Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0309796 METHOD AND SYSTEM FOR MANAGING SECURITY POLICIES
A policy management system includes a policy management device that is configured to manage a policy input and/or a template and/or a functional model, a...
2018/0309795 REDUCING ERROR IN SECURITY ENFORCEMENT BY A NETWORK SECURITY SYSTEM (NSS)
The technology disclosed relates to reducing error in security enforcement by a network security system (abbreviated NSS). The NSS classifies incoming...
2018/0309794 USER INTERFACE SUPPORTING AN INTEGRATED DECISION ENGINE FOR EVOLVING DEFENSES
A decision engine includes: a genetic algorithm framework including a knowledge base of standard configurations, a candidate selector generator and a selector...
2018/0309793 DETECTION AND REMOVAL OF UNWANTED APPLICATIONS
A protection application detects and removes unwanted applications. The protection application scans a client device for suspected unwanted applications. A...
2018/0309792 MULTI-FACTOR AND CONTEXT SENSITIVE BIOMETRIC AUTHENTICATION SYSTEM
This disclosure describes techniques that facilitate granting an access privilege to a client device based on selectively authenticating biometric data....
2018/0309791 SOLUTION DEFINITION FOR ENTERPRISE SECURITY MANAGEMENT
Methods and systems for defining a solution within an enterprise security management configuration server is disclosed. One method includes, based on network...
2018/0309790 USER INTERFACE FEATURES FOR ENTERPRISE SECURITY MANAGEMENT
Methods and systems for configuring a security topology in an enterprise security management configuration tool are disclosed. One method includes manipulating...
2018/0309789 MULTI-LEVEL AFFINITIZATION FOR ENTERPRISE SECURITY MANAGEMENT
Methods and systems for assigning security settings to one or more nodes within an enterprise network are disclosed. One method includes receiving network...
2018/0309788 ENTERPRISE SECURITY MANAGEMENT TOOL
Methods and systems for configuring security management settings within an enterprise network are disclosed. One method includes receiving network concordance...
2018/0309787 DEPLOYING DECEPTION CAMPAIGNS USING COMMUNICATION BREADCRUMBS
A computer implemented method of detecting unauthorized access to a protected network by detecting a usage of dynamically updated deception communication,...
2018/0309786 MOVING TARGET DEFENSE FOR SECURING INTERNET OF THINGS (IoT)
The disclosure relates to systems, methods and devices for secure routing and encrypting of network data streams passing through a network switch and connected...
2018/0309785 ELECTRONIC SECURITY KEYS FOR DATA SECURITY BASED ON QUANTUM PARTICLE STATES THAT INDICATES TYPE OF ACCESS
Systems and method for determining for determining the type of unauthorized access that occurs when a quantum-level encrypted message is tampered with or...
2018/0309784 METHOD, AND DEVICES FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACK
The present disclosure provides a method and devices for defending against distributed denial of service attacks. The method comprises: intercepting, by a...
2018/0309783 MONITOR DEVICE, BASE STATION, MONITORING METHOD, CONTROL METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM
An object is to provide a monitor device capable of reducing threat of DoS attacks on a mobile network. A monitor device (10) according to the present...
2018/0309782 Method and Apparatus for Determining a Threat Using Distributed Trust Across a Network
A system and method are disclosed wherein a risk score is generated by interrogating multiple sources of information across a network. The information is...
2018/0309781 SDN CONTROLLER ASSISTED INTRUSION PREVENTION SYSTEMS
In example implementations, a method is disclosed for a software defined network (SDN) controller assisting an intrusion prevention system (IPS). The method...
2018/0309780 METHODS AND SYSTEMS FOR EVALUATING EFFECTS OF CYBER-ATTACKS ON CYBER-PHYSICAL SYSTEMS
Described are systems and methods for evaluating cyber effects in a cyber-physical system (CPS). In some embodiments, a simulation model of the CPS is built...
