Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,001,5208 Single proxies in secure communication using service function chaining
A first service node receives a message configured to set up a secure communication session between a client and a server, in which the first service node acts...
US-1,001,5207 Dynamic rate adaptation during real-time LTE communication
Methods and computing systems for dynamic rate adaption during real-time Long Term Evolution (LTE) communication are described. A real-time LTE communication...
US-1,001,5206 Client device obtaining network connection information from an image processing apparatus by capturing an image...
A network system includes a server and an apparatus connected to the server via a network. The server includes a connection information generation part...
US-1,001,5205 Techniques for traffic capture and reconstruction
Techniques for reconstructing application-layer traffic flowing between client devices and a cloud computing platform are provided. In an embodiment, the method...
US-1,001,5204 Method, terminal, and server for restoring transmission of session content
A method, a terminal, and a server for restoring transmission of session content. The method includes, after a refresh message for a page is received, retaining...
US-1,001,5203 Apparatus, system and method of differentiating between an IMS connection and a non-IMS connection
Some demonstrative embodiments include devices, systems and methods of differentiating between an Internet Protocol (IP) Multimedia Subsystem (IMS) connection...
US-1,001,5202 Communication sessions
A method of initiating a voice call via a dialer user interface on a user device in a telecommunications network is provided. The user device comprises at least...
US-1,001,5201 Implementing application level multimedia services as a switching function
A network for delivering application level multimedia services includes simple, application-level switches and rules managers. Each application-level switch...
US-1,001,5200 Communication with accessories
A plurality of connections may be established between an accessory interface and a plurality of accessories. A connection between the accessory interface and a...
US-1,001,5199 Processing security-relevant events using tagged trees
Devices described herein are configured to propagate tags among data objects representing system components. Such devices may detect an event associated with a...
US-1,001,5198 Synchronizing a honey network configuration to reflect a target network environment
Techniques for synchronizing a honey network configuration to reflect a target network environment are disclosed. In some embodiments, a system for...
US-1,001,5197 Determining network security policies during data center migration and detecting security violation
Input data are received from a source environment comprising a plurality of servers and one or more applications running on at least one of the servers. One or...
US-1,001,5196 Fast reconfiguring environment for mobile computing devices
An example method includes receiving an indication of a selection of a first application environment that includes a first virtual environment associated with a...
US-1,001,5195 Method and system for the distributed transmission of a communication flow and use of the system
A method and system for the distributed transmission of the communication flow, in which the communication flow takes place at least unidirectionally from a...
US-1,001,5194 System and method for protecting systems from malicious attacks
The disclosed embodiments include a method of disarming malicious code in a computer system having a processor. The method comprises receiving, by the computer...
US-1,001,5193 Methods and devices for identifying the presence of malware in a network
A device and a method for identifying whether a network node is infected by malware, including identifying indicator events for each of a plurality of anomaly...
US-1,001,5192 Sample selection for data analysis for use in malware detection
In one embodiment, a method includes creating a set of network related indicators of compromise at a computing device, the set associated with a malicious...
US-1,001,5191 Detection of man in the browser style malware using namespace inspection
Methods and systems for detecting fraudulent activity are described. A user types in a web address in his or her browser to request a webpage from a server, and...
US-1,001,5190 Forecasting and classifying cyber-attacks using crossover neural embeddings
A first collection including a first feature vector and a Q&A feature vector is constructed. A second collection is constructed from the first collection by...
US-1,001,5189 Detecting and predicting cyber-attack phases in adjacent data processing environment regions
A set and a second set of collections of forecasted feature vectors are selected from a repository for a future time window, a cyber-attack being in progress in...
US-1,001,5188 Method for mitigation of cyber attacks on industrial control systems
Disclosed is a system and method for detecting anomalous behavior in Industrial Control Networks. The system first operates in a learning phase to learn various...
US-1,001,5187 System and method for performing remote security assessment of firewalled computer
Methods and systems for scanning an endpoint terminal across an open computer network are disclosed. An exemplary method includes providing a scanner engine in...
US-1,001,5186 Method and apparatus for reducing security risk in a networked computer system architecture
An apparatus and associated method are provided for reducing a security risk in a networked computer system architecture. The method comprises receiving at a...
US-1,001,5185 Risk score aggregation for automated detection of access anomalies in a computer network
A processing device in one embodiment comprises a processor coupled to a memory and is configured to generate access profiles for respective user identifiers,...
US-1,001,5184 Emulating regulating device to detect utility grid intrusions
Systems and methods of detecting an attack in a utility grid are described. An anomaly detector identifies a first indication of signal samples used by a...
