Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2019/0068656 System and Method for Determining Trust for SIP Messages
A method for performing initial registration is provided. The method includes receiving a server timeout message, the server timeout message including at least...
2019/0068655 RESOURCE-MANAGED CODEC SELECTION
During call setup in a communication system, first and second communication terminals may negotiate regarding which codecs to use for a streaming media...
2019/0068654 VIRTUAL BORDER CONTROLLER
A method comprising receiving a media signal from a media source at one of one or more media signal receivers, determining an association between the media...
2019/0068653 MEDIA BYPASS
Measures to control telecommunications network equipment are provided. Signalling associated with establishment of a media communications session involving...
2019/0068652 BIDIRECTIONAL DATA EXCHANGE BETWEEN COMPUTING DEVICES
A method for bidirectional data exchange includes, on a network computing device, receiving a first request from a first computing device via a request and...
2019/0068651 CELLULAR SECURITY FRAMEWORK
A wireless device determines a location, identifies a mobile network operator (MNO), and/or experiences a network event. In some instances, the wireless device...
2019/0068650 AUTOMATED NETWORK SECURITY POLICY CONFIGURATION
A security configuration management system accesses, from two or more data sources, network data gathered from a network. The network data includes Internet...
2019/0068649 COMPUTER NETWORK SECURITY SYSTEM
A computer network security system includes a central controller in communication with software-based endpoint agents operating on individual host computers....
2019/0068648 SECURITY COMPLIANCE FRAMEWORK USAGE
A method and system for improving usage of a security compliance framework is provided. The method includes authenticating a user for: access to the security...
2019/0068647 Aggregation of Asynchronous Trust Outcomes in a Mobile Device
Systems and techniques are provided for aggregation of asynchronous trust outcomes in a mobile device. Trust levels may be determined from the signals. Each...
2019/0068646 DEVICE POLICY COMPOSITION AND MANAGEMENT SYSTEM
A policy management system is described herein that allows an administrator to compose custom policies that can be applied to target devices and that achieve...
2019/0068645 CYBER ATTACK INFORMATION PROCESSING APPARATUS AND METHOD
A cyber attack information processing apparatus includes a memory and a processor configured to, when a first system obtains first information regarding a...
2019/0068644 Communication Policy Frame
Communication sessions may be initialized by sending an initialization request, and the request may include a frame of policy data identifying permissions,...
2019/0068643 NETWORK SECURITY POLICY CONFIGURATION BASED ON PREDETERMINED COMMAND GROUPS
A network security system monitors, during a time period, data traffic transmitted between devices in a network to identify a plurality of commands transmitted...
2019/0068642 Cyber-deception using network port projection
Decoy network ports and services are projected onto existing production workloads to facilitate cyber deception, without the need to modify production...
2019/0068641 Application-level sandboxing
Rapid deployments of application-level deceptions (i.e., booby traps) implant cyber deceptions into running legacy applications both on production and decoy...
2019/0068640 On-demand injection of software booby traps in live processes
This disclosure provides for rapid deployments of application-level deceptions (i.e., booby traps) to implant cyber deceptions into running legacy applications...
2019/0068639 DETERMINATION OF PLAUSIBILITY OF INTELLIGENT TRANSPORT SYSTEM MESSAGES
Disclosed herein is a method and system for determining plausibility of intelligent transport system (ITS) messages via a wireless communications channel at...
2019/0068638 DISCOVERING WEBSITE PHISHING ATTACKS
A method, computer system, and a computer program product for identifying a phishing attack is provided. The present invention may include receiving an alert...
2019/0068637 RELIABLE TIMESTAMP CREDENTIAL
A process for authenticating a communication device may include receiving a request from a communication device to synchronize time with a server, and...
2019/0068636 UTILIZING TRUST TOKENS TO CONDUCT SECURE MESSAGE EXCHANGES
Embodiments of the invention are directed to the utilization of trust tokens to perform secure message transactions between two devices. A trust token...
2019/0068635 DATA PROCESSING METHOD, APPARATUS, AND SYSTEM
The present application provides data processing methods and apparatuses. A data processing apparatus can include: a communication interface; a memory storing...
2019/0068634 ANALYZING DNS REQUESTS FOR ANOMALY DETECTION
A computer-implemented method for detecting anomalies in DNS requests comprises receiving a plurality of DNS requests generated within a predetermined period....
2019/0068633 PASSCODE BASED ACCESS-CONTROL WITH RANDOMIZED LIMITS
Systems and methods for enhancing the security of an account by reducing the ability of an attacker to determine that an account includes multiple passcodes...
2019/0068632 Malicious social media account identification
A computer-implemented method including scanning, by one or more processors, data that is maintained on one or more social networks, identifying, one or more...
2019/0068631 Time-Tagged Pre-Defined Scenarios for Penetration Testing
Methods and systems for carrying out campaigns of penetration testing for discovering and reporting security vulnerabilities of a networked system. Penetration...
2019/0068630 Cognitive Security for Workflows
A mechanism is provided in a data processing system comprising at least one processor and at least one memory, the at least one memory comprising instructions...
2019/0068629 User Configurable Alert Notifications Applicable to Search Query Results
The disclosed embodiments relate to a system that generates an alert based on information extracted from search results generated by a query. During operation,...
