Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,028,4604 Data processing and scanning systems for generating and populating a data inventory
In particular embodiments, a data processing data inventory generation system is configured to: (1) generate a data model (e.g., a data inventory) for one or...
US-1,028,4603 System and method for providing network and computer firewall protection with dynamic address isolation to a device
A computer performs dynamic address isolation. The computer comprises an application associated with an application address, a network interface coupled to...
US-1,028,4602 Integrating policies from a plurality of disparate management agents
Described herein are embodiments for managing policies of a mobile device. In embodiments, a mobile device receives policy containers from a plurality of...
US-1,028,4601 Managing deviations between expected and normal operations of authentication systems
There are disclosed techniques for use in authentication. In one embodiment, the techniques comprise generating first and second distributions. The first...
US-1,028,4600 System and method for updating downloaded applications using managed container
A managed container may be configured to manage enterprise applications, manage enterprise information stored on a device, manage a protected storage area used...
US-1,028,4599 Method for detecting an attack on a working environment connected to a communication network
A method for detecting an attack on a work environment connected to a communication network includes: electronically emulating, by a network security device...
US-1,028,4598 Honeypot network services
In general, in one aspect, a system for providing honeypot network services may monitor network activity, and detect network activity indicative of network...
US-1,028,4597 E-mail authentication
A system and method for determining whether an e-mail originates from a sender authorized by an address provider to send the e-mail to an intended recipient's...
US-1,028,4596 Cloaking authority system
A cloaking authority system that securely and anonymously identifies a misbehaving device based on its digital certificate. The system may include a cloaking...
US-1,028,4595 Combining internet routing information with access logs to assess risk of user exposure
The present disclosure is directed towards systems and methods for evaluating or mitigating a network attack. A device determines one or more client internet...
US-1,028,4594 Detecting and preventing flooding attacks in a network environment
A method for processing network traffic data includes receiving a packet, and determining whether the packet is a previously dropped packet that is being...
US-1,028,4593 Protecting newly restored clients from computer viruses
Protecting newly restored clients from computer viruses is described. A system identifies a backed-up version of anti-virus software associated with a backup...
US-1,028,4592 Application randomization mechanism
An example method includes providing, by a computing system, first randomized configuration information, generating, by the computing system and based on the...
US-1,028,4591 Detecting and preventing execution of software exploits
In non-limiting examples, anti-exploit systems and methods described herein monitor a memory space of a process for execution of functions. Stack walk...
US-1,028,4590 Automatic detection of points of compromise
Techniques described herein include determining, for each account of several accounts, an element blame score (EBS) for each potential point of compromise (POC)...
US-1,028,4589 Methods and systems for ranking, filtering and patching detected vulnerabilities in a networked system
Systems and methods for determining priority levels to process vulnerabilities associated with a networked computer system can include a data collection engine...
US-1,028,4588 Dynamic selection of security posture for devices in a network using risk scoring
In one embodiment, a method for assessing security posture for entities in a computing network is implemented on a computing device and includes: receiving...
US-1,028,4587 Systems and methods for responding to electronic security incidents
The disclosed computer-implemented method for responding to electronic security incidents may include (i) identifying a plurality of security incidents that...
US-1,028,4586 Data loss prevention techniques for applications with save to web functionality
Techniques presented herein describe data loss prevention (DLP) methods for saving a file to a destination over a network via an application, such as a...
US-1,028,4585 Tree rotation in random classification forests to improve efficacy
Methods and apparatus for optimizing computer detection of malware using pattern recognition by refreshing random classification forests are described. In one...
US-1,028,4584 Methods and systems for improving beaconing detection algorithms
A method (and structure) includes receiving, as input data into a computer-implemented processing procedure, at least one listing of at least one of time series...
US-1,028,4583 Information processing system, information processing apparatus, and information processing method
An information processing system, having one or more information processing apparatuses, includes a data input unit configured to take as input first data being...
US-1,028,4582 System and methods for dynamic digital threat mitigation
Systems and methods include: receiving digital event type data that define attributes of a digital event type; receiving digital fraud policy that defines a...
US-1,028,4581 Systems and methods for detecting resources responsible for events
Systems and methods are disclosed for identifying resources responsible for events. In one embodiment, a method may include determining a number of unique...
US-1,028,4580 Multiple detector methods and systems for defeating low and slow application DDoS attacks
Methods and systems for detecting and defeating a low and slow application DDoS attack, comprising: computing the Entropy of a plurality of detectors, at least...
