Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,954,903 Industrial network security translator
Embodiments of the present technology relate to a system for providing intrusion detection for industrial control systems, comprising serial data links to...
US-9,954,902 Secure proxy
Methods and systems are provided herein to enable secure proxying of network traffic between trusted and untrusted environments. In particular, a secure proxy...
US-9,954,901 Service delivery controller for learning network security services
A learning-based computer network security system may include a service delivery controller executing on one or more of hardware processors that receives...
US-9,954,900 Automating the creation and maintenance of policy compliant environments
Embodiments of the present invention provide for a method, system, and apparatus for creating a publishable computer file. The method includes selecting a first...
US-9,954,899 Applying a network traffic policy to an application session
Embodiments of the present technology relate to a method for applying a security policy to an application session, comprising: determining, by a security...
US-9,954,898 Data flow forwarding method and device
This disclosure makes public a data flow forwarding method and device, and in this method, a second health state is acquired based on the first health state of...
US-9,954,897 Methods and systems providing cyber security
Methods and systems for providing cyber security, wherein a computer with network access incorporates game theory and utilizes a honeypot to enhance...
US-9,954,896 Preconfigured honey net
Systems and methods of managing the security of a networked environment by deploying virtual appliances and using a central monitoring console to manage the...
US-9,954,895 System and method for identifying phishing website
The present invention discloses a system and method for identifying a phishing website. The system comprises: a domain name acquisition unit, a domain name...
US-9,954,894 Webpage security
Aspects of the technology described herein allow webpages to maintain control over content displayed as part of the webpage when viewed on a browser. The...
US-9,954,893 Techniques for combating man-in-the-browser attacks
Methods and apparatus are described for automatically modifying web page code. Specific implementations relate to the modification of web page code for the...
US-9,954,892 Controller area network (CAN) device and method for controlling CAN traffic
Embodiments of a device and method are disclosed. In an embodiment, a method for controlling CAN traffic is disclosed. The method for controlling CAN traffic...
US-9,954,891 Unobtrusive and dynamic DDoS mitigation
Some embodiments provide techniques for mitigating against layer 7 distributed denial of service attacks. Some embodiments submit a computational intensive...
US-9,954,890 Systems and methods for analyzing PDF documents
A system and method for detecting malicious activity within a Portable Document Format (PDF) document. The system includes a parser and one or more virtual...
US-9,954,889 Method and system for malicious code detection
Embodiments of the invention are directed towards detecting and identifying malicious code injected into other legitimate web pages. The detection is divided...
US-9,954,888 Security actions for computing assets based on enrichment information
Systems, methods, and software described herein provide enhancements for implementing security actions in a computing environment. In one example, a method of...
US-9,954,887 Targeted attack discovery
A device may receive usage information, associated with a group of client networks, including particular usage information associated with a particular client...
US-9,954,886 Method and apparatus for detecting website security
The present invention discloses a method and an apparatus for detecting website security. The method includes: performing bypass interception on a network to...
US-9,954,885 Software/hardware device with uncertain service function and structural characterization, and scheduling method...
The present invention discloses a software/hardware device with uncertain service function and structural characterization and a method for scheduling the same....
US-9,954,884 Method and device for simulating network resiliance against attacks
Embodiments of a system and method for a cyber modeling and simulation framework arc generally described herein. In some embodiments, an interface (212) for...
US-9,954,882 Automatic baselining of anomalous event activity in time series data
Software that automatically detects anomalous attributes indicative of a potential intrusion in a computing system. The software performs the following...
US-9,954,881 ATO threat visualization system
An Account Takeover (ATO) detection system is configured to generate a visualization of the monitored login attempts during a time period with respect to an...
US-9,954,880 Protection via webpage manipulation
Techniques are disclosed relating to limiting malicious-code analysis of webpage content. In one embodiment, a computing system receives a webpage requested by...
US-9,954,879 System and methods for dynamic digital threat mitigation
Systems and methods include: receiving digital event type data that define attributes of a digital event type; receiving digital fraud policy that defines a...
US-9,954,878 Multi-factor deception management and detection for malicious actions in a computer network
A network surveillance system, including a management server within a network of resources in which users access the resources in the network based on...
