Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2017/0195360 Dynamic optimizing scanner for identity and access management (IAM) compliance verification
An identity and access management (IAM) system is associated with a set of data sources from which data is collected. A set of vulnerabilities that the IAM...
2017/0195359 TRUST SCORE INVESTIGATION
A system and method for investigating trust scores. A trust score is calculated based on peer transfers, a graphical user interface displays actuatable...
2017/0195358 SYSTEM, METHOD AND APPARATUS FOR FULLY PRECISE HYBRID SECURITY VERIFICATION OF MOBILE APPLICATIONS
A security verification system and method that includes outputting a list of potential dataflow vulnerabilities as a first output from inputting a subject...
2017/0195357 METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR ASSESSING ATTACK VULNERABILITY OF RADIO ACCESS NETWORK EQUIPMENT
The subject matter described herein relates to methods, systems, and computer readable media for assessing attack vulnerability of radio access network...
2017/0195356 IDENTIFICATION OF COMPUTERIZED BOTS AND AUTOMATED CYBER-ATTACK MODULES
Devices, systems, and methods of detecting whether an electronic device or computerized device or computer, is being controlled by a legitimate human user, or...
2017/0195355 LOGGING ATTACK CONTEXT DATA
Methods and systems for improved attack context data logging are provided. According to one embodiment, prior to a logging event being triggered (i) it is...
2017/0195354 NETWORK ANOMALY DETECTION
A security system detects anomalous activity in a network. The system logs user activity, which can include ports used, compares users to find similar users,...
2017/0195353 METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR DETECTING MALICIOUS NETWORK TRAFFIC
Methods, systems, and computer readable media for detecting malicious network traffic are disclosed. According to one method, the method includes caching...
2017/0195352 SYSTEM AND METHOD FOR MONITORING SECURITY OF A COMPUTER NETWORK
Methods and systems to identify the domain names that can potentially be used for delivering instructions to a bot, before bots on a computer network succeed...
2017/0195351 DETECTING MALICIOUS RESOURCES IN A NETWORK BASED UPON ACTIVE CLIENT REPUTATION MONITORING
Systems and methods for detecting malicious resources by analyzing communication between multiple resources coupled to a network are provided. According to one...
2017/0195350 SYSTEM AND METHODS THEREOF FOR CAUSALITY IDENTIFICATION AND ATTRIBUTIONS DETERMINATION OF PROCESSES IN A NETWORK
A system is used for detection of advanced persistent and non-persistent threats in a computerized environment. The system is connected to a plurality of user...
2017/0195349 PLATFORM FOR PROTECTING SMALL AND MEDIUM ENTERPRISES FROM CYBER SECURITY THREATS
A device for protecting a network environment from cyber security threats includes a processing unit and a non-transitory memory having processor-executable...
2017/0195348 Monitoring Traffic in a Computer Network
A computer-implemented method, computerized apparatus and computer program product for monitoring traffic in a computer network. The computer network comprises...
2017/0195347 Modifying Evasive Code Using Correlation Analysis
An example computer-implemented method includes receiving, via a processor, an application to be tested, a set of intrusive monitoring capabilities, and a set...
2017/0195346 SYSTEMS AND METHODS FOR THE DETECTION OF ADVANCED ATTACKERS USING CLIENT SIDE HONEYTOKENS
There is provided a method for detecting a malicious attempt to access a service providing server using credentials of a client terminal in a network, the...
2017/0195345 DETECTION, PREVENTION, AND/OR MITIGATION OF DOS ATTACKS IN PUBLISH/SUBSCRIBE INFRASTRUCTURE
Methods, apparatus, systems, and computer-readable media for detecting denial-of-service ("DoS") attacks include analyzing signals between a publisher and a...
2017/0195344 LAN/SAN NETWORK SECURITY MANAGEMENT
An apparatus for managing network security includes an inventory module, a survey module, an observation module, and a security module. The inventory module...