US-1,001,5183 Using new edges for anomaly detection in computer networks
Creation of new edges in a network may be used as an indication of a potential attack on the network. Historical data of a frequency with which nodes in a...
US-1,001,5182 Systems and methods for protecting computing resources
The disclosed computer-implemented method for protecting computing resources may include (i) computing a degree of commonality between pairs of users within a...
US-1,001,5181 Using natural language processing for detection of intended or unexpected application behavior
Detection of unintended application behaviors, where natural language processing (NLP) techniques are used to analyze the application, and specifically its...
US-1,001,5180 Asynchronous domain name server resolution with automated classification of domain type
Asynchronous techniques are provided for resolving domain names and for automated classification of domain type. An exemplary method comprises asynchronously...
US-1,001,5179 Interrogating malware
Identifying a behavior of a malware service is disclosed. An interrogation packet is sent to a network communication port of a receiver. The interrogation...
US-1,001,5178 Real-time contextual monitoring intrusion detection and prevention
A configuration is received for an agent associated with an application to monitor application transactions. The agent monitors incoming and outgoing...
US-1,001,5177 Lateral movement detection for network security analysis
A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security...
US-1,001,5176 Network protection
A network security system for a network, the network comprising a plurality of networked appliances, the security system comprising one or more security...
US-1,001,5175 Detecting anomalous behavior via user authentication graphs
Significant and aggregate user authentication activity may be analyzed across a population of users and computers in one or more networks to differentiate...
US-1,001,5174 Using communication characteristics of a station to verify identity information
Various aspects provide for receiving identity information from a station (STA) that identifies the STA as a sensor-type STA, determining whether communication...
US-1,001,5173 Systems and methods for location-aware access to cloud data stores
The disclosed computer-implemented method for location-aware access to cloud data stores may include (1) obtaining a location policy that governs access to a...
US-1,001,5172 Creation of link to user profile from user information prior to user logon to a virtual desktop environment
Techniques for improving logon time for remote desktops a user has not logged onto before. In general, these techniques involve utilizing a pre-logon script to...
US-1,001,5171 Authentication using metadata from posts made to social networking websites
Improved techniques of performing authentication involve extracting metadata from posts made by legitimate users on a social networking website and generating...
US-1,001,5170 Protecting delivered web distributed content from unauthorized modifications
A method of delivering web distributed content is disclosed. A set of web distributed content is received by a proxy server. The set of web distributed content...
US-1,001,5169 Node-based policy-enforcement across mixed media, mixed-communications modalities and extensible to cloud...
A system and method are provided to monitor and prevent potential enterprise policy and/or rule violations by subscribers.
US-1,001,5168 System and method for secure control of resources of wireless mobile communication devices
Systems and methods for secure control of a wireless mobile communication device are disclosed. Each of a plurality of domains includes at least one wireless...
US-1,001,5167 Extensible key management system for application program interfaces
An extensible key management system includes a developer services portal for accessing an application. The system may identify initiation via the developer...
US-1,001,5166 Gesture-based signature authentication
Embodiments of the invention are generally directed to systems, methods, devices, and machine-readable mediums for implementing gesture-based signature...
US-1,001,5165 Methods and apparatus to support GlobalPlatform.TM. usage on an embedded UICC (eUICC)
Disclosed herein is a technique for managing one or more electronic Subscriber Identity Modules (eSIMs) on an embedded UICC (eUICC). In particular, the...
US-1,001,5164 Modules to securely provision an asset to a target device
The embodiments described herein describe technologies for Module management, including Module creation and Module deployment to a target device in an operation...
US-1,001,5163 Apparatus and method for cryptographic operations using enhanced knowledge factor credentials
Provided is a process that includes: authenticating a user based on a sequence of transactions that specify a knowledge factor credential where the...
US-1,001,5162 Firewall authentication of controller-generated internet control message protocol (ICMP) echo requests
A method implemented by a network firewall, comprising obtaining a first authentication token for a network test, receiving a test request message for...
US-1,001,5161 Establishing trust within a cloud computing system
A cloud computing system includes a cloud system managing unit, a plurality of sets of devices, where a set of devices includes one or more devices having a...
US-1,001,5160 Communication apparatus, method of controlling the same, and storage medium
A communication apparatus has an auto-complete function using an LDAP protocol. The apparatus inputs character information, and verifies a certificate of an...
US-1,001,5159 Terminal authentication system, server device, and terminal authentication method
Provided is a terminal authentication system including a client terminal and a server device. The client terminal transmits first information based on secret...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.