Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2019/0044985 METHOD, SYSTEM AND NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM FOR PROVIDING A MULTILATERAL COMMUNICATION...
A method for a multilateral communication service includes acquiring at least one of a first video taken in a device of a first user, a first voice recorded in...
2019/0044984 Device Service Capability Discovery
Systems, devices, and techniques described herein are directed to device service capability discovery. An initiating user equipment (UE) can transmit a request...
2019/0044983 COMMUNICATION TERMINAL, COMMUNICATION SYSTEM, COMMUNICATION METHOD, AND RECORDING MEDIUM
A communication terminal receives, from a mobile terminal, counterpart terminal identification information for identifying a counterpart communication terminal...
2019/0044982 TECHNIQUES FOR MULTIPLY-CONNECTED MESSAGING ENDPOINTS
Various embodiments are generally directed to techniques for multiply-connected messaging endpoints, such as for communication between processes of a...
2019/0044981 Communication Node, System, And Method For Optimized Dynamic Codec Selection
The present invention is directed towards a communication node, a system, and a method for dynamically switching a first codec to a second codec for a...
2019/0044980 METHOD AND SYSTEM FOR ACCESS AND USE OF MULTIPLE ISIM OR ISIM CREDENTIALS
A method at a mobile entity for enabling use of multiple Internet Protocol (IP) Multimedia Services (IMS), the method including reading data from a plurality...
2019/0044979 VIRTUAL COMMUNICATION ENDPOINT SERVICES
Customers can utilize resources of a multi-tenant environment to provide one or more services available to various users. In order to simplify the process for...
2019/0044978 DATA PROCESSING SYSTEMS FOR DATA-TRANSFER RISK IDENTIFICATION, CROSS-BORDER VISUALIZATION GENERATION, AND...
In particular embodiments, a Cross-Border Visualization Generation System is configured to: (1) identify one or more data assets associated with a particular...
2019/0044977 TECHNIQUES TO ENFORCE POLICIES FOR COMPUTING PLATFORM RESOURCES
Various embodiments are generally directed to techniques to enforce policies for computing platform resources, such as to prevent denial of service (DoS)...
2019/0044976 SYSTEMS AND METHODS FOR SECURITY PROTOCOL EXECUTION IN A HIERARCHICAL STATE MACHINE-DRIVEN EXECUTION PLAN
Methods, apparatus, systems and articles of manufacture are disclosed to facilitate information exchange using publish-subscribe with blockchain. An example...
2019/0044975 AUTOMATED PROCESSING OF SUSPICIOUS EMAILS SUBMITTED FOR REVIEW
Systems and methods for enterprise cybersecurity triaging of emails suspected of malicious content. Triaging may include analyzing threat level of email...
2019/0044974 DETECTING MAN IN THE MIDDLE ATTACKS ON A LOCAL AREA NETWORK
Apparatuses, methods, systems, and program products are disclosed for detecting man-in-the-middle attacks on a local area network. A method includes checking a...
2019/0044973 REPLAY PROTECTION FOR MEMORY BASED ON KEY REFRESH
The present disclosure is directed to systems and methods for providing protection against replay attacks on memory, by refreshing or updating encryption keys....
2019/0044972 CONTROL DEVICE, MITIGATION SYSTEM, CONTROL METHOD, AND COMPUTER PROGRAM
A mitigation system comprises a plurality of types of mitigation devices which execute a defense function against an attack, and a control device which...
2019/0044971 TECHNIQUES TO PROVIDE FUNCTION-LEVEL ISOLATION WITH CAPABILITY-BASED SECURITY
Embodiments are directed toward techniques to detect a first function associated with an address space initiating a call instruction to a second function in...
2019/0044970 NETWORK ISOLATION BY POLICY COMPLIANCE EVALUATION
An internal network can include a plurality of linked internal nodes, each internal node being configured to communicate with other internal nodes or with one...
