Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0159901 METHOD FOR SETTING UP A WebRTC SESSION
Some embodiments relate to a method implemented by a first terminal for setting up a session with a second terminal. An identifier of a session server is...
2018/0159900 DATA PROCESSING SYSTEMS AND METHODS FOR PERFORMING PRIVACY ASSESSMENTS AND MONITORING OF NEW VERSIONS OF...
In various embodiments, a data map generation system is configured to: (1) enable a user to specify one or more criteria; (2) identify one or more data flows...
2018/0159899 USER INTERFACE FOR LOW-TOUCH SECURITY POLICY PROVISIONING
In one embodiment, a system includes a processor, and a memory to store data used by the processor, the processor being operative to prepare a first user...
2018/0159898 ANALYSIS OF NETWORK TRAFFIC RULES AT A NETWORK VISIBILITY NODE
Techniques are disclosed for monitoring usage of network traffic rules applied by devices on a computer network. Operations in accordance with the disclosed...
2018/0159897 SECURITY SYSTEM, SECURITY METHOD, AND RECORDING MEDIUM FOR STORING PROGRAM
Provided is a security system or the like with which security can be improved. A security system according to one embodiment of the present invention is...
2018/0159896 ENHANCED COMPUTING SYSTEM SECURITY USING A SECURE BROWSER
Described herein are systems, methods, and software to provide secure browsers to end user devices. In one implementation, a secure browsing service receives,...
2018/0159895 Method, Apparatus and System for Quantifying Defense Result
A method including acquiring a suspect data traffic set, the suspect data traffic set including data traffic corresponding to each suspect IP address in a...
2018/0159894 AUTOMATIC THRESHOLD LIMIT CONFIGURATION FOR INTERNET OF THINGS DEVICES
Presented herein are techniques for mitigating a distributed denial of service attack. A method includes, at a network security device, such as a firewall,...
2018/0159893 CLASSIFYING KILL-CHAINS FOR SECURITY INCIDENTS
Systems, methods, and software described herein provide security actions based on the current state of a security threat. In one example, a method of operating...
2018/0159892 RUNTIME PROTECTION OF WEB SERVICES
Protecting a runtime Web service application. A web service application is instrumented to log its operation and allow recreation of its execution trace. Trace...
2018/0159891 THREAT DETECTION AND MITIGATION THROUGH RUN-TIME INTROSPECTION AND INSTRUMENTATION
A graph of a plurality of resources in a computing environment is generated, with the graph associating a first resource of the plurality with a second...
2018/0159890 MODELING OF ATTACKS ON CYBER-PHYSICAL SYSTEMSCYBER-PHYSICAL SYSTEMS
Techniques of preventing sabotage attacks in cyber-physical systems involve automatically identifying links between nodes of a graph representing...
2018/0159889 SYSTEMS AND METHODS FOR AN ARTIFICIAL INTELLIGENCE DRIVEN SMART TEMPLATE
The present disclosure describes systems and methods for determining a subsequent action of a simulated phishing campaign. A campaign controller identifies a...
2018/0159888 SYSTEMS AND METHODS FOR AN ARTIFICIAL INTELLIGENCE DRIVEN SMART TEMPLATE
The present disclosure describes systems and methods for using a template for a simulated phishing campaign, A database includes a plurality of templates for...
2018/0159887 ENTERPRISE LEVEL CYBERSECURITY AUTOMATIC REMEDIATION
Automatic detection and remediation of cybersecurity threats to an information technology installation is disclosed. An information technology installation...
2018/0159886 SYSTEM AND METHOD FOR ANALYZING FORENSIC DATA IN A CLOUD SYSTEM
Disclosed is a system for the analysis of forensic data, wherein the forensic data is present in a cloud system. The system has an analysis unit for analysing...
2018/0159885 Identifying Matching Event Data from Disparate Data Sources
Methods and apparatus consistent with the invention provide the ability to organize and build understandings of machine data generated by a variety of...
2018/0159884 DTAT STREAM SURVEILLANCE, INTELLIGENCE AND REPORTING
A method for monitoring and securing interprogram communications between a plurality of business applications in a network includes gathering, using a...
2018/0159883 RULE-BASED NETWORK-THREAT DETECTION
A packet-filtering device may receive packet-filtering rules configured to cause the packet-filtering device to identify packets corresponding to ...
2018/0159882 SYSTEM AND METHODS TO PREVENT SECURITY BREACHING BY AUTHORIZED USERS IN A CLOUD ENVIRONMENT
A system to facilitate preventing security breach of internal organizational resources by authorized system users. Resource access analysis prevents breaching...
2018/0159881 AUTOMATED CYBER PHYSICAL THREAT CAMPAIGN ANALYSIS AND ATTRIBUTION
A system for automated cyber physical threat campaign analysis and attribution, comprising a multi-dimensional time series and graph hybrid data server, an...
2018/0159880 TECHNOLOGIES FOR SECURE PERSONALIZATION OF A SECURITY MONITORING VIRTUAL NETWORK FUNCTION
Technologies for secure personalization of a security monitoring virtual network function (VNF) in a network functions virtualization (NFV) architecture...
2018/0159879 SYSTEMS AND METHODS FOR CYBER-ATTACK DETECTION AT SAMPLE SPEED
A threat detection model creation computer receives normal monitoring node values and abnormal monitoring node values. At least some received monitoring node...
2018/0159878 ATTACKING NODE DETECTION APPARATUS, METHOD, AND NON-TRANSITORY COMPUTER READABLE STORAGE MEDIUM THEREOF
An attacking node detection apparatus, method, and computer program product thereof are provided. The attacking node detection apparatus is stored with a...
