At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Patent # | Description |
---|---|
2017/0318066 |
SYSTEM AND METHOD FOR LONG RANGE AND SHORT RANGE DATA COMPRESSION A system and method are provided for use with streaming blocks of data, each of the streaming blocks of data including a number bits of data. The system... |
2017/0318065 |
SIMILAR INTRODUCTION ADVERTISING CACHING MECHANISM A method for reducing bandwidth needed for streaming media content. The method includes identifying, by the streaming media server, a subset of a plurality of... |
2017/0318064 |
METHOD AND ELECTRONIC DEVICE FOR EDITING CONTENT A content editing method and apparatus for efficiently editing of content by allowing one user who edits the content to confirm a region of the content edited... |
2017/0318063 |
SYSTEM AND METHOD FOR RELIABLE MESSAGING BETWEEN APPLICATION SESSIONS
ACROSS VOLATILE NETWORKING CONDITIONS An electronic device is provided comprising a processor, a memory coupled to the processor, and a communications module saved in the memory and an application... |
2017/0318062 |
METHOD FOR SETTING UP A COMMUNICATION LINK In a method for setting up a communication link between a first telephony terminal (PA) and a second telephony terminal (PB) in a communication network which... |
2017/0318061 |
METHOD, DEVICE, AND SYSTEM FOR MANAGING INFORMATION RECOMMENDATION An inquiry for information recommendation sent by a terminal is received; the inquiry for information recommendation may include an account identification of a... |
2017/0318060 |
NETWORK CONNECTION ESTABLISHMENT METHOD, TERMINAL DEVICE, AND NODE DEVICE The present application provides a network connection establishment method, a terminal device, and a node device, and relates to the self-organizing network... |
2017/0318059 |
SINGLE PASS LOAD BALANCING AND SESSION PERSISTENCE IN PACKET NETWORKS Methods and systems for performing load balancing and session persistence in IP (e.g., IPv6) networks are described herein. Some aspects relate to a... |
2017/0318058 |
Data Access Policies To verify compliance with a data access policy, a query result including data specified by a requesting entity and a representation of a data access policy is... |
2017/0318057 |
Modulation of the VPS10P-Domain Receptors for the Treatment of
Cardiovascular Disease The present invention relates to methods for modulating the activity of one or more Vps10p-domain receptors selected from the group consisting of Sortilin,... |
2017/0318056 |
METHOD AND DEVICE FOR MONITORING THE SUPPLY OF AUTHENTICATION CERTIFICATES
TO SERVICE NODES OF A... A method for monitoring the supply of authentication certificates to service nodes of a high-performance computer, includes a first step of defining for each... |
2017/0318055 |
USING ACTIVITIES TO MANAGE MULTI-TENANT FIREWALL CONFIGURATION A novel method for managing firewall configuration of a software defined data center is provided. Such a firewall configuration is divided into multiple... |
2017/0318054 |
AUTHENTICATION INCIDENT DETECTION AND MANAGEMENT A system reports credentials on nodes of a network. Nodes are assigned to security silos. If a credential reported from a node is found to match a credential... |
2017/0318053 |
Context-Aware Knowledge System and Methods for Deploying Deception
Mechanisms Methods, systems, and computer-readable mediums are described herein to provide context-aware knowledge systems and methods for deploying deception mechanisms.... |
2017/0318052 |
INTERCEPTING AND SUPERVISING CALLS TO TRANSFORMED OPERATIONS AND OBJECTS In an embodiment, a method comprises intercepting a first set of instructions from a server computer that define one or more objects and one or more original... |
2017/0318051 |
CYBER-SEMANTIC ACCOUNT MANAGEMENT SYSTEM Systems, methods, and apparatus for identifying anomalous behavior are provided. For example, a method may include receiving raw data, generating a behavior... |
2017/0318050 |
