Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2017/0310718 METHOD AND APPARATUS FOR PROVIDING SERVICE CONTINUITY IN MBSFN SERVICE BOUNDARY AREA
The present specification provides a method and an apparatus for a terminal to maintain continuity of multimedia broadcast multicast service (MBMS) service in...
2017/0310717 SYSTEM AND METHOD FOR INSTANTIATING A HIDDEN SECONDARY CHAT SESSION FOR A PRIMARY CHAT SESSION
A method, computer program product, and computer system for identifying a first message sent between a first user computing device and a second user computing...
2017/0310716 AUTO-GENERATION OF ACTIONS OF A COLLABORATIVE MEETING
A method for identifying and initiating actions of a meeting. The method includes a computer processor monitoring a meeting where monitoring the meeting...
2017/0310715 NOTIFYING RESPONSE SENDER OF MALFORMED SESSION INITIATION PROTOCOL (SIP) RESPONSE MESSAGES
A method, computer program product, and computer system for notifying a response sender of a malformed SIP response message. The method includes, producing a...
2017/0310714 SYSTEM AND METHOD FOR INTERACTIVE AND REAL-TIME VISUALIZATION OF DISTRIBUTED MEDIA
A method for providing control and visualization of media. A first media stream having an initial resolution is received from a source computer; the first...
2017/0310713 Establishing And Managing Connections For Real Time Communications
Methods and systems related to supporting real time communications are disclosed. In one type of a real time communication session, prior to an offer and...
2017/0310712 Intelligent Transducers for Transforming Signals in Complex Computing Networks
This disclosure is directed to an intelligent transducer for transforming a first event signal received from an input signal system into a second event signal...
2017/0310711 SYSTEM AND METHOD FOR INTERCEPTION OF IP TRAFFIC BASED ON IMAGE PROCESSING
Methods and systems for monitoring communication traffic in communication networks, such as Internet Protocol (IP) traffic transferred over the Internet or...
2017/0310710 METHOD AND APPARATUS FOR PROVIDING PRIVACY MANAGEMENT IN MACHINE-TO-MACHINE COMMUNICATIONS
A method, non-transitory computer readable medium and apparatus for processing a request from a server of a machine-to-machine service provider are provided....
2017/0310709 CLOUD BASED SECURITY USING DNS
A cloud-based security method using Domain Name System (DNS) includes receiving a request from a user device at a DNS server; performing a security check on...
2017/0310708 SECURE LABELING OF NETWORK FLOWS
An enterprise security system is improved by instrumenting endpoints to explicitly label network flows with cryptographically secure labels that identify an...
2017/0310707 NETWORKED SECURITY SYSTEM
Disclosed are multi-tenant networked security systems and methods. The system includes a central server, a first user application provided on a first computing...
2017/0310706 Tunneling For Network Deceptions
Provided are systems, methods, and computer-program products for providing network deceptions using a network tunnel. In various implementations, a network...
2017/0310705 RESPONSIVE DECEPTION MECHANISMS
Provided are methods, network devices, and computer-program products for dynamically configuring a deception mechanism in response to network traffic from a...
2017/0310704 THREAT ENGAGEMENT AND DECEPTION ESCALATION
Provided are methods, network devices, and computer-program products for a network deception system. The network deception system can engage a network threat...
2017/0310703 DETECTING TRIGGERING EVENTS FOR DISTRIBUTED DENIAL OF SERVICE ATTACKS
An endpoint in an enterprise network is monitored, and when a potential trigger for a distributed denial of service (DDoS) attack is followed by an increase in...
2017/0310702 Biology Based Techniques for Handling Information Security and Privacy
A local segment analysis and security (LSAS) engine method, computer program product, and apparatus are provided. The LSAS engine collects status metrics...
2017/0310701 MICROCHECKPOINTING AS SECURITY BREACH DETECTION MEASURE
A method includes: deploying at least one shadow system in association with each of one or more components of a network environment; periodically recording a...
2017/0310700 SYSTEM FAILURE EVENT-BASED APPROACH TO ADDRESSING SECURITY BREACHES
A method includes: detecting a potential security breach associated with at least one component of a network environment; in response to detecting the...
2017/0310699 HIERARCHICAL SCANNING OF INTERNET CONNECTED ASSETS
A system for hierarchical scanning includes an interface and a processor. The interface is to receive an indication to scan using a payload; provide the...
2017/0310698 Validating Strength Values For Account Security Questions
A device, system, and method validates strength values for security questions associated with an online account. The method performed by an online service...
2017/0310697 NETWORK ANOMALY DETECTION
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for determining network related anomaly scores. One of the...
2017/0310696 PROVIDING APPLICATION-SPECIFIC THREAT METRICS
Assessment of threat risks associated with a given mobile device application (app) on a device type specific basis, so that the threat assessment is specific...
2017/0310695 INFORMATION REPORTING FOR ANOMALY DETECTION
In one embodiment, a first device in a network receives traffic flow data from a plurality of devices in the network. The traffic flow data from at least one...
2017/0310694 MALICIOUS COMMUNICATION PATTERN EXTRACTION APPARATUS, MALICIOUS COMMUNICATION PATTERN EXTRACTION METHOD, AND...
A malicious communication pattern extraction apparatus extracts communication patterns of traffic group of malwares, and replaces the values of predetermined...
