At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Patent # | Description |
---|---|
2018/0191759 |
SYSTEMS AND METHODS FOR MODELING AND MONITORING DATA ACCESS BEHAVIOR A system for monitoring data-access behavior is provided. The system may derive a behavioral pattern based on at least one of historic data access by a user or... |
2018/0191758 |
CLUSTER-BASED DECISION BOUNDARIES FOR THREAT DETECTION IN INDUSTRIAL ASSET
CONTROL SYSTEM According to some embodiments, a threat detection model creation computer may receive a series of monitoring node values (representing normal and/or threatened... |
2018/0191757 |
USING DATA SCIENCE TO AID IN DETECTION OF UNAUTHORIZED DISTRIBUTION In one embodiment, a method performed by a system that includes at least one processor, the method comprising: obtaining subscriber data of a plurality of... |
2018/0191756 |
HEURISTICS-BASED IDENTIFICATION OF IOT (INTERNET OF THINGS) ATTACKS IN
WI-FI Attacks from IoT (Internet of Things) devices (or other statins) on a Wi-Fi network are identified using heuristics. Frames are detected from an IoT device (or... |
2018/0191755 |
NETWORK SECURITY USING INFLATED FILES FOR ANOMALY DETECTION Techniques for providing network security and anomaly detection are disclosed. In some embodiments, network traffic may be monitored in order to create a model... |
2018/0191754 |
SUSPICIOUS MESSAGE PROCESSING AND INCIDENT RESPONSE The present invention relates to methods, network devices, and machine-readable media for an integrated environment for automated processing of reports of... |
2018/0191753 |
SYSTEM AND METHOD FOR PROVIDING A SELF-MONITORING, SELF-REPORTING, AND
SELF-REPAIRING VIRTUAL ASSET CONFIGURED... A trigger event monitoring system is provided in one or more virtual assets. One or more trigger parameters, including security threat patterns, are defined... |
2018/0191752 |
INTRUSION DETECTION USING A HEARTBEAT A variety of techniques are disclosed for detection of advanced persistent threats and similar malware. In one aspect, the detection of certain network traffic... |
2018/0191751 |
IDENTIFYING AN ATTACKED COMPUTING DEVICE A computer implemented method to identify an attacked computing device in a system of network-connected computing devices providing a plurality of computing... |
2018/0191750 |
SYSTEMS AND METHODS FOR DETECTING RESOURCES RESPONSIBLE FOR EVENTS Systems and methods are disclosed for identifying resources responsible for events. In one embodiment, a method may include determining a number of unique... |
2018/0191749 |
METHOD FOR DETECTING REAL-TIME EVENT AND SERVER USING THE SAME A method for detecting a preset type of real-time event is provided. The method includes steps of: (a) a server loading or supporting other server to load a... |
2018/0191748 |
ASSOCIATING A USER IDENTIFIER DETECTED FROM WEB TRAFFIC WITH A CLIENT
ADDRESS In one embodiment, a device in a network receives a set of known user identifiers used in the network. The device receives web traffic log data regarding web... |
2018/0191747 |
GATHERING INDICATORS OF COMPROMISE FOR SECURITY THREAT DETECTION The subject matter of this specification generally relates to computer security. In some implementations, a method includes receiving indicators of compromise... |
2018/0191746 |
SYSTEM AND METHOD FOR DETECTING MALICIOUS DEVICE BY USING A BEHAVIOR
ANALYSIS Malicious behavior of a device on a local network may be detected. A data stream from a device may be collected. A functional group may be created using... |
2018/0191745 |
SYSTEMS AND METHODS FOR DETECTING RESOURCES RESPONSIBLE FOR EVENTS Systems and methods are disclosed for identifying resources responsible for events. In one embodiment, a method may include determining a number of unique... |
2018/0191744 |
SYSTEM AND METHOD TO IMPLEMENT CLOUD-BASED THREAT MITIGATION FOR
IDENTIFIED TARGETS An on-premises network protection system and method for providing on-premises network protection are provided. The system includes a memory configured to store... |
2018/0191743 |
