Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0176260 Distributed Behavioral Monitoring
There are provided measures for improvement of distributed behavioral monitoring. Such measures exemplarily include receiving activity data indicative of a...
2018/0176259 SYSTEM AND METHOD FOR AUTOMATIC DATA PROTECTION IN A COMPUTER NETWORK
A method of protecting data items in an organizational computer network, including, defining multiple information profiles for classifying the data item,...
2018/0176258 METHOD FOR IMPLEMENTING SECURITY RULES IN A TERMINAL DEVICE
A method for implementing security rules in a terminal device is provided with a first secure element and one or more second secure elements comprises the step...
2018/0176257 RULE PLACEMENT IN NETWORK DEVICES
A device receives a new rule construct that includes a source address or a destination address, and at least one parameter, where the new rule construct...
2018/0176256 Temporal Control and Access Control of Emails
A sender device includes a non-transitory memory storage comprising instructions and a temporal control policy, and a processor coupled to the memory. The...
2018/0176255 NATIVE TAG-BASED CONFIGURATION FOR WORKLOADS IN A VIRTUAL COMPUTING ENVIRONMENT
A method of configuring networking, security, and operational parameters of workloads deployed in a virtualized computing environment includes the steps of:...
2018/0176254 COMPLIANCE MONITORING
Systems, methods, and related technologies for device compliance monitoring are described. In certain aspects, one or more compliance rules associated with a...
2018/0176253 PLACEMENT OF OPERATORS AND ENCRYPTION OF COMMUNICATION BASED ON RISK IN A COMPUTER SYSTEM NODE
A streams manager assesses the security risk of streaming communication and dynamically migrates operators of a streaming application based on the security...
2018/0176252 APPLICATION TEMPLATE GENERATION AND DEEP PACKET INSPECTION APPROACH FOR CREATION OF MICRO-SEGMENTATION POLICY...
A method of creating micro-segmentation policy for a network is provided. The method monitors the network packet traffic to identify network traffic types and...
2018/0176251 DECEPTION USING SCREEN CAPTURE
Multiple deception techniques utilized to mislead malicious entities that attempt to gather information associated with a computing device are implemented by...
2018/0176250 DETECTION SYSTEM, DETECTION APPARATUS, DETECTION METHOD, AND DETECTION PROGRAM
A detection apparatus extracts an account and a source address of the account from authentication information obtained from an authentication apparatus...
2018/0176249 SYSTEM AND METHOD FOR DETECTING FALSE DATA INJECTION IN ELECTRICAL SUBSTATIONS
Unique systems, methods, techniques and apparatuses of a substation phasor data concentrator (ssPDC) is disclosed herein. One exemplary embodiment is a method...
2018/0176248 ANYCAST-BASED SPOOFED TRAFFIC DETECTION AND MITIGATION
Systems and methods for detecting spoofed traffic include determining a first hop count of a first data query from a first transmitting device to a first...
2018/0176247 IDENTIFYING A POTENTIAL DDOS ATTACK USING STATISTICAL ANALYSIS
Embodiments can identify requests that may be tied to a DDOS attack. For example, the primary identifiers (e.g., a source address) of requests for a network...
2018/0176246 DYNAMIC ALLOCATION OF A SIGNAL RECEIVER FOR DISSEMINATION OF THREAT INFORMATION
Various embodiments of the invention disclosed herein provide techniques for dynamically assigning a signaling server for threat mitigation. A DDoS detection...
2018/0176245 Method of Detecting Shared Vulnerable Code
A method of detecting shared vulnerable code to efficiently facilitate remediation of such vulnerabilities by the appropriate development teams. The method...
2018/0176244 System and Method for Cloud-Based Operating System Event and Data Access Monitoring
A cloud-based operating-system-event and data-access monitoring method includes collecting event information from a monitored cloud-based element. One or more...
2018/0176243 METHOD AND SYSTEM FOR LEARNING REPRESENTATIONS FOR LOG DATA IN CYBERSECURITY
Disclosed is a data analysis and cybersecurity method, which forms a time-based series of behavioral features, and analyzes the series of behavioral features...
2018/0176242 ACCESS CLASSIFYING DEVICE, ACCESS CLASSIFYING METHOD, AND ACCESS CLASSIFYING PROGRAM
An access classifying device includes a tree building unit, a similarity-degree calculating unit, and a classifying unit. The tree building unit generates...
2018/0176241 ABNORMAL BEHAVIOR DETECTION OF ENTERPRISE ENTITIES USING TIME-SERIES DATA
A machine-readable medium may store instructions executable by a processing resource to access log data of an enterprise and extract time-series data of an...
2018/0176240 IDENTIFYING SELF-SIGNED CERTIFICATES USING HTTP ACCESS LOGS FOR MALWARE DETECTION
In one embodiment, a device in a network receives traffic information regarding one or more secure sessions in the network. The device associates the one or...
2018/0176239 TECHNIQUES AND ARCHITECTURES FOR CROSS-ORGANIZATION THREAT DETECTION
Threat detection in a multi-organizational environment. Attribute data corresponding to accesses to a multi-organizational environment and entity data...
2018/0176238 USING FREQUENCY ANALYSIS IN ENTERPRISE THREAT DETECTION TO DETECT INTRUSIONS IN A COMPUTER SYSTEM
The present disclosure describes methods, systems, and computer program products for performing a frequency domain analysis of activity data for a computer...
2018/0176237 Network Monitoring, Detection, and Analysis System
The Kentik Data Engine (KDE) is an integrated real-time, big data software system able to analyze what exactly is happening on a network at the present moment,...
