Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2019/0020696 COMMUNICATIONS SYSTEM WITH INTERACTIVE AND DIGITAL ENGAGEMENT FUNCTIONS AND DIGITAL OBJECT INSCRIPTION WORKFLOWS
A networked communications system that facilitates real-time direct interaction and engagement with social influencers and other persons-of-interest and, in...
2019/0020695 COMMUNICATIONS SYSTEM WITH SEQUENCED CHAT, INTERACTIVE AND DIGITAL ENGAGEMENT FUNCTIONS INCLUDING...
A networked communications system that facilitates real-time interaction with persons-of-interest. The real-time communications system includes a ...
2019/0020694 COMMUNICATIONS SYSTEM WITH SEQUENCED CHAT, INTERACTIVE AND DIGITAL ENGAGEMENT FUNCTIONS
A networked communications system that facilitates real-time interaction with persons-of-interest. The communications system includes an event scheduling...
2019/0020693 DATA PROCESSING
Measures for use in processing data in a telecommunications network. A request message is received in relation to establishment of a communication session...
2019/0020692 CALL PROCESSING METHOD AND CONTROL APPARATUS, AUTOMATIC CALL DISTRIBUTION APPARATUS, AND AGENT TERMINAL
Embodiments of the present invention provide a call processing method and control apparatus, an automatic call distribution apparatus, and an agent terminal....
2019/0020691 METHOD FOR TELECOMMUNICATION AND COMMUNICATION TERMINAL
A communication connection can be controlled and/or by use of a function address in the form of a protocol element. The protocol element can be configured to...
2019/0020690 System and Apparatus for Providing Network Security
A rule engine receives data flows. The data flows are between a network and an application. The rule engine determines data flow information and in dependence...
2019/0020689 NETWORK PRIVILEGE MANAGER FOR A DYNAMICALLY PROGRAMMABLE COMPUTER NETWORK
A network security policy may be implemented at network switches as a set of active packet disposition directives. In a dynamically programmable network, the...
2019/0020688 SECURITY CONFIGURATION METHOD FOR RADIO BEARER AND DEVICE
Embodiments of the present disclosure disclose a security configuration method for a radio bearer and a device. The method may include: obtaining, by a base...
2019/0020687 SYSTEMS AND METHODS FOR PROTECTING CONTENTS AND ACCOUNTS
An example method comprises receiving, by a secure content system, an email from a sender to a recipient, scanning the contents of the email, evaluating the...
2019/0020686 CREATION AND OPTIMIZATION OF SECURITY APPLICATIONS FOR CYBER THREATS DETECTION, INVESTIGATION AND MITIGATION
A system and method for optimizing a defense model using available security capabilities are provided. The method includes obtaining a defense model and an...
2019/0020685 APPARATUS AND METHOD FOR ANALYSIS OF BINARY TARGETS TO GENERATE SECURITY POLICY
A compiled security program is received, for example, by an electronic tool. The compiled security program is in a form that is generally unreadable to a human...
2019/0020684 SYSTEMS AND METHODS FOR STORING A SECURITY PARAMETER INDEX IN AN OPTIONS FIELD OF AN ENCAPSULATION HEADER
Certain embodiments described herein are generally directed to a first host machine exchanging a Security Parameter Index (SPI) value with a second host...
2019/0020683 AUTOMATIC GENERATION OF LOW-INTERACTION HONEYPOTS
Various embodiments of systems, computer program products, and methods to automatically generate low-interaction honeypots to protect application landscapes...
2019/0020682 SYSTEMS AND METHODS FOR DISCOVERING AND ALERTING USERS OF POTENTIALLY HAZARDOUS MESSAGES
This disclosure generally revolves around providing users with advance warning that a message that they have received may be suspicious. The user may not be...
2019/0020681 METHOD AND SYSTEM FOR PROCESSING FORGED TCP PACKET
A method for processing forged TCP packets is provided. The method utilizes a window size field in a header of a to-be-processed TCP packet and a window...
