Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2019/0116204 HEALTH MONITOR BASED DISTRIBUTED DENIAL OF SERVICE ATTACK MITIGATION
Provided are methods and systems for mitigating a distributed denial of service (DDoS) event. The method may commence with sending a request to a health...
2019/0116203 IDENTIFICATION OF ATTACK FLOWS IN A MULTI-TIER NETWORK TOPOLOGY
Embodiments can provide a computer implemented method in a data processing system comprising a processor and a memory comprising instructions, which are...
2019/0116202 SYSTEMS AND METHODS FOR SELECTIVELY INSULATING A PROCESSOR
The disclosure includes a method for protecting a computer processor system from a harmful communication session from a network linked to the processor system....
2019/0116201 SYSTEM AND METHOD FOR IDENTIFYING AND PREVENTING VULNERABILITY EXPLOITATION USING SYMBOLIC CONSTRAINTS
A system and method for identifying and preventing vulnerability exploitation is provided. The system comprises a processor and memory. The memory stores one...
2019/0116200 METHOD AND SYSTEM FOR PLACING A WORKLOAD ON ONE OF A PLURALITY OF HOSTS
Systems, methods, and other embodiments associated with placing a virtual machine or workload on one of a plurality of hosts are described. In one embodiment,...
2019/0116199 TECHNIQUES FOR PROTECTING APPLICATIONS FROM UNSECURE NETWORK EXPOSURE
A method and system for protecting an application from unsecure network exposure. The method includes identifying at least one port through which the...
2019/0116198 Method For Model Checking On The Design Of Security checking software Of Safety-critical Distributed Storage System
A method for using an advanced software engineering methodology on the design of security checking software for safety-critical distributed storage system...
2019/0116197 METHOD AND SYSTEM TO DETECT ABNORMAL MESSAGE TRANSACTIONS ON A NETWORK
A surveillance system connectable to a network, comprising a communication module and a management module; said system being configured to, during an...
2019/0116196 SYSTEM AND METHOD FOR PROVIDING AN IN-LINE AND SNIFFER MODE NETWORK BASED IDENTITY CENTRIC FIREWALL
The instant disclosure is directed to an attack/unwanted activity detecting firewall for use in protecting authentication-based network resources. The instant...
2019/0116195 DETECTING REMOTE APPLICATION PROFILING
Systems, methods, and software can be used to detect remote application profiling. In some aspects, one computer-implemented method includes receiving, over a...
2019/0116194 Digital Safety and Account Discovery
Methods, computer-readable media, software, and apparatuses may assist a consumer in keeping track of a consumer's accounts in order to prevent unauthorized...
2019/0116193 RISK ASSESSMENT FOR NETWORK ACCESS CONTROL THROUGH DATA ANALYTICS
Methods and systems of risk assessment for network access control through data analytics. An embodiment of the invention employs well-known machine-learning...
2019/0116192 Dynamic Detection of Unauthorized Activity in Multi-Channel System
Systems for dynamically detecting unauthorized activity are provided. A system may receive data from one or more computing devices associated with one or more...
2019/0116191 Method and Apparatus for Remote Malware Monitoring
A method executable via operation of configured processing circuitry to identify applications by remote monitoring may include initiating remote communication...
2019/0116190 User Behavior Profile Environment
A system, method, and computer-readable medium are disclosed for monitoring user behavior elements, comprising: monitoring electronically-observable user...
2019/0116189 METHODS FOR CONTROLLING A DEVICE AND CONTROL SYSTEM
A method for controlling a device includes: sending a command signed by an operator's signature to a server; verifying, in the server, that the operator is...
2019/0116188 SYSTEM AND METHOD FOR SECURE INDIVIDUAL IDENTIFICATION ACROSS MULTIPLE DISPARATE ENTITLES
An entity communicates with a central authority to issue an asset to an individual. The asset has associated therewith a distinct URI or "unique ID". The asset...
2019/0116187 MULTICOMPUTER PROCESSING OF USER DATA WITH CENTRALIZED EVENT CONTROL
Aspects of the disclosure relate to multicomputer processing of data from social media service computing platforms and other sources with centralized event...
2019/0116186 ENTERPRISE CLOUD ACCESS CONTROL AND NETWORK ACCESS CONTROL POLICY USING RISK BASED BLOCKING
A cloud access control server and method provides a cloud service access control database to implement cloud services access control policy. The cloud service...
2019/0116185 ACCESS AUTHORITY MANAGEMENT METHOD, ACCESS AUTHORITY MANAGEMENT SYSTEM, AND ACCESS AUTHORITY MANAGEMENT APPARATUS
In an access authority management system constituting a business network by predetermined business entities, a predetermined node is configured to execute a...
2019/0116184 ASSEMBLY AND METHOD FOR ACCESSING SECURE NETWORKS USING OPTICALLY-SENSED INFORMATION
An assembly includes an optical sensor configured to optically detect information printed or displayed on an object. The information includes one or more of an...
2019/0116183 FAST HEARTBEAT LIVENESS BETWEEN PACKET PROCESSING ENGINES USING MEDIA ACCESS CONTROL SECURITY (MACSEC)...
A device may include one or more processors to establish a media access control security (MACsec) key agreement (MKA) session between a first network device...
2019/0116182 SYSTEM AND METHOD FOR PROXYING FEDERATED AUTHENTICATION PROTOCOLS
A system and method that include receiving a service provider identity request through a protocol; transmitting a proxy identity request to a configured...
2019/0116181 USER AUTHENTICATION METHOD, EVALUATION DEVICE, NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUM, AND USER...
In an evaluation device, a receiver part receives, from an authentication device, a hash value of a user identifier for identifying a user, which is generated...