2018/0176236 DETECTING NETWORK TRAFFIC CONTENT
A device for detecting network traffic content is provided. The device includes a memory configured for storing one or more signatures, each of the one or more...
2018/0176235 DISTRIBUTING CLOUD-COMPUTING PLATFORM CONTENT TO ENTERPRISE THREAT DETECTION SYSTEMS
A Content Service executing in a cloud-computing-based Cloud Platform receives enterprise threat detection (ETD) Content transmitted from an ETD Content...
2018/0176234 BI-DIRECTIONAL CONTENT REPLICATION LOGIC FOR ENTERPRISE THREAT DETECTION
A content replication connector receives control data associated with replication of content data from a source system. Based on the control data, the content...
2018/0176233 Stateful Backend Drivers For Security Processing Through Stateless Virtual Interfaces
Methods and systems are disclosed for stateful backend drivers for security processing through stateless virtual interfaces within virtual machine (VM) host...
2018/0176232 DETECTING MALICIOUS DOMAINS AND CLIENT ADDRESSES IN DNS TRAFFIC
In one embodiment, a device in a network constructs a graph based on Domain Name System (DNS) traffic in which vertices of the graph correspond to client...
2018/0176230 DATA PACKET TRANSMISSION METHOD, APPARATUS, AND SYSTEM, AND NODE DEVICE
Embodiments of the present disclosure disclose a data packet transmission method and apparatus. The data packet transmission method includes: obtaining data...
2018/0176229 DECENTRALIZED AUTOMATED SOFTWARE UPDATES VIA BLOCKCHAIN
A blockchain of transactions may be referenced for various purposes and may be later accessed by interested parties for ledger verification. One example...
2018/0176228 MONITORING ACTIONS PERFORMED BY A NETWORK OF PEER DEVICES USING A BLOCKCHAIN
A blockchain of transactions may be referenced for various purposes and may be later accessed by interested parties. One example may comprise one or more of...
2018/0176227 GENERATION OF APPLICATION ALLOWED LISTS FOR MACHINES
A computing system for generating allowed lists of applications for machines is provided. The system, for each machine, identifies a set of executed...
2018/0176226 SYSTEM, METHOD AND COMPUTER-READABLE MEDIUM FOR UTILIZING A SHARED COMPUTER SYSTEM
The present invention is directed to a method, apparatus and computer-readable medium for utilizing a shared computer system. The method includes receiving,...
2018/0176225 REVERSE ACCESS METHOD FOR SECURING FRONT-END APPLICATIONS AND OTHERS
A system and method for providing a secured connection between servers on a local area network (LAN) and clients on a wide area network (WAN) via a ...
2018/0176224 ELECTRONIC DEVICE AND CONTROL METHOD THEREOF
A control method for preventing an unnecessary control command from being transmitted to a reception Internet of things (IoT) device in an IoT system, and an...
2018/0176223 Use of Personal Device for Convenient and Secure Authentication
The present invention relates to a method to authenticate a user using an authenticator at an access device using another registered device named personal...
2018/0176222 USER FRIENDLY TWO FACTOR AUTHENTICATION
A user friendly two factor authentication method and system for a user is disclosed. In an embodiment the system includes a user device, an authentication...
2018/0176221 Methods and Systems for Verifying a User Login Using Contact Information of the User
A server system receives, from a first device, a request to authenticate a user with a third-party application using a social networking system and contact...
2018/0176220 Methods For Enabling Real-Time Digital Object And Tangible Object Interactions
A method for authorizing an electronic device to perform an action includes detecting interaction data from an interaction between a hardware sensor and an...
2018/0176219 SYSTEM AND METHOD FOR DETERMINING WI-FI CLIENT STATION LOCATION TO AVOID RESALE THEFT
Methods, systems, and computer readable media operate to facilitate the initiation of an initial fingerprint setup between an access point (AP) and two or more...
2018/0176218 NETWORK AUTHORIZATION IN WEB-BASED OR SINGLE SIGN-ON AUTHENTICATION ENVIRONMENTS
Systems and methods for network authorization are described herein. An example method can include receiving a user credential from a host device connected to a...
2018/0176217 AUTHENTICATING FOR AN ENTERPRISE SERVICE
Systems, methods, and software can be used to provide authentication for an enterprise service. In some aspects, an identity server receives an authentication...
2018/0176216 SYSTEM AND METHOD FOR BIOMETRIC PROTOCOL STANDARDS
Secure communications are provided between a user computing device and a server computing device. An enrollment request is received from a user computing...
2018/0176215 COMPANION OUT-OF-BAND AUTHENTICATION
Methods and apparatuses for user authentication are described. In one example, authenticating a user includes establishing a first wireless communication link...
2018/0176214 ON DEMAND PASSWORDS
In one embodiment, a user password is received in relation to a user identifier, wherein the user identifier and user password are associated with a user...
2018/0176213 ONE-TIME ACCESS TO AN AUTOMATION SYSTEM
Methods and systems are described for managing one-time access to an automation system. According to at least one embodiment, a computer-implemented method to...
2018/0176212 Secure System and Method for Managing the Multi-factor Authentication Data of A User
A system for managing multi-factor authentication of a user includes: one or more source components for obtaining multi-factor authentication data by one or...
2018/0176211 METHOD FOR MANAGING A SECURE CHANNEL BETWEEN A SERVER AND A SECURE ELEMENT
The invention is a method for managing a secure channel between a server and a secure element embedded in a first device, wherein a user agent embedded in a...
2018/0176210 POST-CONNECTION CLIENT CERTIFICATE AUTHENTICATION
A network access control (NAC) device detects a connection of an endpoint device at a network switch coupled to a network and restricts access of the endpoint...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.