2017/0195343 SYSTEMS AND APPARATUS FOR ANALYZING SECURE NETWORK ELECTRONIC COMMUNICATION AND ENDPOINTS
The present invention provides for analyzing secured network traffic to determine which devices and/or applications are accessed by authorized, and in some...
2017/0195342 Prevention of RGA Over Existing Internet Services
A method, computer program product, system and apparatus for the prevention of RGA and DGA malware over an existing internet service is disclosed. The...
2017/0195341 Systems and Methods for Data Authentication Via a Stateless Edge Appliance
Methods, systems, and non-transitory computer readable media are provided for rendering at an electronic terminal a first set of graphical user interfaces to...
2017/0195340 System and Method for Partial URL Signing With Applications to Dynamic Adaptive Streaming
A partial URL signing scheme for controlling access to content provided in adaptive streaming such as DASH is disclosed herein. Partial URL signing and...
2017/0195339 METHOD AND APPARATUS FOR GEOGRAPHIC LOCATION BASED ELECTRONIC SECURITY MANAGEMENT
Provided herein are systems, methods and computer readable media for facilitating an authentication process validating the location of a first device, for...
2017/0195338 BROWSER WITH INTEGRATED PRIVACY CONTROLS AND DASHBOARD FOR SOCIAL NETWORK DATA
Particular embodiments comprise a method, by one or more computer systems, for accessing a structured document from an external website, wherein the structured...
2017/0195337 Account Sharing Detection
In one embodiment, a method includes receiving usage data regarding usage of a subscription-based media service account, generating a plurality of sharing...
2017/0195336 Method and System for Non-Authoritative Identity and Identity Permissions Broker and Use Thereof
A credentialing system comprises an identity source storing identity attributes for users, identity wallets for users that enable access to the identity...
2017/0195335 SYSTEM FOR CONTROLLED DATA EXCHANGE IN A FILE HOSTING SERVICE ENVIRONMENT
The present invention provides for managing and controlling data file transfer exchange to and from file hosting services, such as cloud-based file hosting...
2017/0195334 COMPUTER READABLE STORAGE MEDIA FOR TIERED CONNECTION POOLING AND METHODS AND SYSTEMS FOR UTILIZING SAME
Systems and methods for tiered connection pooling are disclosed herein, which may be used in a method of fulfilling user requests in an enterprise computing...
2017/0195333 DOCUMENT MANAGEMENT SYSTEMS AND METHODS
A system for managing files over a network comprises a first computer hosting managed folders and files and one or more second computers. The first computer...
2017/0195332 DEVICE ENROLLMENT IN A CLOUD SERVICE USING AN AUTHENTICATED APPLICATION
In various example embodiments, systems and methods for administering machine access to a cloud service are presented. An edge manager device in a cloud...
2017/0195331 IDENTITY MANAGEMENT AND DEVICE ENROLLMENT IN A CLOUD SERVICE
In various example embodiments, systems and methods for administering machine access to a cloud service are presented. A first device or machine can access an...
2017/0195330 CHAINED SECURITY CREDENTIAL DISTRIBUTION FOR SPONSORED DATA SERVICES
A method to facilitate secure access to sponsored content may include accessing a portal device to generate a campaign for a sponsored data service (SDS), and...
2017/0195329 Role-Based Permissions for Hierarchy-Based Relationships
Some embodiments provide a program that receives, from an application, a role-based permission (RBP) request specifying an RBP, a first user, and a second...
2017/0195328 PROTECTING ACCESS TO A HARDWARE DEVICE THROUGH USE OF AN AGGREGATE IDENTITY INSTANCE
A computer-implemented method, system, and/or computer program product controls access to an appliance. A host system receives, from a client computer,...
2017/0195327 PEER-TO-PEER COMMUNICATION BASED ON DEVICE IDENTIFIERS
A server system receives from a first electronic device a first device identifier and network information of the first electronic device; subsequent to...
