Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2017/0324782 ACCESS CONTROL USING IMPERSONIZATION
A first service submits a request to a second service on behalf of a customer of a service provider. The request may have been triggered by a request of the...
2017/0324781 SECURITY IN SOFTWARE DEFINED NETWORK
At least one security policy is obtained from a policy creator at a controller in an SDN network. The security policy is implemented in the SDN network, via...
2017/0324780 SYSTEM AND METHOD FOR ENCRYPTION KEY MANAGEMENT, FEDERATION AND DISTRIBUTION
Systems and methods are described for orchestrating a security object, including, for example, defining and storing a plurality of policies in a database...
2017/0324779 METHOD AND SYSTEM FOR RAPID ACCREDITATION/RE-ACCREDITATION OF AGILE IT ENVIRONMENTS, FOR EXAMPLE SERVICE...
A system and method for managing and analyzing security requirements in reusable models. At least one functional model, at least one security implementation...
2017/0324778 Latency-Based Timeouts For Concurrent Security Processing Of Network Packets By Multiple In-Line Network...
Latency-based timeouts are used for concurrent security processing by multiple in-line network security tools. A network system forwards secure network packets...
2017/0324777 INJECTING SUPPLEMENTAL DATA INTO DATA QUERIES AT NETWORK END-POINTS
Various embodiments pertain to techniques for injecting supplemental data into search query results delivered to an operating system. More specifically, an...
2017/0324776 GENERATING A HONEY NETWORK CONFIGURATION TO EMULATE A TARGET NETWORK ENVIRONMENT
Techniques for generating a honey network configuration to emulate a target network environment are disclosed. In some embodiments, techniques for generating a...
2017/0324775 SYSTEM AND METHOD FOR DETECTING, ALERTING AND BLOCKING DATA LEAKAGE, EAVESDROPPING AND SPYWARE
A computer implemented method for detecting, alerting and blocking data leakage, eavesdropping and spyware in one or more networked computing devices includes...
2017/0324774 ADDING SUPPLEMENTAL DATA TO A SECURITY-RELATED QUERY
Various embodiments are described herein that add supplemental data into security-related query results delivered to an operating system. More specifically, an...
2017/0324773 CREATION OF FICTITIOUS IDENTITIES TO OBFUSCATE HACKING OF INTERNAL NETWORKS
Introduced here are security techniques for networks. More specifically, fictitious identities (also referred to as "bogus identities") can be willfully...
2017/0324772 SYSTEMS AND METHODS FOR IDENTIFYING INTERNET ATTACKS
The present disclosure relates to a system (1) and a method that employs such system (1) to detect and counteract Internet attacks of Man-in-the-Browser and/or...
2017/0324771 PREDICTIVE FRAUD PREVENTION FOR COLLABORATION CONFERENCING SYSTEMS
Aspects of the present disclosure involve systems and methods for detecting a potentially fraudulent access of a collaboration conferencing system on a...
2017/0324770 MITIGATING NEIGHBOR DISCOVERY-BASED DENIAL OF SERVICE ATTACKS
In one embodiment, a device in a network determines whether a destination address of a packet received by the device is within a neighbor discovery (ND) cache...
2017/0324769 SIMULATING UNAUTHORIZED USE OF A CELLULAR COMMUNICATION NETWORK
Described embodiments include a system that includes a digital memory and a processor. The processor is configured to simulate, using information stored in the...
2017/0324768 ADVANCED CYBERSECURITY THREAT MITIGATION USING BEHAVIORAL AND DEEP ANALYTICS
A system for mitigation of cyberattacks employing an advanced cyber decision platform comprising a time series data store, a directed computational graph...
2017/0324767 SYSTEMS AND METHODS FOR DETECTING AND/OR HANDLING TARGETED ATTACKS IN THE EMAIL CHANNEL
Techniques for detecting and/or handling target attacks in an enterprise's email channel are provided. The techniques include receiving aspects of an incoming...
2017/0324766 SELECTION OF COUNTERMEASURES AGAINST CYBER ATTACKS
A method of selecting, for at least one service of an information system and depending service(s), at least one countermeasure to be implemented against at...
2017/0324765 AUTOMATED SECURITY ENCLAVE GENERATION
Creating security enclaves includes determining one or more parameters of one or more applications and one or more services operating in the network. An...
2017/0324764 SYSTEM AND METHOD FOR EVALUATING AND ENHANCING THE SECURITY LEVEL OF A NETWORK SYSTEM
Examples described herein provide for a system that evaluates a security level of a network system. Additionally, examples described herein evaluate a security...
2017/0324763 Methods and Systems for Predicting Vulnerability State of Computer System
A system uses a probabilistic technique to determine the vulnerability of similar assets based on the data provided on some assets. The probabilistic technique...
2017/0324762 AUTHENTICATION AND RISK ASSESSMENT THROUGH HEADER INJECTIONS
A system for implementing header enrichment or header injections in proprietary networks for authenticating users, conducting user risk assessments, and...
2017/0324761 COLLABORATIVE INFRASTRUCTURE SUPPORTING CYBER-SECURITY ANALYTICS IN INDUSTRIAL NETWORKS
A system comprising a computer-readable storage medium storing at least one program, and a method for reducing cyber-security related false positive alerts is...
2017/0324760 SECURITY WEAKNESS AND INFILTRATION DETECTION AND REPAIR IN OBFUSCATED WEBSITE CONTENT
Website data security is provided by conditionally accessing, assessing, and processing website content file attribute data and website content files used to...
