Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0234478 Guaranteeing Stream Exclusivity In A Multi-Tenant Environment
A file system is configured to ensure exclusive access by an application to a "stream" comprising one or more erase blocks on a storage device. The file system...
2018/0234477 SCHEDULING DOWNLOADS BASED ON METADATA IN A CLIENT-SERVER TOPOLOGY
A computer system for scheduling downloads based on metadata in a client-server topology. A server receives from a client application a request for scheduling...
2018/0234476 SCHEDULING DOWNLOADS BASED ON METADATA IN A CLIENT-SERVER TOPOLOGY
A computer program product for scheduling downloads based on metadata in a client-server topology. A server receives from a client application a request for...
2018/0234475 SCHEDULING DOWNLOADS BASED ON METADATA IN A CLIENT-SERVER TOPOLOGY
A method, a computer program product, and a computer system for scheduling downloads based on metadata in a client-server topology. A server receives from a...
2018/0234474 SYSTEMS AND METHODS TO PROVIDE VIDEO AND CONTROL SIGNALS OVER AN INTERNET PROTOCOL COMMUNICATIONS NETWORK
Systems and methods to provide video signals and control signals over an internet protocol (IP) communications network are presented herein. Video signals and...
2018/0234473 Direct Packet Placement
Communication apparatus includes a host interface and a network interface, which receives at least first and second redundant packet streams, each including a...
2018/0234472 ADAPTING PLAYBACK SETTINGS BASED ON CHANGE HISTORY
Techniques discussed herein improve a user's playback experience of a multimedia file by automatically adjusting playback settings based on change history data...
2018/0234471 Conferencing Server
A conferencing server is directly accessible from the public Internet and has a host transport address, which is a combination of a public IP address on the...
2018/0234470 METHOD AND APPARATUS FOR COMMUNICATING BETWEEN COMMUNICATION DEVICES
Aspects of the subject disclosure may include, for example, receiving from a web real-time communications gateway a first request for communication services...
2018/0234469 METHOD FOR OBTAINING OPERATOR NETWORK IDENTIFICATION NUMBER OF VISITED NETWORK
One disclosure of the present specification provides a method for a proxy-call session control function (P-CSCF) to obtain an identifier of a visited public...
2018/0234468 DATA PROCESSING APPARATUS CONFIGURED TO RECOVER A NETWORK CONNECTION, A METHOD, A SYSTEM AND A NON-TRANSITORY...
In at least some example embodiments, a data processing apparatus is configured to recover a network connection within an application framework that hides...
2018/0234467 METHOD AND APPARATUS FOR FACILITATING ESTABLISHING AND MAINTAINING COMMUNICATION SERVICES
Aspects of the subject disclosure may include, for example, providing radio access information to a first server of an IP multimedia subsystem network to cause...
2018/0234466 Device and Method for Performing an Internet Protocol Multimedia Subsystem Service
A network for performing an IMS service with a communication device comprises a storage device for storing instructions and a processing circuit coupled to the...
2018/0234465 METHOD FOR SELECTING P-CSCF AND TRANSMITTING SIP MESSAGE IN WIRELESS COMMUNICATION SYSTEM AND DEVICE FOR SAME
A method for transmitting a session initiation protocol (SIP) message by a user equipment (UE) in a wireless communication system, according to an embodiment...
2018/0234464 BROKERED AUTHENTICATION WITH RISK SHARING
Embodiments described herein are implemented in authentication brokering systems where an authentication broker issues security tokens that represent its...
2018/0234463 AUTONOMOUS SECURITY POLICY DECISION AND IMPLEMENTATION ACROSS HETEROGENEOUS IT ENVIRONMENTS
The disclosure is directed to an autonomous method for dynamically providing a security policy. A method in accordance with an embodiment includes: determining...
2018/0234462 ACCESS CONTROL MONITORING THROUGH POLICY MANAGEMENT
A computing resource service receives a request to access the service and perform various actions. In response to the request, the computing resource service...
2018/0234461 METHODS AND SYSTEMS FOR PROVIDING SECURE NETWORK CONNECTIONS TO MOBILE COMMUNICATIONS DEVICES
A secure network connection is established between a server and a mobile communications device after the creation of a secure network account. The server,...
2018/0234460 Network Application Security Policy Enforcement
A system validates the establishment and/or continuation of a connection between two applications over a network using a three-stage process: (1) a local...
2018/0234459 Automated Enforcement of Security Policies in Cloud and Hybrid Infrastructure Environments
To prevent un-authorized accesses to data and resources available in workloads on an organization's or enterprise's computer network, various improvements to...
2018/0234458 ALERTS FOR COMMUNITIES OF A SECURITY INFORMATION SHARING PLATFORM
Examples disclosed herein relate to alerts for communities of a security information sharing platform. Some examples may enable obtaining a security indicator...
2018/0234457 METHOD FOR AUTOMATED SIEM CUSTOM CORRELATION RULE GENERATION THROUGH INTERACTIVE NETWORK VISUALIZATION
The present disclosure provides a dynamic method for automated Security Information and Event Management (SIEM) custom correlation rule generation through the...
2018/0234456 SYSTEM AND METHOD FOR CREATING ENCRPTED VIRTUAL PRIVATE NETWORK HOTSPOT
System and method for extending zones of control through a hotspot for communications to and from computing devices based on specific criteria corresponding to...
2018/0234455 PROTECTION FOR COMPUTING SYSTEMS FROM REVOKED SYSTEM UPDATES
A computing system may be protected from revoked system updates. A computing system receives an object and scans it for revocation updates to a security...
