Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0316706 ENABLING USER DEFINITION OF CUSTOM THREAT RULES IN A NETWORK SECURITY SYSTEM
The disclosed embodiments include a method performed by a computer system. The method includes receiving user input defining attributes of a threat rule, the...
2018/0316705 USER INTERFACE FOR DEFINING ANOMALY ACTION RULES IN A NETWORK SECURITY SYSTEM
The disclosed embodiments include a method performed by a computer system. The method includes causing display of one or more first graphical controls enabling...
2018/0316704 LATERAL MOVEMENT DETECTION THROUGH GRAPH-BASED CANDIDATE SELECTION
A lateral movement application identifies lateral movement (LM) candidates that potentially represent a security threat. Security platforms generate event data...
2018/0316703 CONSOLIDATED ENTERPRISE VIEW OF CYBERSECURITY DATA FROM MULTIPLE SITES
This disclosure provides an apparatus and method for a consolidated enterprise view of cybersecurity data from multiple sites, including but not limited to in...
2018/0316702 DETECTING AND MITIGATING LEAKED CLOUD AUTHORIZATION KEYS
In one embodiment, a discrepancy detection application automatically detects and addresses unauthorized activities associated with one or more authorization...
2018/0316701 THREAT DETECTION FOR A FLEET OF INDUSTRIAL ASSETS
A system to protect a fleet of industrial assets may include a communication port to exchange information with a plurality of remote industrial assets. An...
2018/0316700 DATA SECURITY INSPECTION MECHANISM FOR SERIAL NETWORKS
In one embodiment, a device in a serial network determines that a suspicious event has occurred in the network. The suspicious event is identified based on...
2018/0316699 REPORTING AND PROCESSING CONTROLLER SECURITY INFORMATION
In one implementation, a method for providing security on externally connected controllers includes receiving, at a reporting agent that is part of a security...
2018/0316698 CENTRALIZED CONTROLLER MANAGEMENT AND ANOMALY DETECTION
In one implementation, a method for providing security on externally connected controllers includes receiving, at a server system, operation information for a...
2018/0316697 METHOD OF AIDING THE DETECTION OF INFECTION OF A TERMINAL BY MALWARE
A method for aiding detection of infection of a terminal by malware. The method includes: reception of a current request originating from the terminal asking...
2018/0316696 ANALYSIS APPARATUS, ANALYSIS METHOD, AND ANALYSIS PROGRAM
A browser emulator manager causes a browser emulator(s) to access a website. The browser emulator traces content interpretation and script execution on a...
2018/0316695 RISK MONITORING SYSTEM
Various embodiments of the present invention set forth techniques for monitoring risk in a computing system. The technique includes creating one or more risk...
2018/0316694 Method and Apparatus for Intelligent Aggregation of Threat Behavior for the Detection of Malware
Embodiments disclosed herein are directed to intelligent malware detection. A scanner server is used to scan an endpoint device for malware. Various attributes...
2018/0316693 Internet Traffic Classification Via Time-Frequency Analysis
Concepts and technologies disclosed herein are directed to internet traffic classification via time-frequency analysis. According to one aspect of the concepts...
2018/0316692 AUTOMATED SECURITY POLICY GENERATION FOR CONTROLLERS
In one implementation, a method for automatically generating a security policy for a controller includes receiving, by a security policy generation system and...
2018/0316691 Endpoint Detection and Response System Event Characterization Data Transfer
An endpoint computer system monitors data relating to a plurality of events occurring within an operating environment of the endpoint computer system. The...
2018/0316690 METHOD FOR TRANSMITTING/RECEIVING DATA IN WIRELESS COMMUNICATION SYSTEM, AND DEVICE FOR SAME
With regard to a method for transmitting and receiving data in a wireless communication system in the present specification, a method implemented by a first...
2018/0316689 SYSTEM AND HEURISTICS FOR VERIFYING ORIGIN OF REQUEST
A system and method for verifying the origin of a request over a network is provided. The system includes a personal electronic device in communication with...
2018/0316687 SYSTEM AND METHOD FOR GENERATING ACCESS CREDENTIALS
A method is disclosed. The method includes receiving, by a resource provider computer operated by a resource provider, a request from a communication device...
2018/0316686 SECURITY ACCESS FOR A SWITCH DEVICE
A method for providing user access to a network switch appliance, includes: receiving from a user a request to access configuration item for the network switch...
2018/0316685 SECURE INTEGRATION OF INDEPENDENT CLOUD FOUNDRY APPLICATIONS IN A FIORI LAUNCHPAD
An Open Authorization (OAuth) Client Secret of an application associated with a Multi-Tenant Application (MTA) deployed in a cloud-computing environment if...
2018/0316684 CLIENT APPLICATION BASED ACCESS CONTROL IN CLOUD SECURITY SYSTEMS FOR MOBILE DEVICES
A cloud-based security system enforcing application-based control of network resources includes a plurality of nodes communicatively coupled to the Internet;...
2018/0316683 SYSTEM AND METHOD OF LIMITING USER ACCESS TO SUSPICIOUS OBJECTS OF A SOCIAL NETWORK
Disclosed are systems and methods for limiting access of a user profile to dangerous content in a social network service. The described system produces a...
2018/0316682 MANAGING METADATA FOR EXTERNAL CONTENT WITHIN A COMPUTING ENVIRONMENT
Technologies are described for managing metadata associated with external content. For example metadata can be obtained that describes content stored on...
2018/0316681 BROKER-COORDINATED SELECTIVE SHARING OF DATA
In one embodiment, a gateway device receives, from a centralized broker device, a data-access policy for a given computer network, the data-access policy...