2017/0324759 NETWORK SAMPLING BASED PATH DECOMPOSITION AND ANOMALY DETECTION
According to examples, network sampling based path decomposition and anomaly detection may include evaluating computer-generated log file data to generate a...
2017/0324758 DETECTING AND REACTING TO MALICIOUS ACTIVITY IN DECRYPTED APPLICATION DATA
Described herein are systems and methods for detecting potentially malicious activity in a network session. Embodiments may involve identifying a requested...
2017/0324757 MULTIPLE DETECTOR METHODS AND SYSTEMS FOR DEFEATING LOW AND SLOW APPLICATION DDOS ATTACKS
Methods and systems for detecting and defeating a low and slow application DDoS attack, comprising: computing the Entropy of a plurality of detectors, at least...
2017/0324756 REMOTE REMEDIATION OF MALICIOUS FILES
A device may determine that a file of a client device is a malicious file. The device may obtain remote access to the client device using a connection tool....
2017/0324755 Method and System for Mitigating the Effects of Ransomware
Computerized methods and systems mitigate the effect of a ransomware attack on an endpoint by detecting access events associated with requests by processes,...
2017/0324754 SECURE GROUP CREATION IN PROXIMITY BASED SERVICE COMMUNICATION
A method of forming a secure group in ProSe communication includes requesting a service request to a ProSe server from a requesting device (21), the service...
2017/0324753 DEVICES, METHODS AND SYSTEMS FOR SECURE DATA TRANSFERS
Methods, systems and devices for securely transferring digital data from a first repository to a second repository are disclosed. Per at least one embodiment,...
2017/0324752 TARGETED AUTHENTICATION QUERIES BASED ON DETECTED USER ACTIONS
There are provided systems and methods for targeted authentication queries based on detected user actions. A user may perform various actions during a day,...
2017/0324751 VISITOR ACCESS MANAGEMENT
Methods, systems and computer readable media for managing access of visitors to a facility are described.
2017/0324750 PORTABLE VERIFIABLE CREDENTIALS AND METHODS THEREOF
The migration of identity documents, such as driving licenses, from physical documents to electronic documents creates new problems for those seeking to verify...
2017/0324749 SERVICE TOKEN HANDLING
A system includes reception, at a server and in a first browser session, of a request from a client for a token to access a first software service,...
2017/0324748 INDIRECT USER AUTHENTICATION
As disclosed herein a computer system, executed by a computer, includes receiving, from a user, a request for access to a shared system, wherein the request...
2017/0324747 INDIRECT USER AUTHENTICATION
As disclosed herein, a computer program product, executed by a computer, includes receiving, from a user, a request for access to a shared system, wherein the...
2017/0324746 UNIFORMLY ACCESSING FEDERATED USER REGISTRY TOPOLOGIES
An approach for standardizing access to user registries, the approach involving providing a first schema extension to an identity management system and a...
2017/0324745 DIFFERENTIAL SECURITY POLICIES IN EMAIL SYSTEMS
A differential message security policy includes receiving information regarding activities of a user, determining a security risk for the user based on the...
2017/0324744 SITUATIONAL AWARENESS SYSTEM SECURITY FEATURES
Security features a situational awareness system using location tracking information including requiring a security identifier, such as a password or a bio...
2017/0324743 SUPERVISED ONLINE IDENTITY
Technologies to facilitate supervision of an online identify include a gateway server to facilitate and monitor access to an online service by a user of a...
2017/0324742 STATELESS PREVENTION OF LOGIN-BASED CROSS-SITE REQUEST FORGERY
A web application receives a request for a web site's login page. The web application sends, via a domain name, a response including the login page, a first...
2017/0324741 METHOD, NETWORK NODE AND TERMINAL DEVICE IN A COMMUNICATION NETWORK
A method in a network node of a communication network configured to manage command messages from at least one Machine Type Communication, MTC, device manager...
2017/0324740 DATA ACCESS BY EXTERNAL USERS
Described herein is a framework for providing and securing data access by external users. In accordance with one aspect of the framework, an external schema is...
2017/0324739 SYSTEM AND METHOD FOR USING A SEPARATE DEVICE TO FACILITATE AUTHENTICATION
A system that incorporates the subject disclosure may perform, for example, operations including obtaining a request from a mobile device to allow user access...
2017/0324738 INTERNET SECURITY
The present disclosure generally discloses an Internet security mechanism configured to provide security for Internet resources of the Internet using an...
2017/0324737 SYSTEM AND METHOD FOR MULTI-FACTOR AUTHENTICATION
A method at an authentication server for multi-factor authentication of an electronic device, the method including receiving at the authentication server a...
2017/0324736 SECURING BIOMETRIC DATA THROUGH TEMPLATE DISTRIBUTION
Embodiments include method, systems and computer program products for safeguarding biometric data. Aspects include receiving a first biometric data unit and...
2017/0324735 METHOD FOR PROVIDING AN ACCESS CODE ON A PORTABLE DEVICE AND PORTABLE DEVICE
The disclosure relates to a method for providing an access code on a portable device, which comprises a user interface and is set up for a wireless data...
2017/0324734 COMPUTER SECURITY BASED ON MOUSE DEVICE SPEED SETTING AUTHENTICATION
A method of performing operations by a processor of a computer terminal, includes determining an operation system (OS) speed scaling gain used by the OS to...
2017/0324733 USING SECURITY POSTURE INFORMATION TO DETERMINE ACCESS TO SERVICES
Current approaches to using security postures lack functionalities. Security postures can be used to enable various nodes to make informed decisions. In...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.