Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0198841 GENERATING RISK PROFILE USING DATA OF HOME MONITORING AND SECURITY SYSTEM
Methods and systems for premises management are described. An example system may comprise a premises management device and a touchscreen device. The...
2018/0198840 ADDRESS SPACE MANAGEMENT WITH RESPECT TO A COHERENT ACCELERATOR PROCESSOR INTERFACE ARCHITECTURE
Disclosed aspects relate to address space management with respect to a Coherent Accelerator Processor Interface (CAPI) architecture. A shared CAPI component...
2018/0198839 Automatic Discovery of Management Nodes and Generation of CLI Using HA Module
Systems and methods for communicating with the Representational State Transfer (REST) Application Programming Interface (API), by providing a set of libraries...
2018/0198838 LEARNING TECHNIQUE FOR QOS BASED CLASSIFICATION AND PRIORITIZATION OF SAAS APPLICATIONS
The systems and methods of the present disclosure are directed towards a dynamic system that is configured to identify and map networked traffic, such as that...
2018/0198837 STREAMING API SUBSCRIPTION WITHOUT LOSS OF EVENTS
A client facility is provided for establishing a subscription to a streaming service provider, without loss of events. The establishing includes generating, by...
2018/0198836 INTELLIGENT INSERTION OF SECONDARY CONTENT IN LIVE STREAMING
From a live streaming of a main content, an already streamed portion of the main content is analyzed to identify an occurrence of a climactic event in the main...
2018/0198835 ADAPTIVE DATA SEGMENT DELIVERY ARBITRATION FOR BANDWIDTH OPTIMIZATION
Systems, devices and processes are described to adapt segment requests placed by an autonomous media player during media streaming to compensate for...
2018/0198834 METHOD FOR TRANSMITTING A DATA STREAM USING A STREAMING PROTOCOL
Method for transmitting a data stream between a server and a client using the streaming protocol based on HTTP including the following steps implemented by the...
2018/0198833 User Assembled Content Delivered In A Media Stream Via A Virtual Community
A system and method for a user to send a message to a group of users of a streaming media service. The message is directed to a specific group and is sponsored...
2018/0198832 ALLOCATING CAPACITY OF A NETWORK CONNECTION TO DATA STREAMS BASED ON TYPE
A user of a communication network may have specific requirements for its critical data streams. The user may require dedicated channel capacity for its...
2018/0198831 PROACTIVE CHATTING AND INSTANT MESSAGING GROUP MANAGEMENT
In one embodiment, a system includes a processing circuit and logic integrated with the processing circuit, executable by the processing circuit, or integrated...
2018/0198830 Systems and Methods for Interworking with over the Top Applications in Communications Network
Systems and methods are provided for facilitating communications with an operating system suspended OTT application on a user device. The methods include...
2018/0198829 MANAGEMENT OF APPLICATION ACCESS TO DIRECTORIES BY A HOSTED DIRECTORY SERVICE
Features are disclosed for facilitating management of network directories of multiple organizations by a directory management system. Various applications can...
2018/0198828 Identity-Based Internet Protocol Networking
Disclosed herein are system, method, and computer program product embodiments for identity-based internet protocol networking. An embodiment operates by...
2018/0198827 CONFIDENTIAL LEVELS IN REPUTABLE ENTITIES
Examples disclosed herein relate to confidence levels in reputable entities. Some of the examples enable identifying a particular reputable entity that is...
2018/0198826 CONTROL OVER DATA RESOURCE UTILIZATION THROUGH A SECURITY NODE CONTROL POLICY EVALUATED IN THE CONTEXT OF AN...
Disclosed is a method, a device, and/or a system of control over data resource utilization through a security node control policy evaluated in the context of...
2018/0198825 MODULARIZED SOFTWARE SYSTEM FOR MANAGING A PLURALITY OF DISPARATE NETWORKS
Converged network management application and system is provided that delivers a management platform as a service that can view and/or manage all managed...
2018/0198824 Distribution and Management of Services in Virtual Environments
Distribution and management of services in virtual environments is described herein. In one or more implementations, a service distribution and management...
2018/0198823 TECHNIQUES FOR SECURE SESSION REESTABLISHMENT
A client establishes a network session with a server. The network session is used to establish an encrypted communications session. The client establishes...
2018/0198822 VIRTUALIZED NETWORK HONEYPOTS
Disclosed are various embodiments for virtualized network honeypots. Network traffic is received from a connecting device. It is determined whether the network...
2018/0198821 IMMUNIZING NETWORK DEVICES USING A MALWARE MARKER
Provided are systems, methods, and computer program products for a cyber-vaccination technique. In various implementations, the cyber-vaccination technique...
2018/0198820 RELIABLE TIMESTAMP CREDENTIAL
A process for generating an access credential by a communication device may include determining whether a communication device successfully executed a...
2018/0198819 METHOD AND APPARATUS FOR GENERATING INCIDENT GRAPH DATABASE
method and apparatus for generating incident graph database are provided, one of methods comprises, generating incident coverage using an apparatus for...
2018/0198818 CRYPTOGRAPHIC NETWORK PROTOCOL ESCALATION PATH
The systems and methods described herein can provide a protocol escalation path in response to a client system's request or in response to a triggering event....
2018/0198817 PERSISTENT CROSS-SITE SCRIPTING VULNERABILITY DETECTION
Various techniques for detecting a persistent cross-site scripting vulnerability are described herein. In one example, a method includes detecting, via the...