EVENT CORRELATION ACROSS HETEROGENEOUS OPERATIONS Methods, systems, and apparatus, including computer programs encoded on computer storage media, for determining a network security threat response. A data... |
2017/0318049 |
MALWARE DETECTION SYSTEM BASED ON STORED DATA A malware detection system based on stored data that analyzes an electronic message for threats by comparing it to previously received messages in a message... |
2017/0318048 |
SYSTEM AND METHOD FOR MONITORING NETWORK VULNERABILITIES A method for managing network vulnerabilities may include obtaining image data regarding a software container located on a network element. The image data may... |
2017/0318047 |
TECHNIQUES FOR ASSOCIATING MEASUREMENT DATA ACQUIRED AT A WIRELESS
COMMUNICATION DEVICE WITH CURRENT VALUES OF... Techniques are described for wireless communication. A method for wireless communication at a user equipment (UE) includes transmitting, to a wireless... |
2017/0318046 |
METHOD AND SYSTEM FOR ASSESSING DATA SECURITY A method and system for conducting simulated phishing attacks. This may include identifying a target device from a list, such as a corporate directory, and... |
2017/0318045 |
End-to-End Taint Tracking for Detection and Mitigation of Injection
Vulnerabilities in Web Applications The embodiments described in this disclosure may be adapted to detect and mitigate tainted content in network communications across client-server boundaries... |
2017/0318044 |
NET SLEUTH A method of identifying a node of a plurality of nodes in an in-vehicle communications network that transmitted a waveform propagating in the network,... |
2017/0318043 |
METHOD FOR DETECTING NETWORK ANOMALY IN DISTRIBUTED SOFTWARE DEFINED
NETWORKING ENVIRONMENT, APPARATUS... A method, an apparatus, and a computer program for detecting network anomaly in a distributed software defined networking (SDN) environment. The method... |
2017/0318042 |
DYNAMIC CONFIGURATION OF SETTINGS IN RESPONSE TO DDOS ATTACK A system can monitor the server for indications of an attack and adjusts server settings accordingly. In response, the system can increase server tolerance in... |
2017/0318041 |
METHOD AND SYSTEM FOR DETECTING MALICIOUS BEHAVIOR, APPARATUS AND COMPUTER
STORAGE MEDIUM The present disclosure provides a method and system for detecting a malicious behavior, an apparatus and a computer storage medium. In one aspect, in... |
2017/0318040 |
METHOD AND DEVICE FOR DEFENDING DHCP ATTACK A method for defending a DHCP attack is provided. The method includes monitoring packets transmitted by a client terminal coupled to a target port, and... |
2017/0318039 |
DETECTION OF SLEEP DEPRIVATION ATTACK AND MITIGATION Systems and methods are provided for detecting and mitigating a sleep deprivation attack (SDA). A method for detection of the SDA includes one of tracking... |
2017/0318038 |
Defending Against Malicious Electronic Messages Defending against malicious electronic messages by analyzing electronic messages sent via a computer network to identify predefined risk elements found within... |
2017/0318037 |
DISTRIBUTED ANOMALY MANAGEMENT Examples relate to distributed anomaly management. In one example, a computing device may: receive real-time anomaly data for a first set of client devices,... |
2017/0318036 |
PREEMPTIVE ALERTS IN A CONNECTED ENVIRONMENT The present disclosure is related to devices, systems, and methods for preemptive alerts in a connected environment. An example device can include instructions... |
2017/0318035 |
COGNITIVE AND CONTEXTUAL DETECTION OF MALICIOUS DNS From a record of a packet in a Domain Name System (DNS) communication between a DNS client and a DNS server, an input feature is constructed. Using the packet,... |
2017/0318034 |
SYSTEM AND METHOD TO DETECT ATTACKS ON MOBILE WIRELESS NETWORKS BASED ON
NETWORK CONTROLLABILITY ANALYSIS Described is a system for detecting attacks of misinformation on communication networks. Network controllability metrics on a graphical representation of a... |
2017/0318033 |