REPUTATION-BASED APPLICATION CACHING AND WHITE-LISTING A device may classify an application, associated with an endpoint, based on traffic associated with the endpoint. The device may determine a reputation score... |
2018/0191742 |
COMMUNICATION PROTOCOLS IN INTEGRATED SYSTEMS A system and methods comprise a touchscreen at a premises. The touchscreen includes a processor coupled to a security system at the premises. User interfaces... |
2018/0191741 |
COMMUNICATION PROTOCOLS IN INTEGRATED SYSTEMS A system and methods comprise a touchscreen at a premises. The touchscreen includes a processor running gateways and coupled to a security system at the... |
2018/0191740 |
COMMUNICATION PROTOCOLS OVER INTERNET PROTOCOL (IP) NETWORKS A system and methods comprise a gateway that includes a processor coupled to a security system at a premises. A touchscreen at the premises is coupled to the... |
2018/0191739 |
MITIGATION OF ANTI-SANDBOX MALWARE TECHNIQUES Static analysis is applied to unrecognized software objects in order to identify and address potential anti-sandboxing techniques. Where static analysis... |
2018/0191738 |
AUTOMOTIVE ECU CONTROLLER AND DATA NETWORK HAVING SECURITY FEATURES FOR
PROTECTION FROM MALWARE TRANSMISSION In one implementation, a method for providing security on controllers includes detecting, by a given controller, an attempted security attack on the given... |
2018/0191737 |
SYSTEM AND METHOD FOR PROTECTING SYSTEMS FROM MALICIOUS ATTACKS The disclosed embodiments include a method of disarming malicious code in a computer system having a processor. The method comprises receiving, by the computer... |
2018/0191736 |
METHOD AND APPARATUS FOR COLLECTING CYBER INCIDENT INFORMATION Provided are a method of collecting cyber incident information, the method being performed by an apparatus for collecting cyber incident information and... |
2018/0191735 |
Secure Service for Receiving Sensitive Information through Nested iframes Methods and systems for receiving sensitive information include receiving a request for entering sensitive information, the request received from a user... |
2018/0191734 |
SYSTEM FOR PROVIDING HEALTH INFORMATION HAVING AUTHENTICATION DATA AND
OPERATING METHOD THEREOF Provided are a system for providing health information with authentication data and an operation method thereof. The system for providing health information... |
2018/0191733 |
VERIFICATION OF GEOLOCATION OF DEVICES IN A CLOUD DATA CENTER A processor-implemented method alters a computer resource based on its new geolocation. One or more processors receive a message that a computer resource has... |
2018/0191732 |
PERSONAL CLOUD DEVICE FOR DIGITAL MEDIA A personal cloud device includes a housing, one or more processors disposed within the housing, a local area network interface to communicatively couple the... |
2018/0191731 |
Anonymous Application Wrapping Methods and systems are disclosed for providing approaches to anonymous application wrapping on a mobile device. The methods and systems may include receiving,... |
2018/0191730 |
REAL TIME PIVOTING ON DATA TO MODEL GOVERNANCE PROPERTIES Real time pivoting on data to model governance properties is provided. A data explorer module of a security and compliance service may analyze data, metadata,... |
2018/0191729 |
SECURITY FABRIC FOR INTERNET OF THINGS (IOT) The present invention relates to a method for managing IoT devices by a security fabric. A method is provided for managing IoT devices comprises collecting, by... |
2018/0191728 |
METHOD, AUTHENTICATION SERVER, AND ELECTRONIC DEVICE FOR CONFIGURING A
SHARING TARGET DEVICE FOR SHARING DATA... Methods and electronic devices are provided for configuring a sharing target device. A method includes transmitting, to an authentication server associated... |
2018/0191727 |
IMPLEMENTING DATA SECURITY WITHIN A SYNCHRONIZATION AND SHARING
ENVIRONMENT A computer-implemented method according to one embodiment includes receiving a request to share predetermined data with a device, identifying the predetermined... |
2018/0191726 |
