Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2019/0124108 Multiple Presentation Fidelity-Level Based Quantitative Cyber Risk Decision Support System
A multiple presentation fidelity-level based quantitative cyber risk decision support system. The system comprises a processor, a memory, a data store...
2019/0124107 SECURITY MANAGEMENT FOR DATA SYSTEMS
Implementations of the present disclosure relate to methods, systems, and computer program products for security management. In one implementation, a...
2019/0124106 EFFICIENT SECURITY THREAT REMEDIATION
Techniques for efficient remediation of enterprise security threats are disclosed that use historical remediation implementations and security vulnerability...
2019/0124105 CONFIGURING THE GENERATION OF ADDITIONAL TIME-SERIES EVENT DATA BY REMOTE CAPTURE AGENTS
The disclosed embodiments provide a system that facilitates the processing of network data. During operation, the system provides a risk-identification...
2019/0124104 Graph-Based Network Anomaly Detection Across Time and Entities
The disclosed techniques relate to a graph-based network security analytic framework to combine multiple sources of information and security knowledge in order...
2019/0124102 System and Method of Protecting A Network
There is provided a network appliance, methods and systems which intercept web and email traffic, extract executables, compare the executables with a policy...
2019/0124101 COGNITIVE INFORMATION SECURITY USING A BEHAVIORAL RECOGNITION SYSTEM
Embodiments presented herein describe a method for processing streams of data of one or more networked computer systems. According to one embodiment of the...
2019/0124100 ROBOTIC PROCESS AUTOMATION RESOURCE INSULATION SYSTEM
A system for implementing robotic process automation (RPA) to enhance computer network security. Specifically, RPA is used to detect an unauthorized attempt to...
2019/0124099 ANOMALY DETECTION IN A DATA STREAM
There is provided a method for detecting an anomaly in plurality of data streams originating from a system or network of systems. Data streams are collected...
2019/0124098 SERVER-CLIENT AUTHENTICATION WITH INTEGRATED STATUS UPDATE
An endpoint in a network periodically generates a heartbeat encoding health state information and transmits this heartbeat to other network entities....
2019/0124097 DETECTING LATERAL MOVEMENT BY MALICIOUS APPLICATIONS
Attempts at lateral movement are detected by monitoring failed login attempts across a number of endpoints in a network. By configuring endpoints across the...
2019/0124096 CHANNEL DATA ENCAPSULATION SYSTEM AND METHOD FOR USE WITH CLIENT-SERVER DATA CHANNELS
Systems and methods are disclosed that relate to network security to monitor and report threats in network traffic of a datacenter. For example, one embodiment...
2019/0124095 INTEGRATED NETWORK INTRUSION DETECTION
Intrusion preludes may be detected (including detection using fabricated responses to blocked network requests), and particular sources of network ...
2019/0124094 ACTIVE PRIORITIZATION OF INVESTIGATION TARGETS IN NETWORK SECURITY
In one embodiment, a device analyzes network traffic data using a clustering process, to identify a cluster of addresses associated with the network traffic...
2019/0124093 Detecting IP Address Theft in Data Center Networks
Theft detection in data center networks may be provided. First, a first leaf switch may create an entry in a first distributed secure cache in response to an...
2019/0124092 Detection of Remote Fraudulent Activity in a Client-Server-System
Detecting unauthorized access to a device is detected in embodiments of the disclosed technology. After downloading a webpage, code is executed in a browser to...
2019/0124091 VEHICLE COMMUNICATION APPARATUS, IN-VEHICLE NETWORK SYSTEM, AND VEHICLE COMMUNICATION METHOD
An electronic control unit is connected to an in-vehicle network bus in an in-vehicle network system. The electronic control unit includes a first control...
2019/0124090 SYSTEM AND METHOD FOR ACCESS CONTROL USING NETWORK VERIFICATION
A system for controlling access includes a computing device, configured to: determine a first identifier associated with a first access point being used by the...
2019/0124089 SECURE FILE TRANSACTION SYSTEM
Embodiments of a secure file transaction system employ a host to receive a file manipulation request for a secure file from a requester, determine whether the...
2019/0124088 AUTOMATIC HOLDING OF TRANSMISSIONS UNTIL VERIFICATION COMPLETE
Techniques for ensuring verification before transmission of electronic messages are disclosed herein. In some embodiments, a computer-implemented method...
2019/0124087 DESCENDENT CASE ROLE ALIAS
Case management systems and techniques are disclosed. In various embodiments, a definition is received that associates a descendant case role alias with a...
2019/0124086 WEBSITE MONITORING SYSTEM AND MONITORING METHOD
The present invention relates to a website monitoring system. The website monitoring system according to the present invention monitors web information stored...
2019/0124085 PRINCIPAL ACCESS DETERMINATION IN AN ENVIRONMENT
An access determination management system obtains information regarding various different entities in a system (e.g., a networked environment) and what rights...
2019/0124084 SECURE ACCESS MANAGEMENT FOR TOOLS WITHIN A SECURE ENVIRONMENT
A method, system and computer program product for secure access management for tools within a secure environment. A virtual file system for a user in memory on...
2019/0124083 SYSTEM AND METHOD FOR LINKING PRE-INSTALLED SOFTWARE TO A USER ACCOUNT ON AN ONLINE STORE
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for associating an application that was pre-installed on a computer...
2019/0124082 Cross Device User Identification
Browser requests are received and data included in it is added to a vector. If explicit identification information (username, cookie data, etc.) is present,...
