Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2019/0058736 Cloud ai engine for malware analysis and attack prediction
Methods and systems are disclosed herein for detecting malicious software executing on a plurality of computing devices. In an exemplary aspect, a method...
2019/0058735 GATEWAY, CLIENT DEVICE AND METHODS FOR FACILITATING SECURE COMMUNICATION BETWEEN A CLIENT DEVICE AND AN...
It is provided a method performed in a gateway and comprises the steps of: receiving a first client request from the client device, the first client request...
2019/0058734 METHODS, APPARATUS AND SYSTEMS TO USE ARTIFICIAL INTELLIGENCE TO DEFINE ENCRYPTION AND SECURITY POLICIES IN A...
Methods, apparatus and articles of manufacture to use artificial intelligence to define encryption and security policies in a software defined data center are...
2019/0058733 REACTIVE AND PRE-EMPTIVE SECURITY SYSTEM FOR THE PROTECTION OF COMPUTER NETWORKS & SYSTEMS
The invention provides mechanisms for enhancing the security and protection of a computer-based system or network. It relates, in part, to the use of a decoy...
2019/0058732 SYSTEM AND METHOD FOR DETECTION AND ISOLATION OF NETWORK ACTIVITY
A security method in a network environment comprising a corporate network populated with one or more devices connectable to the corporate network over a first...
2019/0058731 USER-SIDE DETECTION AND CONTAINMENT OF ARP SPOOFING ATTACKS
Aspects of the disclosure are related to a method, comprising: detecting an incorrect first address to second address mapping in an Address Resolution Protocol...
2019/0058730 SYSTEM AND METHOD TO SPOOF A TCP RESET FOR AN OUT-OF-BAND SECURITY DEVICE
Systems and methods are provided to reset a TCP connection such as in response to a security policy violation. To address reset conditions under RFC 5961, for...
2019/0058729 Local DDOS mitigation announcements in a telecommunications network
Implementations described and claimed herein provide systems and methods for mitigating network threats. In one implementation, a provider edge device of a...
2019/0058728 DATA PROTECTION AND SECURITY FOR IN-VEHICLE SYSTEMS
Methods and systems for ensuring security of in-car systems in vehicles, particularly, user data privacy and protection of in-car systems from cyber attacks,...
2019/0058727 MESSAGE AUTHENTICITY AND RISK ASSESSMENT
Assessing a risk of a message is disclosed. A sender specified by the message is identified. A measure of authenticity that the sender specified by the message...
2019/0058726 DISCOVERING AND PROVISIONING COMPUTING DEVICES IN A SECURITY ENHANCED ENVIRONMENT
Systems and methods for discovering and provisioning computing devices within a computing environment. An example method may comprise: loading a first kernel...
2019/0058725 SECURITY MANAGEMENT PLATFORMS FOR ASSESSING THREATS TO AN INTERNAL NETWORK
Introduced here are threat detection systems configured to assess security threats to an internal network, which may be associated with an organization. A...
2019/0058724 DETERMINING RISK ASSOCIATED WITH INTERNET PROTOCOL (IP) ADDRESSES INVOLVED IN INTERNET COMMUNICATIONS
Introduced here are security management platforms configured to estimate the risk posed by a public communication activity that involves an internal Internet...
2019/0058723 DISCOVERING INTERNET PROTOCOL (IP) ADDRESSES INVOLVED IN FLOWS TRAVERSING THE INTERNET
Introduced here are security management platforms configured to discover traffic flows that involve one or more internal Internet Protocol (IP) addresses that...
2019/0058722 TRAFFIC ENFORCEMENT IN CONTAINERIZED ENVIRONMENTS
A system and method for traffic enforcement in containerized environments. The method includes analyzing contents of a container image to determine a type of...
2019/0058721 Social threat correlation
A computer-implemented method includes scanning data maintained on multiple social networks, where, scanning includes identifying a first set of data that is...
