Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2019/0132359 Dynamically Configuring A Honeypot
A computer-implemented method includes crawling, by a web crawler, one or more webpages to gather information, resulting in gathered information. The...
2019/0132358 Deception Network System
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for implementing deception networks. One of the systems...
2019/0132357 Systems and Methods for Detecting Online Fraud
Described systems and methods enable a swift and efficient detection of fraudulent Internet domains, i.e., domains used to host or distribute fraudulent...
2019/0132356 Systems and Methods to Detect and Notify Victims of Phishing Activities
Systems and methods to detect the identities of victims of phishing activities, in which embedding, in an item, an element having a reference to a server, is...
2019/0132355 MALICIOUS SCRIPT DETECTION
Systems and methods for detecting malicious or potenitally malicious script data are provided. Script data is extracted from a data stream at the network level...
2019/0132354 IMAGE PROCESSING SYSTEM AND IMAGE PROCESSING UNIT FOR GENERATING ATTACK IMAGE
An image processing system for generating an attack image includes an attack network, and a plurality of image classification networks for an attack target,...
2019/0132353 SERVICE OVERLOAD ATTACK PROTECTION BASED ON SELECTIVE PACKET TRANSMISSION
A first computing system receives a user request. The user request includes a first set of data. The first computing system determines that one or more...
2019/0132352 NEARLINE CLUSTERING AND PROPAGATION OF ENTITY ATTRIBUTES IN ANTI-ABUSE INFRASTRUCTURES
The disclosed embodiments provide a system for processing actions with a service. During operation, the system obtains a first attribute associated with a...
2019/0132351 METHOD AND APPARATUS FOR DATA SECURITY ANALYSIS OF DATA FLOWS
A method and apparatus useful for data risk monitoring and management includes configuration and analysis of data flows to identify and assess risk and...
2019/0132350 SYSTEM AND METHOD FOR VALIDATION OF DISTRIBUTED DATA STORAGE SYSTEMS
Provided herein is a risk framework tool for a distributed ledger-based computing system (i.e., blockchain) that can present a common risk framework to a user...
2019/0132349 AUDITING DATABASES FOR SECURITY VULNERABILITIES
Disclosed herein are methods, systems, and processes to audit databases for security vulnerabilities. A server connects to a database and retrieves security...
2019/0132348 VULNERABILITY SCANNING OF ATTACK SURFACES
A method includes: identifying, by a runtime instrumentation agent of a web server, a plurality of attack surfaces of a web application executed on the web...
2019/0132347 BROKERED COMMUNICATION PROTOCOL USING INFORMATION THEORETIC CODING FOR SECURITY
A network device receives an enrollment request from a first device to enroll in a brokered communication protocol for communicating with at least one second...
2019/0132346 Distributed Data Surveillance in a Community Capture Environment
Data surveillance techniques are presented for the detection of security issues, especially of the kind where privileged data may be stolen by steganographic,...
2019/0132345 APPARATUS FOR NETWORK FUNCTION VIRTUALIZATION USING SOFTWARE DEFINED NETWORKING AND OPERATION METHOD THEREOF
A network function virtualization (NFV) apparatus according to the present disclosure may include: a virtual machine which is configured to perform a first...
2019/0132344 METHOD AND SYSTEM FOR EMPLOYING GRAPH ANALYSIS FOR DETECTING MALICIOUS ACTIVITY IN TIME EVOLVING NETWORKS
Disclosed is a method and system for detecting malicious entities and malicious behavior in a time evolving network via a graph framework by modeling activity...
2019/0132343 METHOD AND SYSTEM FOR GENERATING SYNTHETIC FEATURE VECTORS FROM REAL, LABELLED FEATURE VECTORS IN ARTIFICIAL...
Identifying and detecting threats to an enterprise system groups log lines from enterprise data sources and/or from incoming data traffic. The process applies...
2019/0132342 DETECTING ANOMOLOUS NETWORK ACTIVITY BASED ON SCHEDULED DARK NETWORK Addresses
A technique includes dynamically assigning, by a server, network addresses selected from a plurality of network addresses to network devices of a network based...
2019/0132341 Identifying Anomalies in a Network
Various implementations disclosed herein enable identifying anomalies in a network. For example, in various implementations, a method of identifying anomalies...
2019/0132340 CYBER SECURITY SYSTEM FOR INTERNET OF THINGS CONNECTED DEVICES
A security system may include a normally open relay between an external network connection and at least one internal network connection, a network controller,...
2019/0132339 MULTI-GHZ GUARD SENSOR FOR DETECTING PHYSICAL OR ELECTROMAGNETIC INTRUSIONS OF A GUARDED REGION
A guard sensor injects a multi-GHz (multi giga-bit) guard signal along a guard signal transmission path above an observable knee in the amplitude response of...
2019/0132338 SYSTEM AND METHOD FOR CONDUCTING A SECURED COMPUTER BASED CANDIDATE ASSESSMENT
A system and method for conducting a computer based candidate assessment in an examination center has been described. The system primarily involves a candidate...
2019/0132337 Consumer Threat Intelligence Service
Methods, computer-readable media, software, and apparatuses may assist in proactively warning a consumer they are a victim or possible target of a cyber-attack...
2019/0132336 SYSTEM FOR ACROSS RAIL SILO SYSTEM INTEGRATION AND LOGIC REPOSITORY
Systems, computer program products, and methods are described herein for the creation of an exposure identification and distribution system for across silo...
2019/0132335 SYSTEM AND METHOD FOR DETECTING A COMPROMISED COMPUTING SYSTEM
A digital security threat management system is disclosed. The system detects the presence of a computing system, on a network, that has been compromised by an...