2018/0234454 SECURING DEVICES USING NETWORK TRAFFIC ANALYSIS AND SOFTWARE-DEFINED NETWORKING (SDN)
Systems and methods for securing devices using traffic analysis and Software-Defined Networking (SDN). In some embodiments, an Information Handling System...
2018/0234453 PREFETCH INTRUSION DETECTION SYSTEM
In one embodiment, a device in a network generates a machine learning-based traffic model using data indicative of a particular node in the network attempting...
2018/0234452 ENHANCED BROWSING WITH SECURITY SCANNING
A method securely scans a second web page linked to a first web page being displayed by a browser. The method identifies a target link to a second web page...
2018/0234451 TRUSTED MEDIATOR INTERACTIONS WITH MOBILE DEVICE SENSOR DATA
A system, method, and computer-readable medium for reporting sensor data over a communication network are provided. A data reporting instruction that...
2018/0234450 Generating a Virtual Database to Test Data Security of a Real Database
Determining a data security risk level of a virtual database is provided. An object catalog corresponding to a real database is imported into the virtual...
2018/0234449 Generating a Virtual Database to Test Data Security of a Real Database
Determining a data security risk level of a virtual database is provided. An object catalog corresponding to a real database is imported into the virtual...
2018/0234448 IDENTIFYING NETWORK SECURITY RISKS
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for identifying network security risks. One of the methods...
2018/0234447 SYSTEM AND METHODS FOR DETECTING BOTS REAL-TIME
Bots are detected real-time by correlating activity between users using a lag-sensitive hashing technique that captures warping-invariant correlation....
2018/0234446 SYSTEMS AND METHODS FOR SECURITY BREACH DETECTION IN VEHICLE COMMUNICATION SYSTEMS
Systems and methods for detection of security breaches in intravehicular communication systems are disclosed. In some embodiments, this may include...
2018/0234445 Characterizing Behavior Anomaly Analysis Performance Based On Threat Intelligence
A technique includes receiving data identifying behavior anomalies that are exhibited by entities that are associated with a computer system. The technique...
2018/0234444 SYSTEM AND METHOD FOR DETECTING ANOMALIES ASSOCIATED WITH NETWORK TRAFFIC TO CLOUD APPLICATIONS
An anomaly detection system is provided and includes a processor, a memory, and a security application that is stored in the memory and includes instructions....
2018/0234443 SYSTEM AND METHOD FOR DETECTING ANOMALIES INCLUDING DETECTION AND REMOVAL OF OUTLIERS ASSOCIATED WITH NETWORK...
An anomaly detection system is provided and includes a processor, a memory and a security application stored in the memory and including instructions. The...
2018/0234442 MULTI-SIGNAL ANALYSIS FOR COMPROMISED SCOPE IDENTIFICATION
Detecting compromised devices and user accounts within an online service via multi-signal analysis allows for fewer false positives and thus a more accurate...
2018/0234441 METHOD AND APPARATUS FOR DETECTING PORT SCANS IN A NETWORK
A method and an apparatus for detecting a port scan in a network are disclosed. For example, the method extracts statistics from a message, detects the port...
2018/0234440 PROVIDING SECURITY IN A COMMUNICATION NETWORK
Systems and methods for optimizing system resources by selectively enabling various scanning functions of a network security device are provided. According to...
2018/0234439 Automated Classification of Domain Names Resolved by Malware
Techniques are provided for automated classification of domain names resolved by malware. An exemplary method comprises obtaining a domain name included in...
2018/0234438 MULTI-FACTOR DECEPTION MANAGEMENT AND DETECTION FOR MALICIOUS ACTIONS IN A COMPUTER NETWORK
A network surveillance method to detect attackers, including planting one or more honeytokens in one or more resources in a network of computers in which users...
2018/0234437 CYBERSECURE ENDPOINT SYSTEM FOR A NETWORK
The disclosed embodiments relate to a cybersecure endpoint (CSE) device for a communication system. The CSE device performs a computer-implemented method for...
2018/0234436 STEPPING-STONE DETECTION APPARATUS AND METHOD
Disclosed herein are a stepping-stone detection apparatus and method. The stepping-stone detection apparatus includes a target connection information reception...
2018/0234435 PROACTIVE PREDICATION AND MITIGATION OF CYBER-THREATS
A cyber-security system and method for proactively predicting cyber-security threats are provided. The method comprises receiving a plurality of security...
2018/0234434 SYSTEMS AND METHODS FOR DETECTING MALICIOUS COMPUTING EVENTS
The disclosed computer-implemented method for detecting malicious computing events may include (i) determining, for multiple computing events detected within...
2018/0234433 SYSTEMS AND METHODS FOR MANAGING DIGITAL IDENTITIES
Systems and methods for managing digital identities. In some embodiments, a method is provided, comprising acts of: receiving a request to validate at least...
2018/0234432 VIRTUALIZED VOLUME LEVEL MESSAGING
Implementations and methods herein provide a networked storage system including a plurality of physical storage devices configured to store data on a plurality...
2018/0234431 Enabling Access to Restricted Data Using Geofences
Concepts and technologies are disclosed herein for enabling access to restricted data using geofences. A system can identify a device associated with...
2018/0234430 DATA CLASSIFICATION AND ACCESS CONTROL FOR CLOUD BASED DATA
A data protection policy can specify which applications are allowed and/or dis-allowed from accessing cloud data that is subject to a data protection policy...
2018/0234429 AUTHENTICATING A REQUEST FOR AN ELECTRONIC TRANSACTION
In an approach for authenticating a request for an electronic transaction, a computer receives a request for an electronic transaction on a user account. The...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.