Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2017/0149815 IDENTIFYING AND REMEDIATING MALWARE-COMPROMISED DEVICES
Systems and methods for identifying and remediating malware-compromised mobile devices are disclosed. A computer-implemented method includes accessing, by a...
2017/0149814 Real-Time Detection of Abnormal Network Connections in Streaming Data
Methods and systems for detecting anomalous network activity include determining whether a network event exists within an existing topology graph and port...
2017/0149813 Binocular Fusion Analytics Security
Examples of the present disclosure describe systems and methods for identifying anomalous network behavior. In aspects, a network event may be observed network...
2017/0149812 SUSPICIOUS NETWORK TRAFFIC IDENTIFICATION METHOD AND APPARATUS
Apparatuses, methods and storage medium associated with techniques to identify suspicious network connections. In embodiments, an apparatus may include an...
2017/0149811 SYSTEMS AND METHODS FOR IDENTIFYING COMPROMISED DEVICES WITHIN INDUSTRIAL CONTROL SYSTEMS
The disclosed computer-implemented method for identifying compromised devices within industrial control systems may include (1) monitoring network traffic...
2017/0149810 MALWARE DETECTION ON WEB PROXY LOG DATA
An interactive system to detect malware is provided to interactively analyze web proxy log data. The log data is progressively processed to compute analytics...
2017/0149809 RECORDING MEDIUM, DECIDING METHOD, AND DECIDING APPARATUS
A non-transitory, computer-readable recording medium stores therein a deciding program that causes a computer to execute a process including storing connection...
2017/0149808 NETWORK SYSTEM, CONTROL APPARATUS, COMMUNICATION APPARATUS, COMMUNICATION CONTROL METHOD, AND COMMUNICATION...
A control apparatus performs analysis by using partial information and determines whether or not communication is abnormal. If the communication is determined...
2017/0149807 Detecting Malicious Instructions on a Virtual Machine
A system that includes a hypervisor configured to communicate packets comprising virtual machine operating characteristics metadata for guest virtual machines....
2017/0149806 NETWORK INTRUSION MITIGATION
A request is received to reestablish a connection to an end device in a network. At least one datum is identified indicating an error condition, the at least...
2017/0149805 Proactive Intrusion Protection System
A system for proactive intrusion protection comprises a memory operable to store data identifying a plurality of compromising entities, comprising at least one...
2017/0149804 METHODS AND SYSTEMS FOR MALWARE HOST CORRELATION
Malicious network activity can be detected using methods and systems that monitor execution of code on computing nodes. The computing nodes may be ...
2017/0149803 Guarding against cross-site request forgery (CSRF) attacks
Cross-Site Request Forgery attacks are mitigated by a CSRF mechanism executing at a computing entity. The CSRF mechanism is operative to analyze information...
2017/0149802 PROTECTING THREAT INDICATORS FROM THIRD PARTY ABUSE
A threat analytics system expends significant resources to acquire, structure, and filter the threat indicators provided to the client-side monitoring systems....
2017/0149801 Detecting Malicious Instructions in a Virtual Machine Memory
A system that includes a guest virtual machine is in communication with a hypervisor. The guest virtual machine comprises virtual machine measurement points...
2017/0149800 SYSTEM AND METHOD FOR INFORMATION SECURITY MANAGEMENT BASED ON APPLICATION LEVEL LOG ANALYSIS
The instant disclosure illustrates a system and method for information security management based on application level log analysis. The system and method for...
2017/0149799 SECURE FINE TIMING MEASUREMENT PROTOCOL
Techniques for exchanging secure FTM messages are disclosed. An example of a wireless transceiver system for providing a secure Fine Timing Measurement (FTM)...
2017/0149798 TRUSTED DEVICE CONTROL MESSAGES
Two endpoint devices communicate with one another in a secure session using a secure protocol. Trusted control messages are passed upstream from one of the...
2017/0149797 SECURE DEBUG TRACE MESSAGES FOR PRODUCTION AUTHENTICATED CODE MODULES
Methods of extending capabilities of authenticated code modules (ACM) with minimal increase in code size comprises defining an authenticated code module (ACM)...
2017/0149796 SELECTIVITY IN PRIVACY AND VERIFICATION WITH APPLICATIONS
The present description relates to systems and techniques for allowing a third party verifier to verify aspects of secured data, or successful communication...
2017/0149795 MANAGEMENT AND CONTROL OF MOBILE COMPUTING DEVICE USING LOCAL AND REMOTE SOFTWARE AGENTS
Devices, systems, and methods for allowing parents to view and track smart phone activities of their children can include one or more child software modules....
2017/0149794 Trust Relationships in a Computerized System
Methods and apparatuses for a computerized system are disclosed. A data processing device receives information from at least one source of log information in...
2017/0149793 SYSTEMS AND METHODS FOR ANONYMIZING LOG ENTRIES
The disclosed computer-implemented method for anonymizing log entries may include (1) detecting a data pattern in a group of log entries documenting events...
2017/0149792 RESILIENT NETWORK CONSTRUCTION USING ENHANCED PRIVACY IDENTIFICATION
Systems and techniques for resilient network construction using enhanced privacy identification are described herein. A group certificate may be generated for...
2017/0149791 SYSTEM AND METHOD FOR ACCESSING A SERVICE
According to one example of the present invention, there is provided, a method of accessing a service. The method comprising: receiving, from a requesting...
2017/0149790 AUTHENTICATION CONTROL DEVICE AND AUTHENTICATION CONTROL METHOD
The resolution of the problem is achieved by performing a first determination process in which when request information is received, validity of the request...
