Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0115585 AUTOMATED SECURITY POLICY
There is disclosed a computing apparatus, including: a hardware platform; a service mapping requirements table including a plurality of components and having...
2018/0115583 INHIBITING ELECTROMAGNETIC FIELD-BASED EAVESDROPPING
A technique includes performing a plurality of instances of retrieving components of a security key from a plurality of locations of an electronic device and...
2018/0115582 REAL-TIME CLOUD-BASED DETECTION AND MITIGATION OF DNS DATA EXFILTRATION AND DNS TUNNELING
Various embodiments of the invention disclosed herein provide techniques for managing a domain name system (DNS) based attack. An exfiltration and tunneling...
2018/0115581 SOFTWARE DEFINED NETWORK FOR PREVENTING AN ATTACK ON A HOST TRACKING SERVICE AND CONTROLLER INCLUDED IN THE SAME
Software defined network (SDN) for preventing an attack on a host tracking service and a controller included in the same are disclosed. The SDN comprises a...
2018/0115580 SECURITY APPLIANCE
A security appliance may incorporate a touch screen or similar input/output interface, providing command and control over network functionality and...
2018/0115579 MONITORING THE SECURITY STRENGTH OF A CONNECTION
Systems, methods, and software can be used to monitor the security strength of a connection. In some aspect, a request to connect to an application server is...
2018/0115578 METHODS AND SYSTEMS FOR DEEP LEARNING BASED API TRAFFIC SECURITY
The present invention relates to the field of networking and API/application security. In particular, the invention is directed towards methods, systems and...
2018/0115577 SYSTEM AND METHOD FOR DETECTING AND MITIGATING RANSOMWARE THREATS
This disclosure relates generally to malware detection, and more particularly to system and method for detecting and mitigating ransomware threats. For a User...
2018/0115576 METHODS AND SYSTEMS FOR TRANSMITTING PERFORMANCE BEACONS FROM AN EMBEDDED DEVICE
A network sensor, inserted into a mirror port of a network switch or router, may be configured to monitor the network traffic originating from an embedded...
2018/0115575 ATTACK DETECTION METHOD, ATTACK DETECTION DEVICE AND BUS SYSTEM FOR A MOTOR VEHICLE
An attack detection method for a bus system of a motor vehicle, wherein communication rules for transmitting messages are determined for the bus system. The...
2018/0115574 METHODS AND SYSTEMS FOR DETECTING ANOMALOUS BEHAVIOR OF NETWORK-CONNECTED EMBEDDED DEVICES
A network sensor, inserted into a mirror port of a network switch or router, may be configured to monitor the network traffic originating from an embedded...
2018/0115573 PHISHING DETECTION WITH MACHINE LEARNING
A system and method for identifying a phishing website is disclosed. Content associated with a website that a user is attempting to access is retrieved and...
2018/0115572 METHODS AND SYSTEMS FOR DETECTING AN ELECTRONIC INTRUSION
Systems and methods for detecting an electronic intrusion are described. The system receives an indication of a user activity for a user account for a service...
2018/0115571 DETECTING PAST INTRUSIONS AND ATTACKS BASED ON HISTORICAL NETWORK TRAFFIC INFORMATION
A device may receive information that identifies an attack signature for detecting an intrusion. The device may determine a device configuration that is...
2018/0115570 SYSTEM AND METHOD FOR CATEGORIZING MALWARE
A system for categorizing malware threat names comprising a malware correlator and a frequency graph constructor engine based on a malware virus predicate. The...
2018/0115569 CYBER SECURITY
A method of automatically structuring data mining of computer networks is provided. The method obtains a first set of rules that define a valid transaction...
2018/0115568 METHOD AND DEVICE FOR DETECTING NETWORK INTRUSION
The present disclosure provides a method and a device for detecting network intrusion. The method includes: obtaining a feature vector of a network flow to be...
2018/0115567 LEARNED PROFILES FOR MALICIOUS ENCRYPTED NETWORK TRAFFIC IDENTIFICATION
A method for identifying malicious encrypted network traffic associated with a malware software component communicating via a network, the method including:...
2018/0115566 MALICIOUS ENCRYPTED NETWORK TRAFFIC IDENTIFICATION USING FOURIER TRANSFORM
A method for identifying malicious encrypted network traffic communicated via a network between a first and second computer system, the method including:...
2018/0115565 PHISHING DETECTION WITH MACHINE LEARNING
A system and method for identifying a phishing website is disclosed. Content associated with a website that a user is attempting to access is retrieved and...
2018/0115564 SYSTEM AND METHOD THEREOF FOR IDENTIFYING AND RESPONDING TO SECURITY INCIDENTS BASED ON PREEMPTIVE FORENSICS
A system is connected to a plurality of user devices coupled to an enterprise's network. The system continuously collects, stores, and analyzes forensic data...
2018/0115563 Mitigation of Malicious Software in a Mobile Communications Network
There are provided measures for mitigation of malicious software in a mobile communications network. An example measure includes monitoring network traffic on...
2018/0115562 PACKET ANALYSIS DEVICE AND PACKET ANALYSIS METHOD
In order to allow a DPI device to determine whether a protocol library needs to be updated, this packet analysis device is provided with: a protocol library...
2018/0115561 Distributed Estimation and Detection of Anomalies in Control Systems
Methods and Systems for detecting anomalies in a control area of a control system. Estimating for the control area, a first state from a historical state over...
2018/0115560 METHOD OF VERIFICATION
The present invention relates to a method of verification of a communicating party. In particular, the invention relates to a method of verifying the identity...
