Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0124094 METHODS AND SYSTEMS FOR RANKING, FILTERING AND PATCHING DETECTED VULNERABILITIES IN A NETWORKED SYSTEM
Systems and methods for determining priority levels to process vulnerabilities associated with a networked computer system can include a data collection engine...
2018/0124093 DETECTION OF VULNERABLE WIRELESS NETWORKS
A method and system for detecting vulnerable wireless networks coexisting in a wireless environment of an organization are provided. The method includes...
2018/0124089 SECURE DIGITAL TRAFFIC ANALYSIS
A network monitoring "sensor" is built on initial startup by checking the integrity of the bootstrap system and, if it passes, downloading information from...
2018/0124088 SECURE DIGITAL TRAFFIC ANALYSIS
A network monitoring "sensor" is built on initial startup by checking the integrity of the bootstrap system and, if it passes, downloading information from...
2018/0124087 METHOD, APPARATUS, AND SYSTEM FOR DETECTING TERMINAL DEVICE ANOMALY
Embodiments of the present invention provide a method, an apparatus, and a system for detecting a terminal device anomaly. A PGW obtains abnormal event...
2018/0124086 COLD START MECHANISM TO PREVENT COMPROMISE OF AUTOMATIC ANOMALY DETECTION SYSTEMS
In one embodiment, a device in a network analyzes data indicative of a behavior of a network using a supervised anomaly detection model. The device determines...
2018/0124085 Extracting Encryption Metadata and Terminating Malicious Connections Using Machine Learning
A network traffic hub extracts encryption metadata from messages establishing an encrypted connection between a smart appliance and a remote server and...
2018/0124083 LOG ANALYZING SYSTEM AND METHOD
Proposed are a log analyzing system and a log analyzing method capable of more effectively defending a control system from unauthorized access. The log...
2018/0124082 CLASSIFYING LOGINS, FOR EXAMPLE AS BENIGN OR MALICIOUS LOGINS, IN PRIVATE NETWORKS SUCH AS ENTERPRISE NETWORKS...
Logins within a private network are classified as benign or malicious by (a) receiving login patterns within a private network, wherein each login pattern...
2018/0124080 Methods and Systems for Anomaly Detection Using Functional Specifications Derived from Server Input/Output...
Various embodiments include methods of protecting a computing device within a network from malware or other non-benign behaviors. A computing device may...
2018/0124079 SYSTEMS AND METHODS FOR PROCESSING HYPERVISOR-GENERATED EVENT DATA
Systems, methods, and apparatuses enable a network security system to more efficiently process and respond to events generated by hypervisors and other...
2018/0124078 Dynamic Reputation Indicator For Optimizing Computer Security Operations
Described systems and methods allow protecting a computer system from malware such as viruses, worms, and spyware. A reputation manager executes on the...
2018/0124074 PROBE COUNTER STATE FOR NEIGHBOR DISCOVERY
Examples disclosed herein relate to security actions that can be taken at a network appliance based on a received copy of a neighbor discovery packet. The...
2018/0124071 COLLABORATIVE CONTENT EVALUATION
In an example embodiment, a system for evaluating published content is provided. The system includes at least one processor and a plurality of components...
2018/0124069 DYNAMIC SELECTION AND GENERATION OF A VIRTUAL CLONE FOR DETONATION OF SUSPICIOUS CONTENT WITHIN A HONEY NETWORK
Techniques for dynamic selection and generation of detonation location of suspicious content with a honey network are disclosed. In some embodiments, a system...
2018/0124068 PROTOCOLS FOR ACCESSING HOSTS
Techniques and technologies for protocols for accessing hosts are described. In at least some embodiments, a system includes a processing component, and a host...
2018/0124065 Detecting Impossible Travel in the On-Premise Settings
Determining impossible travel for a specific user entity associated with an on-premises site. A method includes identifying an estimated location of an...
2018/0124064 SEPARATED APPLICATION SECURITY MANAGEMENT
A virtualization environment is provided to include a security management instance and an application instance. The application instance is separated from the...
2018/0124062 System And Method For Controlling Access Of Users To Sensitive Information Content In An Organization
An enterprise security system for controlling access of users to sensitive information content in an organization is provided herein. The system includes a...
2018/0124057 DIFFERENTIATED CONTAINERIZATION AND EXECUTION OF WEB CONTENT BASED ON TRUST LEVEL AND OTHER ATTRIBUTES
Systems and methods may provide for receiving web content and determining a trust level associated with the web content. Additionally, the web content may be...
2018/0124055 DECOUPLING CONTAINER IMAGE LAYERS TO PRESERVE PRIVACY
An example system includes a memory, one or more processors in communication with the memory, and a container image generator. The container image generator...
2018/0124054 PARAMETER BASED DATA ACCESS ON A SECURITY INFORMATION SHARING PLATFORM
Example implementations relate to a security information sharing platform that enables sharing of security information among a plurality of members. For...
2018/0124053 AUTHENTICATED ACCESS TO CACHEABLE SENSOR INFORMATION IN INFORMATION CENTRIC DATA NETWORK
In one embodiment, a method comprises: receiving, by a requestor device in a data network, authentication request parameters for generating a secured request...
2018/0124051 Response Method and System in Virtual Network Computing Authentication, and Proxy Server
A response method and system in virtual network computing authentication, and a proxy server, where the method includes receiving, by a proxy server, a...
2018/0124045 CAPTCHA SYSTEMS AND METHODS
Systems and methods for verifying human users through cognitive processes that computers cannot imitate are described herein. Human cognitive language...
