Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0213001 VIRTUAL AIR-GAPPED ENDPOINT, AND METHODS THEREOF
An air-gapped computing system includes at least network card interface; a processing circuitry; and a memory, the memory containing instructions that, when...
2018/0213000 SAFE DATA ACCESS THROUGH ANY DATA CHANNEL
Providing safe access of a data item accessed through one of a plurality of access channels while concurrently providing a policy check of the data item. An...
2018/0212999 ENFORCING A CENTRALIZED, CRYPTOGRAPHIC NETWORK POLICY FOR VARIOUS TRAFFIC AT A HOST
A computer-implemented method includes monitoring a plurality of connections of a plurality of host applications at a host, where each connection of the...
2018/0212998 UPDATING COMPUTER SECURITY THREAT SIGNATURE LIBRARIES BASED ON COMPUTING ENVIRONMENT PROFILE INFORMATION
Systems, methods, and apparatuses enable optimizing a size of computer threat signature libraries used by computer security applications to detect potential...
2018/0212997 GENERATING EFFICIENT COMPUTER SECURITY THREAT SIGNATURE LIBRARIES
Systems, methods, and apparatuses enable optimizing a size of computer threat signature libraries used by computer security applications to detect potential...
2018/0212996 ENTITY IDENTIFICATION FOR ENCLAVE SEGMENTATION IN A NETWORK
In one embodiment, a device in a network identifies a set of network entities. The device determines characteristics of the network entities. The device...
2018/0212995 DECOY AND DECEPTIVE DATA OBJECT TECHNOLOGY
A computer implemented method of detecting unauthorized access to a protected network by monitoring a dynamically updated deception environment, comprising...
2018/0212994 E-MAIL ANTI-PHISHING SYSTEM AND METHOD
An anti-phishing email system and an anti-phishing email method are provided. The system includes an email address registration and authentication subsystem...
2018/0212993 CODE MODIFICATION FOR AUTOMATION DETECTION
Techniques for code modification for automation detection are described. Web code is obtained corresponding to content to be served to a first client device in...
2018/0212992 SERVICE USAGE MODEL FOR TRAFFIC ANALYSIS
In one embodiment, a device in a network identifies an set of services of a domain accessed by a plurality of users in the network. The device generates a...
2018/0212991 METHODS AND SYSTEMS FOR TRANSMITTING PERFORMANCE BEACONS FROM AN EMBEDDED DEVICE
A network sensor, inserted into a mirror port of a network switch or router, may be configured to monitor the network traffic originating from an embedded...
2018/0212990 OPTIMIZING SECURITY ANALYSES IN SAAS ENVIRONMENTS
Embodiments of the present invention provide systems and methods for performing a security analysis on a set of observables by inferring malicious...
2018/0212989 SYSTEM AND METHOD FOR MONITORING, CAPTURING AND REPORTING NETWORK ACTIVITY
Methods and apparatus for monitoring and capturing network activities and producing network activity reports at predetermined, regular intervals are provided....
2018/0212988 SYSTEM AND METHOD FOR DETECTING AND CLASSIFYING MALWARE
A network device may include a memory and one or more processors configured to analyze execution of suspicious data; detect one or more states of execution of...
2018/0212987 RANSOMWARE RESILIENT CLOUD SERVICES
An anti-ransomware system protects data in cloud storage of a cloud services provider against a ransomware attack. A backup handler is configured to at least...
2018/0212986 NETWORK ATTACK DETECTION METHOD AND DEVICE
Provided are a network attack detection method and device. The method comprises: carrying out word segmentation to a character string to be detected and obtain...
2018/0212985 IDENTIFYING ATTACK BEHAVIOR BASED ON SCRIPTING LANGUAGE ACTIVITY
Techniques for identifying attack behavior based on scripting language activity are disclosed. A security monitoring system generates a behavior profile for a...
2018/0212984 OPTIMIZING SECURITY ANALYSES IN SAAS ENVIRONMENTS
Embodiments of the present invention provide systems and methods for performing a security analysis on a set of observables by inferring malicious...
2018/0212983 AUTOMATIC DETECTION OF HIDDEN LINK MISMATCHES WITH SPOOFED METADATA
Example methods and systems directed to an Alert Manager are described. According to various embodiments, the Alert Manager detects receipt of a message. The...
2018/0212982 NETWORK SYSTEM, NETWORK CONTROLLER, AND NETWORK CONTROL METHOD
To identify a network device connected with a terminal by combining not only ARP information and FDB information but also LLDP information. An interruption...
2018/0212981 DISABLING APPLICATIONS ON A CLIENT DEVICE REMOTELY
Systems and methods for disabling applications on a client device remotely are disclosed. An example method may comprise establishing, via a network interface...
2018/0212980 SYSTEM AND METHOD OF DETECTING INTRUSION INTO COMMUNICATION ENVIRONMENT
A system capable of detecting an artful risk of intrusion into a communication environment, and protecting the communication environment from the risk. The...
2018/0212979 COMPUTER SYSTEM AND CONTROL METHOD THEREOF
A computer system is reliably protected from unauthorized access. The present invention provides a computer system comprising a plurality of service computers...
2018/0212978 DEVICE MANAGEMENT PROXY FOR SECURE DEVICES
A hardware device architecture is described that improves security and flexibility in access to hardware device settings. A device management proxy service is...
2018/0212977 IN-VEHICLE NETWORK SYSTEM
An in-vehicle network system includes one first node and a plurality of second nodes. The first node is configured to transmit predetermined data to the...
