Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0219912 SYSTEM AND METHOD FOR SCRUBBING DNS IN A TELECOMMUNICATIONS NETWORK TO MITIGATE ATTACKS
Aspects of the present disclosure involve systems, methods, computer program products, and the like, for providing a proxy server or scrubbing service for an...
2018/0219911 RESPONDING TO ALERTS
In some examples, an alert relating to an issue in a computing arrangement is received. It is determined that the received alert is similar to a given alert in...
2018/0219910 DETECTING AND REMOVING INJECTED ELEMENTS FROM CONTENT INTERFACES
Systems and methods are disclosed for detecting and removing injected elements from content interfaces. In one implementation, a processing device receives a...
2018/0219909 SYSTEMS AND METHODS FOR DETECTING COMPUTER VULNERABILITIES THAT ARE TRIGGERED BY EVENTS
Methods and systems for carrying out campaigns of penetration testing for discovering and reporting security vulnerabilities of a networked system, the...
2018/0219908 METHOD AND APPARATUS FOR REDUCING SECURITY RISK IN A NETWORKED COMPUTER SYSTEM ARCHITECTURE
An apparatus and associated method are provided for reducing a security risk in a networked computer system architecture. The method comprises receiving at a...
2018/0219907 METHOD AND APPARATUS FOR DETECTING WEBSITE SECURITY
The present invention discloses a method and an apparatus for detecting website security. The method includes: performing bypass interception on a network to...
2018/0219906 METHODS AND SYSTEMS FOR IMPLEMENTING A PHISHING ASSESSMENT
A system, method, and computer program product for implementing a phishing assessment of a target computer network that includes a phishing assessment platform...
2018/0219905 Penetration Testing of a Networked System
Methods and systems for penetration testing of a networked system comprising a set of network-nodes by a penetration testing system (e.g. to enforce first...
2018/0219904 Penetration Testing of a Networked System
Methods and systems for penetration testing of a networked system comprising a set of network-nodes by a penetration testing system (e.g. to enforce first...
2018/0219903 SYSTEMS AND METHODS FOR SELECTING A LATERAL MOVEMENT STRATEGY FOR A PENETRATION TESTING CAMPAIGN
Methods and systems for carrying out campaigns of penetration testing for discovering and reporting security vulnerabilities of a networked system, the...
2018/0219902 ENDPOINT VULNERABILITY ANALYSIS PLATFORM
The present invention relates to methods, network devices, and machine-readable media for an integrated environment for a method of environment security...
2018/0219901 SETTING-UP PENETRATION TESTING CAMPAIGNS
Methods and systems for penetration testing of a networked system by a penetration testing system (e.g. that is controlled by a user interface of a computing...
2018/0219900 SETTING-UP PENETRATION TESTING CAMPAIGNS
Methods and systems for penetration testing of a networked system by a penetration testing system (e.g. that is controlled by a user interface of a computing...
2018/0219899 METHOD AND SYSTEM FOR PLACING A WORKLOAD ON ONE OF A PLURALITY OF HOSTS
Systems, methods, and other embodiments associated with placing a workload on one of a plurality of hosts are described. In one embodiment, a method includes...
2018/0219898 Data Surveillance System
Data surveillance techniques are presented for the detection of security issues, especially of the kind where privileged data may be stolen by steganographic,...
2018/0219897 EVENT SPECIFIC ENTITY RELATIONSHIP DISCOVERY IN DATA INTAKE STAGE OF A DISTRIBUTED DATA PROCESSING SYSTEM
A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The...
2018/0219896 COMPUTER-IMPLEMENTED SYSTEM AND METHOD FOR CREATING AN ENVIRONMENT FOR DETECTING MALICIOUS CONTENT
Techniques and mechanisms are disclosed for creating an environment for detecting malicious network traffic. A test computer network including a plurality of...
2018/0219895 METHOD AND SYSTEM FOR LEARNING REPRESENTATIONS OF NETWORK FLOW TRAFFIC
Disclosed is an improved method, system, and computer program product for learning representations or embeddings of network flow traffic. The disclosed...
2018/0219894 USER AND ENTITY BEHAVIORAL ANALYSIS USING AN ADVANCED CYBER DECISION PLATFORM
A system for user and entity behavioral analysis using an advanced cyber decision platform is provided, comprising a grouping engine configured to create an...
2018/0219893 SECURED EVENT MONITORING LEVERAGING BLOCKCHAIN
A method, computer system, and a computer program product for a monitor security process is provided. The present invention may include configuring monitors in...
2018/0219892 Methods and Systems for Detecting Viruses in Emails
A method of monitoring email use is performed at a server system by monitoring email use in a first email application at a first device distinct from the...
2018/0219891 INDIVIDUALIZED CYBERSECURITY RISK DETECTION USING MULTIPLE ATTRIBUTES
A method for assessing and responding to potential cybersecurity risks includes: obtaining, by a computing device, a plurality of attributes relating to an...
2018/0219890 IDENTIFYING A SECURITY THREAT TO A WEB-BASED RESOURCE
Access logs associated with user requests for a web-based resource are monitored. Parameter(s) that index records of the web-based resource are identified. A...
2018/0219889 ANOMALY DETECTION BASED ON RELATIONSHIPS BETWEEN MULTIPLE TIME SERIES
In some implementations, sequences of time series values determined from machine data are obtained. Each sequence corresponds to a respective time series. A...
