Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0255086 APPLYING CONDENSED MACHINE LEARNED MODELS WITHIN A LOCAL NETWORK
The behavior analysis engine can condense stored machine-learned models and transmit the condensed versions of the machine-learned models to the network...
2018/0255085 DETERMINING ENTITY MALICIOUSNESS BASED ON ASSOCIATED ENTITIES
The behavior analysis engine can identify malicious entities based on connections between the entity and other entities. The behavior analysis engine receives...
2018/0255084 SYSTEMS AND METHODS FOR BEHAVIORAL CLUSTER-BASED NETWORK THREAT DETECTION
Systems and methods for threat detection in a network are provided. The system obtains recoils for entities that access a network. The records include...
2018/0255083 IDENTIFICATION OF A DNS PACKET AS MALICIOUS BASED ON A VALUE
Examples determine a number of hosts, within an enterprise, which are resolving a particular domain. Based on the number of hosts within the enterprise...
2018/0255082 COOPERATIVE CLOUD-EDGE VEHICLE ANOMALY DETECTION
Example implementations of the present disclosure are directed to systems and methods directed to increasing the accuracy and speed that anomalous and...
2018/0255081 GENERATING MALWARE SIGNATURES BASED ON DEVELOPER FINGERPRINTS IN DEBUG INFORMATION
Techniques for generating malware signatures based on developer fingerprints in debug information are disclosed. In some embodiments, a system, process, and/or...
2018/0255080 System and Method for Cyber Security Threat Detection
A cyber security threat detection system for one or more endpoints within a computing environment is disclosed. The system includes one or more collector...
2018/0255079 System and Method for Cyber Security Threat Detection
A cyber security threat detection system for one or more endpoints within a computing environment is disclosed. The system comprises a plurality of collector...
2018/0255078 ADVANCED PERSISTENT THREAT DETECTION
A threat level is evaluated for an ongoing attack detected for a set of resources based on received notifications having low weight in the evaluation of the...
2018/0255076 System and Method for Cyber Security Threat Detection
A cyber security threat detection system for one or more endpoints within a computing environment is disclosed. The system comprises a plurality of collector...
2018/0255075 Creating a Multi-Dimensional Host Fingerprint for Optimizing Reputation for IPV6
A mechanism is provided for blocking IP connection addresses and prefixes. Header information is extracted from an incoming connection request. A determination...
2018/0255074 MANAGING DATA ENCRYPTING APPLICATIONS
A method for managing cloud based applications is described. In one embodiment, the method includes detecting initiation of an application, detecting an action...
2018/0255073 ENHANCED DETECTION OF POLYMORPHIC MALICIOUS CONTENT WITHIN AN ENTITY
Embodiments of the invention are directed to systems, methods and computer program products for enhanced detection of polymorphic malicious content within an...
2018/0255072 COMMUNICATION DEVICE
A communication device capable of detecting transmission of an improper message to a network. A CAN controller in the gateway transmits and receives a message...
2018/0255071 TRUSTED DEVICE CONTROL MESSAGES
Two endpoint devices communicate with one another in a secure session using a secure protocol. Trusted control messages are passed upstream from one of the...
2018/0255070 DETERMINING THE LEGITIMACY OF MESSAGES USING A MESSAGE VERIFICATION PROCESS
A server computer receives an indication of an interaction between a first user device of a first user and a second user device of a second user, where the...
2018/0255069 SECURITY OF CODE BETWEEN CODE GENERATOR AND COMPILER
Techniques are described herein that are capable of providing security for code between a code generator and a compiler. The code generator generates source...
2018/0255068 PROTECTING CLIENTS FROM OPEN REDIRECT SECURITY VULNERABILITIES IN WEB APPLICATIONS
Described embodiments protect clients from open redirect security vulnerabilities in Web applications. A primary application receives a request for an...
2018/0255067 CONTROLLING DEVICES BY SOCIAL NETWORKING
In one embodiment, a method includes analyzing information received from a first network-enabled device to identify instructions for a second network-enabled...
2018/0255066 ENHANCED AUTHENTICATION SECURITY
Systems, methods, and apparatus, including computer-readable storage media storing executable instructions, for enhanced authentication security. In some...
2018/0255065 TECHNOLOGY FOR GENERATING A MULTI-USER RESPONSE IN A NETWORK
In a computer system implemented method for generating an authorized response to a message in a network, the computer system detects a message sent by an...
2018/0255064 TECHNOLOGY FOR GENERATING A MULTI-USER RESPONSE IN A NETWORK
In a computer system implemented method for generating an authorized response to a message in a network, the computer system detects a message sent by an...
2018/0255063 SYSTEM AND METHOD FOR PROVIDING A DECISION ENGINE WITH DATA FROM A QUERY SERVER
A system and method for method for providing data to decision engines. The method includes: providing an alternate login frame to a user device accessing a...
2018/0255062 REMOTE ACCESS TO RESOURCES OVER A NETWORK
Systems and techniques are provided for controlling requests for resources from remote computers. A remote computer's ability to access a resource is...
2018/0255061 Device Management Across Multiple Operator Networks
Various implementations disclosed herein enable a method of managing device access on one or more operator networks. The method includes determining...
2018/0255060 Service driven split tunneling of mobile network traffic
Systems and methods implemented by an application executed on a mobile device for service driven split tunneling include receiving and configuring the...