2018/0309779 MULTI-DIMENSIONAL HEURISTIC SEARCH AS PART OF AN INTEGRATED DECISION ENGINE FOR EVOLVING DEFENSES
A decision engine includes: a genetic algorithm framework including a knowledge base of standard configurations, a candidate selector generator and a selector...
2018/0309778 NETWORK RESOURCE IMPLEMENTATION PRIORITIZATION
Techniques for providing dynamic resource implementation prioritization for a network are provided. In one embodiment, a method includes determining a user of...
2018/0309777 COMPUTER SYSTEM FOR DISTRIBUTED DISCOVERY OF VULNERABILITIES IN APPLICATIONS
In one aspect, the disclosure provides: A method comprising: inviting a distributed plurality of researchers to participate in one or more computer...
2018/0309776 Hierarchical Pattern Matching for Deep Packet Analysis
A method comprising receiving, by a network element, a data packet, searching, by the network element, the received data packet at a first hierarchical level...
2018/0309775 DETECTION OF AN ONGOING DATA BREACH BASED ON RELATIONSHIPS AMONG MULTIPLE NETWORK ELEMENTS
The disclosed teachings include a computer-implemented method a computer-implemented method for identifying a data breach. The method includes monitoring...
2018/0309774 AUTOMATIC TUNNELS ROUTING LOOP ATTACK DEFENSE
The present disclosure relates to systems, methods, and non-transitory computer readable storage medium for detecting a tunnel routing loop attack on a...
2018/0309773 METHOD AND DEVICE FOR DATA INSPECTION
A method for data inspection includes upon receiving an out-of-order part of a sequence of parts, checking the out-of-order part for matching in forward and...
2018/0309772 METHOD AND DEVICE FOR AUTOMATICALLY VERIFYING SECURITY EVENT
The present invention relates to a method and a device for automatically verifying a security event. The method for automatically verifying a security event,...
2018/0309771 SERVER DRIFT MONITORING
Threat detection is improved by monitoring variations in observable events and correlating these variations to malicious activity. The disclosed techniques can...
2018/0309770 AN ANOMALY DETECTION METHOD FOR THE VIRTUAL MACHINES IN A CLOUD SYSTEM
This invention relates to an anomaly detection method for the virtual machines in a cloud system, in which an HsMM is trained by searching the state...
2018/0309769 APPARATUS AND METHOD FOR DETECTING A CLONED BASE STATION
Communications are established between a base station and a mobile unit. The mobile unit analyzes the content of at least some information received from the...
2018/0309768 AUTOMATED AUTHENTICATION, VALIDATION AND PROCESSING OF DIGITIZED FILES
Automated authentication, validation and processing of digitized files. Specifically, the invention provides for receiving/ingesting digitized files from an...
2018/0309767 SELECTING USER IDENTITY VERIFICATION METHODS BASED ON VERIFICATION RESULTS
Implementations of the present disclosure discloses user identity verification method selection method and device. In an implementation, times and...
2018/0309766 Technique to Ensure Security for Connected Implantable Medical Devices
An implantable medical device (IMD) includes communication circuitry that enables the IMD to communicate via a network such as the Internet. A security routine...
2018/0309765 REDIRECTION METHOD FOR ELECTRONIC CONTENT
Electronic content, for example, a web page, is configured for display by a web browser application to include content that is not included in or referenced by...
2018/0309764 USING SMART GROUPS FOR COMPUTER-BASED SECURITY AWARENESS TRAINING SYSTEMS
This disclosure describes embodiments of an improvement to the static group solution because all the administrator needs to do is specify the criteria they...
2018/0309763 INFORMATION PROCESSING APPARATUS, CONTROL METHOD OF THE INFORMATION PROCESSING APPARATUS, STORAGE MEDIUM, AND...
An information processing apparatus for suitably registering policy information by considering an order of priority while reducing the burden on a user has the...