2018/0219888 Graph-Based Network Security Threat Detection Across Time and Entities
The disclosed techniques relate to a graph-based network security analytic framework to combine multiple sources of information and security knowledge in order...
2018/0219887 CONTINUOUS LEARNING FOR INTRUSION DETECTION
Balancing the observed signals used to train network intrusion detection models allows for a more accurate allocation of computing resources to defend the...
2018/0219886 CLUSTERING NETWORK ADDRESSES
A method may include identifying a shared usage of a first network address and a second network address in a predetermined period of time. The method may also...
2018/0219885 Network Attack Detection Using Multi-Path Verification
Various embodiments provide methods, devices, and non-transitory processor-readable storage media enabling rogue access point detection with a communications...
2018/0219884 CHANGING THE DEPLOYMENT STATUS OF A PRE-PROCESSOR OR ANALYTIC
Example implementations relate to changing deployment statuses. An example implementation includes updating a data source data store comprising descriptors of...
2018/0219883 SECURED EVENT MONITORING LEVERAGING BLOCKCHAIN
A method, computer system, and a computer program product for a monitor security process is provided. The present invention may include configuring monitors in...
2018/0219882 SYSTEMS AND METHODS FOR IP SOURCE ADDRESS SPOOF DETECTION
Aspects of the present disclosure involve systems, methods, computer program products, and the like, for detecting a spoofed source IP address on an incoming...
2018/0219881 Detecting Anomalous Hypertext Transfer Protocol (HTTP) Events from Semi-Structured Data
Embodiments include computing devices, apparatus, and methods implemented by the apparatus for implementing anomalous hypertext transfer protocol (HTTP) event...
2018/0219880 Reactive virtual security appliances
Methods and systems for monitoring network activity. Various embodiments may deploy virtual security appliances to a certain location or with a specific...
2018/0219879 SECURITY MONITORING OF NETWORK CONNECTIONS USING METRICS DATA
Various embodiments of the present invention set forth techniques for security monitoring of a network connection, including analyzing network traffic data for...
2018/0219878 FIREWALL
Generally speaking, embodiments of the present disclosure include a network security system that can comprise a hardware appliance installed in a vehicle and...
2018/0219877 SECURITY-BASED CONTAINER SCHEDULING
Examples disclosed herein relate to a security-based container scheduling system for allocating a container to a node. A discovery engine discovers a node in a...
2018/0219876 DETERMINING CONTEXTUAL INFORMATION FOR ALERTS
In some examples, an alert relating to an issue in a computing arrangement is received. Contextual information is determined for the alert, the determined...
2018/0219875 GROUPING ALERTS INTO BUNDLES OF ALERTS
In some examples, a plurality of alerts relating to issues in a computing arrangement are received, where the plurality of alerts generated based on events in...
2018/0219874 CLOUD-BASED SURVEILLANCE WITH INTELLIGENT TAMPER PROTECTION
In one embodiment, a security system includes a central communication unit and a first surveillance device. The central communication unit is communicatively...
2018/0219873 COMMUNICATION SYSTEM, COUNT VALUE SYNCHRONIZATION METHOD, AND COUNT VALUE SYNCHRONIZATION PROGRAM PRODUCT
A communication system includes multiple nodes connected with each other. Each of the multiple nodes generates a message authentication code using a count...
2018/0219872 COMMUNICATION SYSTEM, MANAGEMENT NODE, NORMAL NODE, COUNTER SYNCHRONIZATION METHOD, AND STORAGE MEDIUM
In a communication system, a management node includes: a high-order count value holding unit holding a high-order count value; and a high-order count value...
2018/0219871 VERIFICATION OF FRAGMENTED INFORMATION CENTRIC NETWORK CHUNKS
Methods, apparatus, and systems are provided for lightweight integrity verification of fragmented chunks in an information centric network. One aspect provides...
2018/0219870 MANAGEMENT OF TRANSACTIONS IN A DISTRIBUTED TRANSACTION SYSTEM
Briefly, embodiments disclosed herein relate to managing transactions in a distributed content transaction system.
2018/0219869 LOCALIZATION BASED ON NETWORK OF WIRELESS NODES
A wireless node for use in a network of wireless nodes, for performing a localization to determine a location of a mobile device based on respective beacon...
2018/0219868 COMMUNICATION FRAMEWORK FOR A FEDERATION OF NETWORK CONTROLLERS
A communication framework is provided that can be configured to control or limit a network controller's ability to communicate, export, or share the network...
2018/0219867 SECURE REMOTE SUPPORT AUTHORIZATION
A request for access to a user's account is made to an authenticator. The authenticator sends a request for access to the user associated with the user's...
2018/0219866 System and Method for Application Route Management
The unauthorized access of database nodes by application nodes within an electronic computing and communications system can be prevented using an access table...
2018/0219865 TRUSTED NETWORK ENTITY SECURE CONNECTIVITY
Various embodiments herein each include at least one of systems, methods, software, processes, and devices for trusted network entity secure connectivity. Some...
2018/0219864 ACCOUNT LOGIN METHOD AND APPARATUS
A server, primary client device, and secondary device may be provided. The server may be configured to receive a login request sent by a secondary client...
2018/0219863 INVOCATION PATH SECURITY IN DISTRIBUTED SYSTEMS
Systems, methods, and computer program products for an application to securely record and propagate an invocation context for invoking other applications are...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.