2019/0058720 CONNECTION GATEWAY FOR COMMUNICATING MONITORING AND CONTROL INFORMATION BETWEEN A REMOTELY LOCATED MOBILE...
A home security and control system for monitoring and controlling an external environment such as a home environment comprising: an Internet browser...
2019/0058719 SYSTEM AND A METHOD FOR DETECTING ANOMALOUS ACTIVITIES IN A BLOCKCHAIN NETWORK
A system and a method for detecting anomalous activities in a distributed and decentralised network is provided. Anonymous users transacting in the network are...
2019/0058718 SYSTEMS AND METHODS TO DETECT AND MONITOR DNS TUNNELING
Systems and methods of detecting Domain Name System (DNS) tunnels for monitoring thereof include obtaining data related to DNS traffic between DNS nameservers...
2019/0058717 METHODS AND SYSTEMS FOR IDENTIFYING MALWARE ENABLED BY AUTOMATICALLY GENERATED DOMAIN NAMES
Computerized methods and systems identify malware enabled by automatically generated domain names. An agent executes a malware, in a controlled environment, at...
2019/0058716 CONFIGURATION MANAGEMENT FOR NETWORK ACTIVITY DETECTORS
Network activity detectors, such as firewalls, communicate with one another to form a Unified Threat Management System. A first network activity detector sends...
2019/0058715 MULTI-CLASS DECISION SYSTEM FOR CATEGORIZING INDUSTRIAL ASSET ATTACK AND FAULT TYPES
According to some embodiments, a plurality of monitoring nodes may each generate a series of current monitoring node values over time that represent a current...
2019/0058714 Dynamic Decryption of Suspicious Network Traffic Based on Certificate Validation
A disclosed method performed by a network device can include intercepting cryptographic certificates of host servers received in response to requests for...
2019/0058713 SYSTEMS AND METHODS FOR NETWORK ACCESS GRANTING
A server is provided for managing access of an electronic entity to a communications network. The server includes a contact point in operable communication...
2019/0058712 SYSTEMS AND METHODS FOR DIFFERENTIATED IDENTIFICATION FOR CONFIGURATION AND OPERATION
A differentiated identification system facilitates dynamically differentially morphed access for one or more requesters. The system receives an access request...
2019/0058711 IoT DEVICES WIRELESS NETWORK CONNECTIVITY POLICY MANAGEMENT
A network device receives parameters associated with a usage profile of at least one Internet of Things (IoT) device, where the usage profile specifies a data...
2019/0058710 METHODS, SYSTEMS, AND MEDIA FOR CONTROLLING ACCESS TO CONTENT
Methods, systems, and media for controlling access to content are provided. In some embodiments, the method comprises: receiving a request to modify a first...
2019/0058709 TENANT MANAGEMENT METHOD AND SYSTEM IN A CLOUD COMPUTING ENVIRONMENT
A tenant management system and method operative in a cloud-based database environment. A distributed blockchain ledger is provided for holding tenant records...
2019/0058708 SERVER BASED BIOMETRIC AUTHENTICATION
A server-side biometric authentication system is disclosed that can split data knowledge and processes, so that extensive collusion would be required in order...
2019/0058707 Applicantion User Single Sign On
Systems and methods are disclosed for accessing protected data. A computing device may have a secured stared storage accessible by two or more applications...
2019/0058706 Extending Single-Sign-On to Relying Parties of Federated Logon Providers
Aspects of the disclosure relate to extending single-sign-on to relying parties for federated logon providers. An enterprise identity provider server may...
2019/0058704 SYSTEM AND METHOD FOR MANAGING HETEROGENEOUS COMPUTING ENVIRONMENTS
A framework is provided for managing heterogeneous computing environments. The framework includes at least a first computing device having a Windows based...
2019/0058703 DEVICE AND METHOD FOR AUTHENTICATION
A device and method for user authentication. The device for authentication includes an extraction unit configured to extract a signal feature of a brainwave...
