Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0191759 SYSTEMS AND METHODS FOR MODELING AND MONITORING DATA ACCESS BEHAVIOR
A system for monitoring data-access behavior is provided. The system may derive a behavioral pattern based on at least one of historic data access by a user or...
2018/0191758 CLUSTER-BASED DECISION BOUNDARIES FOR THREAT DETECTION IN INDUSTRIAL ASSET CONTROL SYSTEM
According to some embodiments, a threat detection model creation computer may receive a series of monitoring node values (representing normal and/or threatened...
2018/0191757 USING DATA SCIENCE TO AID IN DETECTION OF UNAUTHORIZED DISTRIBUTION
In one embodiment, a method performed by a system that includes at least one processor, the method comprising: obtaining subscriber data of a plurality of...
2018/0191756 HEURISTICS-BASED IDENTIFICATION OF IOT (INTERNET OF THINGS) ATTACKS IN WI-FI
Attacks from IoT (Internet of Things) devices (or other statins) on a Wi-Fi network are identified using heuristics. Frames are detected from an IoT device (or...
2018/0191755 NETWORK SECURITY USING INFLATED FILES FOR ANOMALY DETECTION
Techniques for providing network security and anomaly detection are disclosed. In some embodiments, network traffic may be monitored in order to create a model...
2018/0191754 SUSPICIOUS MESSAGE PROCESSING AND INCIDENT RESPONSE
The present invention relates to methods, network devices, and machine-readable media for an integrated environment for automated processing of reports of...
2018/0191753 SYSTEM AND METHOD FOR PROVIDING A SELF-MONITORING, SELF-REPORTING, AND SELF-REPAIRING VIRTUAL ASSET CONFIGURED...
A trigger event monitoring system is provided in one or more virtual assets. One or more trigger parameters, including security threat patterns, are defined...
2018/0191752 INTRUSION DETECTION USING A HEARTBEAT
A variety of techniques are disclosed for detection of advanced persistent threats and similar malware. In one aspect, the detection of certain network traffic...
2018/0191751 IDENTIFYING AN ATTACKED COMPUTING DEVICE
A computer implemented method to identify an attacked computing device in a system of network-connected computing devices providing a plurality of computing...
2018/0191750 SYSTEMS AND METHODS FOR DETECTING RESOURCES RESPONSIBLE FOR EVENTS
Systems and methods are disclosed for identifying resources responsible for events. In one embodiment, a method may include determining a number of unique...
2018/0191749 METHOD FOR DETECTING REAL-TIME EVENT AND SERVER USING THE SAME
A method for detecting a preset type of real-time event is provided. The method includes steps of: (a) a server loading or supporting other server to load a...
2018/0191748 ASSOCIATING A USER IDENTIFIER DETECTED FROM WEB TRAFFIC WITH A CLIENT ADDRESS
In one embodiment, a device in a network receives a set of known user identifiers used in the network. The device receives web traffic log data regarding web...
2018/0191747 GATHERING INDICATORS OF COMPROMISE FOR SECURITY THREAT DETECTION
The subject matter of this specification generally relates to computer security. In some implementations, a method includes receiving indicators of compromise...
2018/0191746 SYSTEM AND METHOD FOR DETECTING MALICIOUS DEVICE BY USING A BEHAVIOR ANALYSIS
Malicious behavior of a device on a local network may be detected. A data stream from a device may be collected. A functional group may be created using...
2018/0191745 SYSTEMS AND METHODS FOR DETECTING RESOURCES RESPONSIBLE FOR EVENTS
Systems and methods are disclosed for identifying resources responsible for events. In one embodiment, a method may include determining a number of unique...
2018/0191744 SYSTEM AND METHOD TO IMPLEMENT CLOUD-BASED THREAT MITIGATION FOR IDENTIFIED TARGETS
An on-premises network protection system and method for providing on-premises network protection are provided. The system includes a memory configured to store...
