Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0375886 TECHNIQUES FOR MONITORING PRIVILEGED USERS AND DETECTING ANOMALOUS ACTIVITIES IN A COMPUTING ENVIRONMENT
In various implementations, a security management and control system for monitoring and management of security for cloud services can include automated...
2018/0375885 MALWARE DETECTION SYSTEM ATTACK PREVENTION
Systems and methods may be used to prevent attacks on a malware detection system. A method may include modeling a time series of directed graphs using incoming...
2018/0375884 DETECTING USER BEHAVIOR ACTIVITIES OF INTEREST IN A NETWORK
A user behavior activity detection method is provided in which network traffic relating to user behavior activities in a network is monitored. Data is stored...
2018/0375883 AUTOMATICALLY DETECTING INSIDER THREATS USING USER COLLABORATION PATTERNS
Automatically detecting insider threats using user collaboration patterns. In one embodiment, a method may include identifying collaborative access of one or...
2018/0375882 MALICIOUS SOFTWARE IDENTIFICATION
A computer implemented method to identify malicious software in a computer system includes receiving an indication of a detection of malicious network traffic...
2018/0375881 INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, AND NON-TRANSITORY COMPUTER READABLE RECORDING MEDIUM
An information processing device is connected to a network where a plurality of electronic control units perform communication. The information processing...
2018/0375880 MALICIOUS INDUSTRIAL INTERNET OF THINGS NODE ACTIVITY DETECTION FOR CONNECTED PLANTS
A method and apparatus for identifying malicious activity. At least one memory is configured to store historical communication data. At least one processor is...
2018/0375879 VEHICLE NETWORK OPERATING PROTOCOL AND METHOD
A communication network includes a plurality of nodes, wherein each of the nodes is operably connected to a bus. A transmitting node sends a data communication...
2018/0375878 SYSTEM, METHOD AND COMPUTER READABLE MEDIUM FOR PROCESSING UNSOLICITED ELECTRONIC MAIL
An internet service provider (ISP) is configured to analyze a subscriber's sent e-mail packets to determine a subscriber identity associated with the e-mail...
2018/0375877 USING MESSAGE CONTEXT TO EVALUATE SECURITY OF REQUESTED DATA
Information of an electronic message to be delivered to an intended recipient is received. For an original resource identifier included in the electronic...
2018/0375876 METHOD AND ARRANGEMENT FOR DECOUPLED TRANSMISSION OF DATA BETWEEN NETWORKS
Provided is a method for decoupled transmission of data between networks having different security requirements, in which, in a first network having high...
2018/0375875 ACCESS CONTROL FOR DATABASE
In an embodiment of the present invention, a command for performing a database operation with respect to a table of a database is received, whereby the table...
2018/0375874 SYSTEM AND METHOD FOR MODIFYING PERMISSIONS ASSOCIATED WITH NETWORK-BASED RESOURCES VIA FINGERPRINT ENTRY ON...
A method and apparatus for adjusting permission settings associated with one or more network-based resources on a communication device. A graphical user...
2018/0375873 Network Device Isolation For Access Control and Information Security
A system that includes a switch, a network authentication server (NAS), and a threat management server. The NAS sends a device identifier for an endpoint...
2018/0375872 EPHEMERAL APPLICATIONS
A method of executing an application in a direct launch mode includes receiving a user input to download an application from a remote server to a client...
2018/0375871 THIRD PARTY PROGRAM INTEGRITY AND INTEGRATION CONTROL IN WEB BASED APPLICATIONS
Disclosed herein are a resource control service, system, method and architecture. A client device's resource access is limited to an approved resource, or...
2018/0375870 NETWORK SYSTEM FOR SECURE COMMUNICATION
In a network system (100) for wireless communication an enrollee (110) accesses the network via a configurator (130). The enrollee acquires a data pattern...
2018/0375869 MULTI-BLOCKCHAIN NETWORK DATA PROCESSING
A data processing request is obtained containing blockchain data and an identifier used to identify a blockchain network to which the data processing request...
2018/0375868 Equipment Control System
The invention disclosed herein includes an equipment management system. The equipment management system can include an ignition control device for connecting...
2018/0375867 Untrusted Network Device Identification and Removal For Access Control and Information Security
A system that includes a switch, a network authentication server (NAS), and a threat management server. The NAS sends a device identifier for an endpoint...
2018/0375866 SECURE COMMUNICATION NETWORK
Secure network communications are described. In one aspect, a secure network can include a passbuilder that provides policy information related to performance...
2018/0375865 Inter-Application Delegated Authentication
Disclosed is a system for delegating authentication of an untrusted application executing on a client device. For delegated authentication, an untrusted...
2018/0375864 ID ACQUISITION TERMINAL APPARATUS AND METHOD, INFORMATION PROCESSING APPARATUS AND METHOD, AND PROGRAM
The present technology relates to an ID acquisition terminal apparatus and method, an information processing apparatus and method, and a program by which the...
2018/0375863 WEBSITE LOGIN METHOD AND APPARATUS
The present application provides example website login methods and apparatuses. One example method includes identifying a website jump trigger indication to...
2018/0375862 Network Switch Port Access Control and Information Security
A system that includes a switch, a network authentication server (NAS), and a threat management server. The NAS sends a device identifier for an endpoint...
2018/0375861 Network Device Removal For Access Control and Information Security
A system that includes a switch, a network authentication server (NAS), and a threat management server. The NAS sends a device identifier for an endpoint...
