Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0248910 Anti-Attack Data Transmission Method and Device
An anti-attack data transmission method and an apparatus thereof are provided. The method includes obtaining a communication protocol message to be...
2018/0248909 COMMUNICATIONS METHODS, SYSTEMS AND APPARATUS FOR PROTECTING AGAINST DENIAL OF SERVICE ATTACKS
The present invention relates to methods, systems and apparatus for mitigating denial of service attacks. One exemplary embodiment in accordance with the...
2018/0248908 ALGORITHMICALLY DETECTING MALICIOUS PACKETS IN DDOS ATTACKS
A method for detecting patterns using statistical analysis is provided. The method includes receiving a subset of structured data having a plurality of fields....
2018/0248907 DETECTION OF SCRIPTED ACTIVITY
Methods, systems, and computer program products for online content referral are provided. A computer-implemented method may include receiving a request from an...
2018/0248906 IPFIX-Based Detection of Amplification Attacks on Databases
One embodiment illustrated herein includes a computer implemented method. The method includes acts for training an amplification attack detection system. The...
2018/0248905 SYSTEMS AND METHODS TO DETECT ABNORMAL BEHAVIOR IN NETWORKS
Systems and methods implemented by a computer to detect abnormal behavior in a network include obtaining Performance Monitoring (PM) data including one or more...
2018/0248904 ANALYTICS FOR PROCESSING INFORMATION SYSTEM DATA
A processing pipeline for supporting machine-learning processes for network monitoring and information management as well as specific analytics for particular...
2018/0248903 PROCESSING PIPELINE FOR MONITORING INFORMATION SYSTEMS
A processing pipeline for supporting advanced analytics for network monitoring and information management as well as specific analytics for particular use...
2018/0248902 MALICIOUS ACTIVITY DETECTION ON A COMPUTER NETWORK AND NETWORK METADATA NORMALISATION
The invention relates to a network security and data normalisation system for a computer network, IT system or infrastructure, or similar. According to an...
2018/0248901 BEHAVIORAL BASELINING OF NETWORK SYSTEMS
Systems and methods for behavioral baselining of network systems. In one embodiment, a method includes: storing, in an asset attribute database, information...
2018/0248900 MULTI-DIMENSIONAL DATA SAMPLES REPRESENTING ANOMALOUS ENTITIES
In some examples, a plurality of multi-dimensional data samples representing respective behaviors of entities in a computing environment are sorted, where the...
2018/0248899 BEHAVIORAL BASELINING OF NETWORK SYSTEMS
Systems and methods for behavioral baselining of network systems. In one embodiment, a method includes: storing, in an asset attribute database, information...
2018/0248898 METHOD AND APPARATUS FOR IDENTIFYING MALICIOUS WEBSITE, AND COMPUTER STORAGE MEDIUM
This application discloses a method and an apparatus for identifying a malicious website, and belongs to the field of the Internet. An apparatus for...
2018/0248897 METHOD AND SYSTEM TO PROTECT SOFTWARE-BASED NETWORK-CONNECTED DEVICES FROM ADVANCED PERSISTENT THREAT
A method of protecting a network-connected device from an advanced persistent threat cyber-attack is provided. A network-connected device having an operating...
2018/0248896 SYSTEM AND METHOD TO PREVENT, DETECT, THWART, AND RECOVER AUTOMATICALLY FROM RANSOMWARE CYBER ATTACKS, USING...
An anti-ransomware system for a computer system has a deception component comprising a decoy module configured to place decoy segments within one or more file...
2018/0248895 INTELLIGENT SECURITY MANAGEMENT
A corpus of documents (and other data objects) stored for an entity can be analyzed to determine one or more topics for each document. Elements of the...
2018/0248894 INFORMATION SECURITIES RESOURCE PROPAGATION FOR ATTACK PREVENTION
A system for verifying resource propagations in real-time typically includes a classical computer apparatus and a quantum optimizer in communication with the...
2018/0248893 Detecting Cyber Attacks by Correlating Alerts Sequences in a Cluster Environment
Providing network entities with notifications of attacks on the entities. A method includes collecting alerts from a plurality of network entities in a cluster...
2018/0248892 Location-Based Continuous Two-Factor Authentication
The invention provides a means of continuous two-factor authentication, wherein location information is collected by a client mobile device and transmitted to...
2018/0248891 CONTENT MANAGEMENT BASED ON SPATIAL AND TEMPORAL INFORMATION
Variety of approaches to provide content management based on spatial and temporal information are described. A hosted service initiates operations to provide...
2018/0248890 ENABLING ROLE-BASED OPERATIONS TO BE PERFORMED ON MACHINE DATA IN A MACHINE ENVIRONMENT
Embodiments are directed towards a system and method for a cloud-based front end that may abstract and enable access to the underlying cloud-hosted elements...
2018/0248889 SYSTEMS AND METHODS FOR ROLE-BASED COMPUTER SECURITY CONFIGURATIONS
An apparatus includes a processor operatively coupled to a memory. The processor detects a software application installed on a client computing device, and/or...
2018/0248888 INFORMATION PROCESSING APPARATUS AND ACCESS CONTROL METHOD
An information processing apparatus includes a processor that executes a process including calculating, for each of a plurality of registered users from which...
2018/0248887 Method and Systems for Virtual File Storage and Encryption
The present invention discloses an intelligent cloud server for cloud storage information management and encryption. In some embodiments, the intelligent cloud...