2018/0191743 REPUTATION-BASED APPLICATION CACHING AND WHITE-LISTING
A device may classify an application, associated with an endpoint, based on traffic associated with the endpoint. The device may determine a reputation score...
2018/0191742 COMMUNICATION PROTOCOLS IN INTEGRATED SYSTEMS
A system and methods comprise a touchscreen at a premises. The touchscreen includes a processor coupled to a security system at the premises. User interfaces...
2018/0191741 COMMUNICATION PROTOCOLS IN INTEGRATED SYSTEMS
A system and methods comprise a touchscreen at a premises. The touchscreen includes a processor running gateways and coupled to a security system at the...
2018/0191740 COMMUNICATION PROTOCOLS OVER INTERNET PROTOCOL (IP) NETWORKS
A system and methods comprise a gateway that includes a processor coupled to a security system at a premises. A touchscreen at the premises is coupled to the...
2018/0191739 MITIGATION OF ANTI-SANDBOX MALWARE TECHNIQUES
Static analysis is applied to unrecognized software objects in order to identify and address potential anti-sandboxing techniques. Where static analysis...
2018/0191738 AUTOMOTIVE ECU CONTROLLER AND DATA NETWORK HAVING SECURITY FEATURES FOR PROTECTION FROM MALWARE TRANSMISSION
In one implementation, a method for providing security on controllers includes detecting, by a given controller, an attempted security attack on the given...
2018/0191737 SYSTEM AND METHOD FOR PROTECTING SYSTEMS FROM MALICIOUS ATTACKS
The disclosed embodiments include a method of disarming malicious code in a computer system having a processor. The method comprises receiving, by the computer...
2018/0191736 METHOD AND APPARATUS FOR COLLECTING CYBER INCIDENT INFORMATION
Provided are a method of collecting cyber incident information, the method being performed by an apparatus for collecting cyber incident information and...
2018/0191735 Secure Service for Receiving Sensitive Information through Nested iframes
Methods and systems for receiving sensitive information include receiving a request for entering sensitive information, the request received from a user...
2018/0191734 SYSTEM FOR PROVIDING HEALTH INFORMATION HAVING AUTHENTICATION DATA AND OPERATING METHOD THEREOF
Provided are a system for providing health information with authentication data and an operation method thereof. The system for providing health information...
2018/0191733 VERIFICATION OF GEOLOCATION OF DEVICES IN A CLOUD DATA CENTER
A processor-implemented method alters a computer resource based on its new geolocation. One or more processors receive a message that a computer resource has...
2018/0191732 PERSONAL CLOUD DEVICE FOR DIGITAL MEDIA
A personal cloud device includes a housing, one or more processors disposed within the housing, a local area network interface to communicatively couple the...
2018/0191731 Anonymous Application Wrapping
Methods and systems are disclosed for providing approaches to anonymous application wrapping on a mobile device. The methods and systems may include receiving,...
2018/0191730 REAL TIME PIVOTING ON DATA TO MODEL GOVERNANCE PROPERTIES
Real time pivoting on data to model governance properties is provided. A data explorer module of a security and compliance service may analyze data, metadata,...
2018/0191729 SECURITY FABRIC FOR INTERNET OF THINGS (IOT)
The present invention relates to a method for managing IoT devices by a security fabric. A method is provided for managing IoT devices comprises collecting, by...
2018/0191728 METHOD, AUTHENTICATION SERVER, AND ELECTRONIC DEVICE FOR CONFIGURING A SHARING TARGET DEVICE FOR SHARING DATA...
Methods and electronic devices are provided for configuring a sharing target device. A method includes transmitting, to an authentication server associated...
2018/0191727 IMPLEMENTING DATA SECURITY WITHIN A SYNCHRONIZATION AND SHARING ENVIRONMENT
A computer-implemented method according to one embodiment includes receiving a request to share predetermined data with a device, identifying the predetermined...
