Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0152474 DOS DETECTION CONFIGURATION
A method for configuring a network monitoring device is provided. One or more performance metrics associated with one or more thresholds to be configured are...
2018/0152473 METHOD AND SYSTEM FOR CREATING AND DEPLOYING VIRTUAL ASSETS
A method and system include identifying a virtual asset creation template associated with virtual assets to be verified. A test virtual asset is generated...
2018/0152472 INVALIDITY DETECTION ELECTRONIC CONTROL UNIT, IN-VEHICLE NETWORK SYSTEM, AND COMMUNICATION METHOD
An invalidity detection electronic control unit connected to a bus used by a plurality of electronic control units (ECUs) to communicate with one another in...
2018/0152471 DETECTING COMPUTER SECURITY RISK BASED ON PREVIOUSLY OBSERVED COMMUNICATIONS
Information about an electronic message that is from a sender for an intended recipient is received. It is determined whether an electronic message account of...
2018/0152470 METHOD OF IMPROVING NETWORK SECURITY BY LEARNING FROM ATTACKERS FOR DETECTING NETWORK SYSTEM'S WEAKNESS
Being targeted by an attacker is unfortunate and being actually attacked is even worse. When this happens, it indicates there must be a weakness or...
2018/0152469 SYSTEMS AND METHOD FOR PROVIDING DYNAMIC COMPUTER NETWORKS IN WHICH BEHAVIOR MODELS DRIVE CYBER MISSION MODELS
Systems and methods for controlling operations of a computer network (100). The methods involve: generating programming instructions implementing a first...
2018/0152468 PROCESSING NETWORK DATA USING A GRAPH DATA STRUCTURE
Certain described examples are directed towards analyzing network data. The network data is processed to generate a graph data structure that has edges that...
2018/0152467 LEVERAGING SYNTHETIC TRAFFIC DATA SAMPLES FOR FLOW CLASSIFIER TRAINING
In one embodiment, a device in a network receives traffic data regarding a plurality of observed traffic flows. The device maps one or more characteristics of...
2018/0152466 ESTIMATING FEATURE CONFIDENCE FOR ONLINE ANOMALY DETECTION
In one embodiment, a device in a network obtains characteristic data regarding one or more traffic flows in the network. The device incrementally estimates an...
2018/0152465 DETECTION OF BOTNETS USING COMMAND-AND-CONTROL ACCESS PATTERNS
A method and device for detecting botnets in a cloud-computing infrastructure are provided. The method includes gathering data feeds over a predefined...
2018/0152464 DEVICE AND METHOD FOR DETECTING ATTACK IN NETWORK
An attack detection device includes a transceiver and a processor. The transceiver receives a message from a communication device in a network. The processor...
2018/0152463 SYSTEM AND METHOD FOR MALWARE DETECTION USING HASHING TECHNIQUES
A system and method in accordance with example embodiments may include systems and methods for generating and transforming data presentation. The method may...
2018/0152462 SYSTEM AND METHODS FOR SECURE SHORT MESSAGE SERVICE ENCRYPTION AND PROVISIONING
A device may receive an encrypted short message service (SMS) message en route from an originating device to a recipient device, the encrypted SMS message to...
2018/0152461 Secure Email Verification Service
Concepts and technologies are disclosed herein for providing and using a secure email verification service. A processor can receive verification data and...
2018/0152460 PERSISTENT MUTABLE SHARING OF ELECTRONIC CONTENT
A computing system is configured to provide access to electronic content. The computing system includes a processor, a data store, an access control system,...
2018/0152459 METHOD AND SYSTEM FOR COMPILING MAP DATA
In one embodiment, a method of compiling map data is disclosed. The method includes a server receiving an authorization request from a remote programmable...
2018/0152458 DIFFERENTIAL SECURITY POLICIES IN EMAIL SYSTEMS
A differential message security policy includes receiving information regarding activities of a user, determining a security risk for the user based on the...
2018/0152457 PROVIDING ACCESS WITH SEPARATE AUTHENTICATION TO SECURE CONTENT IN REPOSITORIES
A request from a user to access a report associated with one or more content items maintained by an electronic content management system can be received. A...
2018/0152456 SECURITY MODES FOR A COMPONENT-BASED WEB SECURITY MODEL
Disclosed are examples of systems, apparatus, methods and computer program products for providing a security model for component-based web applications....
2018/0152455 Remote Authentication in a Database System
A computer system is configured to provide a database system. The computer system comprises one or more processors, a primary database system implemented by...
2018/0152454 METHOD AND APPARATUS FOR MANAGING PROGRAM OF ELECTRONIC DEVICE
An electronic device and a program management method therefor are provided. The electronic device includes a communication interface, a memory, at least one...
2018/0152453 METHODS, SYSTEMS AND APPARATUS TO PREVENT UNAUTHORIZED MODEM USE
Methods and apparatus to prevent unauthorized modem use are disclosed. An example apparatus includes a locking circuit; and a host authorizer to, when a...
2018/0152452 RESOURCE BASED FRAMEWORK TO SUPPORT SERVICE PROGRAMMABILITY FOR A 5G OR OTHER NEXT GENERATION MOBILE CORE NETWORK
A programmable network architecture that employs a software based, modular functional infrastructure with standard interfaces is utilized for mobile core...
2018/0152451 TECHNIQUES AND ARCHITECTURES FOR SECURE SESSION USAGE AND LOGGING
Techniques for session security. Information corresponding to an electronic device used to access a resource is gathered. The information uniquely identifies...
2018/0152450 SECURE COMPONENT-BASED WEB APPLICATIONS
Disclosed are examples of systems, apparatus, methods and computer program products for providing a security model for component-based web applications....