2019/0116180 AUTHENTICATION SYSTEM, AUTHENTICATION METHOD, AND PROGRAM
An authentication system is provided with: a user device; user side assistance device(s) to assist user authentication that authenticates a user of the user...
2019/0116179 SYSTEM, METHOD AND APPARATUS FOR DEVICE AUTHENTICATION
An authentication method including: receiving a service request from a terminal device to access a service, the service request including authentication...
2019/0116178 APPLICATION ERROR FINGERPRINTING
According to some embodiments, an application error detection platform computer processor may monitor execution of an application for a customer and determine...
2019/0116177 AUTHENTICATION SYSTEM
A method for authenticating a user for performing a transaction comprises receiving unique knowledge of the user such as photoauthentication, and receiving a...
2019/0116176 SYSTEMS AND METHODS FOR PRODUCT AUTHENTICATION
The present invention relates to systems for product authentication. Unique identifiers are associated with products. Said identifiers are captured through a...
2019/0116175 INFORMATION PROCESSING APPARATUS, CONTROL METHOD OF INFORMATION PROCESSING APPARATUS, AND PROGRAM
An information processing apparatus constructs virtual environments, and includes: a first storage provided in a first virtual environment, the first storage...
2019/0116174 SELECTING AND SECURING PROOF DELGATES FOR CRYPTOGRAPHIC FUNCTIONS
The disclosed technology is generally directed to cryptographic functions for smart contracts. In one example of the technology, a request for cryptographic...
2019/0116173 CONTEXT AND DEVICE STATE DRIVEN AUTHORIZATION FOR DEVICES
In some examples, a target device may store a policy that includes one or more conditions. For example, a condition of the policy may specify that each device...
2019/0116172 AGGREGATION PLATFORM FILTER
Apparatuses, systems, methods, and computer program products are presented for an aggregation platform filter. A hardware computing device is configured to...
2019/0116171 AGGREGATION PLATFORM PORTAL
Apparatuses, systems, methods, and computer program products are presented for an aggregation platform portal. A hardware computing device is configured to...
2019/0116170 APPARATUS AND METHOD FOR CONTAINERIZATION AT A CLUSTER
Tenant-specific data required for use by a software analytic at an edge node is obtained. The software analytic is associated with a single tenant. The...
2019/0116169 REAL-TIME DATA FOR ACCESS CONTROL APPROVAL
An approval service is provided that provides an approver, that controls a secured resource, real-time data that verifies the identity of a user or approvee...
2019/0116168 AUTHENTICATION FOR COMPUTING SYSTEMS
Various examples are directed to system and methods for authenticating a first computing system and a second computing system. The first computing system may...
2019/0116167 SECURE, CUSTOMER-CONTROLLED STORAGE FOR CLOUD-MANAGED MEETING DETAILS
Embodiments are described for securing access to sensitive information used by on-premises devices in a distributed system. For example, embodiments include...
2019/0116166 SYSTEM AND METHOD FOR SECURE MESSAGING IN A HYBRID PEER-TO-PEER NETWORK
An improved system and method are disclosed for peer-to-peer communications. In one example, the method enables endpoints to securely send and receive messages...
2019/0116165 APPARATUSES AND METHODS for GENERATING DOMAIN-SPECIFIC CODES
An example communications apparatus includes a plurality of communicatively-interconnected communication domains and an electronic switch, integrated as part...
2019/0116164 SECURE PROCESSING ENVIRONMENT FOR PROTECTING SENSITIVE INFORMATION
A processor-implemented method for a secure processing environment for protecting sensitive information is provided. The processor-implemented method may...
2019/0116163 EFFICIENT COMMON STORAGE OF PARTIALLY ENCRYPTED CONTENT
Techniques and mechanisms described herein facilitate the efficient common storage of partially encrypted content. According to various embodiments, a client...
2019/0116162 METHOD FOR ENCRYPTING VOICE IN VOICE COMMUNICATIONS, CALLING TERMINAL AND CALLED TERMINAL, AND SYSTEM
An embodiment of the disclosure provides a voice communication method, a calling terminal, a called terminal and a system, the voice communication method...
2019/0116161 SECURE COMMUNICATION METHOD AND APPARATUS FOR VEHICLE, MULTIMEDIA SYSTEM FOR VEHICLE, AND VEHICLE
The present application discloses a method and a device for vehicle security communication, a vehicle multimedia system, and a vehicle. The method applied to a...
2019/0116160 METHOD TO TRACK SSL SESSION STATES FOR SSL OPTIMIZATION OF SAAS BASED APPLICATIONS
Described embodiments provide systems and methods for initiating establishment of a connection. The system may include a device intermediary between a client...
2019/0116159 AGILE PROTOCOL FOR SECURE COMMUNICATIONS WITH ASSURED SYSTEM AVAILABILITY
A method of transmitting data over a computer network includes, at an originating terminal connected to the computer network, receiving a stream of data and...
2019/0116158 DETERMINE PAYLOAD INTEGRITY FOR TRAFFIC FLOWING ACROSS PROXIES
In a network that includes a client, a server and one or more proxy entities that intercept network traffic between the client and the server, a...
2019/0116157 INFORMATION PROCESSING METHOD, INFORMATION PROCESSING SYSTEM, AND NON-TRANSITORY COMPUTER-READABLE RECORDING...
An information processing method of processing data frames flowing over an onboard network includes a frame collecting step of obtaining, from each of received...
2019/0116156 SYSTEMS AND METHODS FOR PROTECTING NETWORK DEVICES BY A FIREWALL
Embodiments of the present disclosure help protect network devices from unauthorized access. Among other things, embodiments of the disclosure allow full...
2019/0116155 DOMAIN NAME SYSTEM BYPASS IN USER APPLICATIONS
Disclosed herein are methods, systems, and software for bypassing a domain name system. In one example, a method of operating a user communication device...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.