2019/0068628 EMOJI FREQUENCY DETECTION AND DEEP LINK FREQUENCY
Systems and methods are disclosed for generating term frequencies of known terms based on crowdsourced differentially private sketches of the known terms. An...
2019/0068627 CLOUD BASED SECURITY MONITORING USING UNSUPERVISED PATTERN RECOGNITION AND DEEP LEARNING
Provided are systems and methods for a cloud security system that learns patterns of user behavior and uses the patterns to detect anomalous behavior in a...
2019/0068626 DISTRIBUTED DENIAL-OF-SERVICE ATTACK DETECTION AND MITIGATION BASED ON AUTONOMOUS SYSTEM NUMBER
An exemplary apparatus for mitigating a distributed denial-of-service (DDoS) attack includes a controller configured: to receive an output signal from a...
2019/0068625 METHOD AND SYSTEM FOR USER PLANE TRAFFIC CHARACTERISTICS AND NETWORK SECURITY
A method at a network element for monitoring user plane traffic for a user equipment, the method including configuring a set of characteristics and a range of...
2019/0068624 DISTRIBUTED DENIAL-OF-SERVICE ATTACK DETECTION AND MITIGATION BASED ON AUTONOMOUS SYSTEM NUMBER
An apparatus for detecting a distributed denial-of-service (DDoS) attack in a networked computing system includes at least one detector in operative...
2019/0068623 LOW-COMPLEXITY DETECTION OF POTENTIAL NETWORK ANOMALIES USING INTERMEDIATE-STAGE PROCESSING
In an embodiment, a computer implemented method receives flow data for a network flows. The method extracts a tuple from the flow data and calculates long-term...
2019/0068622 SECURITY SYSTEM FOR MANAGED COMPUTER SYSTEM
A security system for a customer computer site includes a cloud-based manager (CBM) and on-site components. The on-site components include a manager appliance,...
2019/0068621 USER ACCESS RATE LIMITING AMONG CONTENT DELIVERY NODES
Systems, methods, and software for operating one or more content delivery nodes (CDN), which cache content for delivery to end users, are provided herein. In...
2019/0068620 DETECTING MALWARE ATTACKS USING EXTRACTED BEHAVIORAL FEATURES
Detecting malware attacks is described herein. A computer-implemented method may include receiving, via a processor, events from a plurality of activity...
2019/0068619 SYSTEMS AND METHODS FOR DYNAMIC ANALYSIS AND RESOLUTION OF NETWORK ANOMALIES
Systems and methods to manage operation of at least one network is provided. The system includes a processor, an input/output device coupled to the processor,...
2019/0068618 USING VIRTUAL SENSORS TO ACCOMMODATE INDUSTRIAL ASSET CONTROL SYSTEMS DURING CYBER ATTACKS
In some embodiments, an industrial asset may be associated with a plurality of monitoring nodes, each monitoring node generating a series of monitoring node...
2019/0068617 SERVICE PROVIDER ADVANCED THREAT PROTECTION
Methods and systems are disclosed for service provider based advanced threat protection. A service provider network may include one or more network devices....
2019/0068616 SECURITY SYSTEM FOR DETECTION AND MITIGATION OF MALICIOUS COMMUNICATIONS
Embodiments of the present invention relate to, in general, detecting and mitigating malicious communications. Typically, a system of the present invention is...
2019/0068615 SECURE DECENTRALIZED FILE SHARING SYSTEMS AND METHODS
In an embodiment, a request for hosting a blockchain may be obtained from a client device. A node device to host the blockchain may be determined. Information...
2019/0068614 Federated Messaging
The present disclosure describes a method, system, and non-transitory computer readable medium that includes instructions that permit users of different secure...
2019/0068613 UNIFIED ONLINE CONTENT MANAGER APPARATUSES, METHODS AND SYSTEMS
The UNIFIED ONLINE CONTENT MANAGER APPARATUSES, METHODS, AND SYSTEMS ("Online Content Manager") transforms identification information and selection data inputs...
2019/0068612 SETTING APPLICATION PERMISSIONS IN A CLOUD COMPUTING ENVIRONMENT
Application permissions can be set in a cloud computing environment based on a user's authorization level in the cloud computing environment. For example, a...
2019/0068611 MANAGEMENT OF COLLABORATIVE CONTENT ITEM MODIFICATION
The content management system can receive log-on requests from a plurality of users and a request from the plurality of users to access content stored in a...
2019/0068610 PROTECTING AGAINST SPAM AND OVER-REPRESENTATION IN SUBMISSION OF CONFIDENTIAL DATA
In an embodiment, a submission history table is maintained by tracking an identification of each user making a submission of a confidential data value and a...
2019/0068609 MULTIPLE DATA STORE AUTHENTICATION
Systems and methods for authenticating access to multiple data stores substantially in real-time are disclosed. The system may include a server coupled to a...
2019/0068608 IDENTITY AUTHENTICATION AND INFORMATION EXCHANGE SYSTEM AND METHOD
An apparatus for use in an identity management system includes a storage device; a network interface; and a processor, the storage device storing software...
2019/0068607 DATA ACCESS METHOD, USER EQUIPMENT AND SERVER
A data access method, a UE and a server are provided. The data access method includes: acquiring, by the UE, authentication data from an NFC circuit;...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.