2018/0152449 COMMUNICATING NOTIFICATIONS FROM A THIRD PARTY SYSTEM TO ONLINE SYSTEM USERS VIA THE ONLINE SYSTEM
To allow a third party system to more particularly identify sets of users for distributing content, an online system receives data from a third party system...
2018/0152448 PROVIDING DEVICES AS A SERVICE
Devices, such as hardware security modules, are provided as a service. A customer of a computing resource provider is able to request the addition of a device...
2018/0152447 NETWORK DEVICE AND METHOD FOR ACCESSING A DATA NETWORK FROM A NETWORK COMPONENT
A network device, two interfaces for connecting to an access-protected access point of a data network and to a network component which is to be allowed access...
2018/0152446 SYSTEM AND METHOD FOR SPEAKER RECOGNITION ON MOBILE DEVICES
A speaker recognition system for authenticating a mobile device user includes an enrollment and learning software module, a voice biometric authentication...
2018/0152445 METHOD AND APPARATUS FOR AUTHENTICATING USER
The present disclosure discloses a method and an apparatus for authenticating a user. A specific embodiment of the method comprises: receiving an...
2018/0152444 METHOD AND APPARATUS FOR MAKING A DECISION ON A CARD
Method and devices for making access decisions in a secure access network are provided. The access decisions are made by one or more portable credentials using...
2018/0152443 METHOD FOR VERIFYING AUTHENTICITY, CONFIGURING NETWORK CREDENTIALS AND CRYPTOGRAPHIC KEYS FOR INTERNET OF...
A method to securely send, to the device the cryptographic key and the local wireless network credentials with an authenticity verification to ensure that the...
2018/0152442 BLOCKCHAIN-SUPPORTED, HASH TREE-BASED DIGITAL SIGNATURE INFRASTRUCTURE
Transformations of digital records are used as lowest level inputs to a tree data structure having nodes computed as digital combinations of child node values...
2018/0152441 AUTHORITY VERIFICATION SYSTEM, AUTHORITY VERIFICATION METHOD, AND COMPUTER-READABLE STORAGE MEDIUM
A per-resource user authority management unit that manages user authorities per resource, a user authority refinement unit that refines authorities linked to a...
2018/0152440 SINGLE SIGN-ON FRAMEWORK FOR BROWSER-BASED APPLICATIONS AND NATIVE APPLICATIONS
Disclosed are various approaches for providing single sign-on capabilities for a user on a client device. A user's credentials can be authenticated by an...
2018/0152439 SINGLE SIGN-ON FRAMEWORK FOR BROWSER-BASED APPLICATIONS AND NATIVE APPLICATIONS
Disclosed are various approaches for providing single sign-on capabilities for a user on a client device. A user's credentials can be authenticated by an...
2018/0152438 COMMON CACHE POOL FOR APPLICATIONS
A system having a common cache pool (CCP) includes a computing device having a plurality of applications executable on the computing device, each of the...
2018/0152437 Communication Terminal, Communication Method, Program, and Communication System
There is provided a communication terminal including a transmission controller configured to allow transmission of, to a verification target device,...
2018/0152436 RELIABLE SELECTION OF SECURITY COUNTERMEASURES
Among other things, this document describes a computer-implemented security method such as for authenticated selection of security countermeasures and for...
2018/0152435 SYSTEM AND METHODS FOR SECURE ENTRY OF A PERSONAL IDENTIFICATION NUMBER (PIN)
Systems and methods for credential character selection are provided. The system includes one or more sensors configured to detect a character selection and...
2018/0152434 VIRTUAL CONTENT REPOSITORY
Disclosed are various examples for facilitating access to files in a virtual content repository. In one example, a request to access a file is transmitted to a...
2018/0152433 SECURE METHOD FOR MTC DEVICE TRIGGERING
Upon receiving a triggering message from a MTC server (20), a network (10) verifies if the MTC server (20) is authorized to trigger a target MTC device (30)...
2018/0152432 SECURE METHOD FOR MTC DEVICE TRIGGERING
Upon receiving a triggering message from a MTC server (20), a network (10) verifies if the MTC server (20) is authorized to trigger a target MTC device (30)...
2018/0152431 METHOD OF SELECTING A WEBSITE FOR DISPLAYING IN A WEB BROWSER QUICK-ACCESS FIELD
A method of selecting websites for displaying in a quick-access field in a web browser is provided. The method includes receiving an indication of user's...
2018/0152430 INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING TERMINAL, AND INFORMATION PROCESSING METHOD
An information processing system is provided that includes a cloud server and an information processing terminal. The cloud server includes a storage device...
2018/0152429 SYSTEMS AND METHODS FOR PUBLICLY VERIFIABLE AUTHORIZATION
Systems and computer-implemented methods are provided for publicly verifiable authorization using a distributed public data structure. A central authorization...
2018/0152428 SINGLE KEY AUTHENTICATION METHOD
Systems, methods, and computer-readable media are disclosed for obtaining authenticated access to a service provider system, or more specifically, to a user...
2018/0152427 PROTECTING A WEB SERVER AGAINST AN UNAUTHORIZED CLIENT APPLICATION
An approach is provided for securing communication between a server computer and a client computer. A first string is sent to the client in response to a...
2018/0152426 AUTHENTICATION OF USERS IN A COMPUTER NETWORK
Apparatuses and methods for authenticating a user to a host by an agent are disclosed. In the method the agent receives a connection request to the host from...
2018/0152425 RESTRICTING BROADCAST AND MULTICAST TRAFFIC IN A WIRELESS NETWORK TO A VLAN
Traffic broadcast to a VLAN is restricted. To do so, a plurality of stations are associated with a BSSID (basic service set identifier). A first VLAN is...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.