2019/0132334 SYSTEM AND METHOD FOR ANALYZING BINARY CODE FOR MALWARE CLASSIFICATION USING ARTIFICIAL NEURAL NETWORK TECHNIQUES
A system for detecting whether a file including content s associated with a cyber-attack is described. The content may include an executable file for example....
2019/0132333 IDENTITY AND TRUSTWORTHINESS VERIFICATION USING ONLINE AND OFFLINE COMPONENTS
Methods and systems for verifying the identity and trustworthiness of a user of an online system are disclosed. In one embodiment, the method comprises...
2019/0132332 AUTHENTICATED DATA STREAMING
A data-collecting device acquires data associated with a real-time data stream and transmits the data to a data-consuming service hosted on a server computer...
2019/0132331 SECURE ADAPTIVE WIRELESS COMMUNICATIONS
A communication device includes a directional antenna, and a control circuit. The directional antenna has a directional radiation pattern for directing greater...
2019/0132330 METHOD AND ARRANGEMENT FOR CONFIGURING A SECURE DOMAIN IN A NETWORK FUNCTIONS VIRTUALIZATION INFRASTRUCTURE
It is disclosed a method, an arrangement and a computer program for configuring a secure domain, SD, in a network functions virtualization infrastructure. The...
2019/0132329 A COMPUTING CLOUD FOR MONITORING PHYSICAL ENVIRONMENTS
Disclosed is a computing cloud for monitoring physical environments. The computing cloud comprises at least one data storage unit that is configured to store...
2019/0132328 CROSS CHANNEL AUTHENTICATION ELEVATION VIA LOGIC REPOSITORY
Systems, computer program products, and methods are described herein for elevated authentication model using cross-channel data. The present invention is...
2019/0132327 SYSTEMS AND METHODS FOR ACCESS TO ELECTRONIC DATA
Systems, methods, and machine readable medium are provided for improving access to electronic data. An application is provided that generates a graphical user...
2019/0132326 Software Defined Network for Creating a Trusted Network System
Implementations of a software-defined network perimeter system may include: a security standards server configured to send an installer to a first client...
2019/0132325 RESOURCE-BASED SELECTION OF IDENTITY PROVIDER
The automatic selection of an identity provider to be used to authenticate users when requesting to access network resources for a tenant. The authentication...
2019/0132324 REMOTE LOCKING A MULTI-USER DEVICE TO A SET OF USERS
Methods and devices for restricting access to a computer device may include receiving a lost device message including a device identifier identifying the...
2019/0132323 SYSTEMS AND METHODS FOR DYNAMICALLY ADJUSTING A PASSWORD ATTEMPT THRESHOLD
A system for dynamically adjusting a default password attempt threshold is provided. The system includes a server for storing the digital account, and a...
2019/0132322 NETWORK ACCESS CONTROL
This disclosure provides a method and device for controlling network access. According to the method, an aggregation switch may configure thereon an ACL rule...
2019/0132321 Securely Managing Digital Assistants that Access Third-Party Applications
Systems herein allow a digital assistant to make requests to applications, such as third-party applications, that access data in an enterprise mobility...
2019/0132319 SYSTEM AND METHOD FOR AUTHENTICATING OUTSIDE PARTIES FOR COMMUNICATION WITH INMATES OF A CONTROLLED ENVIRONMENT
A system and method are disclosed for registering outside parties for communications inmates, and for processing communications between the inmates and outside...
2019/0132318 NETWORK SYSTEM
A network system that can easily augment security is provided. The network system includes an information device included in an internal network connected to...
2019/0132317 Third-Party Authorization of Access Tokens
A method for third-party authorization is presented. A client request is received by a resource server in a computer system from a client, wherein the client...
2019/0132316 SYSTEMS AND METHODS FOR REGISTERING AND LOCALIZING BUILDING SERVERS FOR CLOUD-BASED MONITORING AND CONTROL OF...
Disclosed are systems and methods for registering and localizing a building server. A system comprises a building server communicatively coupled with a...
2019/0132315 Methods for Internet Communication Security
The present disclosure relates to network security software cooperatively configured on plural nodes to authenticate and authorize devices, applications,...
2019/0132314 SYSTEMS AND METHODS OF SERVERLESS MANAGEMENT OF DATA MOBILITY DOMAINS
Techniques for managing data mobility domains in storage system environments. The techniques employ a multiple master approach, in which each storage system in...
2019/0132313 SYSTEM AND METHOD OF SECURE ENCRYPTION FOR ELECTRONIC DATA TRANSFER
A system for secure transfer of encrypted data involves a sender client, a recipient client, a main server, and a key server. The sender client receives...
2019/0132312 Universal Identity Validation System and Method
The Universal Identity Validation System and Method (UIVSM) is a novel system and method for validating identity of membership on behalf of third-party...
2019/0132311 ELECTRONIC CONTROL DEVICE, COMMUNICATION MANAGEMENT METHOD, AND NON-TRANSITORY STORAGE MEDIUM STORING PROGRAM
An electronic control device, a communication management method performable, and a non-transitory storage medium storing a program are disclosed. The...
2019/0132310 Server authentication using multiple authentication chains
A client seeking to establish a cryptographically-secure channel to a server has an associated public key acceptance policy. The policy specifies a required...
2019/0132309 DIGITAL CERTIFICATE MANAGEMENT
A mapping relationship of a device ID associated with a client, a certificate ID associated with a certificate to be applied by the client during a certificate...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.