Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2017/0244753 ESTABLISHING A SECURE DATA EXCHANGE CHANNEL
A method is provided for verifying a data exchange channel between a first client, a second client, and a server that is communicatively coupled to the first...
2017/0244752 SYSTEM AND METHOD OF PROTECTION OF TECHNOLOGICAL SYSTEMS FROM CYBER ATTACKS
Disclosed are systems and methods for protection of a technological system (TS) from cyber attacks. An exemplary method comprises: obtaining a real state of...
2017/0244751 CATEGORIZATION SYSTEM
A system for the categorization of interlinked information items, the system comprising: a trust flow module which is configured to receive a seed trust list...
2017/0244750 System and Method for Collection of Forensic and Event Data
A system for collection and analysis of forensic and event data comprising a server and an endpoint agent operating on a remote system. The server is...
2017/0244749 TECHNIQUES FOR DETECTING COMPROMISES OF ENTERPRISE END STATIONS UTILIZING NOISY TOKENS
Noisy tokens can be placed in locations of client end stations such that local operations performed upon the noisy tokens generate network traffic. A traffic...
2017/0244748 Secure computing environment
Methods and systems for providing secure computing environments. Features of the present invention use a plurality of integrated security controls to ensure...
2017/0244747 IDENTIFYING USER BEHAVIOR IN A DISTRIBUTED COMPUTING SYSTEM
A list of electronic mail (e-mail) accounts is extracted from an electronic mail system. A list of electronic mail accounts, with forwarding enabled, are...
2017/0244746 Assessing Security Risks of Users in a Computing Network
Various embodiments assess security risks of users in computing networks. In some embodiments, an interaction item is sent to an end user electronic device....
2017/0244745 SYSTEMS AND METHODS FOR ATTACK SIMULATION ON A PRODUCTION NETWORK
The disclosure is directed towards systems and methods for improving security in a computer network. The system can include a planner and a plurality of...
2017/0244744 SYSTEMS AND METHODS FOR ATTACK SIMULATION ON A PRODUCTION NETWORK
The disclosure is directed towards systems and methods for improving security in a computer network. The system can include a planner and a plurality of...
2017/0244743 SYSTEMS AND METODS FOR ATTACK SIMULATION ON A PRODUCTION NETWORK
The disclosure is directed towards systems and methods for improving security in a computer network. The system can include a planner and a plurality of...
2017/0244742 METHODS AND APPARATUS FOR EFFICIENT STORAGE AND PROCESSING OF GLOBAL AND LOCAL CYBER THREAT DATA IN A...
Apparatus and methods described herein relate to a global workspace management compute device that can generate a workspace hierarchy tree representing a...
2017/0244741 Malware Identification Using Qualitative Data
A system analyzes various qualitative data to identify security threats to computing devices. Qualitative data refers to data that may describe a security...
2017/0244740 METHODS AND SYSTEMS FOR ENHANCING DATA SECURITY IN A COMPUTER NETWORK
Network security risk assessment systems and methods are provided. The system has a remote subscriber computer, a risk assessment viewer application, and a...
2017/0244739 TECHNIQUES FOR DATA ROUTING AND MANAGEMENT USING RISK CLASSIFICATION AND DATA SAMPLING
Techniques described and suggested herein include various systems and methods for determining risk levels associated with transiting data, and routing portions...
2017/0244738 DISTRIBUTED DETECTION OF MALICIOUS CLOUD ACTORS
Examples relate to distributed detection of malicious cloud actors. In some examples, outgoing cloud packets from the cloud server are intercepted and...
2017/0244737 Analyzing Web Application Behavior to Detect Malicious Requests
A system is configured for protecting web applications at a host by analyzing web application behavior to detect malicious client requests. Example embodiments...
2017/0244736 METHOD AND SYSTEM FOR MITIGATING MALICIOUS MESSAGES ATTACKS
The present invention relates to a method of providing an automated reaction to malicious polymorphic messages, comprising the steps of: a) applying a handling...
2017/0244735 SYSTEMS AND USER INTERFACES FOR DYNAMIC AND INTERACTIVE INVESTIGATION OF BAD ACTOR BEHAVIOR BASED ON AUTOMATIC...
Embodiments of the present disclosure relate to a data analysis system that may automatically generate memory-efficient clustered data structures,...
2017/0244734 System and Method for Detecting and Monitoring Network Communication
A system for collection and analysis of forensic and event data comprising a server and an endpoint agent operating on a remote system. The server is...
2017/0244733 INTRUSION DETECTION USING EFFICIENT SYSTEM DEPENDENCY ANALYSIS
Methods and systems for intrusion detection include determining a causality trace for a flagged event. Determining the causality trace includes identifying a...
2017/0244731 METHODS AND SYSTEMS FOR IMPROVING BEACONING DETECTION ALGORITHMS
A method (and structure) includes receiving, as input data into a computer-implemented processing procedure, at least one listing of at least one of time...
2017/0244730 SYSTEM AND METHOD FOR PROVIDING AN IN-LINE SNIFFER MODE NETWORK BASED IDENTITY CENTRIC FIREWALL
The instant disclosure is directed to an attack/unwanted activity detecting firewall for use in protecting authentication-based network resources. The instant...
2017/0244729 SECURITY MONITORING AT OPERATING SYSTEM KERNEL LEVEL
Methods and apparatus for real-time security monitoring on a computing device are presented. A system may define privileges to access hardware interfaces for...
2017/0244728 IDENTITY AND TRUSTWORTHINESS VERIFICATION USING ONLINE AND OFFLINE COMPONENTS
Methods and systems for verifying the identity and trustworthiness of a user of an online system are disclosed. In one embodiment, the method comprises...