2017/0195326 INFORMATION PROCESSING METHOD, INFORMATION PROCESSING DEVICE, AUTHENTICATION SERVER DEVICE, AND VERIFICATION...
There is provided an information processing method of an information processing device, including acquiring tag-unique information unique to an IC tag from the...
2017/0195325 CONNECTION MANAGEMENT OF SMART DEVICES WITH AUTOMOBILE HEAD UNIT
Embodiments are directed towards establishing a network connection between a mobile device and an automobile head unit. A user of the mobile device interacts...
2017/0195324 AUTOMOBILE NETWORK TO COMMUNICATE WITH MULTIPLE SMART DEVICES
Embodiments are directed towards establishing a network between mobile devices, an automobile head unit, and a plurality of automobile accessories. A user...
2017/0195323 METHOD AND DEVICE FOR INFORMATION INTERACTION AND ASSOCIATION BETWEEN HUMAN BIOLOGICAL FEATURE DATA AND ACCOUNT
A method and an apparatus for information interaction, and a method and an apparatus for associating human biometric data with an account are disclosed. The...
2017/0195322 ENTRY AND EXIT CONTROL METHOD AND APPARATUS, AND USER TERMINAL AND SERVER FOR THE SAME
Disclosed are an entry and exit control method and apparatus, and a user terminal and a server. The entry and exit control method may be performed by the entry...
2017/0195321 METHOD, DEVICE AND COMPUTER-READABLE MEDIUM FOR ENABLING VIRTUAL SUBSCRIBER IDENTITY MODULE CARD
Method, device and computer-readable medium for enabling a virtual Subscriber Identity Module (SIM) card are provided in the disclosure, which belongs to a...
2017/0195320 USER AUTHENTICATION METHOD WITH ENHANCED SECURITY
A user authentication method with enhanced security is provided. The method includes generating a first common authentication key if a user of the user...
2017/0195319 ONE TIME PASSCODE
A one-time passcode authentication system includes an application server, an authentication server, and an access device, wherein the access includes an...
2017/0195318 SYSTEM AND METHOD FOR AUTOMATIC WIRELESS NETWORK AUTHENTICATION IN AN INTERNET OF THINGS (IOT) SYSTEM
A system, apparatus, and method are described for a secure IoT wireless network configuration. For example, one embodiment of an Internet of Things (IoT) hub...
2017/0195317 WEB-BASED SINGLE SIGN-ON WITH FORM-FILL PROXY APPLICATION
Web-based single sign-on can enable a user to log in to a single interface (such as through a web browser or thin client) and then provide SSO services to the...
2017/0195316 METHOD, SYSTEM AND APPARATUS USING FORWARD-SECURE CRYPTOGRAPHY FOR PASSCODE VERIFICATION
Methods, apparatus, and systems using a passcode for securing interaction between a user and a computer based application are disclosed.
2017/0195315 USING SOCIAL GRAPH FOR ACCOUNT RECOVERY
A social networking system performs account recovery for a user with the help of the user's connections (e.g., friends). The social networking system selects...
2017/0195314 PROVISIONING ACCOUNT CREDENTIALS VIA A TRUSTED CHANNEL
Disclosed are various embodiments for provisioning account credentials via a trusted channel. An account configuration manager automatically determines a...
2017/0195313 Method and System for Provisioning an Electronic Device
This application discloses a method of provisioning an electronic device. The electronic device proactively broadcasts an advertising packet that includes a...
2017/0195312 SENSITIVE OPERATION PROCESSING PROTOCOL
The present disclosure belongs to the field of network technologies, and disclosed are a sensitive operation processing protocols. The method includes:...
2017/0195311 LOGIN METHOD, SERVER, AND LOGIN SYSTEM
A login method is disclosed, including: receiving, by a first server, a login request of a first terminal; generating, by the first server, a unique identifier...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.