Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2019/0141066 Detecting malicious network activity using time series payload data
Methods and systems for detecting malicious network activity. The method may include analyzing payload data relating to activity on one or more virtual...
2019/0141065 Neutralizing malicious locators
Methods and systems for neutralizing malicious locators. Threat actors may shut down their web pages or applications (i.e., resources) that serve malicious...
2019/0141064 DETECTING ATTACKS AGAINST A SERVER COMPUTER BASED ON CHARACTERIZING USER INTERACTIONS WITH THE CLIENT COMPUTING...
A computer-implemented method includes providing, for use by a third-party, injectable computer code that is capable of being served with other code provided...
2019/0141063 SYSTEMS AND METHODS FOR COMPUTER ENVIRONMENT SITUATIONAL AWARENESS
Systems and methods for monitoring states of operation of a computer environment can include one or more computer servers identifying a target asset of the...
2019/0141062 METHODS AND SYSTEMS FOR MALWARE DETECTION
According to some embodiments, a method for training a malware detector comprising a deep learning algorithm is described, which comprises converting a set of...
2019/0141061 METHODS AND DEVICES FOR AUTOMATICALLY DETECTING ATTACK SIGNATURES AND GENERATING ATTACK SIGNATURE IDENTIFICATIONS
Network traffic management apparatuses, systems, methods, and computer-readable media for automatically detecting attack signatures and generating attack...
2019/0141060 PARALLELISM AND N-TIERING OF KNOWLEDGE INFERENCE AND STATISTICAL CORRELATION SYSTEM
An n-tiering security threat inference and correlation apparatus (100) for monitoring and anticipating cyber attacks is disclosed. The apparatus comprises a...
2019/0141059 INTRUSION DETECTION APPARATUS AND COMPUTER READABLE MEDIUM
A state management unit (210) identifies a state of an operational system, and determines presence or absence of a state transition of the operational system...
2019/0141058 DETECTION OF ADVERSARY LATERAL MOVEMENT IN MULTI-DOMAIN IIOT ENVIRONMENTS
Implementations are directed to methods for detecting and identifying advanced persistent threats (APTs) in networks, including receiving first domain activity...
2019/0141057 AUTOMATED DETECTION OF PHISHING CAMPAIGNS VIA SOCIAL MEDIA
Methods and systems for automatically detecting and responding to phishing campaigns are described herein. Real-time feeds may be streamed from one or more...
2019/0141056 PHYSICAL LAYER ROGUE DEVICE DETECTION
Systems and methods for detecting a rogue network device at a physical layer include obtaining physical layer characteristics of a link between a first network...
2019/0141055 PREVENTING EXECUTION OF PROGRAMS THAT ARE EMBEDDED IN EMAIL MESSAGES
Systems and methods are presented which generate modified email messages, which are largely devoid of embedded functions, from original email messages, which...
2019/0141054 METHOD AND APPARATUS FOR BLOCKCHAIN POWERED INTEGRITY PROTECTION SYSTEM
Various embodiments relate to a method and apparatus for using blockchains as an integrity tracking tool for network elements, the method including the steps...
2019/0141053 ENHANCING INTEGRITY OF DATA CENTER SPECIFIC INFORMATION
There is provided a method comprising: receiving, by an apparatus of a data center, a request message from a server computer of said data center, the apparatus...
2019/0141052 Differentially Private Processing and Database Storage
A hardware database privacy device is communicatively coupled to a private database system. The hardware database privacy device receives a request from a...
2019/0141051 COMPUTATION SYSTEM, COMPUTATION DEVICE, METHOD THEREOF, AND PROGRAM
A computation device accepts a first processing request output from a first external device, executes first processing, which does not involve outputting...
2019/0141050 ACCESS CONTROL SYSTEM AND METHOD
A team-centric computerized access control system includes at least one data record, one or more collaboration spaces associated with the data record, and for...
2019/0141049 ENFORCING DATA SECURITY IN A CLEANROOM DATA PROCESSING ENVIRONMENT
Techniques for enforcing data security in a cleanroom data processing environment are described herein. In one or more embodiments, a virtual private cloud...
2019/0141048 BLOCKCHAIN IDENTIFICATION SYSTEM
A computing device comprises a processor module executing software to conduct a transaction, a networking module enabling connections to a peer-to-peer...
2019/0141047 VEHICLE NETWORK ACCESS CONTROL METHOD AND INFOTAINMENT APPARATUS THEREFOR
Disclosed is a vehicle network access control method and infotainment apparatus thereof. According to one aspect of the present disclosure, a vehicle network...
2019/0141046 SYSTEM AND METHOD FOR EMBEDDING FIRST PARTY WIDGETS IN THIRD-PARTY APPLICATIONS
Methods and systems for providing a third party application with access to files stored on a server are disclosed. A method may include receiving, from a...
2019/0141045 OBSERVATION SYSTEM
Embodiments of an observation system are disclosed herein. The observation system includes at least one observation device having at least one observation unit...
2019/0141044 Method and System to Enable Controlled Safe Internet Browsing
Various embodiments provide an approach to controlled access of websites based on website content, and profile for the person consuming the data. In operation,...
2019/0141043 System and Method for Managing Electronic Interactions Based on Defined Relationships
Aspects of the subject disclosure may include, for example, a process that includes receiving first input defining a relationship between first and second...
2019/0141042 CONTROLLING ACCESS TO A HOST SITE USING A PERSONAL IDENTIFICATION VIDEO
Methods, systems and computer program products for controlling access to a host site are provided. Aspects include receiving, receiving an authentication video...