2018/0159877 MULTI-MODE BOUNDARY SELECTION FOR THREAT DETECTION IN INDUSTRIAL ASSET CONTROL SYSTEM
According to some embodiments, streams of monitoring node signal values may be received over time that represent a current operation of an industrial asset...
2018/0159876 Consolidating structured and unstructured security and threat intelligence with knowledge graphs
An automated method for processing security events. It begins by building an initial version of a knowledge graph based on security information received from...
2018/0159875 Using electronic game as means of data acquisition
Special electronic cyber security simulator game with programmable real-life situations will allow collection of sufficient quantity of controlled attacker...
2018/0159874 UNWANTED TUNNELING ALERT SYSTEM
Various systems and methods are provided that detect malicious network tunneling. For example, VPN logs and data connection logs may be accessed. The VPN logs...
2018/0159873 PUSH NOTIFICATIONS OF SYSTEM EVENTS IN A RESTRICTED NETWORK
Methods, computing systems and computer program products implement embodiments of the present invention that include associating a token with a computing...
2018/0159872 Systems and Methods of Viral Enablement of Features by Peer-to-Peer Connection
The technology disclosed relates to identifying and notifying a user of nearby attendees at a mega attendance event who are in user's social graph by comparing...
2018/0159871 Machine Learning Based Malware Detection System
There are provided measures for machine learning based malware detection systems. Such measures exemplarily include analyzing a set of training data, said set...
2018/0159870 COMMUNICATION METHOD, PROGRAM AND COMMUNICATION DEVICE USING SAME
A communication device includes: a communication section that transmits and receives a message in a network; an acquisition unit that acquires state...
2018/0159869 Method, Mobile Switching Centre, MSC, and a Computer Program Product for Detecting Interconnect Bypass
A method for detecting interconnect bypass by a subscription identity in a telecommunication network, said telecommunication network comprising at least a...
2018/0159867 DATA PROTECTION METHOD AND DATA PROTECTION SYSTEM
A data protection method includes: detecting whether a web transmission behavior occurs or not; analyzing a transmitter and a first file of the web...
2018/0159866 Computer Malware Detection
According to the presently disclosed subject matter, malware induced data compression is harnessed for detecting infection of a host computer by the malicious...
2018/0159865 SYSTEM AND METHOD FOR MESSAGE RECIPIENT VERIFICATION
An electronic device includes a communication interface and at least one processor configured for: transmitting to or receiving from a second electronic device...
2018/0159864 DOUBLE WRITE DATA EXCHANGE IN A DEAD DROP NETWORK ARCHITECTURE
A sender uses a double-write protocol to pass data to a recipient using a dead drop network architecture. The sender sends, to a dead drop domain, a data...
2018/0159863 TECHNIQUES FOR DYNAMIC ENPOINT SECURE LOCATION AWARENESS
Techniques for dynamic endpoint secure location awareness may include determining that a mobile device changed locations. A platform security engine in the...
2018/0159862 CBR-Based Negotiation RBAC Method for Enhancing Ubiquitous Resources Management
A CBR-based negotiation RBAC method for ubiquitous resources management is described. The method, which is applicable to serving servers, includes steps of...
2018/0159861 ACCESS GUARDS FOR MULTI-TENANT LOGGING
A multi-tenant logging system that allows a user to have an individual profile that controls the user's access to tenant logs is provided. The system includes...
2018/0159860 PACKET VALIDATION IN VIRTUAL NETWORK INTERFACE ARCHITECTURE
Roughly described, a network interface device receiving data packets from a computing device for transmission onto a network, the data packets having a certain...
2018/0159859 Rolling Security Platform
A method of rolling security for a system that includes multiple server groups, such as a first server group of one or more servers and a second server group...
2018/0159858 CONTENT SUGGESTION MECHANISM
A method to facilitate control of media content access is disclosed. The method includes acquiring relationship information from one or more external sources,...
2018/0159857 INTEGRATED ACTIVITY MANAGEMENT SYSTEM AND METHOD OF USING SAME
An integrated activity management system and method for a firm comprising at least one user is disclosed. The system includes at least one communicator, at...
2018/0159856 Secure Access To On-Premises Web Services From Multi-Tenant Cloud Services
Methods, systems, and computer-readable media for using a multi-tenant web relay service to provide secure access to on-premises web services from a...
2018/0159855 METHOD AND APPARATUS FOR REGISTERING DEVICE IN CLOUD SERVER
An apparatus and a method for registering a device in a cloud server are provided. The apparatus includes detecting the device by using short-range...
2018/0159854 SECURE MOBILE ACCESS FOR AUTOMATION SYSTEMS
An industrial automation and control system is provided with a control unit and at least one electronic device. The system establishes a first data connection...
2018/0159853 HOME NETWORK SYSTEM USING Z-WAVE NETWORK AND HOME AUTOMATION DEVICE CONNECTION METHOD USING SAME
A home network system using a Z-Wave network according to the present invention includes: at least one home automation device connected to the Z-Wave network...
2018/0159852 CONTEXTUAL AND RISK-BASED MULTI-FACTOR AUTHENTICATION
A system for contextual and risk-based multi-factor authentication having a multi-dimensional time series data server configured to monitor and record a...
2018/0159851 Facilitating Network Security Analysis Using Virtual Reality Display Devices
A virtual reality system including a virtual reality user device with a display that presents a virtual reality environment to a user, an electronic transfer...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.