2017/0149789 SYSTEMS AND METHODS FOR PROVIDING PUBLIC EPHEMERAL MEDIA CONTENT WITHOUT REQUIRING SUBSCRIPTION
Systems, methods, and non-transitory computer-readable media can detect a trigger to provide public ephemeral media content to a viewing user account. A subset...
2017/0149788 INFORMATION PROCESSING APPARATUS, TERMINAL APPARATUS, PROGRAM, AND INFORMATION PROCESSING SYSTEM
An information processing apparatus issuing qualification information that is used by a terminal apparatus in using a service includes an authenticating unit...
2017/0149787 Security of Computer Resources
A method including providing access to a reference database storing information on known behaviour of trusted computer processes and on resources the trusted...
2017/0149786 ON-DEMAND AUTHORIZATION OF ACCESS TO PROTECTED RESOURCES
A method and system for on-demand authorization of access to protected resources are presented. The method comprises associating a primary user device with at...
2017/0149785 Proactive Intrusion Protection System
A system for proactive intrusion protection comprises a memory operable to store data identifying a plurality of compromising entities, comprising at least one...
2017/0149784 DELEGATED ACCESS CONTROL OF AN ENTERPRISE NETWORK
Presented herein are techniques for enabling delegated access control of an enterprise network. In particular, data representing a trust chain formed between a...
2017/0149783 CROSS-SITE REQUEST FORGERY (CSRF) PREVENTION
A computer program product for cross-site request forgery (CSRF) prevention is provided and includes a computer readable storage medium having program...
2017/0149782 IDENTIFYING WEBPAGES ACCESSIBLE BY UNAUTHORIZED USERS VIA URL GUESSING OR NETWORK SNIFFING
A computer-implemented method includes: generating a first list of uniform resource locators (URLs) available on a page when accessed using privileged...
2017/0149781 TECHNIQUES TO AUTHENTICATE A CLIENT TO A PROXY THROUGH A DOMAIN NAME SERVER INTERMEDIARY
Techniques to authenticate a client to a proxy through a domain name server intermediary are described. In one embodiment, for example, a client apparatus may...
2017/0149780 DOMAIN JOIN AND MANAGED DIRECTORY SUPPORT FOR VIRTUAL COMPUTING ENVIRONMENTS
A virtual computing environment service may receive a request from a customer to provision a virtual computing environment and join the virtual computing...
2017/0149779 SYSTEM AND METHOD OF FACILITATING THE IDENTIFICATION OF A COMPUTER ON A NETWORK
A system and method for facilitating identification of an attacking computer in a network is provided. A user attempting to login to a network application may...
2017/0149778 METHOD AND SYSTEM FOR PROVIDING ACCESS TO ADMINISTRATIVE FUNCTIONALITY A VIRTUALIZATION ENVIRONMENT
Described is an architecture for providing access to administrative functionality in a virtualization system using implied authentication. This approach avoids...
2017/0149777 SYSTEMS AND METHOD FOR CROSS-CHANNEL DEVICE BINDING
A system facilitates secure communication between an authorized user device and two or more servers via two or more channels that are associated with the...
2017/0149776 METHOD FOR ONE-TO-ONE REGISTRATION BETWEEN PERSONAL AUTOMATION ID KIT AND SMARTPHONE
A method for one-to-one registration between a personal automation ID kit and a smartphone comprises steps in which: a smartphone, which is a master, performs...
2017/0149775 SUB-NETWORKS BASED SECURITY METHOD, APPARATUS AND PRODUCT
A method, apparatus and product for sub-networks based cyber security. One method comprises detecting a device connecting to a local network which is divided...
2017/0149774 MULTI FACTOR USER AUTHENTICATION ON MULTIPLE DEVICES
Systems and methods of the present invention provide for a first and second client computer configured to receive and transmit an authentication credential and...
2017/0149773 SECURE DATA COMMUNICATION AND STORAGE USING SCALE-BASED SYSTEMS
Aspects of the disclosure are directed to an apparatus including a scale and external circuitry. The scale collects signals from a plurality of users and...
2017/0149772 IDENTITY AUTHENTICATION METHOD, SYSTEM, BUSINESS SERVER AND AUTHENTICATION SERVER
Embodiments of the present application provide an identity authentication method, business server, authentication server and identity authentication system....
2017/0149771 AUTOMATED DEVICE DISCOVERY OF PAIRING-ELIGIBLE DEVICES FOR AUTHENTICATION
Automated device discovery of pairing-eligible devices for authenticating an unidentified user of a computing device is provided. When the user initiates a...
2017/0149770 USING AN OUT-OF-BAND PASSWORD TO PROVIDE ENHANCED SSO FUNCTIONALITY
A system and method for using a single-use password to add SSO functionality to a service of a Service Provider belonging to an F-SSO federation that does not...
2017/0149769 ENHANCING TRANSACTION AUTHENTICATION WITH PRIVACY AND SECURITY ENHANCED INTERNET GEOLOCATION AND PROXIMITY
Transaction authentication with techniques and geolocation are combined to provide privacy and security enhanced geolocation. In an example implementation, a...
2017/0149768 CROSS-SITE REQUEST FORGERY (CSRF) PREVENTION
A computer program product for cross-site request forgery (CSRF) prevention is provided and includes a computer readable storage medium having program...
2017/0149767 USING A SERVICE-PROVIDER PASSWORD TO SIMULATE F-SSO FUNCTIONALITY
A system and method for using a Service-Provider password to simulate F-SSO functionality. A processor receives from an F-SSO Identity Provider authentication...
2017/0149766 CROSS-DOMAIN SINGLE LOGIN
Cross-domain single login is disclosed. In an example system, a first application server hosts a first application that has a first user-visible page. The...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.