2019/0141041 REMOTE DIRECT MEMORY ACCESS AUTHORIZATION
Provided is a process of determining whether remote direct memory access requests are authorized, including: receiving a request to authorize a remote direct...
2019/0141040 SCALABLE UNIVERSAL FULL SPECTRUM CYBER CYBER DETERMINING PROCESS
A scalable universal full spectrum cyber determining process for accurately and reliably determining and reporting at least one cyber determination from a full...
2019/0141039 SYSTEM AND METHOD FOR RE-AUTHENTICATION OF ASYNCHRONOUS MESSAGING
A system and method are presented for the re-authentication of asynchronous messaging, specifically within enterprise to consumer communications. A third-party...
2019/0141038 APPARATUS AND METHOD FOR SECURE PROVISIONING OF A COMMUNICATION DEVICE
A system that incorporates the subject disclosure may perform, for example, obtaining programming data via an over-the-air programming message for use by a...
2019/0141037 USER-WEARABLE SECURED DEVICES PROVIDED ASSURING AUTHENTICATION AND VALIDATION OF DATA STORAGE AND TRANSMISSION
Described are user-wearable devices utilizing encryption authentication techniques to ensure security of any data transmission to and from these devices. In...
2019/0141036 ACCESS CONTROL
A VXLAN Tunnel End Point (VTEP) sends an authentication request packet to an authentication server upon receiving a user access request from a user terminal,...
2019/0141035 TECHNIQUES FOR EXTENDING COMMUNICATIONS CHAIN OF TRUST TO CLIENT APPLICATIONS
Various embodiments are generally directed to techniques to form secure communications between two computing devices in which the chain of trust of those...
2019/0141034 ANALYZING FACIAL RECOGNITION DATA AND SOCIAL NETWORK DATA FOR USER AUTHENTICATION
Tools, strategies, and techniques are provided for evaluating the identities of different entities to protect business enterprises, consumers, and other...
2019/0141033 AUTHENTICATING A USER
Computer-implemented methods, software, and computer systems for authenticating a user. Authentication includes presenting on a first user interface a...
2019/0141032 Distributed Method and System to Improve Collaborative Services Across Multiple Devices
A distributed system and method to improve collaborative service across multiple sensors on various devices. According to one embodiment, multiple devices may...
2019/0141031 AUTHENTICATING A USER TO A CLOUD SERVICE AUTOMATICALLY THROUGH A VIRTUAL ASSISTANT
According to one embodiment, a method, computer system, and computer program product for identifying and authenticating users of a voice-based virtual...
2019/0141030 MANAGING ACCESS TO SERVICES BASED ON FINGERPRINT MATCHING
A method includes: receiving a request regarding access by a first computing device (e.g., a mobile device of a user) to a service; in response to the request,...
2019/0141029 MULTISPECTRAL IMAGING BASED LOCATION AUTHENTICATION USING PRISM ELEMENT
An invention is provided for authentication in a network environment. The invention includes displaying an authentication image on a display device, and...
2019/0141028 System and Methods for Authentication and/or Identification
A method of authenticating a user. The method involves receiving or retrieving a request from a first user device for access to a website or access to an...
2019/0141027 SINGLE SIGN-ON FOR UNMANAGED MOBILE DEVICES
Disclosed are various examples for providing a single sign-on experience for mobile applications that may or may not be managed. A first application executed...
2019/0141026 BLOCKCHAIN BASED DEVICE AUTHENTICATION
An authentication system receives an authentication request from a client device. The authentication request includes a unique token assigned to the device...
2019/0141025 Table-Connected Tokenization
A tokenization system tokenizes sensitive data to prevent unauthorized entities from accessing the sensitive data. The tokenization system accesses sensitive...
2019/0141024 CONDUCTING SECURE INTERACTIONS UTILIZING RELIABILITY INFORMATION
Embodiments of the invention are directed assessing reliability between two computing devices. A distributed database may maintain reliability associations...
2019/0141023 VEHICLE WITH MOBILE TO VEHICLE AUTOMATED NETWORK PROVISIONING
A vehicle that includes one or more controllers coupled to at least one and/or one or more wireless transceivers and antennas. The controllers are configured...
2019/0141022 ON-PREMISE AND OFF-PREMISE COMMUNICATION
Proposed are concepts for managing communication between off-premise and on-premise servers. Also proposed are concepts for managing authentication between...
2019/0141021 SYSTEM AND METHOD FOR PROVIDING SIMPLIFIED IN STORE PURCHASES AND IN-APP PURCHASES USING A USE- INTERFACE-...
Disclosed is a method including receiving, at a server and from a browser configured on a device, a request to access the server, the server being associated...
2019/0141020 DEVICE PAIRING IN A LOCAL NETWORK
Particular embodiments described herein provide for an electronic device that can be configured to receive registration data for a local network device,...
2019/0141019 IPSEC ANTI-REPLAY WINDOW WITH QUALITY OF SERVICE
In some examples, an example method to provide an IPsec anti-replay window with quality of service (QoS) at a first network endpoint may include configuring a...
2019/0141018 DATABASE-CENTERED COMPUTER NETWORK SYSTEMS AND COMPUTER-IMPLEMENTED METHODS FOR CRYPTOGRAPHICALLY-SECURED...
In some embodiments, the present invention provides for an exemplary computer system which includes at least the following components: a network of externally...
2019/0141017 INFORMATION EXCHANGE FOR SECURE COMMUNICATION
A system may include a first network device configured to communicate via an encrypted session, and a second network device configured to communicate with the...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.