Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2017/0359383 Methods and Systems for Protecting a Secured Network
Methods and systems for protecting a secured network are presented. For example, one or more packet security gateways may be associated with a security policy...
2017/0359382 METHODS AND SYSTEMS FOR PROTECTING A SECURED NETWORK
Methods and systems for protecting a secured network are presented. For example, one or more packet security gateways may be associated with a security policy...
2017/0359381 Methods and Systems for Protecting a Secured Network
Methods and systems for protecting a secured network are presented. For example, one or more packet security gateways may be associated with a security policy...
2017/0359380 METHODS AND SYSTEMS FOR ENHANCING CYBER SECURITY IN NETWORKS
The present application is directed a computer-implemented method for enhancing security on a network. The method includes a step of receiving, from user...
2017/0359379 NETWORK-BASED PERMISSIONING SYSTEM
Aspects of the present disclosure include a system comprising a computer-readable storage medium storing at least one program and a method for managing access...
2017/0359378 SYSTEMS AND METHODS FOR ENFORCING DEVICE POLICIES
Systems and methods of enforcing device policies. One example method includes receiving, with an electronic processor and from a host virtual machine server,...
2017/0359377 GRAPHICAL POLICY INTERFACE FOR NETWORK CONTROL SYSTEMS
A graphical policy interface architecture may enable simplified graphical development of customized policy logic for software controllers to control network...
2017/0359376 AUTOMATED THREAT VALIDATION FOR IMPROVED INCIDENT RESPONSE
A method for deploying threat specific deception campaigns for updating a score given to a malicious activity threat by performing an analysis of processes...
2017/0359375 ANTI-PHISHING PROTECTION
Anti-Phishing protection assists in protecting against phishing attacks. Any links that are contained within a message that has been identified as a phishing...
2017/0359374 Blockchain System with Nucleobase Sequencing as Proof of Work
A sequence mining platform (SMP) comprises a processor, at least one machine-accessible storage medium responsive to the processor, and a sequence manager in...
2017/0359373 CYBERATTACK PREVENTION SYSTEM
A self-updating system for defending against a cyberattack requests connected devices to solve a problem that is created in a random manner. The problems are...
2017/0359372 DETECTING VOLUMETRIC ATTACKS
Detecting a volumetric attack on a computer network with fewer false positives and while also requiring fewer processing resources is provided. The systems and...
2017/0359371 Performing Rule-Based Actions Based on Accessed Domain Name Registrations
Domain names are determined for each computational event in a set, each event detailing requests or posts of webpages. A number of events or accesses...
2017/0359370 KEY THROTTLING TO MITIGATE UNAUTHORIZED FILE ACCESS
A file system extension for an endpoint controls access to files by selectively decrypting files under certain conditions. Where a pattern of access to the...
2017/0359369 SYSTEMS AND METHODS TO BLOCK ACCOUNT CREATION FROM COMPUTING DEVICES
Systems, methods, and non-transitory computer readable media are configured to determine an account through which illegitimate activity has been conducted on...
2017/0359368 Identifying malicious identifiers
Methods and systems for identifying malicious URIs. The system accepts a list of URIs as input and extracts features related to a given URI and uses the...
2017/0359367 SYSTEM FOR DETERMINING EFFECTIVENESS AND ALLOCATION OF INFORMATION SECURITY TECHNOLOGIES
Disclosed is a computerized system for determining the collective effectiveness of information security technologies. The system typically includes a...
2017/0359366 THREAT DETECTION AND LOCALIZATION FOR MONITORING NODES OF AN INDUSTRIAL ASSET CONTROL SYSTEM
In some embodiments, a plurality of real-time monitoring node signal inputs receive streams of monitoring node signal values over time that represent a current...
2017/0359365 DETECTING AND EVICTING MALICIOUS VEHICLES IN A VEHICLE COMMUNICATIONS NETWORK
A method, computer program product and computer system maintain a list that includes identifiers of vehicles determined by the processor of a detective vehicle...
2017/0359364 EMOJI FREQUENCY DETECTION AND DEEP LINK FREQUENCY
Systems and methods are disclosed for generating term frequencies of known terms based on crowdsourced differentially private sketches of the known terms. An...
2017/0359363 EMOJI FREQUENCY DETECTION AND DEEP LINK FREQUENCY
Systems and methods are disclosed for generating term frequencies of known terms based on crowdsourced differentially private sketches of the known terms. An...
2017/0359362 SPAM CLASSIFICATION SYSTEM BASED ON NETWORK FLOW DATA
In an example embodiment, a computer-implemented method comprises obtaining labels from messages associated with an email service provider, wherein the labels...
2017/0359361 SELECTING REPRESENTATIVE METRICS DATASETS FOR EFFICIENT DETECTION OF ANOMALOUS DATA
Certain embodiments involve selecting metrics that are representative of large metrics datasets and that are usable for efficiently performing anomaly...
2017/0359360 SYSTEM AND METHOD FOR GATHERING BOTNET CYBER INTELLIGENCE
A drone unit operatively connected to a server may identify an attack, launched by a botnet, on a resource. A drone unit may continuously and iteratively,...
2017/0359359 CYBERATTACK PREVENTION SYSTEM
A self-updating system for defending against a cyberattack requests connected devices to solve a problem that is created in a random manner. The problems are...
2017/0359358 METHOD FOR MAKING CONTACTLESS TRANSACTIONS SECURE
The invention relates to a method for making a transaction of a contactless application secure, said application (11) being stored in the mobile terminal (10),...