2018/0115559 AGGREGATION AND PROVISION OF VERIFICATION DATA
A computer implemented system comprises one or more data stores storing in one or more entity-specific data locations entity access protocols for determining...
2018/0115558 FAST MULTICAST MESSAGING ENCRYPTION AND AUTHENTICATION
To prevent legitimate message recipients from forging new messages and to encrypt messages for a specific set of recipients (channel), a root key is encrypted...
2018/0115557 CLICKJACKING PREVENTION
Systems and methods provide for clickjacking prevention code provided in an embedded webpage to prevent clickjacking when the embedded webpage is called by an...
2018/0115556 Systems and Methods of Restricting File Access
Example embodiments of the system and methods disclosed herein include receiving a request of a file from a guest of a website, determining that it is access...
2018/0115555 AUTHENTICATING DATA TRANSFER
In an embodiment, a method for authenticating data transfer is provided. A user-agent is redirected between an enterprise, an intermediary platform, and an...
2018/0115554 SYSTEM AND METHOD FOR ARCHITECTURE INITIATED NETWORK ACCESS CONTROL
A system and method are provided for authenticating a user using a client side server within a computer network, the computer network operating in conformance...
2018/0115553 TRANSPARENT ASYNCHRONOUS NETWORK FLOW INFORMATION EXCHANGE
A method for providing a transparent asynchronous network flow exchange is provided. The method may include receiving a query request from a requester, whereby...
2018/0115552 METHODS, SYSTEMS, AND APPARATUSES OF SERVICE PROVISIONING FOR RESOURCE MANAGEMENT IN A CONSTRAINED ENVIRONMENT
The disclosure provides a service provisioning method to support configurations of admission control, and resource control policies for constrained devices by...
2018/0115551 PROXY SYSTEM FOR SECURELY PROVISIONING COMPUTING RESOURCES IN CLOUD COMPUTING ENVIRONMENT
A computer process includes, but is not limited to, obtaining cloud credential data for accessing one or more cloud accounts of a cloud computing system having...
2018/0115550 AUTHORIZATION TO ACCESS A SERVER IN THE CLOUD WITHOUT OBTAINING AN INITIAL SECRET
A method and system provides access control for sensitive data. An access control system defines a plurality of access policies for gaining access to the...
2018/0115549 METHODS AND NODES FOR HANDLING ACCESS TO A SERVICE VIA AN UNTRUSTED NON-3GPP NETWORK
Embodiments herein relate to a 3rd Generation Partnership Project, 3GPP, infrastructure node, a method in the 3GPP infrastructure node, 3GPP Access,...
2018/0115548 APPARATUS AND METHOD FOR INSSEC PACKET GENERATION
Techniques are provided herein to achieve data security and integrity using the cryptographic machinery of IEEE MACSec for TCP or UDP packets, for example,...
2018/0115547 EDGE PROTECTION FOR INTERNAL IDENTITY PROVIDERS
Systems and methods for edge protection for internal identity providers are provided. A first claimed embodiment of the present disclosure involves a method...
2018/0115546 INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING SYSTEM, AND INFORMATION PROCESSING METHOD
A non-transitory, computer-readable recording medium having stored therein a program for causing a computer execute a process of transmitting a first random...
2018/0115545 DIGITAL IDENTITY CARD MANAGEMENT
Embodiments of the present invention provide methods, program products and systems to reduce mistakes in production and management of digital identification...
2018/0115544 Protecting Network Communication Security
A method and apparatus for protecting a network communication security. In one embodiment, there is provided a method for protecting network communication...
2018/0115543 METHODS AND SYSTEMS FOR PROVIDING A ONLINE COMMUNICATION PLATFORM FOR A TARGETED COMMUNITY OF PEOPLE
The method for providing an online communication platform for a targeted community of people, by choosing a community of people, and identifying a product...
2018/0115542 SECURITY MECHANISM FOR MULTI-TIERED SERVER-IMPLEMENTED APPLICATIONS
A facility providing securely for a multi-tiered server-implemented application is described. The facility receives in a back-end application service a request...
2018/0115541 Method for Distributed Application Segmentation Through Authorization
Methods and supporting systems for managing secure communications and establishing authenticated communications between processes of a computer application...
2018/0115540 REAL-TIME ELECTRONIC EVENT PROCESSING AND IDENTITY VALIDATION SYSTEM
Disclosed is an event processing and identity validation system. The system typically includes a processor, a memory, and an event processing and identity...
2018/0115539 System and Method for Massive loT Group Authentication
It is possible to reduce singling overhead in a radio access network by coordinating authentication of a group of UEs (e.g., IoT devices, etc.) via a master...
2018/0115538 Methods And Apparatus For Recording A Change Of Authorisation State Of One Or More Authorisation Agents
Roughly described, a method of recording a change of authorisation state of one or more authorisation agents, the method comprising: establishing a copy of a...
2018/0115537 METHOD AND SYSTEM FOR PROTECTING USER DATA USING INDIVIDUALIZED KEYS TO ENABLE SECURE COMPARTMENTALIZED DATA...
A data management system is provided. The system includes at least one processor, configured to couple to a plurality of domains of a storage memory. The at...
2018/0115536 Reconfigurable Access Network Encryption Architecture
An access platform or other network elements can include multiple line cards configured to encrypt data. The platform and/or each of the line cards may receive...
2018/0115535 Blind En/decryption for Multiple Clients Using a Single Key Pair
Different clients encrypt secrets using a server's public RSA key, blind them using randomly generated onetime use blinding factors, and bind them to unique...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.