US-9,954,877 Automatic detection of hidden link mismatches with spoofed metadata
Example methods and systems directed to an Alert Manager are described. According to various embodiments, the Alert Manager detects receipt of a message. The...
US-9,954,876 Automatic tunnels routing loop attack defense
The present disclosure relates to systems, methods, and non-transitory computer readable storage medium for detecting a tunnel routing loop attack on a computer...
US-9,954,875 Protecting from unintentional malware download
Protection from malware download is provided. A first input is received to access one of an email attachment or a web site link using an application. A newly...
US-9,954,874 Detection of mutated apps and usage thereof
System, method and product for detection of mutated apps and usage thereof. A method comprises obtaining features of an Application Under Check (AUC); comparing...
US-9,954,873 Mobile device-based intrusion prevention system
A method for managing network traffic at a portable electronic device connected to a network that includes establishing a virtual network interface to queue...
US-9,954,872 System and method for identifying unauthorized activities on a computer system using a data structure model
A computer implemented method includes monitoring activity on the virtual machine. A plurality of activities being performed at the virtual machine is...
US-9,954,871 Method and system to protect software-based network-connected devices from advanced persistent threat
A method of protecting a network-connected device from an advanced persistent threat cyber-attack is provided. A network-connected device having an operating...
US-9,954,870 System conversion in a networked computing environment
Approaches for providing security in a networked computing environment are provided. The method includes detecting, by at least one computer device, a breach of...
US-9,954,869 Authentication and authorization without the use of supplicants
Provided is authentication and authorization without the use of supplicants. Authentication and authorization includes generating a profile for a device based...
US-9,954,868 System and method to associate a private user identity with a public user identity
The system includes a host, a network including a security gateway, and a public application. Established are an access session between the network and the host...
US-9,954,867 Verification of credential reset
Methods and systems are provided for verifying reset of credentials for user accounts. The methods and systems receive a request to change a credential...
US-9,954,866 Parameter based key derivation
A delegation request is submitted to a session-based authentication service, fulfilment of which involves granting an entity an access privilege to a computing...
US-9,954,865 Sensors for a resource
A system may include first sensor to monitor first information relating a volume of information searched by a user, a second sensor to monitor second...
US-9,954,864 Providing safe operation of a subsystem within a safety-critical system
A safety apparatus for providing a safe operation of a subsystem within a safety critical system, SCS is disclosed herein. The safety apparatus includes: a...
US-9,954,863 Computing system record security architecture
A computing system record security architecture comprises, in one example, a record generation component configured to receive a record generation request that...
US-9,954,862 System and method for using resources of a computer system in conjunction with a thin media client
A computer system including a processor and a memory for retrieving digital media content, storing the digital media content in the memory, and providing the...
US-9,954,861 Consumer choice for broadband application and content services
Novel tools and techniques might provide for implementing application, service, and/or content access control. Based at least in part on a consumer's choice of...
US-9,954,860 Online secure transaction verification system proxy server and method
In one example, a proxy server acts as a gateway to a website and modifies the traffic between a web browser on a user device and the website server, as...
US-9,954,859 Random number distribution
A computer device includes means for receiving a request for at least one random number; means for generating a message authentication code from the identifier...
US-9,954,858 Fingerprint recognition-based control method and device
A fingerprint recognition-based control method may include acquiring sensor data with a fingerprint sensor. The sensor data may be acquired by the fingerprint...
US-9,954,857 Digital charms system and method
A system and method for controlling access to a digital asset. A first host device is provided to a first host device owner and rights are determined to a...
US-9,954,856 Token based one-time password security
A one-time password (OTP) based security scheme is described, where a provider pre-generates a number of verification codes (e.g., OTP codes) which will be...
US-9,954,855 Login method and apparatus, and open platform system
The present disclosure is applicable to the field of network communications, and provides a login method and apparatus, and an open platform system. The method...
US-9,954,854 File format and platform for storage and verification of credentials
In various embodiments, a computer-implemented method for generating and verifying officially verifiable electronic representations may be disclosed. The method...
US-9,954,853 Network security
There is described a method for enabling a user of a client computer to securely access a remote server via a network, which is preferably the Internet, by...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.