2018/0198816 FORECASTING AND CLASSIFYING CYBER-ATTACKS USING ANALYTICAL DATA BASED NEURAL EMBEDDINGS
A first collection including an analytical feature vector and a Q&A feature vector is constructed. A second collection is constructed from the first collection...
2018/0198815 COMPUTER ASSET VULNERABILITIES
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for determining a network path between computer assets. One of...
2018/0198814 IDENTIFYING SECURITY RISKS IN CODE USING SECURITY METRIC COMPARISON
An example system includes a processor to receive a source code and history information, wherein the history information includes a version control history or...
2018/0198813 METHODS AND SYSTEMS FOR DISCOVERING NETWORK SECURITY GAPS
A risk assessment (RA) computing device for generating network security campaigns to discover network security gaps. The RA computing device includes at least...
2018/0198812 Context-Based Detection of Anomalous Behavior in Network Traffic Patterns
Various embodiments provide methods, devices, and non-transitory processor-readable storage media for detecting anomalies in network traffic patterns with a...
2018/0198811 IDENTIFYING MALICIOUS NETWORK TRAFFIC BASED ON COLLABORATIVE SAMPLING
Identifying malicious network traffic based on distributed, collaborative sampling includes, at a computing device having connectivity to a network, obtaining...
2018/0198810 User Classification by Local to Global Sequence Alignment Techniques for Anomaly-Based Intrusion Detection
A sequence of events by a single user with at least one computing system are monitored. Each event characterizes user interaction with the at least one...
2018/0198809 APPARATUS, SYSTEM, AND METHOD FOR ACCELERATING SECURITY INSPECTIONS USING INLINE PATTERN MATCHING
The disclosed apparatus may include a physical processing that (1) receives, at a network device, a packet that is destined for a computing device within a...
2018/0198808 TECHNIQUES FOR AUTOMATICALLY MITIGATING DENIAL OF SERVICE ATTACKS VIA ATTACK PATTERN MATCHING
A method for mitigating a denial of service attack includes determining, for a client, a number of requests being transmitted to a server and determining, for...
2018/0198807 CLIENT-SIDE ATTACK DETECTION IN WEB APPLICATIONS
A client comprising a web browser is provided. The client is configured to: run an application in the web browser, the application comprising a sensor...
2018/0198806 CYBER VACCINES AND ANTIBODIES
Provided are systems, methods, and computer program products for a cyber-vaccination technique. In various implementations, the technique includes determine...
2018/0198805 GRAPH PRIORITIZATION FOR IMPROVING PRECISION OF THREAT PROPAGATION ALGORITHMS
Systems described herein preemptively detect newly registered network domains that are likely to be malicious before network behavior of the domains is...
2018/0198804 REASSEMBLY FREE DEEP PACKET INSPECTION FOR PEER TO PEER NETWORKS
The present disclosure relates to a system, a method, and a non-transitory computer readable storage medium for deep packet inspection scanning at an...
2018/0198803 SELF-DEFENDING SMART FIELD DEVICE AND ARCHITECTURE
An automation system comprises a local threat information server operating within automation plant and a plurality of field devices operating at a control...
2018/0198802 COMMUNICATION PROTOCOLS IN INTEGRATED SYSTEMS
A system and methods comprise a touchscreen at a premises. The touchscreen includes a processor coupled to a security system at the premises. User interfaces...
2018/0198801 CYBER VACCINES AND ANTIBODIES
Provided are systems, methods, and computer program products for a cyber-antibody technique. In various implementations, the technique includes monitoring, by...
2018/0198800 VALIDATION-BASED DETERMINATION OF COMPUTATIONAL MODELS
Example techniques described herein determine a validation dataset, determine a computational model using the validation dataset, or determine a signature or...
2018/0198799 ENHANCED EMAIL SERVICE
An enhanced email service that mitigates drawbacks of conventional email services by enabling transmission of encrypted content to a recipient regardless of...
2018/0198798 Modulation Analysis and Distortion Identification
An apparatus, method, computer readable medium, and system are provided to determine whether a non-linear signal impairment is present in a network...
2018/0198797 METHOD OF MANAGING PROFILES IN A SECURE ELEMENT
Method of managing profiles in a secure element, the secure element including a first profile associated with a first communication network and a second...
2018/0198796 EVALUATING A QUESTIONABLE NETWORK COMMUNICATION
Techniques for evaluating a questionable network communication are disclosed. In some implementations, a network of computing systems or devices is provided....
2018/0198795 Cross-Enterprise Workflow
Example systems, methods and storage media to provide a cross-enterprise workflow among clinical systems are disclosed. An example cross-enterprise enabled...
2018/0198794 APPARATUS AND SYSTEM FOR MANAGING TRANSACTION INFORMATION OF PUBLIC ORGANIZATION USING BLOCKCHAIN TECHNOLOGY
A transaction information managing system including a plurality of servers and at least one third-party server, wherein the plurality of servers are configured...
2018/0198793 VISUALIZATION OF ACCESS PERMISSION STATUS
Queries regarding access permissions of users and rights to directories in a complex enterprise are executed in near real-time, using lookups to tables that...
2018/0198792 METHOD AND SYSTEM FOR EXECUTING A TRANSACTION REQUEST USING A COMMUNICATION CHANNEL
A method and system for executing a transaction request using a communication channel such as SMS or email has been described. The disclosure provides a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.