2017/0244727 Tokenization for Network Authorization Routing
A tokenization system that includes a tokenizer, a token and alias directory, and a network node. The tokenizer is configured to generate tokens. The token and...
2017/0244726 INTERFACE WITH SECURE INTERMEDIARY PLATFORM TO GENERATE DATA COMPATIBLE WITH AN EXTERNAL SYSTEM IN AN OIL AND...
The present disclosure generally relates to an interface system and method of interfacing to generate data compatible with an external system in an oil and gas...
2017/0244725 Distributed Content Uploading and Validation
In accordance with one or more embodiments, aspects of the disclosure provide efficient, effective, and convenient ways of uploading and authenticating...
2017/0244724 Provisioning Work Environments on Personal Mobile Devices
A virtual business mobile device can be provisioned on a personal mobile device, by binding a mobile application for provisioning the business mobile device to...
2017/0244723 JUST-IN-TIME ACCESS BASED ON GEOLOCATION TO MAINTAIN CONTROL OF RESTRICTED DATA IN CLOUD COMPUTING ENVIRONMENTS
A JIT service in a cloud computing environment manages just-in-time access to resources in the cloud computing environment for DevOps personnel who do not have...
2017/0244722 SYSTEM AND METHOD FOR AUTOMATICALLY PROVIDING PROXIMITY BASED GUEST ACCESS TO A NETWORK OF RESOURCE DEVICES
A method for providing guest access to a guest user for a network resource device based on proximity includes provisioning a plurality of network resource...
2017/0244721 SYSTEM FOR PROVIDING LEVELS OF SECURITY ACCESS TO A PROCESS DATA NETWORK
Embodiments enable a system to determine, authorize, and adjust access, writing, retrieval, and validation rights of users and entities associated with one or...
2017/0244720 SYSTEM FOR EXTERNAL VALIDATION OF PRIVATE-TO-PUBLIC TRANSITION PROTOCOLS
Embodiments of the invention are directed to a system, method, or computer program product for generating and using a block chain distributed network for...
2017/0244719 COMMUNITY-BASED PARENTAL CONTROLS
The present disclosure includes a method of maintaining rating groups and receiving, from a first user, a selection of a first rating group, from among the...
2017/0244718 METHOD OF AND SYSTEM FOR PROCESSING AN UNAUTHORIZED USER ACCESS TO A RESOURCE
There is provided a method of authenticating a user in a network. The method can be executed on a server. The method comprises: acquiring a non-authorized...
2017/0244717 Token-Based Routing for In-Network Authorization
An apparatus including an in-network transfer processor configured to receive a transfer request, a sender token, and a receiver token, to identify an...
2017/0244716 Apparatus and Method for Accessing a Network
Apparatuses, methods, and program products are disclosed for accessing a network. One method includes receiving, at a second information handling device, a...
2017/0244715 SYSTEM AND METHOD FOR PERIPHERAL INITIATED HOST ARBITRATION
A system and method is disclosed for establishing authenticated Bluetooth Low Energy communication session between a slave device and a master device. The...
2017/0244714 METHOD FOR PROVIDING BROWSER USING BROWSER PROCESSES SEPARATED FOR RESPECTIVE ACCESS PRIVILEGES AND APPARATUS...
A method for providing a browser using browser processes separated based on access privileges and an apparatus using the method. The method includes acquiring...
2017/0244713 WEB SERVER TRANSMISSION OBFUSCATION
A proxy that requests, and then analyzes, some test characteristics of a client to generate a client signature profile. When the test characteristics change in...
2017/0244712 DYNAMIC PASSCODES IN ASSOCIATION WITH A WIRELESS ACCESS POINT
A method includes, after expiration of a first passcode, receiving, at an access point, a first access request from a first device. The first access request...
2017/0244711 SYSTEM AND METHOD FOR EVALUATING A REVERSE QUERY
Real-time techniques for determining all access requests to an attribute-based access control policy which evaluate to a given decision, "permit" or "deny"....
2017/0244710 REMOTE ACCESS TO RESOURCES OVER A NETWORK
Systems and techniques are provided for controlling requests for resources from remote computers. A remote computer's ability to access a resource is...
2017/0244709 APPLICATION PROGRAMMING INTERFACE ACCESS CONTROLS
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for controlling access to APIs. One of the methods includes...
2017/0244708 Token-Based Routing for Out-of-Network Authorization
A token-based routing system that includes an out-of-network transfer processor configured to receive a transfer request, a sender token, and a receiver token...
2017/0244707 SYSTEM FOR ESTABLISHING SECURE ACCESS FOR USERS IN A PROCESS DATA NETWORK
Systems, computer program products, and methods are described herein for a system for establishing secure access for users in a process data network. The...
2017/0244706 DELEGATED RESOURCE AUTHORIZATION FOR REPLICATED APPLICATIONS
An authenticating device assigns an application identifier and an application secret value to a customer application, receives a first resource authorization...
2017/0244705 METHOD OF USING CONVERGED CORE NETWORK SERVICE, UNIVERSAL CONTROL ENTITY, AND CONVERGED CORE NETWORK SYSTEM
A method of using a converged core network service, a universal control entity (UCE), and a converged core network system. The method includes establishing, by...
2017/0244704 LOCAL VERIFICATION OF CODE AUTHENTICATION
Embodiments are directed to a computing device having execution hardware including at least one processor core, and non-volatile memory that stores...
2017/0244703 METHOD AND APPARATUS FOR CONNECTING BETWEEN ELECTRONIC DEVICES USING AUTHENTICATION BASED ON BIOMETRIC INFORMATION
A method and an apparatus for providing a connection between electronic devices using authentication based on biometric information are provided. The...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.