Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0103062 SYSTEMS AND METHODS FOR INTEGRATION OF DIRECTORY SERVICE WITH MANAGEMENT CONTROLLERS
In accordance with embodiments of the present disclosure, an information handling system may include a processor, a directory service application comprising a...
2018/0103061 APPARATUS AND METHOD FOR IMPLEMENTING NETWORK DECEPTION
An example apparatus configured to perform network deception may include processing circuitry configured to generate virtual instances of decoy resources...
2018/0103060 METHODS AND APPARATUS FOR DETECTING AND/OR DEALING WITH DENIAL OF SERVICE ATTACKS
Methods and apparatus for detecting and minimizing the effects of Denial Of Service (DOS) attacks in high-speed networks in which packet processing is carried...
2018/0103059 CONNECTION CONTROL APPARATUS, CONNECTION CONTROL METHOD, AND CONNECTION CONTROL PROGRAM
A connection control apparatus is configured such that a connection count calculator calculates a TCP connection count, which is the number of TCP connections...
2018/0103058 SYSTEM AND METHOD FOR ITERATIVELY UPDATING NETWORK ATTACK MITIGATION COUNTERMEASURES
A system and computer-implemented method for mitigating a malicious network attack. The method includes receiving an attack alert that a network attack has...
2018/0103057 SYSTEM AND METHOD FOR MANAGING TIERED BLACKLISTS FOR MITIGATING NETWORK ATTACKS
A method, system, and computer-implemented method to manage blacklists used for mitigating network traffic is provided. The method includes monitoring a first...
2018/0103056 ANALYZING ENCRYPTED TRAFFIC BEHAVIOR USING CONTEXTUAL TRAFFIC DATA
In one embodiment, a device in a network detects an encrypted traffic flow associated with a client in the network. The device captures contextual traffic data...
2018/0103055 SECURITY-RISK PLUGIN TO HELP TARGETED USERS INTERACT WITH WEB PAGES AND APPLICATIONS
The present disclosure relates to techniques for helping targeted users determine whether it is safe to supply personal information requested by a web site. In...
2018/0103054 Vulnerability Detection in IT Assets by utilizing Crowdsourcing techniques
This invention discloses systems and methods for detecting vulnerabilities in IT assets by utilizing crowdsourcing techniques. A corpus containing...
2018/0103053 METHODS AND APPARATUS FOR APPLICATION ISOLATION
Processor(s) for detecting malicious software. A hardware virtual machine monitor (HVMM) operates under a host OS. Container(s) initialized with network...
2018/0103052 SYSTEM AND METHODS FOR AUTOMATED DETECTION, REASONING AND RECOMMENDATIONS FOR RESILIENT CYBER SYSTEMS
A method for securing an IT (information technology) system using a set of methods for knowledge extraction, event detection, risk estimation and explanation...
2018/0103051 Transient Transaction Server
A networked computer system enables one or more transactions to be executed securely. An initiator sends a service request to a control server. The control...
2018/0103050 AUTHENTICATION OF CLIENT DEVICES USING MODIFIED IMAGES
Systems and methods for detecting phishing attacks and identifying attackers are described. In embodiments, a server system may modify a template image based...
2018/0103049 Systems and Methods for Protecting a Physical Asset Against a Threat
Embodiments of the disclosure relate to systems and methods for protecting a physical asset against an attack. In one exemplary embodiment, an asset protection...
2018/0103048 SYSTEM CONVERSION IN A NETWORKED COMPUTING ENVIRONMENT
Approaches for providing security in a networked computing environment are provided. The method includes detecting, by at least one computer device, a breach...
2018/0103047 DETECTION OF COMPUTERIZED BOTS AND AUTOMATED CYBER-ATTACK MODULES
Devices, systems, and methods of detecting whether an electronic device or computerized device or computer, is being controlled by a legitimate human user, or...
2018/0103046 Protecting from Unintentional Malware Download
Protection from malware download is provided. A first input is received to access one of an email attachment or a web site link using an application. A newly...
2018/0103045 NETWORK ATTACK DETECTION METHOD
It is described a network attack detection method. A topology analysis on network is conducted to obtain a probing path set containing at least one probing...
2018/0103044 ANTI-MALWARE CLIENT
Protecting devices and systems from electronic attacks is of paramount importance to the protection of such devices, systems, and their associated data. By...
2018/0103043 SYSTEM AND METHODS OF DETECTING MALICIOUS ELEMENTS OF WEB PAGES
Disclosed are system and method for detecting anomalous or malicious elements of a web page. One exemplary method comprises: obtaining data about elements of a...
2018/0103042 AUTOMATED DATA AUTHENTICATION AND SERVICE AUTHORIZATION VIA CRYPTOGRAPHIC KEYS IN A PRIVATE BLOCKCHAIN
Embodiments of the present invention provide a system for authenticating records belonging to an individual or entity and providing authorized access of said...
2018/0103041 PORTABLE ELECTRONIC DEVICE WITH USER-CONFIGURABLE API DATA ENDPOINT
Systems, devices methods and media are provided for selecting data received from or sent by a client device. In one example, a system is configured to initiate...
2018/0103040 COMMUNICATION SYSTEM, COMMUNICATION CONTROL APPARATUS, AND RECORDING MEDIUM
A communication control apparatus includes circuitry that includes a memory that stores a first list including a first condition that associates an address...
2018/0103039 LEVERAGING PRE-EXISTING GROUPS FOR IOT DEVICE ACCESS
The application is directed to a computer-implemented method and apparatus for provisioning an Internet of Things (IoT) device on an IoT network. The...
