVICES
A peer enrollment method, a route updating method, a communication system, and relevant devices to improve security of a peer-to-peer (P2P) network. The peer...
2018/0069871 DATA VERIFICATION VIA INDEPENDENT PROCESSORS OF A DEVICE
A content request communication, e.g., generated using a first processor of a device, can be transmitted to a web server. A response communication including...
2018/0069870 Method and Apparatus for Providing an Adaptable Security Level in an Electronic Communication
A method of communicating in a secure communication system, comprises the steps of assembling a message at a sender, then determining a security level, and...
2018/0069869 APPLICATION PLATFORM WITH FLEXIBLE PERMISSIONING
Systems and methods are provided for an application platform with flexible permissioning according to one or more embodiments. In one embodiment, an...
2018/0069868 UTILITY PORTALS FOR MANAGING DEMAND-RESPONSE EVENTS
A method includes generating a utility portal interface in response to a request from a utility computer system that receives parameters that specify a demand...
2018/0069867 Computer User Authentication Using Machine Learning
Systems and methods are described herein for computer user authentication using machine learning. Authentication for a user is initiated based on an...
2018/0069866 MANAGING PRIVILEGED SYSTEM ACCESS BASED ON RISK ASSESSMENT
Managing privileged system access may be performed by a risk management system controlling user access privilege to production systems. One example method of...
2018/0069865 Systems and Methods for Creating and Modifying Access Control Lists
Embodiments of the present disclosure can present information on services hosted and used by various assets on a network, and allow users to control access to...
2018/0069864 SYSTEMS AND METHODS FOR SCALABLE-FACTOR AUTHENTICATION
Authentication systems and methods can selectively authenticate a request to access a resource data store storing access rights associated with a user device....
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.