2019/0124081 METHODS AND SYSTEMS FOR PROVIDING FIDO AUTHENTICATION SERVICES
FIDO ("Fast IDentity Online") authentication processes and systems are described. In an embodiment, a FIDO information systems (IS) computer system receives a...
2019/0124080 ONLINE IDENTITY VERIFICATION PLATFORM AND PROCESS
An online identity verification application may be provided. According to an exemplary embodiment, an online identity verification application may utilize...
2019/0124079 SYSTEM AND METHOD FOR BIOMETRIC AUTHENTICATION IN CONNECTION WITH CAMERA-EQUIPPED DEVICES
The present invention relates generally to the use of biometric technology for authentication and identification, and more particularly to non-contact based...
2019/0124078 SECURE INTERACTIVE VOICE RESPONSE
Aspects of the embodiments are directed to systems, methods, and computer program products that facilitate authentication of a user for providing ...
2019/0124077 METHOD AND SYSTEM FOR ENHANCED VALIDATION OF CRYPTOGRAMS IN CLOUD-BASED SYSTEMS
A method for enhanced validation of cryptograms for varying account number lengths includes: storing one or more primary account numbers and a plurality of...
2019/0124076 METHOD AND SYSTEM FOR VERIFYING AN ACCOUNT OPERATION
Method and server system for user login verification are disclosed. The method includes: obtaining a verification request from a first device for an account...
2019/0124075 Delivering Personalized Content to Authenticated User Devices
Techniques for generated scannable coded images or user actionable-link with corresponding personalized content are described. In an example embodiment, the...
2019/0124074 SYSTEM AND METHOD FOR COMMUNICATING WITH A SERVICE PROCESSOR
The present disclosure relates to a method for using a service processor to communicate with a remote component. The method may involve using the service...
2019/0124073 SINGLE SIGN-ON FOR MANAGED MOBILE DEVICES
Disclosed are various examples for single-sign on by way of managed mobile devices. For example, an identity provider service can receive a request for an...
2019/0124072 END TO END SECURE IDENTIFICATION AND VERIFICATION OF USERS FOR ORGANIZATIONS ON MULTITENANT PLATFORM
Embodiments of the present invention teach use of a single-platform with its own authentication-process (i.e., its own "single-platform-authentication-process"...
2019/0124071 ACCESS TO NETWORK DATA FROM A PLURALITY OF SOURCES USING A SINGLE IDENTIFICATION VALUE
A method for accessing network data from a plurality of sources using a single identification value. The method may include the steps of: receiving the single...
2019/0124070 AUTHENTICATION TOKEN WITH CLIENT KEY
Techniques are described for using two tokens to request access to a secure server. The tokens allow the server to verify, without an external call, that the...
2019/0124069 PRIVATE SIMULTANEOUS AUTHENTICATION OF EQUALS
A passphrase is assigned to an end user device for use in authenticating the end user device for a network using SAE. An identification of the end user device...
2019/0124068 MULTI-STEP AUTHENTICATION USING OBJECTIVE AND SUBJECTIVE CREDENTIALS
Multi-step user authentication combines steps of authenticating both objective and subjective credentials. A user selects objective credentials, such as a...
2019/0124067 MULTI-STEP AUTHENTICATION USING OBJECTIVE AND SUBJECTIVE CREDENTIALS
Multi-step user authentication combines steps of authenticating both objective and subjective credentials. A user selects objective credentials, such as a...
2019/0124066 USER SELECTED KEY AUTHENTICATION
Methods, systems, and devices for user authentication are described. A user may attempt an authentication procedure when accessing an application or cloud...
2019/0124065 Variable-Step Authentication for Communications in Controlled Environment
A variable-step authentication system and a method for operating for performing variable-step authentication for communications in a controlled environment is...
2019/0124064 ISOLATING NETWORKS AND CREDENTIALS USING ON-DEMAND PORT FORWARDING
An allowed client server, that is authorized to access a resource server over a given port, receives a client request, from a client computing system, to...
2019/0124063 TWO-FACTOR AUTHENTICATION SYSTEMS AND METHODS
A method including: receiving, from an application executing on a computing device and by an authentication process executing on the computing device, data...
2019/0124062 SYSTEMS AND METHODS FOR VERIFYING ATTRIBUTES OF USERS OF ONLINE SYSTEMS
For sharing of information in a virtual or online environment, methods and systems are provided which enable verifying attributes of an individual. An...
2019/0124061 RESOURCE TRANSFER SETUP AND VERIFICATION
Systems and techniques are provided for a resource transfer setup and verification. A request for transfer conditions for a transfer of resources may be...
2019/0124060 PROVIDING DOMAIN-JOINED REMOTE APPLICATIONS IN A CLOUD ENVIRONMENT
Embodiments are directed to provisioning private virtual machines in a public cloud and to managing private virtual machines hosted on a public cloud. In one...
2019/0124059 METHOD TO IDENTIFY USERS BEHIND A SHARED VPN TUNNEL
Transparently identifying users using a shared VPN tunnel uses an innovative method to detect a user of a shared VPN tunnel, after authenticating the user,...
2019/0124058 TERMINAL DEVICE, KEY DISTRIBUTION MANAGEMENT DEVICE, SERVER-CLIENT SYSTEM, COMMUNICATION METHOD, AND PROGRAMS
To provide a terminal device that can share a session key for use in encryption communication with multiple terminal devices at a certain timing without...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.