2018/0103038 RULE MANAGEMENT USER INTERFACE
Embodiments of the invention are directed to techniques for preventing access to protected resources by unauthorized individuals by enabling an administrator...
2018/0103037 RESOURCE ACCESS CONTROL USING NAMED CAPABILITIES
Aspects of the embodiments are directed to systems, methods, and computer program products embodied at a server managing a resource for providing access to a...
2018/0103036 SYSTEMS AND METHODS FOR CYBER-PHYSICAL VEHICLE MANAGEMENT, DETECTION AND CONTROL
A cyber-physical vehicle management system may allow for highly reliable and authentic identity management of cyber-physical systems, unforgeable legal...
2018/0103035 NETWORK AUTHENTICATION OF A GEO-FENCED VOLUME
Provided is a method for managing a software defined network using a software control layer to regulate a geo-fenced volume. The software control layer can use...
2018/0103034 USER PROFILE SELECTION USING CONTEXTUAL AUTHENTICATION
In embodiments, apparatuses, methods and storage media (transitory and non-transitory) are described that are associated with user profile selection using...
2018/0103033 PROVIDING A SECURE COMMUNICATION CHANNEL DURING ACTIVE DIRECTORY DISASTER RECOVERY
A secure communication channel can be established between a recovery console and a recovery agent during an Active Directory disaster recovery. This secure...
2018/0103032 Authorization of Computing Devices Using Cryptographic Action Tokens
Methods and apparatuses are described for authorization of computing devices using cryptographic action tokens. Delegation request data, including an...
2018/0103031 ADVANCED LOCAL-NETWORK THREAT RESPONSE
There are provided measures for enabling advanced local-network threat response. Such measures could exemplarily comprise receiving, at a local-network...
2018/0103030 WEARABLE MISPLACEMENT
An access control system is described in which a primary credential device has a master key and a secondary credential device has a key derived from the master...
2018/0103029 WRITING SYSTEM SOFTWARE ON AN ELECTRONIC DEVICE
Systems, methods, and software can be used to write system software on an electronic device. In some aspects, an instruction to write system software on an...
2018/0103028 APPLICATION PROGRAM AS KEY FOR AUTHORIZING ACCESS TO RESOURCES
In a networked environment, a client side application executed on a client device may transmit a request to an authorization service for access to a resource....
2018/0103027 COMMUNICATION CONTROL APPARATUS, COMMUNICATION CONTROL METHOD, AND RECORDING MEDIUM
A communication unit and a controller are included, the communication unit being configured to communicate with a communication apparatus using a first...
2018/0103026 SECURE AUTHENTICATION TO PROVIDE MOBILE ACCESS TO SHARED NETWORK RESOURCES
Techniques to perform secure authentication to provide mobile access to shared content are disclosed. In various embodiments, a user credential associated with...
2018/0103025 SYSTEMS AND METHODS FOR LOCATION-BASED DEVICE SECURITY
A device may collect environmental information surrounding the device. Based on the collected environmental information, the device may automatically identify...
2018/0103024 IDENTITY DATA BASED ON AGGREGATING INPUT DATA
A computing device, a system, and a method are provided to receive a number of inputs associated with one or more sensors of the computing device. One or more...
2018/0103023 VALIDATING INTERNET OF THINGS DEVICE FIRMWARE
A computer-implemented method validates Internet of Things (IoT) device firmware levels for peer-to-peer communication in a network. Communication rules...
2018/0103022 SYSTEM AND METHOD FOR PROVIDING ACCESS TO A VEHICLE AND ENABLING DATA OFF-BOARDING
A method and system for providing access to a vehicle and enabling data off-boarding that include associating a primary portable device to the vehicle and...
2018/0103021 ENSURING THE CREDIBILITY OF DEVICES FOR GLOBAL ATTESTATION
Embodiments disclose systems, methods, and computer program products to perform an operation for adapting a set of devices used to authenticate a client...
2018/0103020 MULTI-LEVEL AUTHENTICATION USING PHONE APPLICATION LEVEL DATA
Embodiments of the present invention provide a multi-level authentication system to provide an additional level of authentication using phone application level...
2018/0103019 METHOD AND SYSTEM FOR AUTHENTICATING A USER BASED ON LOCATION DATA
Disclosed is a method of authenticating a user based on location data. The method includes receiving, using a communication device, a user location from a...
2018/0103018 SYSTEMS AND METHODS FOR EXECUTING CRYPTOGRAPHIC OPERATIONS ACROSS DIFFERENT TYPES OF PROCESSING HARDWARE
The present disclosure is directed towards systems and methods for executing cryptographic operations across different types of processing hardware. An...
2018/0103017 SERVICE PROCESSING METHOD AND ELECTRONIC DEVICE
The present disclosure relates to the field of terminal technologies, and discloses a service processing method and an electronic device. In the present...
2018/0103016 ENHANCING SECURITY OF APPLICATION DOWNLOADS
A computer-implemented method includes receiving download description information for an application from a network using an encrypted communications channel,...
2018/0103015 SYSTEM AND METHOD FOR AUTHENTICATING USERS
A security application for a computing device, e.g., a mobile phone, allows generation of a secret according to a unique user input (e.g., user credentials)....
2018/0103014 Systems to Implement Security in Computer Systems
Systems, methods, and non-transitory computer-readable medium are provided to secure data centers and cloud computing. A method receives network identifiers...
2018/0103013 EDGE SERVER, ENCRYPTION COMMUNICATION CONTROL METHOD THEREOF, AND TERMINAL
An edge server disposed on an edge of a cloud network, includes: a processor, wherein when encryption key information relating to a terminal which requests a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.