At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Patent # | Description |
---|---|
2018/0063208 |
JOIN FEATURE RESTORATION TO ONLINE MEETING Features to join an online meeting are crucial to successfully conducting the online meeting. Accordingly, embodiments are directed to restoration of such... |
2018/0063207 |
TECHNIQUES FOR IMPLEMENTING TELEPHONE CALL BACK FOR A MULTIMEDIA
CONFERENCING PLATFORM A method is described and in one embodiment includes receiving a request to participate in a web-based conferencing session using an IP phone, wherein the... |
2018/0063206 |
Media Communication A method and apparatus for providing communication between participants of a shared user event, in which inputs from participants of the event cause a... |
2018/0063205 |
MIXED REALITY COLLABORATION Mixed reality collaboration applications and a mixed reality collaboration platform providing mixed reality collaboration are described. The platform can... |
2018/0063204 |
METHOD, APPARATUS AND SYSTEM FOR ESTABLISHING A REAL-TIME
TELECOMMUNICATION SESSION Methods, apparatuses and systems for establishing a telecommunication session may include receiving a plurality of communication identifiers of a first type,... |
2018/0063203 |
PAIRING COMPUTER SYSTEMS WITH CONFERENCING SYSTEMS USING A VIDEO INTERFACE A conferencing system includes a computer system coupled to a base station via a first connection. The computer system receives display identification data... |
2018/0063202 |
HIGH-QUALITY ADAPTIVE BITRATE VIDEO THROUGH MULTIPLE LINKS Delivery of high quality video in an adaptive bit rate (ABR) download session is achieved using obtained using lower quality communication paths. The method... |
2018/0063201 |
DEVICE AND METHOD FOR MANAGING A COMMUNICATION INTERFACE OF A
COMMUNICATION DEVICE Methods and devices for managing a physical communication interface can include operating a first communication interface management unit in a first container... |
2018/0063200 |
MEETING INVITEE AS PROXY An electronic invitation, including invitation proxy information, for a meeting is communicated to at least a first and a second invitee. A response is... |
2018/0063199 |
ISOLATING A SOURCE OF AN ATTACK THAT ORIGINATES FROM A SHARED COMPUTING
ENVIRONMENT A method and associated systems for isolating a source of an attack that originates from a shared computing environment. A computer-security system tags... |
2018/0063198 |
DYNAMIC FILTERING OF POSTED CONTENT Systems and methods for dynamic filtering of content posted to a social network are disclosed. In aspects, a method of the system includes generating, by a... |
2018/0063197 |
System and Apparatus for Providing Network Security A rule engine receives data flows. The data flows are between a network and an application. The rule engine determines data flow information and in dependence... |
2018/0063196 |
Directing Audited Data Traffic to Specific Repositories Data traffic is monitored on a network with data access elements thereof collected and compared to security rules. An audit data collection is sent to a... |
2018/0063195 |
ADAPTABLE NETWORK EVENT MONITORING CONFIGURATION IN DATACENTERS Some embodiments provide a method for defining an adaptable monitoring profile for a network. The defined network monitoring profile is independent of the... |
2018/0063194 |
POLICY DEFINITION AND ENFORCEMENT FOR A NETWORK VIRTUALIZATION PLATFORM A method of defining policy for a network virtualization platform of a data center is provided. The method receives a registration of one or more actions... |
2018/0063193 |
Distributed Network Encryption for Logical Network Implemented in Public
Cloud Some embodiments provide a method for a first data compute node (DCN) operating in a public datacenter. The method receives an encryption rule from a... |
2018/0063192 |
EXTENSIBLE MODERATION FRAMEWORK A moderation framework monitors content posted in a database network and uses a declarative configuration scheme that defines moderation rules without having... |
2018/0063191 |
SYSTEM AND METHOD FOR USING A VIRTUAL HONEYPOT IN AN INDUSTRIAL AUTOMATION
SYSTEM AND CLOUD CONNECTOR A system includes a first network including a network device, a second network including a cloud-computing infrastructure, a module including a first interface... |
2018/0063190 |
METHOD FOR IDENTIFYING PHISHING WEBSITES AND HINDERING ASSOCIATED ACTIVITY Systems and methods for hindering cyber-attacks include: modifying a target website of a remote service provider, wherein modifying the target website... |
2018/0063189 |
PASSWORD BREACH REGISTRY A password breach registry is utilized to secure a service provided by a service provider. The password breach registry is a publicly accessible registry and... |
2018/0063188 |
Clustering Approach for Detecting DDoS Botnets on the Cloud from IPFix
Data Use machine learning to train a classifier to classify entities to increase confidence with respect to an entity being part of a distributed denial of service... |
2018/0063187 |
ADAPTIVE SELF-OPTIMZING DDOS MITIGATION A system for mitigating network attacks includes a protected network including a plurality of devices. The system further includes attack mitigation devices... |
2018/0063185 |
METHOD AND SYSTEM FOR PREVENTING UNAUTHORIZED ACCESS TO SMART CARD DEVICES
IN A REMOTE DESKTOP INFRASTRUCTURE The disclosure provides an approach for permission checking in virtualized desktop infrastructure (VDI) redirection so that only a rightful owner can access a... |
2018/0063184 |
SOFTWARE SECURITY VERIFICATION METHOD, DEVICE, AND SYSTEM The present invention discloses a software security verification method, a device, and a system, and relates to the communications field, so as to resolve a... |
2018/0063183 |
INTERACTING WITH A REMOTE SERVER OVER A NETWORK TO DETERMINE WHETHER TO
ALLOW DATA EXCHANGE WITH A RESOURCE AT... Provided are a computer program product, system, and method for interacting with a remote server over a network to determine whether to allow data exchange... |
2018/0063182 |