2017/0310693 LOCAL PROXY DETECTION
Protocol suites such as hypertext transfer protocol (HTTP) using secure socket layer (SSL) can facilitate secure network communications. When using this type...
2017/0310692 DETECTING ENDPOINT COMPROMISE BASED ON NETWORK USAGE HISTORY
In the context of network activity by an endpoint in an enterprise network, malware detection is improved by using a combination of reputation information for...
2017/0310691 SELF ORGANIZING LEARNING TOPOLOGIES
In one embodiment, a networking device at an edge of a network generates a first set of feature vectors using information regarding one or more characteristics...
2017/0310690 DOMAIN LEVEL THREAT DETECTION FOR INDUSTRIAL ASSET CONTROL SYSTEM
A normal space data source stores, for each of a plurality of threat nodes, a series of normal values that represent normal operation of an industrial asset...
2017/0310689 AUTOMATICALLY GENERATING NETWORK RESOURCE GROUPS AND ASSIGNING CUSTOMIZED DECOY POLICIES THERETO
A cyber security system comprising circuitry of a decoy deployer planting one or more decoy lateral attack vectors in each of a first and a second group of...
2017/0310688 SYSTEM AND METHOD FOR SECURING AN ELECTRONIC CIRCUIT
A system for securing an electronic circuit including: plural regions, activity of each of which may be controlled; plural sensors integrated into the...
2017/0310687 BOTNET DETECTION SYSTEM AND METHOD
A botnet detection system and method are provided. The method includes the steps of: retrieving a network log file of a computer device; refining the network...
2017/0310686 LABELING NETWORK FLOWS ACCORDING TO SOURCE APPLICATIONS
An enterprise security system is improved by instrumenting endpoints to explicitly label network flows according to sources of network traffic. When a network...
2017/0310685 Method for Transmitting Verification Information and Terminal
A method for transmitting verification information includes: detecting, by a first terminal, whether a condition for performing a verification operation is...
2017/0310684 METHOD AND DEVICE FOR AVOIDING MANIPULATION OF A DATA TRANSMISSION
A method and device for avoiding manipulation of a data transmission. A message containing a message authentication code is received at a processing unit, the...
2017/0310683 COMPUTER SECURITY BASED ON HIERARCHICAL CACHE LATENCY SIGNATURE AUTHENTICATION
A processor is coupled to a hierarchical memory structure which includes a plurality of levels of cache memories that hierarchically cache data that is read by...
2017/0310682 System and Method for Surrogate Locational Determination
Surrogate locational determination may rely on a surrogate device to provide a locational fix. When a device lacks an accurate geo-location system,...
2017/0310681 Method and Apparatus for Providing an Adaptable Security Level in an Electronic Communication
A method of communicating in a secure communication system, comprises the steps of assembling a message at a sender, then determining a frame type, and...
2017/0310680 TRUSTWORTHINESS OF PROCESSED DATA
A method indicates a trustworthiness of data processed in accordance with a processing rule. A first trust weight is assigned to a data item to be processed to...
2017/0310679 SECURITY DETERMINATION
A method and system for determining user security is provided. The method includes registering a first user associated with a service provider system by...
2017/0310678 METHODS AND SYSTEMS FOR MANAGING A NETWORK NODE THROUGH A SERVER
The present invention discloses methods and systems for managing a node through a management server. The management server verifies whether a management...
2017/0310677 SYSTEM AND METHOD FOR PROTECTING CONTENT IN A WIRELESS NETWORK
A method of providing access to content within a user device is disclosed and may include determining a location of the content, determining whether the...
2017/0310676 METHOD FOR ACCESSING SWITCH EXTERNAL MEMORY FROM CONTROL PLANE AND DATA PLANE
The present invention relates to a method for accessing a switch external memory from a control plane and a data plane. A control module issues information...
2017/0310675 SERVER APPARATUS, SYSTEM, INFORMATION PROCESSING METHOD, AND STORAGE MEDIUM STORING COMPUTER PROGRAM
In a case where a second client apparatus associated with a first client apparatus exists when the first client apparatus is determined as a client apparatus...
2017/0310674 APPROACH FOR SECURING A VEHICLE ACCESS PORT
The disclosure reveals a system having secured electronic access. The system may have one or more vehicle buses, one or more electronic control units on a...
2017/0310673 SECURITY SYSTEM WITH GESTURE-BASED ACCESS CONTROL
A method for gesture-based access control of a secured target using a mobile device, such as a wristband or smart phone, is disclosed. The method includes...
2017/0310672 INTERNETWORK AUTHENTICATION
A technique for network authentication interoperability involves initiating an authentication procedure on a first network, authenticating on a second network,...
2017/0310671 METHOD AND APPARATUS TO SUPPORT BINARY PACKING OF JSON DATA
A new approach is proposed that contemplates systems and methods to support packing of both binary data and fields of non-binary logical data (e.g., JSON) into...
2017/0310670 BYPASSING CERTIFICATE PINNING
A client application performs certificate pinning as a means of authenticating the identity of a server. A proxy is interposed in the communications path of...
2017/0310669 Device Blocking Tool
Automated locating and disconnection of undesired devices may include receiving a unique address of a candidate device, determining the address of the switch...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.