ACCESS RELATIONSHIPS IN A COMPUTER SYSTEM The disclosure relates to access relationships, more particularly to controlling access relationships between entities in a computerized system. In the... |
2018/0191725 |
ACCESS RELATIONSHIPS IN A COMPUTER SYSTEM The disclosure relates to methods and apparatuses for controlling access relationships between entities in a computerized system. A chain of access... |
2018/0191724 |
System, Method and Apparatus for Increasing Website Relevance While
Protecting Privacy The present invention provides a system, method and apparatus for increasing relevance of a content provided to a visitor by a content provider by providing... |
2018/0191723 |
ENHANCED LOAD PROCESSING USING LINKED HIERARCHICAL DATA STRUCTURES The present disclosure relates to enhancing load processing for facilitated assignment or modification of access-right data. More specifically, the present... |
2018/0191722 |
Systems and Methods for Use in Managing Access to User Profiles, and
Content Blocks Included Therein Systems and methods are provided for use in implementing access controls to content blocks of a user profile associated with a user. One exemplary system... |
2018/0191721 |
MECHANISMS TO ENABLE SECURE VIRTUAL NAMESPACES IN DISAGGREGATED STORAGE
TARGETS Embodiments are generally directed to mechanisms to enable secure virtual namespaces in disaggregated storage targets. An embodiment of an apparatus includes a... |
2018/0191720 |
COMMUNICATION PROTOCOLS IN INTEGRATED SYSTEMS Systems and methods comprise a gateway at a premises. The gateway is coupled to a remote system. An interface component is coupled to a processor of the... |
2018/0191719 |
INTERNET-OF-THINGS READING DEVICE, METHOD OF SECURE ACCESS, AND CONTROL
CENTER APPARATUS An Internet-of-Things (IoT) reading device, a method of secure access using the same, and a control center apparatus are provided. The Internet-of-Things... |
2018/0191718 |
TECHNOLOGIES FOR SECURELY EXTENDING CLOUD SERVICE APIS IN A CLOUD SERVICE
MARKETPLACE Technologies for securely extending cloud service application programming interfaces (APIs) in a cloud service marketplace include a connector hub of a... |
2018/0191717 |
METHOD AND SYSTEM FOR ESTABLISHING A SECURE ACCESS CONNECTION WITH
ELECTRONIC DEVICES A technique is provided for establishing a secure access connection with electronic devices. The technique includes receiving a request for establishing the... |
2018/0191716 |
TECHNIQUES FOR MULTI-DOMAIN MEMORY ENCRYPTION Various embodiments are generally directed to techniques for multi-domain memory encryption, such as with a plurality of cryptographically isolated domains,... |
2018/0191715 |
APPARATUS AND METHOD FOR SECURE OVER THE AIR PROGRAMMING OF A
COMMUNICATION DEVICE A system that incorporates the subject disclosure may perform, for example, receiving an over-the-air programming message that is utilizing a hypertext... |
2018/0191714 |
BLOCK-CHAIN ENABLED SERVICE PROVIDER SYSTEM A distributed ledger, e.g., blockchain, enabled operating environment includes a user device that accesses services of a service device by leveraging the... |
2018/0191713 |
AUTHENTICATION OF PACKETIZED AUDIO SIGNALS The present disclosure is generally directed a data processing system for authenticating packetized audio signals in a voice activated computer network... |
2018/0191712 |
Preventing Unauthorized Access to Secured Information Systems Using
Proactive Controls Systems and arrangements for detecting unauthorized activity and implementing proactive controls to avoid future occurrences of unauthorized activity are... |
2018/0191711 |
AUTHENTICATION OF PACKETIZED AUDIO SIGNALS The present disclosure is generally directed a data processing system for authenticating packetized audio signals in a voice activated computer network... |
2018/0191710 |
MANAGEMENT AND AUTHENTICATION IN HOSTED DIRECTORY SERVICE A user, group, and device management and authentication system allows administrators to manage one or more directories with devices that are not associated... |