2017/0359357 A METHOD AND APPARATUS FOR MANAGING A PREFERENCE SETTING FOR TRUST LEVEL INFORMATION OF CALLER IDENTITY IN A...
The present invention relates to a wireless access system, and more particularly, to methods and apparatus for managing a preference setting for trust level...
2017/0359356 PERMISSIONS DECISIONS IN A SERVICE PROVIDER ENVIRONMENT
Permissions can be delegated to enable access to resources associated with one or more different accounts, which might be associated with one or more different...
2017/0359355 Smart Authentication Friction Level Adjusted Based on Circumstances
Granting a validation period. A method includes receiving user input providing one or more authentication factors. The method further includes receiving...
2017/0359354 AUTHORIZATION SERVER, CONTROL METHOD, AND STORAGE MEDIUM
During execution of authority transfer, a scope group obtained by grouping a plurality of scopes is used to perform authority transfer. Performing authority...
2017/0359353 PERVASIVE INTERMEDIATE NETWORK ATTACHED STORAGE APPLICATION WITH ASYNCHRONOUSLY RENDERED CONTENT
A Pervasive Intermediate Network Attached Storage Application (PINApp) enables users to digitally assign (pin) a folder or drive to a public cloud storage...
2017/0359351 SYSTEM FOR CREATION OF ALTERNATIVE PATH TO RESOURCE ACQUISITION
Systems, computer program products, and methods are described herein for access to a resource across a dispersed Internet protocol capable network connecting...
2017/0359350 METHOD FOR CONTROLLING PERMISSION OF APPLICATION PROGRAM AND CONTROLLER
The application relates to controlling access in a software-defined network (SDN). A controller in the SDN receives an access request from an application...
2017/0359349 METHOD AND APPARATUS FOR CAUSING A DELAY IN PROCESSING REQUESTS FOR INTERNET RESOURCES RECEIVED FROM CLIENT DEVICES
A method and apparatus for causing a delay in processing requests for Internet resources received from client devices is described. A server receives from a...
2017/0359348 SECURE REMOTE DESKTOP SESSION
A system discloses providing secure remote desktop session host experience to a user for a selected application while controlling the user's access to non-core...
2017/0359347 SYSTEM AND METHOD FOR DATA CENTER SECURITY ENHANCEMENTS LEVERAGING SERVER SOCs OR SERVER FABRICS
A data center security system and method are provided that leverage server systems on a chip (SOCs) and/or server fabrics. In more detail, server interconnect...
2017/0359346 System and Method for Providing Feature-Level Delegation of Service Entitlements Among Users in a Group
A system and method are provided for delegating entitlements to features of media services. The method includes storing, at an intermediary system operable...
2017/0359345 System and Method for Delegating Service Entitlements Across Multiple Media Services
A system and method are provided for delegating entitlements to media services. The method includes storing, at an intermediary system operable between a...
2017/0359344 NETWORK-VISITABILITY DETECTION CONTROL
A state of visitability of a network interface can be determined by receiving, via a network interface, an instruction. In response, a security request...
2017/0359343 SYSTEM AND METHOD FOR SECURE COMMUNICATIONS WITH INTERNET-OF-THINGS DEVICES
A system and method for securing communications between Internet of Things (IoT) devices and user devices. The method includes establishing a connection to an...
2017/0359342 Mobile device access to a protected machine
In a first embodiment, the "one tap" operation of this disclosure enables a user having a mobile device "one tap" mobile application (or "app") to log-in to...
2017/0359341 DATA ACCESS CONTROL BASED ON STORAGE VALIDATION
A system and method to control access to data are disclosed. A request for a subject to perform an action on an object is received. A determination is made...
2017/0359340 Nullifying Biometrics
Artificial biometric traits self-nullify due to natural physiological processes. Biometric enrollment and authentication may then be based on a life associated...
2017/0359339 Proximity detection for mobile device access to protected resources
In a first embodiment, the "one tap" operation of this disclosure enables a user having a mobile device "one tap" mobile application (or "app") to log-in to...
2017/0359338 MANAGEMENT OF RELATIONSHIPS BETWEEN A DEVICE AND A SERVICE PROVIDER
An authentication device is used to create a secure connection between an Internet of Things (IoT) device and a service provider, so that the IoT device is not...
2017/0359337 PROVISION OF CROSS-DEVICE IDENTIFICATION
Described are methods, systems, and apparatus, including computer program products for provision of cross-device identifiers. A cross-device ID is assigned by...
2017/0359336 Preventing Unauthorized Access to Secured Information Systems Based on Contextual Login Information
A computing platform may receive, from a client server, a request to authenticate a user to a user account, as well as device selection input selecting a...
2017/0359335 IN-CIRCUIT SECURITY SYSTEM AND METHODS FOR CONTROLLING ACCESS TO AND USE OF SENSITIVE DATA
At a first electronic device with a display and one or more biometric sensors a request is made for user authentication using the one or more biometric...
2017/0359334 SYSTEM AND METHOD FOR VOICE AUTHENTICATION
A system and a method for single sign-on voice authentication that provides access to multiple voice recognition and artificial intelligence platforms, to...
2017/0359333 CONTEXT BASED SWITCHING TO A SECURE OPERATING SYSTEM ENVIRONMENT
Generally, this disclosure provides devices, systems, methods and computer readable media for context based switching to a secure OS environment including...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.