Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0077188 Methods And Systems For On-Device Real-Time Adaptive Security Based On External Threat Intelligence Inputs
Methods, and computing devices implementing the methods, that enable client computing devises to work in conjunction with a server device to identify and...
2018/0077187 CYBERSECURITY INCIDENT DETECTION SYSTEMS AND TECHNIQUES
Behavioral baselines for a computer system may be accurately and efficiently established by (1) monitoring occurrences on the computer system, (2) determining,...
2018/0077186 METHOD AND SYSTEM FOR DETECTING SUSPICIOUS ADMINISTRATIVE ACTIVITY
Disclosed is an improved approach for identifying suspicious administrative host activity within a network. Network traffic is examined to learn the behavior...
2018/0077185 METHOD OF AND SYSTEM FOR USER AUTHENTICATION IN ELECTRONIC SERVICE FOR TRANSMISSION OF DIGITAL OBJECTS
A method of and a system for user authentication in an electronic service for transmitting digital objects, the electronic service accessible by a client...
2018/0077184 TAMPERPROOF LOGS
Methods and devices for creating a secure log of security events may include receiving a historical digest representing approved historical security events...
2018/0077183 MODULAR EVENT PIPELINE
A modular pipeline for event management in a computer environment is provided to enable the high volume of events that may be relevant to the security and...
2018/0077182 LEARNING INTERNAL RANGES FROM NETWORK TRAFFIC DATA TO AUGMENT ANOMALY DETECTION SYSTEMS
In one embodiment, a device in a network receives traffic records indicative of network traffic between different sets of host address pairs. The device...
2018/0077181 BOT DETECTION BASED ON BEHAVIOR ANALYTICS
A system automatically detects bots and/or botnets.
2018/0077180 BOT DETECTION SYSTEM BASED ON DEEP LEARNING
A system automatically detects bots and/or botnets.
2018/0077179 BOT DETECTION BASED ON DIVERGENCE AND VARIANCE
A system automatically detects bots and/or botnets.
2018/0077178 METHOD AND SYSTEM FOR DETECTING MALICIOUS PAYLOADS
Disclosed is an improved method, system, and computer program product for identifying malicious payloads. The disclosed approach identifies potentially...
2018/0077177 PERIODICITY DETECTION OF NETWORK TRAFFIC
The improved detection of malicious processes executing on a networked computing device is provided. An agent running on the networked computing device...
2018/0077176 DETECTING INTRUSION ATTEMPTS IN DATA TRANSMISSION SESSIONS
A computer-implemented method includes identifying a data transmission session associated with a display-oriented data transmission scheme; identifying an...
2018/0077175 MALICIOUS THREAT DETECTION THROUGH TIME SERIES GRAPH ANALYSIS
Malicious threat detection through time-series graph analysis, in which a data analysis device receives a data file comprising multiple log data entries. The...
2018/0077174 Intrusion Detection and Response System
Disclosed herein are system, method, and computer program product embodiments for intrusion detection and response. An embodiment operates by receiving one or...
2018/0077173 DISTRIBUTED STORAGE NETWORK WITH ENHANCED SECURITY MONITORING
A method includes receiving a data access request from a requesting device regarding one or more encoded data slices. A data object is dispersed storage error...
2018/0077172 CLIENT REPUTATION DRIVEN ROLE-BASED ACCESS CONTROL
The present disclosure discloses a system and method for dynamically modifying role based access control for a client based on the activity. Generally, a...
2018/0077171 TRANSPARENT BRIDGE FOR MONITORING CRYPTO-PARTITIONED WIDE-AREA NETWORK
This disclosure is directed to monitoring a crypto-partitioned, or cipher-text, wide-area network (WAN). A first computing device may be situated in a...
2018/0077170 CONDITIONAL CONTENT ACCESS
In one embodiment, a method comprises: in response to a request of a user device to access first content, sending a challenge, relating to digital video...
2018/0077169 Reflective Network Device Position Identification
A method of identifying a device positioned in a network and making domain assignments includes instantiating a network comprising an offsite server and a...
2018/0077168 PROXIMITY-BASED DEVICE AUTHENTICATION
An accurate distance between two devices can be determined in continuous and secure manner using modulated audible signals containing time-based information....
2018/0077167 SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR PUBLICLY PROVIDING WEB CONTENT OF A TENANT USING A MULTI-TENANT...
In accordance with embodiments, there are provided mechanisms and methods for publicly providing web content of a tenant using a multi-tenant on-demand...
2018/0077166 METHOD OF AND SYSTEM FOR GENERATING USER PROFILES
There are disclosed methods of and systems for generating a user profile. The method is executable at a server, the server having previously generated a first...
2018/0077165 METHODS, MEDIA, AND SYSTEMS FOR SECURING COMMUNICATIONS BETWEEN A FIRST NODE AND A SECOND NODE
Methods, media, and systems for securing communications between a first node and a second node are provided. In some embodiments, methods for securing...
2018/0077164 METHODS, SYSTEMS, AND MEDIA FOR CONTROLLING ACCESS TO CONTENT
Methods, systems, and media for controlling access to content are provided. In some embodiments, the method comprises: receiving a request to modify a first...
2018/0077163 POTENTIAL BLOCKING IMPACTS
Examples disclosed herein relate to potential blocking impacts. Some of the examples enable obtaining network traffic data of a network that is accessible by a...
2018/0077162 WEBPAGE UPDATING METHOD AND SYSTEM AND WEBPAGE SERVER
The present disclosure relates to a method and system for updating a webpage and a webpage server. The method includes: upon detection of an update...