2019/0058702 SELF-ADJUSTING MULTIFACTOR NETWORK AUTHENTICATION
A network authentication device that includes an authentication engine. The authentication engine is configured to receive an authentication key request from a...
2019/0058701 KEY DISTRIBUTION AND AUTHENTICATION METHOD AND SYSTEM, AND APPARATUS
This application provides a key distribution and authentication method, system, and an apparatus. The method includes: a service center server distributes...
2019/0058700 ELASTIC AUTHENTICATION SYSTEM
Embodiments of the invention are directed to a system, method, or computer program product for providing elastic authentication based on a continuum of elastic...
2019/0058699 SYSTEMS AND METHODS FOR MANAGING RESETTING OF USER ONLINE IDENTITIES OR ACCOUNTS
Systems and methods are disclosed for managing the resetting of online identities or accounts of users of Internet web pages. One method includes: receiving,...
2019/0058698 PROTECTION OF A WIRELESS COMMUNICATION FOR VEHICLE ACCESS SYSTEMS
A process for protected data transfer between a mobile ID transmitter and a control device in a motor vehicle includes establishing wireless communication...
2019/0058697 Systems and methods for implementing data communication with security tokens
Network endpoints performing security token procedures are disclosed and described herein. Embodiments include a first endpoint performing functions...
2019/0058696 TECHNIQUES FOR SHARED PRIVATE DATA OBJECTS IN A TRUSTED EXECUTION ENVIRONMENT
Techniques for sharing private data objects in a trusted execution environment using a distributed ledger are described. The techniques described herein may...
2019/0058695 NETWORK SYSTEM, CONTROL APPARATUS, METHOD FOR CONSTRUCTING A VIRTUAL NETWORK, AND PROGRAM
A network system is connected to a first physical network comprising: a first data transmission node that transmits data used for a first service and a second...
2019/0058694 MOBILE VIRTUAL PRIVATE NETWORK CONFIGURATION
Example implementations relate to mobile virtual private network (mVPN) configuration. For example, a system for mVPN configuration may include a configuration...
2019/0058693 Systems and Methods for Securely Transferring Selective Datasets Between Terminals
Systems and methods for securely transmitting data between terminals include receiving, by a first communication device, an internet protocol (IP) packet via a...
2019/0058692 METHOD AND SYSTEM FOR NETWORK TRAFFIC STEERING TOWARDS A SERVICE DEVICE
A method and system for steering network traffic towards a service device. Specifically, the disclosed method and system entail the installation of multiple...
2019/0058691 FLEXIBLE HYBRID FIREWALL ARCHITECTURE
A flexible hybrid firewall architecture that allows a mix of firewalls at end points in front of a target and at the initiator points. Groups of Priv-IDs may...
2019/0058690 DYNAMICALLY ALLOWING TRAFFIC FLOW THROUGH A FIREWALL TO ALLOW AN APPLICATION SERVER DEVICE TO PERFORM...
A network device may receive, a flow control request for a first device that is registered for an internet protocol (IP) pinhole service. The flow control...
2019/0058689 REMOTE NETWORK CONNECTION SYSTEM, ACCESS EQUIPMENT AND CONNECTION METHOD THEREOF
A remote network connection system includes a gateway, a mobile office access equipment and a terminal equipment. The gateway is connected in an enterprise...
2019/0058688 INTERNET PROTOCOL ADDRESS SELECTION IN SESSION INITIATION PROTOCOL COMMUNICATIONS
Examples disclosed herein provide methods and systems for selecting Internet Protocol addresses for Session Initiation Protocol (SIP) communications. In at...
2019/0058687 PERSONAL WEB ADDRESS MANAGEMENT SYSTEM
It is realized that improved processes and systems for delivering personal web content are needed. Various aspects and embodiments are related to systems and...
2019/0058686 Smart Routing Synchronization System for Socializing a Synthetic Rebroadcast and Group Stream
Smart routing synchronization systems socialize a synthetic rebroadcast or group stream for enabling members of a user group to (re)broadcast select content to...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.