2018/0375860 ENTROPY-BASED AUTHENTICATION OF MOBILE FINANCIAL TRANSACTION
A method for leveraging a secure communication channel between a first agent and a second agent to authenticate an activity outside of the secure communication...
2018/0375859 METHOD AND APPARATUS FOR AUTHENTICATION OF USER USING BIOMETRIC
A method and an apparatus for authenticating user using biometric information. The apparatus authenticates the user by performing: generating a first feature...
2018/0375858 SYSTEM, IMAGE PROCESSING APPARATUS, AND METHOD OF AUTHENTICATION
A system includes a communication device to perform wireless communication with a terminal carried by a user, a biometric authentication device to acquire...
2018/0375857 COMPUTER SECURITY BASED ON MOUSE DEVICE SPEED SETTING AUTHENTICATION
A method of performing operations by a processor of a computer terminal, includes determining an operation system (OS) speed scaling gain used by the OS to...
2018/0375856 INFORMATION PROCESSING APPARATUS AND INFORMATION PROCESSING SYSTEM
An information processing apparatus includes a memory, a request unit, an authenticating unit, and a determination unit. The memory stores authentication...
2018/0375855 METHOD FOR AUTHENTICATING A USER
The present invention relates to a method and a system for authentication of a user for granting access to a service, the method comprising: receiving, by a...
2018/0375854 AUTHENTICATING TO A NETWORK VIA A DEVICE-SPECIFIC ONE TIME PASSWORD
Generally, this disclosure describes a method and system for authenticating to a network via a device-specific one-time password. A method in an embodiment may...
2018/0375853 METHOD FOR IMPROVING INFORMATION SECURITY FOR VEHICLE-TO-X COMMUNICATION, AND COMMUNICATION APPARATUS (AS AMENDED)
A method for improving information security for vehicle-to-X communication, wherein the vehicle-to-X communication is protectable by at least one certificate,...
2018/0375852 DEVICE WITH EMBEDDED CERTIFICATE AUTHORITY
A smart device, connected device, Internet of Things (IoT) device, etc. is configured with an embedded certificate authority. The embedded certificate...
2018/0375851 AUTHENTICATION ON A COMPUTING DEVICE
Systems and/or methods provide a user of a first computing device with the ability to authenticate themselves on a remotely provided process or service using a...
2018/0375850 SECURE COMMUNICATION NETWORK
Secure network communications are described. In one aspect, a secure network can include a passbuilder that provides policy information related to performance...
2018/0375849 ACCESS MANAGEMENT
According to an example aspect of the present invention, there is provided an apparatus comprising a memory configured to store an encryption key and a list of...
2018/0375848 UN-PASSWORD: RISK AWARE END-TO-END MULTI-FACTOR AUTHENTICATION VIA DYNAMIC PAIRING
A method for determining a dynamic pairing code for use in exchanging information between a first and a second communications entity. At the at the first...
2018/0375847 STORED VALUE USER IDENTIFICATION SYSTEM USING BLOCKCHAIN OR MATH-BASED FUNCTION
Systems and methods for creating a numeric value for a present certainty of a user's identity, recording and `storing` that numeric value on a distributed...
2018/0375846 TRANSMISSION-ONLY MESH NODES
In an aspect of the disclosure, a method, a computer-readable medium, and an apparatus are provided. In certain implementations, the apparatus may determine a...
2018/0375845 SYSTEMS AND METHODS FOR TWO-FACTOR LOCATION-BASED DEVICE VERIFICATION
A system for two-factor location-based device verification includes a processor and a non-transitory, tangible, computer-readable storage medium having...
2018/0375844 SECURE CALL ANSWERING
In currently available mobile devices (e.g., a user equipment (UE)), no authentication occurs at the mobile device to answer an incoming call at the mobile...
2018/0375843 VEHICLE WIRELESS INTERNET SECURITY
Methods, systems, and computer program products for vehicle wireless internet security are provided. A connection request is received from a mobile device. A...
2018/0375842 METHODS AND SECURITY CONTROL APPARATUSES FOR TRANSMITTING AND RECEIVING CRYPTOGRAPHICALLY PROTECTED NETWORK PACKETS
A modular security control apparatus for the protected transfer of network packets is provided. In particular, an exchange of network data (e.g. network...
2018/0375841 SYSTEMS AND METHODS FOR ENTERPRISE COMMUNICATIONS
This disclosure relates to systems and methods for protecting enterprise communications and data associated therewith. According to embodiments, systems and...
2018/0375840 SYSTEM AND METHOD FOR USING A DISTRIBUTED LEDGER GATEWAY
System and method for using a distributed ledger gateway are disclosed. In one embodiment, in an information processing apparatus comprising at least one...
2018/0375839 System and Method for Secure Remote Control of a Medical Device
A system and method for secure wireless control of a device including, but not limited to, replay attack protection, man-in-the-middle protection, data...
2018/0375838 FILTERING AND UNICITY WITH DETERMINISTIC ENCRYPTION
Some database systems may implement encryption services to improve the security of data stored in databases. Certain functionality may or may not be supported...
2018/0375837 INTERFACES TO MANAGE DIRECT NETWORK PEERINGS
Methods and apparatus for interfaces to manage direct network peerings. A system may include a data center, endpoint routers and a connectivity coordinator....
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.