2019/0020680 SYSTEM AND METHOD OF DETERMINING DDOS ATTACKS
Disclosed are systems and methods for detecting distributed denial-of-service (DDoS) attack. An exemplary method includes receiving one or more requests from a...
2019/0020679 ADDRESS CHECKING TO PROTECT AGAINST DENIAL OF SERVICE ATTACK
Certain embodiments described herein are generally directed to checking packets at a hardware tunnel endpoint. In some embodiments, an encapsulated packet is...
2019/0020678 DISTRIBUTED DENIAL OF SERVICE MITIGATION FOR WEB CONFERENCING
A web conferencing operator can enable participants to share multimedia content in real-time despite one or more of the participants operating from behind a...
2019/0020677 MANAGING SECURITY ACTIONS IN A COMPUTING ENVIRONMENT BASED ON COMMUNICATION ACTIVITY OF A SECURITY THREAT
Systems, methods, and software described herein provide security actions based on the current state of a security threat. In one example, a method of operating...
2019/0020676 MOBILE SECURITY COUNTERMEASURES
A method includes generating a user profile for an authorized user of a mobile device based on behavior patterns associated with the authorized user. The...
2019/0020675 DIGITAL DYE PACKS
Embodiments relate to systems and methods for providing digital dye packs in connection with a transaction via a device user interface. In an embodiment, a...
2019/0020674 SYSTEMS AND METHODS FOR DETECTING VULNERABILITIES ON SERVERS
The disclosed computer-implemented method for detecting vulnerabilities on servers may include (i) sending requests to servers for information about services...
2019/0020673 METHODS AND APPARATUSES FOR IMPROVED MOBILE APP SECURITY TESTING VIA BRIDGED NATIVE AND WEB USER INTERFACE...
Methods and apparatuses disclosed herein for improved mobile app security testing via bridged native and web user interface interaction. In one example...
2019/0020672 SYSTEM AND METHODS FOR DETECTING MALICIOUS EMAIL TRANSMISSION
A system and methods of detecting an occurrence of a violation of an email security policy of a computer system. A model relating to the transmission of prior...
2019/0020671 GENERATING A VECTOR REPRESENTATIVE OF USER BEHAVIOR IN A NETWORK
Presented herein are techniques for classifying devices as being infected with malware based on learned indicators of compromise. A method includes receiving,...
2019/0020670 BAYESIAN TREE AGGREGATION IN DECISION FORESTS TO INCREASE DETECTION OF RARE MALWARE
In one embodiment, a computing device provides a feature vector as input to a random decision forest comprising a plurality of decision trees trained using a...
2019/0020669 CYBER SECURITY SYSTEM WITH ADAPTIVE MACHINE LEARNING FEATURES
Systems and methods for a cyber security system with adaptive machine learning features. One embodiment is a system that includes a server configured to manage...
2019/0020668 SYSTEM AND METHODS FOR DYNAMIC DIGITAL THREAT MITIGATION
Systems and methods include: receiving digital event type data that define attributes of a digital event type; receiving digital fraud policy that defines a...
2019/0020667 NON-RULE BASED SECURITY RISK DETECTION
A non-rule based security detection system and method is described. The method includes identifying a plurality of data sources. The method then proceeds to...
2019/0020666 METHOD, DEVICE AND ASSEMBLY OPERABLE TO ENHANCE SECURITY OF NETWORKS
A method, device and assembly are disclosed herein. Each of the method, device and assembly, in an embodiment, is operable to perform multiple steps for...
2019/0020665 SECURING MICRO-SERVICES
A computing device running a local enforcement agent is configured to instantiate at least one application container at the computing device, where the at...
2019/0020664 System and Method for Blocking Persistent Malware
Systems and methods for allowing and blocking data packets sent to and from browser software applications and non-browser software applications operated on a...
2019/0020663 USING REPETITIVE BEHAVIORAL PATTERNS TO DETECT MALWARE
In one embodiment, a device generates one or more time series of characteristics of client-server communications observed in a network for a particular client...
