Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2017/0279850 DETECTING AND PREVENTING FLOODING ATTACKS IN A NETWORK ENVIRONMENT
A method for processing network traffic data includes receiving a packet, and determining whether the packet is a previously dropped packet that is being...
2017/0279849 CONSTRAINT-AWARE RESOURCE SYNCHRONIZATION ACROSS HYPER-DISTRIBUTED LEARNING SYSTEMS
In one embodiment, a device in a network receives data indicative of a target state for one or more distributed learning agents in the network. The device...
2017/0279848 SCORE BOOSTING STRATEGIES FOR CAPTURING DOMAIN-SPECIFIC BIASES IN ANOMALY DETECTION SYSTEMS
In one embodiment, a device in a network detects an anomaly in the network using an anomaly detector. The anomaly corresponds to an anomalous behavior...
2017/0279847 INCREASED GRANULARITY AND ANOMALY CORRELATION USING MULTI-LAYER DISTRIBUTED ANALYTICS IN THE NETWORK
In one embodiment, a primary networking device in a branch network receives a notification of an anomaly detected by a secondary networking device in the...
2017/0279846 DETECTING AND REMEDIATING HIGHLY VULNERABLE DOMAIN NAMES USING PASSIVE DNS MEASUREMENTS
Some embodiments provide a technique for detecting highly-vulnerable domain names and remediating associated problems. The technique can include collecting DNS...
2017/0279845 User Interface for Displaying and Comparing Attack Telemetry Resources
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for displaying information about computer network resources...
2017/0279844 IDENTIFYING AND REMEDIATING AT-RISK RESOURCES IN A COMPUTING ENVIRONMENT
Methods and systems of identifying and remediating at-risk resources in a computing environment are provided. A method includes periodically determining...
2017/0279843 PROBABILISTIC MODEL FOR CYBER RISK FORECASTING
A system and method are presented for forecasting the risk of cyber-attacks on targeted networks. The described technology quantifies linear and non-linear...
2017/0279842 MALWARE AND ANOMALY DETECTION VIA ACTIVITY RECOGNITION BASED ON SENSOR DATA
A system for malware and anomaly detection via activity recognition based on sensor is disclosed. The system may analyze sensor data collected during a...
2017/0279841 METHODS OF DETERMINING A FILE SIMILARITY FINGERPRINT
A similarity fingerprint for a data object such as a file can be automatically determined using one or more anchor values. The one or more anchor values can be...
2017/0279840 AUTOMATED EVENT ID FIELD ANALYSIS ON HETEROGENEOUS LOGS
A system, program, and method for anomaly detection in heterogeneous logs. The system having a processor configured to identify pattern fields comprised of a...
2017/0279839 NETWORK-BASED APPROACH FOR TRAINING SUPERVISED LEARNING CLASSIFIERS
In one embodiment, a supervisory device in a network receives traffic data from a security device that uses traffic signatures to assess traffic in the...
2017/0279838 DISTRIBUTED ANOMALY DETECTION MANAGEMENT
In one embodiment, a device in a network performs anomaly detection functions using a machine learning-based anomaly detector to detect anomalous traffic in...
2017/0279837 GATHERING FLOW CHARACTERISTICS FOR ANOMALY DETECTION SYSTEMS IN PRESENCE OF ASYMMETRICAL ROUTING
In one embodiment, a first device in a network identifies a first traffic flow between two endpoints that traverses the first device in a first direction. The...
2017/0279836 DISTRIBUTED FEEDBACK LOOPS FROM THREAT INTELLIGENCE FEEDS TO DISTRIBUTED MACHINE LEARNING SYSTEMS
In one embodiment, a device in a network receives anomaly data regarding an anomaly detected by a machine learning-based anomaly detection mechanism of a first...
2017/0279835 ADAPTIVE CAPTURE OF PACKET TRACES BASED ON USER FEEDBACK LEARNING
In one embodiment, a node in a network detects an anomaly in the network based on a result of a machine learning-based anomaly detector analyzing network...