SYSTEMS AND METHODS FOR IDENTIFYING AND MAPPING SENSITIVE DATA ON AN
ENTERPRISE Embodiments of the present invention provide techniques, systems, and methods for remote, agent-less enterprise computer threat data collection, malicious... |
2018/0063181 |
SYSTEMS AND METHODS FOR REMOTE IDENTIFICATION OF ENTERPRISE THREATS Embodiments of the present invention provide techniques, systems, and methods for remote, agent-less enterprise computer threat data collection, malicious... |
2018/0063180 |
JAVASCRIPT SECURITY TESTING In one example in accordance with the present disclosure, a method may include receiving an initial document object model (DOM) corresponding to an HTML page... |
2018/0063179 |
System and Method Of Performing Online Memory Data Collection For Memory
Forensics In A Computing Device Various embodiments include methods and a memory data collection processor for performing online memory data collection for memory forensics. Various... |
2018/0063178 |
METHOD AND SYSTEMS FOR REAL-TIME INTERNAL NETWORK THREAT DETECTION AND
ENFORCEMENT A method for threat detection and enforcement in an internal network is disclosed. The method includes: receiving a network packet of a plurality of network... |
2018/0063177 |
NON-TRANSITORY RECORDING MEDIUM RECORDING CYBER-ATTACK ANALYSIS SUPPORTING
PROGRAM, CYBER-ATTACK ANALYSIS... A non-transitory recording medium recording a cyber-attack analysis supporting program that causes a computer to execute a process, the process includes:... |
2018/0063176 |
Identifying and Handling Threats to Data Compute Nodes in Public Cloud Some embodiments provide a method for a public cloud manager that interacts with a management system of a public datacenter. The method receives a notification... |
2018/0063175 |
Detection Dictionary System Supporting Anomaly Detection Across Multiple
Operating Environments A detection dictionary system provides a framework for describing, detecting, and reporting anomalies across multiple operating environments each including... |
2018/0063174 |
ILLEGITIMATE TYPOSQUATTING DETECTION WITH INTERNET PROTOCOL INFORMATION Detecting illegitimate typosquatting with Internet Protocol (IP) information includes, at a computing device having connectivity to a network, obtaining a list... |
2018/0063173 |
APPARATUS FOR INFORMATION PROCESSING, SYSTEM FOR INFORMATION PROCESSING,
AND METHOD FOR INFORMATION PROCESSING An information processing apparatus includes a memory configured to store identifying information of a web page conforming to a predetermined condition and a... |
2018/0063172 |
NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM STORING CONTROL PROGRAM,
CONTROL METHOD, AND INFORMATION... A non-transitory computer-readable recording medium storing a control program causing a computer to execute processing, the processing includes: displaying a... |
2018/0063171 |
NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM STORING CYBER ATTACK
ANALYSIS SUPPORT PROGRAM, CYBER ATTACK... A non-transitory computer readable recording medium storing a computer executable program that, when executed, causes a computer to perform a cyber attack... |
2018/0063170 |
NETWORK SECURITY SCORING In one general aspect, a network security system is disclosed that includes a network interface operative to connect the system to a public wide area network... |
2018/0063169 |
CONTAINER FILE ANALYSIS USING MACHINE LEARNING MODEL In one respect, there is provided a system for training a machine learning model to detect malicious container files. The system may include at least one... |
2018/0063168 |
AUTOMATIC DETECTION OF NETWORK THREATS BASED ON MODELING SEQUENTIAL
BEHAVIOR IN NETWORK TRAFFIC A computer-implemented data processing method comprises: executing a recurrent neural network (RNN) comprising nodes each implemented as a Long Short-Term... |
2018/0063167 |
LOCATION ENRICHMENT IN ENTERPRISE THREAT DETECTION Subnet information and location information is received from a database by a smart data streaming engine (SDS). A particular subnet of the subnet information... |
2018/0063166 |
ROOTKIT DETECTION SYSTEM AND METHOD A rootkit detection method includes obtaining, from a target system, first data comprising raw data stored in a data block of a storage drive, checking the... |
2018/0063165 |
DETECTING AND MITIGATING WARDRIVING Determining the physical location of wirelessly connected devices within a network can provide a number of security benefits. However, manually determining and... |
2018/0063164 |
SECURING SERVICES IN A NETWORKED COMPUTING ENVIRONMENT A system includes: a CPU, a computer readable memory and a computer readable storage medium associated with a computer device of a service provider; program... |
2018/0063163 |
LEARNING INDICATORS OF COMPROMISE WITH HIERARCHICAL MODELS Presented herein are techniques for classifying devices as being infected with malware based on learned indicators of compromise. A method includes receiving... |
2018/0063162 |
DNS TUNNELING PREVENTION Embodiments for domain name service (DNS) tunneling prevention by a processor. A DNS tunneling detection operation is requested to be performed upon receiving... |
2018/0063161 |
RAPID, TARGETED NETWORK THREAT DETECTION Rapidly detecting network threats with targeted detectors includes, at a computing device having connectivity to a network, determining features of background... |
2018/0063160 |
Isolated Network Stack to Manage Security for Virtual Machines Some embodiments provide a novel method for monitoring network requests from a machine. The method captures the network request at various layers of a protocol... |
2018/0063159 |
APPARATUS AND METHOD FOR PROVIDING SECURITY SERVICE IN COMMUNICATION
SYSTEM An apparatus and a method for providing a security service in a communication system are provided. The security device includes a receiver configured to... |
2018/0063158 |
CRYPTOGRAPHIC EVIDENCE OF PERSISTED CAPABILITIES Example implementations relate to cryptographic evidence of persisted capabilities. In an example implementation, in response to a request to access a... |