2018/0248886 PERMISSIONS -CONSTRAINED DELIVERY OF PARTIAL SEARCH RESULTS FOR A CONTENT MANAGEMENT SYSTEM
User permissions for a search on content managed by a content management system (CMS) can be evaluated in a search engine based on a user identity of a user...
2018/0248885 Managing Inter-Object Operations in a Domain Role-Based Access Control (RBAC) System
An approach is provided in which an information handling system receives a request from a subject to perform an operation between a first object and a second...
2018/0248884 IDENTITY PROXY TO PROVIDE ACCESS CONTROL AND SINGLE SIGN ON
Techniques to provide secure access to a cloud-based service are disclosed. In various embodiments, a request is received from a client app on a device to...
2018/0248883 Secure Identity Federation for Non-Federated Systems
Methods and apparatus, including computer program products, implementing and using techniques for providing user credentials over a network to a remote...
2018/0248882 EFFICIENT CLOUD RESOURCE PROTECTION
A cloud resource protection method, system, and computer program product include authenticating a user on a first computer that is part of a distributed...
2018/0248881 INFORMATION LINKING SYSTEM AND METHOD OF OPERATION THEREOF
A method of operation of an information linking system includes: locating an object with an identification icon; scanning the identification icon with a...
2018/0248880 PERMISSIONS USING BLOCKCHAIN
A network device receives a smart contract for permissions to access a service, wherein the smart contract is in an initial block for authorizations in a...
2018/0248879 METHOD AND APPARATUS FOR SETTING ACCESS PRIVILEGE, SERVER AND STORAGE MEDIUM
The present application discloses a method and an apparatus for setting an access privilege, a server and a storage medium, comprising: acquiring Internet...
2018/0248878 SECURE MATRIX BARCODE
A security system in a network connected computing device, the device executing a software component that receives information stored in a matrix barcode, the...
2018/0248877 METHOD AND DEVICE FOR TRANSMITTING IMAGE DATA
A method of processing image data comprising detecting, by a first device, a user input, capturing, at the first device, image data in response to the...
2018/0248876 INTERNETWORK AUTHENTICATION
A technique for network authentication interoperability involves initiating an authentication procedure on a first network, authenticating on a second network,...
2018/0248875 COMMUNICATION TERMINAL, COMMUNICATION SYSTEM, COMMUNICATION METHOD, AND RECORDING MEDIUM
A communication terminal includes circuitry to perform a first function and a second function. The second function is performed through a communication with...
2018/0248874 DATA TRANSMISSION METHOD, DISPLAY SYSTEM, AND SERVER
An embodiment of a data transmission method is executed by a server that includes a memory that stores first unique number data presenting a first unique...
2018/0248873 ELECTRONIC DEVICE VERIFICATION
A method for verifying whether an electronic device is one of a group of known devices comprises receiving verification information indicative of a first...
2018/0248872 COMMUNICATION APPARATUS, COMMUNICATION METHOD, AND COMMUNICATION SYSTEM
A communication apparatus of the disclosure includes: an authentication section that performs personal authentication of a user through BAN (Body Area Network)...
2018/0248871 ENHANCING PRIVACY OF NETWORK CONNECTIONS
An example method may include detecting, by an operating system component of a computing device, that a client requesting a network connection is operating in...
2018/0248870 SECURITY VERIFICATION METHOD, APPARATUS, AND SYSTEM
A security verification method, apparatus, and system relate to the field of computer security technologies, and are used to improve reliability of the...
2018/0248869 MOBILE DEVICE THEME PARK OR RESORT EXPERIENCE DONGLE
A system and method for a universal device accessory (i.e. dongle) that is compatible with various different user devices (e.g. smartphones, tablets) that...
2018/0248868 METHOD AND COMMUNICATION SYSTEM FOR SECURED AND AUTOMATED COMMUNICATION
A method and a communication system for secured and automated communication between a data management device and a hardware security device of a communication...
2018/0248867 CERTIFICATE MANAGEMENT METHOD AND APPARATUS IN NETWORK FUNCTIONS VIRTUALIZATION ARCHITECTURE
Embodiments of the present application provide a certificate management method and apparatus in an NFV architecture. The certificate management method...
2018/0248866 INFORMATION PROCESSING APPARATUS AND NON-TRANSITORY COMPUTER READABLE MEDIUM STORING INFORMATION PROCESSING PROGRAM
A sign-in unit of an information processing apparatus, in a case where a user, who has signed in to a first cloud service of cooperation source, signs in to a...
2018/0248865 CONFIDENCE-BASED AUTHENTICATION
Disclosed are various embodiments that perform confidence-based authentication of a user. An identification of a user account is obtained from a user, and a...
2018/0248864 METHOD OF USING SERVER, SERVER RESERVATION CONTROL APPARATUS AND PROGRAM STORAGE MEDIUM
In a content supply system, in order to use a streaming server to perform a live distribution, a user PC used makes a reservation for a time zone, etc. to a...
2018/0248863 SYSTEMS AND METHODS FOR USER AUTHENTICATION USING PATTERN-BASED RISK ASSESSMENT AND ADJUSTMENT
A computer-implemented method is provided for authenticating an identity of a user requesting access to a computerized resource via a client computing device....
2018/0248862 SECOND FACTOR AUTHORIZATION VIA A HARDWARE TOKEN DEVICE
A credential associated with a username is received from a user. The credential is verified. A key identification and a first one-time password are received...
2018/0248861 SECOND FACTOR AUTHORIZATION VIA A HARDWARE TOKEN DEVICE
A credential associated with a username is received from a user. The credential is verified. A key identification and a first one-time password are received...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.