2018/0316680 UNAUTHORIZED CONTROL SUPPRESSION METHOD, UNAUTHORIZED CONTROL SUPPRESSION DEVICE, AND ONBOARD NETWORK SYSTEM
An unauthorized control suppression method for use in a network system is provided. The network system includes a plurality of electronic controllers that...
2018/0316679 Leak-Proof Classification for an Application Session
The present disclosure discloses a system and method for classifying an application session for forwarding or refrain from forwarding to a client. Generally,...
2018/0316678 System and Method for Secure Control of Resources of Wireless Mobile Communication Devices
Systems and methods for secure control of a wireless mobile communication device are disclosed. Each of a plurality of domains includes at least one wireless...
2018/0316677 RULE-BASED APPLICATION ACCESS MANAGEMENT
A container that manages access to protected resources using rules to intelligently manage them includes an environment having a set of software and...
2018/0316676 DYNAMIC COMPUTING RESOURCE ACCESS AUTHORIZATION
Techniques include receiving an access notification identifying a request by an identity for access to an access-protected network resource; identifying a...
2018/0316675 UNIFIED ENTERPRISE MANAGEMENT OF WIRELESS DEVICES IN A CONTROLLED ENVIRONMENT
A wireless device enterprise management system and a method for operating the management system in a controlled environment is disclosed. The enterprise...
2018/0316674 METHODS AND SYSTEMS FOR CONTROLLING THE EXCHANGE OF FILES BETWEEN AN ENTERPRISE AND A NETWORK
Computerized methods and systems receive password-protected data from a network at an entity coupled to the network. The password-protected data is intended...
2018/0316673 ZERO-TOUCH IOT DEVICE PROVISIONING
In one embodiment, an authorized signing authority server receives an authenticity request from a security registrar to vouch for authenticity of a particular...
2018/0316672 SHARING OF EVENT DATA ACROSS A PLURALITY OF SERVICE PLATFORMS
A method for registering a first electronic entity of a user, which is capable of generating event data. The method includes: after a first main service...
2018/0316671 METHOD AND APPARATUS FOR FACILITATING AUTHORIZATION OF A SPECIFIED TASK VIA MULTI-STAGE AND MULTI-LEVEL...
A method, apparatus and computer program products are provided for authorizing a specified task via multi-stage and multi-level authentication processes. One...
2018/0316670 METHOD AND APPARATUS FOR FACILITATING FRICTIONLESS TWO-FACTOR AUTHENTICATION
A method, apparatus and computer program products are provided for facilitating performing frictionless two-factor authentication. One example method includes...
2018/0316669 MULTI-DIMENSIONAL FRAMEWORK FOR DEFINING CRITERIA THAT INDICATE WHEN AUTHENTICATION SHOULD BE REVOKED
Methods and systems are presented for defining criteria that indicate when authentication for an identified client device should be revoked based on rules...
2018/0316668 SYSTEMS AND METHODS FOR IMPROVED ELECTRONIC DATA SECURITY
An electronic data protection (EDP) computing device for protecting sensitive data of a user during a computer interaction between the user and a business...
2018/0316667 Information processing device
According to an embodiment, an information processing device includes one or more processors configured to: receive first connected information including first...
2018/0316666 Protection and Verification of User Authentication Credentials against Server Compromise
Authenticating a user is provided. A decryption key corresponding to an authentication account of the user of a client device and authentication credential...
2018/0316665 Systems and Methods to Authenticate Users and/or Control Access Made by Users based on Enhanced Digital...
A graphlet is extracted from a relation graph for digital identity verification. The relation graph contains data element nodes collected about access...
2018/0316664 METHOD, APPARATUS, AND SYSTEM FOR CONTROLLING INTELLIGENT DEVICE, AND STORAGE MEDIUM
A method, an apparatus, and a system for controlling an intelligent device are provided. The device transmits a control request including a first intelligent...
2018/0316663 SMART CARD THUMB PRINT AUTHENTICATION
A data center operator is authenticated to obtain requested access to a data center by an approval mechanism on the data center that receives an access request...
2018/0316662 Embedded trusted network security perimeter in computing systems based on ARM processors
The invention relates to a method for computer systems based on the ARM processor, for example mobile devices, wherein the ARM processor provides fully...
2018/0316661 METHOD AND APPARATUS FOR PROVIDING CLIENT-SIDE SCORE-BASED AUTHENTICATION
Methods, apparatus, and systems for generating and verifying one time passwords in connection with a risk assessment are disclosed. The risk assessment may...
2018/0316660 APPLICATION PACKAGE INSPECTION METHOD, INSPECTION DEVICE AND COMPUTER-READABLE STORAGE MEDIUM
An application package inspection method is provided. The method includes: obtaining a to-be-inspected application installation package; and extracting an...
2018/0316659 SYSTEMS, METHODS, AND APPARATUSES FOR IMPLEMENTING A WEB-BASED LIFE MANAGEMENT PLATFORM WITH USER CREATED...
In accordance with embodiments disclosed herein, there are provided methods and systems for implementing a web-based life management platform with user created...
2018/0316658 SECURELY PROVIDING A PASSWORD USING AN USING AN INTERNET OF THINGS (IOT) SYSTEM
An apparatus and method are described for securely providing a User ID and/or password to an IoT device. For example, one embodiment of a method comprises:...
2018/0316657 SINGLE SIGN-ON REGISTRATION
An identity provider receives a request to configure authentication for enabling single sign-on to a service provider. The identity provider identifies the...
2018/0316656 MANAGING ACCESS TO SOFTWARE BASED ON A STATE OF AN ACCOUNT
The present disclosure is directed towards systems and methods for using a software as a service ("SaaS") product. The systems and methods request, in response...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.