2017/0279834 USER ASSISTANCE COORDINATION IN ANOMALY DETECTION
In one embodiment, a device in a network receives feedback regarding an anomaly reporting mechanism used by the device to report network anomalies detected by...
2017/0279833 EDGE-BASED MACHINE LEARNING FOR ENCODING LEGITIMATE SCANNING
In one embodiment, a device in a network receives an indication that a network anomaly detected by an anomaly detector of a first node in the network is...
2017/0279832 SANITY CHECK OF POTENTIAL LEARNED ANOMALIES
In one embodiment, a device in a network receives, from a supervisory device, trace information for one or more traffic flows associated with a particular...
2017/0279831 USE OF URL REPUTATION SCORES IN DISTRIBUTED BEHAVIORAL ANALYTICS SYSTEMS
In one embodiment, a device in a network identifies a universal resource locator (URL) from traffic destined for the URL that triggered a first anomaly...
2017/0279830 MECHANISMS TO PREVENT ANOMALY DETECTORS FROM LEARNING ANOMALOUS PATTERNS
In one embodiment, a device in a network detects an anomaly in the network by analyzing a set of sample data regarding one or more conditions of the network...
2017/0279829 DYNAMIC DEVICE CLUSTERING USING DEVICE PROFILE INFORMATION
In one embodiment, a networking device in a network causes formation of device clusters of devices in the network. The devices in a particular cluster exhibit...
2017/0279828 HIERARCHICAL MODELS USING SELF ORGANIZING LEARNING TOPOLOGIES
In one embodiment, a device in a network maintains a plurality of anomaly detection models for different sets of aggregated traffic data regarding traffic in...
2017/0279827 EDGE-BASED DETECTION OF NEW AND UNEXPECTED FLOWS
In one embodiment, a device in a network identifies a new interaction between two or more nodes in the network. The device forms a feature vector using...
2017/0279826 PROTECTING DYNAMIC AND SHORT-LIVED VIRTUAL MACHINE INSTANCES IN CLOUD ENVIRONMENTS
The present disclosure relates to protecting temporary virtual machine instances in a cloud computing platform from security risks. An example method generally...
2017/0279825 TRACKING CLOUD WORKLOADS TO ISOLATE SECURITY BREACH EXPOSURE
A computer-implemented method includes receiving, by a computing device within a networking environment, a workload for execution within the networking...
2017/0279824 TECHNIQUES FOR SHARING NETWORK SECURITY EVENT INFORMATION
This disclosure provides an architecture for sharing information between network security administrators. Events converted to a normalized data format (CCF)...
2017/0279823 NETWORK ATTACK DETERMINATION METHOD, SECURE NETWORK DATA TRANSMISSION METHOD, AND CORRESPONDING APPARATUS
This application discloses a network attack determination method, a secure network data transmission method, and a corresponding apparatus. In this...
2017/0279822 SYSTEMS AND TECHNIQUES FOR GUIDING A RESPONSE TO A CYBERSECURITY INCIDENT
A cybersecurity engine can guide a forensic investigation of a security incident by estimating the utility of investigating events associated with the security...
2017/0279821 SYSTEM AND METHOD FOR DETECTING INSTRUCTION SEQUENCES OF INTEREST
An instruction sequence detection system is trained to detect instruction sequences of interest, such as threats by malicious computer data. Training includes...
2017/0279820 SYSTEM AND METHOD FOR DETECTING COMPUTER ATTACKS
One embodiment of the invention is a system that stores a characteristic "modus operandi" for each type of computer attack that has historically been...
2017/0279819 SYSTEMS AND METHODS FOR OBTAINING INFORMATION ABOUT SECURITY THREATS ON ENDPOINT DEVICES
The disclosed computer-implemented method for obtaining information about security threats on endpoint devices may include (1) detecting, by a security program...
2017/0279818 ANTIVIRUS SIGNATURE DISTRIBUTION WITH DISTRIBUTED LEDGER
This document generally describes techniques for using a distributed ledger to implement a framework for the validation and distribution of virus signatures,...