2019/0044969 AGGREGATION OF RISK SCORES ACROSS AD-HOC ENTITY POPULATIONS
The systems and methods described herein, given a population of entities each with associated information technology (IT) security risk scores, computes an...
2019/0044968 METHOD AND SYSTEM FOR UNIQUELY IDENTIFYING A USER COMPUTER IN REAL TIME USING A PLURALITY OF PROCESSING...
A method is provided for identifying a compromised client device from a masquerading device. The method includes capturing a plurality of attributes from a...
2019/0044967 IDENTIFICATION OF A MALICIOUS STRING
Particular embodiments described herein provide for an electronic device that can be configured to identify a string of data to be displayed on a display,...
2019/0044966 SYSTEM AND METHOD FOR IMPLEMENTING DIGITAL CLOUD FORENSICS
The invention relates to digital cloud forensics. An embodiment of the present invention applies collection processes and tools to cloud infrastructure as a...
2019/0044965 SYSTEMS AND METHODS FOR DISCRIMINATING BETWEEN HUMAN AND NON-HUMAN INTERACTIONS WITH COMPUTING DEVICES ON A...
Humans as well as non-human actors may interact with computer devices on a computer network. As described herein, it is possible to train and apply human vs....
2019/0044964 Malware Clustering Approaches Based on Cognitive Computing Techniques
A computer system extracts features of documents that mention malware programs to determine textual features that correspond to individual ones of the malware...
2019/0044963 USER BEHAVIOR ANALYTICS FOR INSIDER THREAT DETECTION
Disclosed in some examples are systems, methods, and machine readable mediums for identifying insider threats by determining file system element activity...
2019/0044962 Method, Apparatus, and Device for Detecting E-mail Attack
A method, an apparatus, and a device for detecting an electronic mail (E-mail) attack. The device receives a data flow, obtains an E-mail traffic parameter of...
2019/0044961 SYSTEM AND METHODS FOR COMPUTER NETWORK SECURITY INVOLVING USER CONFIRMATION OF NETWORK CONNECTIONS
Systems and methods for detecting anomalies in network traffic and providing notification to the users of the computers that generated the network traffic for...
2019/0044960 NETWORK DEVICE AND METHOD FOR DETERMINING SECURITY PROBLEMS IN SUCH A NETWORK DEVICE
To determine if a device is open to the Internet, the device, storing a statistically unique identifier for the device or a group of devices including the...
2019/0044959 MACHINE LEARNING-BASED DETERMINATION OF PROGRAM CODE CHARACTERISTICS
A technique includes processing a plurality of sets of program code to extract call graphs; determining similarities between the call graphs; applying...
2019/0044958 System, Method, and Apparatus for Computer Security
A super-shield system for protecting a computer from malicious software uses a whitelist to determine is a program is safe to run. As new malicious software...
2019/0044957 REGISTRY APPARATUS, AGENT DEVICE, APPLICATION PROVIDING APPARATUS AND CORRESPONDING METHODS
A method for verifying trusted communication between an agent device and an application providing apparatus using a registry apparatus. The registry apparatus...
2019/0044956 Restricting Communications Between Subscriber Machines
A method of transferring information between subscribers associated with a communication service is disclosed. The method includes receiving a first handle...
2019/0044955 STRENGTHENING INTEGRITY ASSURANCES FOR DNS DATA
One or more DNS services are provided that are configured to not only tolerate some commonly observed DNSSEC misconfigurations (while still providing DNSSEC's...
2019/0044954 Methods And Apparatus To Support Reliable Digital Communications Without Integrity Metadata
Before sending a message to a destination device, a source device automatically uses a pattern matching algorithm to analyze entropy characteristics of a...
2019/0044953 SYSTEM AND METHOD FOR CONTROLLING ACCESS TO DATA ASSOCIATED WITH A VENUE-CENTRIC EVENT
A system configured controls access to data associated with a venue-centric event. The system may include one or more hardware processors configured by...