2018/0191726 ACCESS RELATIONSHIPS IN A COMPUTER SYSTEM
The disclosure relates to access relationships, more particularly to controlling access relationships between entities in a computerized system. In the...
2018/0191725 ACCESS RELATIONSHIPS IN A COMPUTER SYSTEM
The disclosure relates to methods and apparatuses for controlling access relationships between entities in a computerized system. A chain of access...
2018/0191724 System, Method and Apparatus for Increasing Website Relevance While Protecting Privacy
The present invention provides a system, method and apparatus for increasing relevance of a content provided to a visitor by a content provider by providing...
2018/0191723 ENHANCED LOAD PROCESSING USING LINKED HIERARCHICAL DATA STRUCTURES
The present disclosure relates to enhancing load processing for facilitated assignment or modification of access-right data. More specifically, the present...
2018/0191722 Systems and Methods for Use in Managing Access to User Profiles, and Content Blocks Included Therein
Systems and methods are provided for use in implementing access controls to content blocks of a user profile associated with a user. One exemplary system...
2018/0191721 MECHANISMS TO ENABLE SECURE VIRTUAL NAMESPACES IN DISAGGREGATED STORAGE TARGETS
Embodiments are generally directed to mechanisms to enable secure virtual namespaces in disaggregated storage targets. An embodiment of an apparatus includes a...
2018/0191720 COMMUNICATION PROTOCOLS IN INTEGRATED SYSTEMS
Systems and methods comprise a gateway at a premises. The gateway is coupled to a remote system. An interface component is coupled to a processor of the...
2018/0191719 INTERNET-OF-THINGS READING DEVICE, METHOD OF SECURE ACCESS, AND CONTROL CENTER APPARATUS
An Internet-of-Things (IoT) reading device, a method of secure access using the same, and a control center apparatus are provided. The Internet-of-Things...
2018/0191718 TECHNOLOGIES FOR SECURELY EXTENDING CLOUD SERVICE APIS IN A CLOUD SERVICE MARKETPLACE
Technologies for securely extending cloud service application programming interfaces (APIs) in a cloud service marketplace include a connector hub of a...
2018/0191717 METHOD AND SYSTEM FOR ESTABLISHING A SECURE ACCESS CONNECTION WITH ELECTRONIC DEVICES
A technique is provided for establishing a secure access connection with electronic devices. The technique includes receiving a request for establishing the...
2018/0191716 TECHNIQUES FOR MULTI-DOMAIN MEMORY ENCRYPTION
Various embodiments are generally directed to techniques for multi-domain memory encryption, such as with a plurality of cryptographically isolated domains,...
2018/0191715 APPARATUS AND METHOD FOR SECURE OVER THE AIR PROGRAMMING OF A COMMUNICATION DEVICE
A system that incorporates the subject disclosure may perform, for example, receiving an over-the-air programming message that is utilizing a hypertext...
2018/0191714 BLOCK-CHAIN ENABLED SERVICE PROVIDER SYSTEM
A distributed ledger, e.g., blockchain, enabled operating environment includes a user device that accesses services of a service device by leveraging the...
2018/0191713 AUTHENTICATION OF PACKETIZED AUDIO SIGNALS
The present disclosure is generally directed a data processing system for authenticating packetized audio signals in a voice activated computer network...
2018/0191712 Preventing Unauthorized Access to Secured Information Systems Using Proactive Controls
Systems and arrangements for detecting unauthorized activity and implementing proactive controls to avoid future occurrences of unauthorized activity are...
2018/0191711 AUTHENTICATION OF PACKETIZED AUDIO SIGNALS
The present disclosure is generally directed a data processing system for authenticating packetized audio signals in a voice activated computer network...
2018/0191710 MANAGEMENT AND AUTHENTICATION IN HOSTED DIRECTORY SERVICE
A user, group, and device management and authentication system allows administrators to manage one or more directories with devices that are not associated...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.