US-1,028,4579 Detection of email spoofing and spear phishing attacks
A computer-implemented method of detecting an email spoofing and spear phishing attack may comprise generating a contact model of a sender of emails;...
US-1,028,4578 Creating a multi-dimensional host fingerprint for optimizing reputation for IPV6
A mechanism is provided for blocking IP connection addresses and prefixes. Header information is extracted from an incoming connection request. A determination...
US-1,028,4577 Method and apparatus for file identification
The present application discloses a method and an apparatus for file identification. The method for file identification comprises: determining a virus family of...
US-1,028,4576 Tiered object-related trust decisions
Adware and viruses are examples of objects that may be embedded in a web page or linked to a web page. When such an object is detected to be associated with a...
US-1,028,4575 Launcher for setting analysis environment variations for malware detection
A system and method for automatically analyzing an object for malware is described. Operating one or more virtual machines, the system and method provide an...
US-1,028,4574 System and method for threat detection and identification
Exemplary systems and methods for malware attack detection and identification are provided. A malware detection and identification system a controller that...
US-1,028,4573 Friction management
One or more embodiments of techniques or systems for session management, security scoring, and friction management are provided herein. Sessions may be...
US-1,028,4572 Management method, management device, and management program
A management method comprising, extracting, using a processor, psychological characteristics that are characteristic of people who have experienced a certain...
US-1,028,4571 Rule based alerting in anomaly detection
A graphical user interface for constructing rules to run on an intrusion detection system is described. The user interface includes a field that specifies a...
US-1,028,4570 System and method to detect threats to computer based devices and systems
Aspects of the present disclosure relate to systems and methods for detecting a threat of a computing system. In one aspect, a plurality of instances of input...
US-1,028,4569 Email based SLAs management for effective business
A method includes determining that a message sent using a sender account to a first user account of an email application is unopened for a first predetermined...
US-1,028,4568 System and method for secure transmission of streamed data frames
Data acquired, for example by a mobile platform, such as a sequence of images observed by a mobile platform, is grouped. A signature is computed for each group...
US-1,028,4567 Targeted authentication queries based on detected user actions
There are provided systems and methods for targeted authentication queries based on detected user actions. A user may perform various actions during a day,...
US-1,028,4566 Proximity detection system
Various systems and methods for providing a walk away lock are provided herein. A plurality of data packets may be received at a compute device from a user...
US-1,028,4565 Security verification method, apparatus, server and terminal device
A security verification method is provided. The method includes receiving a security verification request from a terminal device, sending verification...
US-1,028,4564 Systems and methods for dynamically validating remote requests within enterprise networks
The disclosed computer-implemented method for dynamically validating remote requests within enterprise networks may include (1) receiving, on a target system...
US-1,028,4563 Transparent asynchronous network flow information exchange
A method for providing a transparent asynchronous network flow exchange is provided. The method may include receiving a query request from a requester, whereby...
US-1,028,4562 Device authentication to capillary gateway
It is disclosed a method and a capillary gateway, CGW, (50, 60, 204, 304) capable to determine whether to allow a first machine-to-machine, M2M, device network...
US-1,028,4561 Method and server for providing image captcha
A method of providing an image Completely Automatic Public Turing test to tell Computers and Humans Apart (CAPTCHA), and a server thereof. The method includes:...
US-1,028,4560 Secure unmanned vehicle operation and communication
Systems and methods for unmanned vehicle security and control are provided herein. An exemplary system includes a control station and an unmanned vehicle. The...
US-1,028,4559 Managed access system with security assessment equipment
A managed access system for mobile wireless devices (MWDs) in a facility that is geographically within a wireless communications network includes a plurality of...
US-1,028,4558 Systems and methods for managing privacy settings of shared content
Systems and methods for managing privacy settings of shared content include receiving content associated with an object; receiving privacy settings associated...
US-1,028,4557 Secure data proxy for cloud computing environments
An apparatus in one embodiment comprises a plurality of host devices configured to support execution of applications on behalf of one or more tenants of cloud...
US-1,028,4556 Systems and methods for verifying authentication requests using internet protocol addresses
A computer-implemented method for verifying authentication requests using IP addresses may include (i) collecting, by a computing system, data on IP address...
US-1,028,4555 User equipment credential system
A user equipment in a communications system, the user equipment comprising: a memory arranged to store at least one identifier associated with the user...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.