2019/0044952 SYSTEMS AND METHODS FOR PROXIMITY IDENTITY VERIFICATION
Systems and methods are provided for authenticating a user of a computing device. An example system includes a memory storing instructions, and a processor...
2019/0044951 SURVEILLANCE-BASED RELAY ATTACK PREVENTION
In one embodiment, an apparatus comprises an antenna to receive one or more radio signals, wherein the antenna is associated with a proximity-based access...
2019/0044950 Detection of Compromised Access Points
Various embodiments include systems and methods of determining whether a compromised access point is present in a communication network. A processor of a...
2019/0044949 TRUST MANAGEMENT MECHANISMS
Systems, methods, and computer-readable media are provided for managing mutual and transitive trust relationships between resources, such as Fog/Edge nodes,...
2019/0044948 DEVICE ZONING IN A NETWORK GATEWAY DEVICE
The disclosure is directed to a network gateway device ("gateway") that provides various network management features, including a device zoning feature in...
2019/0044947 ON-DEMAND SECURITY POLICY ACTIVATION
On-demand activation of a security policy may be provided. Upon receiving a selection of a link, a profile identified by a security policy associated with the...
2019/0044946 APPARATUS FOR MONITORING FILE ACCESS IN VIRTUAL MACHINE AND METHOD FOR THE SAME
An apparatus for monitoring file access in a virtual machine in a cloud-computing system based on a virtualized environment includes a hypervisor for...
2019/0044945 DETECTION AND PREVENTION OF ATTEMPTS TO ACCESS SENSITIVE INFORMATION IN REAL-TIME
Embodiments of the present invention provide systems and methods for thwarting attempts at the unauthorized access to the restricted resources within the...
2019/0044944 SECURE DEFAULT USER ACCOUNT FOR EMBEDDED SYSTEMS
In an aspect of the disclosure, a method, a computer-readable medium, and an apparatus are provided. The apparatus may be a service processor. The service...
2019/0044943 TWO-CHANNEL AUTHENTICATION PROXY SYSTEM CAPABLE OF DETECTING APPLICATION TAMPERING AND METHOD THEREFOR
The present invention relates to a two-channel authentication proxy system capable of detecting application tampering, and a method therefor, and provides a...
2019/0044942 Deep Learning for Behavior-Based, Invisible Multi-Factor Authentication
Biometric behavior-based authentication may be enhanced by using convolutional deep neural networks to learn subject-specific features for each subject. The...
2019/0044941 SECURITY SERVICE, COMMISSIONING, SELF-SERVICE, AND AREA OWNER MANAGEMENT
An embodiment of a semiconductor package apparatus may include technology to establish communication with a security asset, establish communication with a...
2019/0044940 IDENTITY MANAGEMENT VIA A CENTRALIZED IDENTITY MANAGEMENT SERVER DEVICE
A device can establish an identity for an individual by communicating with a first set of devices. The first set of devices can include a user device, a first...
2019/0044939 Secure Type-Enforced Actions
In some examples, a robot middleware system including a first robot middleware node, a second robot middleware node, and one or more secure encrypted...
2019/0044938 Multi-Persona Management and Devices
A method of installing an application on a device configured with a plurality of personas is disclosed. The method includes receiving an indication to engage a...
2019/0044937 CONTROLLING ACCESS TO TRAVERSAL USING RELAYS AROUND NETWORK ADDRESS TRANSLATION (TURN) SERVERS USING TRUSTED...
Embodiments disclosed provide access to Traversal Using Relays around Network Address Translation (TURN) servers using trusted single-use credentials, and...
2019/0044936 FILE FORMAT AND PLATFORM FOR STORAGE AND VERIFICATION OF CREDENTIALS
In various embodiments, a computer-implemented method for generating and verifying officially verifiable electronic representations may be disclosed. The...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.