SYSTEM AND METHOD TO DETECT ATTACKS ON MOBILE WIRELESS NETWORKS BASED ON
MOTIF ANALYSIS Described is a system for detecting attacks on networks. A hierarchical representation of activity of a communication network is used to detect and predict... |
2017/0318032 |
SYSTEM AND METHOD FOR DETECTING ATTACKS ON MOBILE AD HOC NETWORKS BASED ON
NETWORK FLUX Described is a system for detecting attacks on mobile networks. The system includes the relevant hardware and components to perform a variety of operations... |
2017/0318031 |
DIRECT CACHE ACCESS FOR NETWORK INPUT/OUTPUT DEVICES Methods and systems for improving efficiency of direct cache access (DCA) are provided. According to one embodiment, a set of DCA control settings are defined... |
2017/0318030 |
Methods, Apparatuses, and Storage Mediums for Acquiring Legitimate
Installation Packages Methods, apparatuses, and storage mediums are provided for acquiring a legitimate installation package the field of computer technology. The method includes:... |
2017/0318029 |
CONFIGURATION MANAGEMENT FOR VIRTUAL MACHINE ENVIRONMENT A computer-implemented method for controlling a connection between a virtual machine and a physical device comprises receiving a connection request for... |
2017/0318028 |
INTELLIGENT NETWORK ACCESS CONTROL A method for managing a private wireless network includes a processor that generates the private wireless network within a part of a coverage area of a local... |
2017/0318027 |
EFFECTIVELY VALIDATING DYNAMIC DATABASE QUERIES THROUGH DATABASE ACTIVITY
MONITORING A database activity monitoring service, operating independent of a database server, in response to intercepting a database server response issued by the... |
2017/0318026 |
INFERRING SECURITY-SENSITIVE ENTITIES IN LIBRARIES A method for analyzing a software library may include obtaining the software library, identifying a candidate security-sensitive entity in the software... |
2017/0318025 |
MANAGING SECURITY GROUPS FOR DATA INSTANCES Access level and security group information can be updated for a data instance without having to take down or recycle the instance. A data instance created in... |
2017/0318024 |
Controlling Access to Ideograms In one embodiment, a method includes receiving, from a client device of an author of a message, a request for a restricted ideogram to be inserted into a... |
2017/0318023 |
PERMISSION BASED RESOURCE AND SERVICE DISCOVERY Current discovery mechanisms lack capabilities, such as capabilities related to permissions associated with a given registrant for example. In an example... |
2017/0318022 |
PROTECTION OF RESOURCE INFORMATION BASED ON DYNAMIC ASSIGNMENT OF
RESOURCES IN A WIRELESS NETWORK An example technique may include determining a change in an assignment state for a network resource that is shared among a plurality of sharing partners in a... |
2017/0318021 |
RESOURCE SHARING AND DESIGNATION OF PERMISSIONS FOR OTHER TENANTS AND
UNREGISTERED USERS OF SAME TENANT Autocompleting into an invite box for purposes of sharing an executable computing resource such as an application or portion thereof. However, the autocomplete... |
2017/0318020 |
ACTIVITY FEED FOR HOSTED FILES Described herein are various technologies pertaining to generating an activity feed for an entity hosted at a file hosting server. The activity feed includes a... |
2017/0318019 |
GAZE-BASED AUTHENTICATION A user may be authenticated to access an account, computing device, or other resource using gaze tracking. A gaze-based password may be established by... |
2017/0318018 |
WIRELESS NETWORK ACCESS A system and machine-implemented method of wireless network access are provided. An authentication request comprising credentials for a user account of a... |
2017/0318016 |
TECHNOLOGIES FOR SUPPORTING MULTIPLE DIGITAL RIGHTS MANAGEMENT PROTOCOLS
ON A CLIENT DEVICE Technologies for supporting and implementing multiple digital rights management protocols on a client device are described. In some embodiments, the... |