2019/0020662 REDUCTION IN SECURE PROTOCOL OVERHEAD WHEN TRANSFERRING PACKETS BETWEEN HOSTS
The technology disclosed herein enables reduction of secure protocol overhead when transferring packets between guest elements on different hosts. In a...
2019/0020661 CLIENT APPARATUS, SERVER APPARATUS AND ACCESS CONTROL SYSTEM FOR AUTHORIZED ACCESS
Disclosed are a client apparatus, a server apparatus and an access control system for authorized access. The client apparatus comprises a request generating...
2019/0020660 ACCESS ENFORCEMENT AT A WIRELESS ACCESS POINT
A first set of access rules is received from an access configuration service. The first set of access rules specifies addresses of devices authorized for a...
2019/0020659 ROLE-BASED ACCESS CONTROL WITH FEATURE-LEVEL GRANULARITY
Example methods are provided for a computer system to perform role-based access control with feature-level granularity in a network environment. The method may...
2019/0020658 NETWORK SANITIZATION FOR DEDICATED COMMUNICATION FUNCTION AND EDGE ENFORCEMENT
A network sanitization technology for enforcing a network edge and enforcing particular communication functions for untrusted dedicated-function devices such...
2019/0020657 METHOD AND APPARATUS FOR OPTIMIZING MOBILE EDGE COMPUTING FOR NOMADIC COMPUTING CAPABILITIES AS A SERVICE
A system and method for operating an edge compute advisory system comprising a network adapter to receive a compute work request from a client device seeking...
2019/0020656 VIRTUAL ADDRESS FOR CONTROLLER IN A CONTROLLER CLUSTER
In some examples, a method includes determining a number of controllers in a Network Authentication Server (NAS) controller cluster, wherein each of the...
2019/0020655 SERVICE PROVIDING SYSTEM, SERVICE DELIVERY SYSTEM, SERVICE PROVIDING METHOD, AND NON-TRANSITORY RECORDING MEDIUM
A processor is configured to associate terminal identifier for identifying terminals that have requested login with communication states of the terminals, the...
2019/0020654 SERVICE PROVIDING SYSTEM, SERVICE DELIVERY SYSTEM, SERVICE PROVIDING METHOD, AND NON-TRANSITORY RECORDING MEDIUM
A processor associates with one another terminal identifiers for identifying terminals. Each terminal identifier includes a to-be-authenticated section common...
2019/0020653 METHOD AND APPARATUS FOR SECURE CROSS-SERVICE CONTENT SELECTION AND DELIVERY BASED ON MOBILE DEVICE IDENTITY
Systems, apparatuses, methods, and computer program products are disclosed for providing secure cross-service content selection and delivery based on mobile...
2019/0020652 SYSTEM AND METHOD FOR LOCAL DATA IP BASED NETWORK SECURITY FOR PREVENTING DATA BREACH ATTEMPTS IN A...
A data storage device includes advertised internet protocol (IP) addresses, a logical data storage, and a resource request processor. The logical data storage...
2019/0020651 SYNTHETIC GENOMIC VARIANT-BASED SECURE TRANSACTION DEVICES, SYSTEMS AND METHODS
Various devices, systems, structures and methods are disclosed related to securely authorizing a transaction by synchronizing digital genomic data with...
2019/0020650 VERIFICATION OF BOTH IDENTIFICATION AND PRESENCE OVER A NETWORK
A method and system for verifying both identification and presence of a user is provided. The system includes an identification tag containing data associated...
2019/0020649 APPARATUS AND METHOD FOR OBTAINING UP-TO-DATE SECURITY CREDENTIALS
A credentials database that includes a first credentials locker with a first path defining the location of the first locker, and a second credentials locker....
2019/0020648 SYSTEMS AND METHODS FOR MANAGING DEVICE ASSOCIATION
A method and system for managing device association and access is disclosed. Some embodiments may comprise receiving, from a user device, a request to access a...
2019/0020647 Key Attestation Statement Generation Providing Device Anonymity
A computing device sends a request for an attestation certificate to an attestation service along with information regarding the hardware and/or software of...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.