2018/0077161 METHOD AND APPARATUS FOR PROVIDING AND RECEIVING CONTENTS VIA NETWORK, METHOD AND APPARATUS FOR BACKING UP DATA...
Provided are methods and apparatuses for providing contents via a network, in which original data of contents provided via a network can be traced, and...
2018/0077160 CLIENT/SERVER SECURITY BY EXECUTING INSTRUCTIONS AND RENDERING CLIENT APPLICATION INSTRUCTIONS
In an embodiment, a method comprises intercepting, from a server computer, a first set of instructions that define a user interface; executing, using a...
2018/0077159 SECURITY RESPONSE PROTOCOL BASED ON SECURITY ALERT ENCODED DATA SLICES OF A DISTRIBUTED STORAGE NETWORK
A method includes receiving, from a requesting device, an access request for at least one security alert encoded data slice of a set of security alert encoded...
2018/0077158 PRIVATELY PERFORMING APPLICATION SECURITY ANALYSIS
Systems and methods for analyzing applications on a mobile device for risk so as to maintain the privacy of the application user are provided. In the example...
2018/0077157 METHOD AND SYSTEM FOR IDENTIFYING USER INFORMATION IN SOCIAL NETWORK
A method for identifying user information includes obtaining a first user identifier of a user in a social network; obtaining identity authentication...
2018/0077156 SYSTEMS AND METHODS FOR DEVICE AUTHENTICATION
Embodiments include methods, and systems and computing devices configured to implement the methods of authenticating a computing device. A processor of a first...
2018/0077155 VERIFYING AN APPLICATION IDENTIFIER ON A MOBILE DEVICE THROUGH A TELECOMMUNICATION NETWORK
A system for verifying an association between an application and a mobile computing device. The application is identified by an application instance...
2018/0077154 USER PROFILE SELECTION USING CONTEXTUAL AUTHENTICATION
In embodiments, apparatuses, methods and storage media (transitory and non-transitory) are described that are associated with user profile selection using...
2018/0077153 ANONYMIZING BIOMETRIC DATA FOR USE IN A SECURITY SYSTEM
An anonymized biometric representation of a target individual is used in a computer based security system. A detailed input biometric signal associated with a...
2018/0077152 VIRTUAL SIM AUTHENTICATION
According to a first aspect of the present disclosed subject matter, a mobile terminal comprises a single cellular modem having concurrent protocol stack that...
2018/0077151 Architecture For Access Management
Disclosed are techniques that use devices with corresponding identity wallet applications that execute on an electronic processor device of the devices, and...
2018/0077150 Device Security Utilizing Continually Changing QR Codes
A method provides device access security via use of periodically changing Quick Response (QR) codes. The method includes: generating (706) a first ...
2018/0077149 DISTRIBUTING AN AUTHENTICATION KEY TO AN APPLICATION INSTALLATION
Disclosed are various examples for facilitating distribution of an authentication code to installation of managed applications. An identity certificate is sent...
2018/0077148 DISTRIBUTING SECURITY CODES THROUGH A RESTRICTED COMMUNICATIONS CHANNEL
Disclosed are various examples for facilitating distribution of security codes for a two-factor authentication scheme or one-time passwords. Security codes can...
2018/0077147 ATTRIBUTED NETWORK ENABLED BY SEARCH AND RETREIVAL OF PRIVITY DATA FROM A REGISTRY AND PACKAGING OF THE PRIVITY...
Methods and systems generate an attributed network for tracing transmitted data that is attributable to a user. A digital registration certificate includes an...
2018/0077146 Online Identity Reputation
Examples of the present disclosure describe systems and methods of determining online identity reputation. In aspects, an online identity of an entity may...
2018/0077145 TASK SEGREGATION IN A MULTI-TENANT IDENTITY AND DATA SECURITY MANAGEMENT CLOUD SERVICE
Embodiments provide cloud-based identity management by receiving a request to perform an identity management service that includes real-time tasks and...
2018/0077144 SINGLE LOGOUT FUNCTIONALITY FOR A MULTI-TENANT IDENTITY AND DATA SECURITY MANAGEMENT CLOUD SERVICE
A cloud-based identity and access management system that implements single sign-on ("SSO") receives a first request for an identity management service...
2018/0077143 CROSS-PLATFORM SINGLE SIGN-ON ACCESSIBILITY OF A PRODUCTIVITY APPLICATION WITHIN A SOFTWARE AS A SERVICE PLATFORM
A Cross-Platform Single Sign On (CP-SSO) experience is provided herein to enable users to access multiple services via a single login when working across...
2018/0077142 SHARING CREDENTIALS AND OTHER SECRET DATA IN COLLABORATIVE ENVIRONMENT IN A SECURE MANNER
A system and method for facilitating sharing of credentials and other secret data in a networked computing environment. An example embodiment provides for...
2018/0077141 CODE SEQUENCING
A system, method, and computer-readable medium for challenge-response authentication are provided. A plurality of codes is received over a communication...
2018/0077140 AUTHORIZATION FLOW INITIATION USING SHORT-RANGE WIRELESS COMMUNICATION
In general, aspects of the disclosure are directed towards techniques for initiating an authorization flow with a user to enable a user interface-limited...
2018/0077139 METHOD AND SYSTEM FOR ACCESSING SERVICE/DATA OF A FIRST NETWORK FROM A SECOND NETWORK FOR SERVICE/DATA ACCESS...
A method for accessing service/data of a first network from a second network includes accessing the services and data of the first network from the second...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.