2018/0255059 System for authentication center
This invention provides a system for authentication center, so that a user can manage centrally at the authentication center the statuses of the logins or the...
2018/0255058 IDENTITY VERIFICATION METHOD AND DEVICE
A method and a device of identity verification are disclosed. The method includes: receiving by a server, an identity verification request sent from a...
2018/0255057 AUTHENTICATING A LIMITED INPUT DEVICE VIA AN AUTHENTICATED APPLICATION
A limited input device, such as a camera, is authenticated based on a request received from an authenticated application. The application can request an...
2018/0255056 ANONYMIZING BIOMETRIC DATA FOR USE IN A SECURITY SYSTEM
An anonymized biometric representation of a target individual is used in a computer based security system. The system receives a record of a target individual...
2018/0255055 SYSTEMS AND METHODS FOR PROVIDING BLOCK CHAIN-BASED MULTlFACTOR PERSONAL IDENTITY VERIFICATION
Block chain-based multifactor personal identity verification may be provided. Verification addresses may be established on a block chain by: associating...
2018/0255054 SYSTEM AND METHOD OF NOTIFYING MOBILE DEVICES TO COMPLETE TRANSACTIONS
A method including registering an authority device for an account on an auth platform; receiving transaction request from an initiator to the auth platform;...
2018/0255053 PARTIAL ONE-TIME PASSWORD
Techniques are disclosed relating to authenticating a user based on a partial password. In one embodiment, a computer system stores masking criteria defining...
2018/0255052 Preventing Unauthorized Access to Secured Information Systems Using Authentication Tokens
Aspects of the disclosure relate to providing information security and preventing unauthorized access to secured resources by implementing token-based...
2018/0255051 ACCOUNT LOGIN METHOD AND APPARATUS
A method is provided in which a JavaScript (JS) SDK file is called by an application. A plurality of login paths for logging in to the application is...
2018/0255050 ZERO SIGN-ON AUTHENTICATION
A method of facilitating zero sign-on access to media services depending on trust credentials. The trust credentials may be cookies, certificates, and other...
2018/0255049 STRONG AUTHENTICATION WITH FEEDER ROBOT IN A FEDERATED IDENTITY WEB ENVIRONMENT
Method, system, and programs for performing two-factor authentication for a controlled access application via one or more third-party host verification...
2018/0255048 COMPREHENSIVE AUTHENTICATION AND IDENTITY SYSTEM AND METHOD
A comprehensive authentication and identity system and method are disclosed. A central profile is created for a user which includes user information that can...
2018/0255047 METHOD AND APPARATUS FOR AN IDENTITY ASSURANCE SCORE WITH TIES TO AN ID-LESS AND PASSWORD-LESS AUTHENTICATION...
A technique is provided by which a user goes to a site and instead of the authentication system of the site going to their own databases to match an ID and...
2018/0255046 METHOD AND APPARATUS FOR A SOCIAL NETWORK SCORE SYSTEM COMMUNICABLY CONNECTED TO AN ID-LESS AND PASSWORD-LESS...
A technique is provided in which entities, such as companies, connect to a universal social network score server in the cloud, to request therefrom a social...
2018/0255045 MOBILE DEVICE ENABLED DESKTOP TETHERED AND TETHERLESS AUTHENTICATION
A technique is provided that integrates authentication from a mobile device (e.g., using biometrics, social informational data, questions and answers, and...
2018/0255044 SYSTEM AND METHOD FOR UTILIZING BEHAVIORAL CHARACTERISTICS IN AUTHENTICATION AND FRAUD PREVENTION
A behavioral characteristics authentication system and method ("BCA system") that facilitates authentication of the identity of a user, registrant, or...
2018/0255043 Access Control in a Computer System
The disclosure relates to apparatuses and methods for a computer network comprising hosts accessible by directory users whose user identity information is...
2018/0255042 HOP LATENCY NETWORK LOCATION IDENTIFIER
Identifying a communication source includes receiving a message from a client computer requesting access to a computer-based resource; and receiving, a network...
2018/0255041 NETWORK HOP COUNT NETWORK LOCATION IDENTIFIER
Identifying a communication source includes receiving a message from a client computer requesting access to a computer-based resource; and receiving, a network...
2018/0255040 APPARATUS AND METHOD FOR PREDICTIVE TOKEN VALIDATION
An apparatus and method are provided for predictive token validation. In use, a database stores service usage information relating to usage of at least one...
2018/0255039 KEY SHARING DEVICE, KEY SHARING SYSTEM, KEY SHARING METHOD, AND COMPUTER PROGRAM PRODUCT
According to one embodiment, a key sharing device includes one or more processors function as a plurality of individual processing units. Each of the...
2018/0255038 METHODS AND SYSTEMS OF PROVIDING VERIFICATION OF THE IDENTITY OF A DIGITAL ENTITY USING A CENTRALIZED OR...
Methods and systems of providing verification of the identity of a digital entity are provided, including receiving information and a public key of the digital...
2018/0255037 SELF MANAGEMENT OF CREDENTIALS BY IoT DEVICES
A method, a device and a computer program product are provided. A networked device determines whether a condition occurred. In response to detecting the...
2018/0255036 METHODS OF BIDIRECTIONAL PACKET EXCHANGE OVER NODAL PATHWAYS
A node system implements a method for node relay communication. A description of a flow entry including an address in a flow and a private key is received. The...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.