2018/0309762 Digital Rights Management (DRM) -Agnostic Entitlement Gateway and Verification System and Method
Novel tools and techniques are provided for implementing digital rights management ("DRM")-agnostic entitlement gateway and verification system. In various...
2018/0309761 IMAGE-BASED GROUP PROFILES
An image of users of an application may be received from a computing device on a home network. The image may comprise representations of a group of users....
2018/0309760 MOBILE DEVICE ENABLED TIERED DATA EXCHANGE VIA A VEHICLE
A mobile device enabled tiered data exchange via a vehicle is disclosed. A mobile device can access profile information related to a tiered-data sharing...
2018/0309759 MULTI-LEVEL, DISTRIBUTED ACCESS CONTROL BETWEEN SERVICES AND APPLICATIONS
A computing system controls access between components. A token issuer issues an access token to a requesting component, that is requesting access to a...
2018/0309758 UNIFIED AUTHENTICATION SOFTWARE DEVELOPMENT KIT
Embodiments of the disclosure provide a method of incorporating multiple authentication systems and protocols. The types of authentication systems and...
2018/0309757 Techniques for Providing Full-Featured Browser Access During Captive Portal Authentication Routines
The present disclosure is generally directed to a method and system for authentication with a computer network that comports with CNA requirements, but...
2018/0309755 METHOD, SYSTEM AND APPARATUS FOR POLICY BASED AUTHORIZATION AND AUTHENTICATION OF DATA TRAFFIC BYPASSING MOBILE...
A policy server and a charging server authorize and authenticate data traffic bypassing a mobile network. The policy server stores subscriber records, each...
2018/0309754 SECURE UPDATING OF TELECOMMUNICATION TERMINAL CONFIGURATION
A network terminal, e.g., a smartphone, can retrieve, from a datastore, a cryptographically-signed configuration record including a device identifier of the...
2018/0309753 SYSTEM AND METHOD FOR WIRELESS SCREEN PROJECTION
One embodiment provides a computer system (e.g., a client computing device) for facilitating screen projection, the first computer system comprising a...
2018/0309752 ENHANCED SECURITY AUTHENTICATION SYSTEM
A method, a computer system, and a computer program product for authenticating a transaction are provided. An authentication system receives the transaction...
2018/0309751 MOBILE DEVICE USING SHARED DIGITAL CERTIFICATE FOR DIFFERENT MANAGED ENTERPRISE APPLICATIONS AND RELATED METHODS
A mobile device may include at least one memory and a processor-cooperating with the at least one memory to enroll with an enterprise mobility management (EMM)...
2018/0309750 IN-CIRCUIT SECURITY SYSTEM AND METHODS FOR CONTROLLING ACCESS TO AND USE OF SENSITIVE DATA
A first electronic device comprises a transmitter, a secure processor, a secure memory, and one or more biometric sensors. The first electronic device is...
2018/0309749 RETRIEVAL OF DATA ACROSS MULTIPLE PARTITIONS OF A STORAGE DEVICE USING DIGITAL SIGNATURES
A system and method for exchanging data among partitions of a storage device is disclosed. For example, data stored in a first partition is exchanged with an...
2018/0309748 SYSTEM AND METHOD FOR APPLICATIONS TO SHARE SINGLE SIGN ON THROUGH LIGHTWEIGHT DIRECTORY ACCESS PROTOCOL (LDAP)...
The techniques described herein may be used to provide a user with access to distinct applications (with Lightweight Directory Access Protocol (LDAP)...
2018/0309747 SYSTEMS AND METHODS FOR PROVIDING CONTAINER SECURITY
Computer systems and methods are provided in which an agent executive running concurrent with a security module, when initially executed, obtains an agent API...
2018/0309746 TECHNOLOGIES FOR TOKEN-BASED AUTHENTICATION AND AUTHORIZATION OF DISTRIBUTED COMPUTING RESOURCES
Technologies for token-based access authorization to an application program interface (API) include an access management server to receive a service request...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.