2018/0124042 ACCELERATING OCSP RESPONSES VIA CONTENT DELIVERY NETWORK COLLABORATION
Techniques are disclosed for accelerating online certificate status protocol (OCSP) response distribution to relying parties using a content delivery network...
2018/0124040 METHODS AND SYSTEMS FOR REMOTE ACCESS TO A TRANSPORATION VEHICLE SYSTEM
Methods and systems for a transportation vehicle are provided. For example, one method includes storing or installing a security certificate in a portable...
2018/0124037 IDENTIFICATION OF A RELATED COMPUTING DEVICE FOR AUTOMATIC ACCOUNT LOGIN
In an implementation of identifying related computing devices for automatic user account login, a login request to a user account that includes a unique...
2018/0124036 FACILITATING USERS TO OBFUSCATE USER CREDENTIALS IN CREDENTIAL RESPONSES FOR USER AUTHENTICATION
A system and method for facilitating users to obfuscate user credentials in credential responses for user authentication are disclosed. A string sequence may...
2018/0124034 IMAGE BASED METHOD, SYSTEM AND COMPUTER PROGRAM PRODUCT TO AUTHENTICATE USER IDENTITY
An authentication process is disclosed which authenticates a user identity with a password that includes at least one portion based on an image that is saved...
2018/0124030 Need Based Controller Area Network Bus Authentication
Systems and methods are provided and include a control module that receives a communication packet from a communication node that includes at least one of a...
2018/0124015 Transparent Traffic Control Device and Method
A firewall security platform is provided for enhancing security of a network. The firewall security platform includes at least one interface to communicate the...
2018/0124014 SECURITY INFORMATION AND EVENT MANAGEMENT
Systems and methods are described for conducting work flows by an SIEM device to carry out a complex task automatically. According to one embodiment, an SIEM...
2018/0124010 IDENTIFYING ALGORITHMICALLY GENERATED DOMAINS
Examples relate to identifying algorithmically generated domains. In one example, a computing device may: receive a query domain name; provide the query domain...
2018/0124009 SYSTEMS, METHODS, AND APPARATUS TO FACILITATE MAPPING A DEVICE NAME TO A HARDWARE ADDRESS
Systems, methods, and apparatus to identify media devices are disclosed. An example apparatus includes a listing retriever to retrieve a list of device names...
2018/0124008 Network Topology-Preserving Internet Protocol Address Anonymization
Anonymization of IP addresses of a network while preserving a topology of the network is provided. Information is received regarding a network topology. The...
2018/0124007 HASHES OF EMAIL TEXT
Examples described herein include receiving text of an email, determining a header of an email message in the email, and determining a body of the email...
2018/0124006 BLINDER AVOIDANCE IN SOCIAL NETWORK INTERACTIONS
A method, system and computer program product for blinder avoidance in social networking interactions includes executing a social networking data processing...
2018/0124003 SYSTEMS AND METHODS FOR ELECTRONIC COMMUNICATION USING UNIQUE IDENTIFIERS ASSOCIATED WITH ELECTRONIC ADDRESSES
A method and system for electronically communicating with a user knowing only a unique identifier associated with that user is described. An electronic message...
2018/0124001 TECHNIQUES FOR SUPERVISING COMMUNICATIONS FROM MULTIPLE COMMUNICATION MODALITIES
Provided herein are methods, systems, and computer-program products for providing a supervision system for review of one or more communications associated with...
2018/0124000 E-MAIL WITH SMART REPLY AND ROAMING DRAFTS
An electronic mail computing system has a smart reply system that that enables a smart reply feature that surfaces a user input mechanism that allows a user to...
2018/0123999 TRACKING CLIENT LOCATION USING BUCKETS
An example system includes a processor to receive a client location request from a first client and forward the client location request to a remote server...
2018/0123995 SHARED COMMENTS FOR VISUALIZED DATA
A system includes presentation of a visualization of a result set, the visualization including a plurality of graphical representations, each of the plurality...
2018/0123993 METHOD AND APPARATUS FOR FILTERING A PLURALITY OF MESSAGES
An electronic apparatus for filtering a plurality of messages and a method thereof are disclosed. The method includes displaying at least some of the plurality...
2018/0123991 MOBILE DEVICE AND INSTANT MESSAGING RECORD OPERATING METHOD THEREOF
A mobile device and an instant messaging record operating method thereof are provided. The mobile device receives an identifying input from a user while...
2018/0123990 IMAGE FEEDING SERVER NETWORK
Technology is disclosed for feeding source images from image stores of client systems into an image processing system using image feeding servers ("the...
2018/0123987 VIRTUAL AREA COMMUNICATIONS
A virtual area has a spatial visualization and includes zones that are associated with respective geometric boundaries located in relation to the spatial...
2018/0123982 DATA PACKET PROCESSING IN SDN
The present invention discloses a method and apparatus for processing a data packet in a software defined network SDN protocol-based network. The method...
2018/0123981 SYSTEM AND METHOD FOR SUPPORTING EFFICIENT LOAD-BALANCING IN A HIGH PERFORMANCE COMPUTING (HPC) ENVIRONMENT
Methods and systems for supporting efficient load balancing among a plurality of switches and a plurality of end nodes arranged in a tree topology in a network...
2018/0123976 CHANNEL-BASED MANDATORY ACCESS CONTROLS
Systems and methods for enforcing mandatory access control in a message-based operating system are provided. Calls to operating system logic may be passed as...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.