2017/0279817 SYSTEM AND METHOD FOR RETROSPECTIVE NETWORK TRAFFIC ANALYSIS
A method is provided to monitor network traffic, including reserving a portion of a system memory for short-term storage of copied network traffic, wherein the...
2017/0279816 REMEDIATING COMPUTER SECURITY THREATS USING DISTRIBUTED SENSOR COMPUTERS
A data processing system comprising: a sensor computer that is coupled to and co-located with a compromised computer, the compromised computer comprising at...
2017/0279815 Systems and Methods for Using Video for User and Message Authentication
Aspects of the disclosed technology include a method including identifying, by a computer device, a message; encoding, by the computer device, the message;...
2017/0279814 DOUBLE WRITE DATA EXCHANGE IN A DEAD DROP NETWORK ARCHITECTURE
A sender uses a double-write protocol to pass data to a recipient using a dead drop network architecture. The sender sends, to a dead drop domain, a data...
2017/0279813 CONTEXT-BASED RESOURCE ACCESS MEDIATION
Apparatuses, methods, and computer-readable media for a context-based access mediator ("CAM") are described. The CAM may be configured to mediate access to...
2017/0279812 ENCRYPTION AND DECRYPTION OF DATA IN A CLOUD STORAGE BASED ON INDICATIONS IN METADATA
Provided are a method, a system, and a computer program product in which metadata associated with encrypted data is maintained in a cloud computing...
2017/0279811 USER IDENTIFICATION MARKING METHOD, APPARATUS, AND SYSTEM
The present disclosure provides a user identification marking method. The method includes determining a user identification that needs a classification...
2017/0279810 METHOD OF, AND APPARATUS FOR, SECURE ONLINE ELECTRONIC COMMUNICATION
A method for secure electronic communication between one or more clients on one or more client computing devices. The method includes establishing a networked...
2017/0279809 METHODS AND SYSTEMS FOR DETECTING, VERIFYING, PREVENTING AND CORRECTING OR RESOLVING UNAUTHORIZED USE OF...
A method of detecting, verifying, preventing and correcting or resolving unauthorized use of electronic media content. In one embodiment, the method comprises...
2017/0279808 METHOD AND DEVICE FOR CONTROLLING DEVICE BY USING BLUETOOTH LOW ENERGY (LE) TECHNIQUE
Disclosed is a method and device for controlling a connection between a first device and a second device by using Bluetooth LE (Low Energy) technology. The...
2017/0279807 SAFE METHOD TO SHARE DATA AND CONTROL THE ACCESS TO THESE IN THE CLOUD
The object of the present invention is to create a method for storing data in the cloud that ensures the privacy of the said data even against the...
2017/0279806 Authentication in a Computer System
An authentication arrangement comprises a first security protocol server configured to manage authenticators for log in to a first set of hosts managed by the...
2017/0279805 SECURE RESOURCE-BASED POLICY
The techniques and systems described herein improve security and improve connection reliability by providing a framework for an application to communicate its...
2017/0279804 INTEGRATED HOSTED DIRECTORY
Methods, systems, and devices for enterprise-wide management of disparate devices, applications, and users are described. A cloud-based central server may...
2017/0279803 SYSTEMS AND METHODS FOR CLOUD BASED UNIFIED SERVICE DISCOVERY AND SECURE AVAILABILITY
Systems and methods implemented by a unified agent application executed on a mobile device, for unified service discovery and secure availability include...
2017/0279802 BI-DIRECTIONAL AUTHENTICATION BETWEEN A MEDIA REPOSITORY AND A HOSTING PROVIDER
A hosting provider may be bi-directionally authenticated with one or more media repositories. The hosting provider preferably has domain name registration and...
2017/0279801 SYSTEMS AND METHODS FOR PROVIDING BLOCK CHAIN-BASED MULTIFACTOR PERSONAL IDENTITY VERIFICATION
Block chain-based multifactor personal identity verification may be provided. Verification addresses may be established on a block chain by: associating...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.