2018/0212976 SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR LOCATION VERIFICATION
A computer-implemented information verification method, system, and non-transitory computer readable medium, include acquiring a first measurement from a user...
2018/0212975 GEOLOCATION-BASED AUTHENTICATION CREDENTIALS
Provided is process including receiving a request to authenticate a user; sending instructions to present an authentication user interface including a...
2018/0212974 ACCESS CONTROL USING INFORMATION ON DEVICES AND ACCESS LOCATIONS
Access control within a network is established by combining multiple factors to prevent unauthorized access to a computer and/or network target system. The...
2018/0212973 Cloud-Based Device Information Storage
Device information for each of multiple devices associated with a user account is maintained by a cloud service. The device information can include credential...
2018/0212972 Online Privacy Management System with Enhanced Automatic Information Detection
A privacy management system (PMS) is disclosed for a Chief Privacy Officer (CPO) or other user to use in monitoring and/or controlling in realtime the flow of...
2018/0212971 DATA UNSEALING WITH A SEALING ENCLAVE
Techniques for securely sealing and unsealing enclave data across platforms are presented. Enclave data from a source enclave hosted on a first computer may be...
2018/0212970 DISTRIBUTED AUTHENTICATION FOR INTERNET-OF-THINGS RESOURCES
A network device receives, from a node in an Internet-of-Things (IoT) network, an access request for a user authenticated via the node and identifies the...
2018/0212969 COMPUTER READABLE STORAGE MEDIA FOR TIERED CONNECTION POOLING AND METHODS AND SYSTEMS FOR UTILIZING SAME
Systems and methods for tiered connection pooling are disclosed herein, which may be used in a method of fulfilling user requests in an enterprise computing...
2018/0212968 TRANSACTION SECURITY SYSTEMS AND METHODS
Outbound traffic of a host application may be received from a host device having a host processor. The secure resource may be configured to provide a secure...
2018/0212967 PORTABLE DEVICE USED TO SUPPORT SECURE LIFECYCLE OF CONNECTED DEVICES
When operating these different environments, the infrastructure of and around a vehicle should be secure to prevent unauthorized and possibly malicious access...
2018/0212966 CROSS-PLATFORM ENCLAVE DATA SEALING
Techniques for securely sealing and unsealing enclave data across platforms are presented. Enclave data from a source enclave hosted on a first computer may be...
2018/0212965 METHOD AND SYSTEM FOR SECURE CROSS-DOMAIN LOGIN
Techniques are described for separating subdomains as part of a secure login process. For example the subdomains can correspond to an enterprise user or...
2018/0212964 Sharing of Anonymous Data Between Connected Devices Over the Internet
In the sharing of data between connected devices over a network, a network device broadcasts an availability of a set of data collected by a data producing...
2018/0212963 METHOD AND APPARATUS FOR ACCESSING WEBSITE
Disclosed are methods and apparatus for accessing a website. A method may comprise: acquiring a web address that meets a preset condition; determining a server...
2018/0212962 ENABLING COORDINATED IDENTITY MANAGEMENT BETWEEN AN OPERATOR-MANAGED MOBILE-EDGE PLATFORM AND AN EXTERNAL NETWORK
Approaches may be used for enabling coordinated identity management between an operator-managed mobile edge platform (MEP) and an external network. A token may...
2018/0212961 SYSTEM AND METHOD
A system includes an authentication server that executes authentication processing via one or more biometric authentication methods. The system detects, in...
2018/0212960 SECURE BIOMETRIC AUTHENTICATION WITH CLIENT-SIDE FEATURE EXTRACTION
Provided is a process that includes: receiving, with a first device, a request to authenticate a user; obtaining, with the first device, an unstructured-data...
2018/0212959 MEDIA ACCESS POLICY AND CONTROL MANAGEMENT
Embodiments for media access policy and control management by one or more processors. A user is identified using biometric data to enable enforcement of one or...
2018/0212958 Two Factor Authentication Using SMS
Authentication of a user and/or granting of access to secure data is made by way of an out of bounds authentication of the user by having the user use a...
2018/0212957 APPARATUS AND METHOD FOR AUTHENTICATION, AND COMPUTER PROGRAM AND RECORDING MEDIUM APPLIED TO THE SAME
Disclosed are an authentication device and method, and a computer program and a recording medium applied thereto. An authentication device according to the...
2018/0212956 ANONYMOUS TOKEN AUTHENTICATION
When a user attempts to log in to his account from within an unsecure environment, such as a public computer or a third party application, the user is shown an...
2018/0212955 METHOD FOR OPERATING A DESIGNATED SERVICE, SERVICE UNLOCKING METHOD, AND TERMINAL
Disclosed are method for operating a designated service, a service unlocking method and terminal. The method comprises: receiving an operation request for...
2018/0212954 INFORMATION REGISTRATION AND AUTHENTICATION METHOD AND DEVICE
The present application discloses methods and devices for information registration and authentication. The registration method may comprise: sending a request...
2018/0212953 SYSTEMS AND METHODS FOR POLICY DRIVEN FINE GRAIN VALIDATION OF SERVERS? SSL CERTIFICATE FOR CLIENTLESS SSLVPN...
The present disclosure is directed towards systems and methods for validation of a secure socket layer (SSL) certificate of a server for clientless SSL virtual...
2018/0212952 MANAGING EXCHANGES OF SENSITIVE DATA
A method, system or computer usable program product for managing exchanges of sensitive data including utilizing a processor to request a service across a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.