Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2019/0089746 SYSTEM AND METHOD FOR REMOTE WIPE
A remote wipe message or notification may be sent from a server computer to one or more target client devices associated with a user. A managed container...
2019/0089745 Dynamic Application Versioning System
A computer system authenticates a user of a mobile application. In response to authenticating the user, the computer identifies a user profile for the user....
2019/0089744 Security Unit and Method for an Industrial Control System
A security unit for an industrial control system comprises an interface adapted to communicate with a plurality of components of an industrial control system...
2019/0089743 POLICIES BASED ON CLASSIFICATION OF GROUPS, TEAMS, AND SITES
Information technology use policies based on classification of groups, teams, and sites is provided. Example systems may enable information technology...
2019/0089742 CREATING, VISUALIZING, AND SIMULATING A THREAT BASED WHITELISTING SECURITY POLICY AND SECURITY ZONES FOR NETWORKS
Techniques described herein are directed toward creating, visualizing, and simulating a threat based whitelisting security policy and security zones for...
2019/0089741 NETWORK ASSET CHARACTERIZATION, CLASSIFICATION, GROUPING AND CONTROL
Techniques applicable to a network orchestration and security platform for a network, such as an industrial control system (ICS) network, are disclosed. Such...
2019/0089740 AUTOMATED AUDITING OF NETWORK SECURITY POLICIES
Systems and methods for automated testing of network security controls are provided. According to one embodiment, information regarding multiple desired...
2019/0089739 CLONED DEVICE DETECTION
Detection of cloned devices, such as but not necessarily limited to facilitating detection of cloned cable modems or other endpoints in a network used to gain...
2019/0089738 ESTABLISHING A PROPRIETARY LINK LAYER CONNECTION WITH A PROPRIETARY DEVICE
The apparatus may establish a non-proprietary link layer connection with a second device. The apparatus may determine if a first set of empty non-proprietary...
2019/0089737 DETECTING ATTACKERS WHO TARGET CONTAINERIZED CLUSTERS
A method for operation of a deception management server, for detecting and hindering attackers who target containerized clusters of a network, including...
2019/0089736 PASSIVE DETECTION OF FORGED WEB BROWSERS
Techniques to facilitate passive detection of forged web browsers are disclosed herein. In at least one implementation, web traffic between a web server and a...
2019/0089735 Automatic Anti-Spoof for Multicast Routing
A method, system and computer-usable medium are disclosed for performing an automated anti-spoofing configuration operation, comprising: determining whether a...
2019/0089734 IDENTIFYING A POTENTIAL DDOS ATTACK USING STATISTICAL ANALYSIS
Embodiments can identify requests that may be tied to a DDOS attack. For example, the primary identifiers (e.g., a source address) of requests for a network...
2019/0089733 FRONT-END PROTOCOL FOR SERVER PROTECTION
A method and technique for protecting against denial of service attacks includes maintaining a window over a sequence number space that includes sequence...
2019/0089732 DYNAMIC ADAPTIVE DEFENSE FOR CYBER-SECURITY THREATS
Disclosed is a cyber-security system that is configured to aggregate and unify data from multiple components and platforms on a network. The system allows...
2019/0089731 ABUSER DETECTION
An abuser detection method, apparatus, system, and/or non-transitory computer readable medium may decrease and/or prevent an occurrence of abuse by detecting...
2019/0089730 STRUCTURING DATA AND PRE-COMPILED EXCEPTION LIST ENGINES AND INTERNET PROTOCOL THREAT PREVENTION
Blocking high-risk IP connections in real-time while allowing tailoring of an acceptable risk profile to match the security requirements of network resources....
2019/0089729 APPLICATION SECURITY MANAGEMENT SYSTEM AND EDGE SERVER
An application security management system and an edge server which enable an application developed by an application developer to be executed only in a state...
2019/0089728 STORAGE ENVIRONMENT ACTIVITY MONITORING
A computer-implemented method according to one embodiment includes identifying a storage environment, establishing a baseline associated with input and output...
2019/0089727 CONNECTED SECURITY SYSTEM
Systems, methods, and apparatus, including computer programs encoded on computer storage media, for obtaining, processing, and presenting data related to...
2019/0089726 SYSTEMS AND METHODS FOR SECURING ACCESS TO RESOURCES
In some embodiments, a resource security system may determine an access request outcome (e.g., accept, reject, or review) for an access request based on access...
2019/0089725 Deep Architecture for Learning Threat Characterization
The disclosed systems and techniques apply innovative cross-disciplinary machine intelligence to security in computer networks to provide automated threat...
2019/0089724 POWER CIRCUITRY FOR SECURITY CIRCUITRY
In some examples, a modular server includes an auxiliary power source an auxiliary power system. The auxiliary power system includes a battery terminal to...
2019/0089723 SYSTEM FOR AUTOMATED SIGNATURE GENERATION AND REFINEMENT
Systems and methods are provided for generating samples of network traffic and characterizing the samples to easily identify exploits. A first embodiment of...
2019/0089722 INTRUSION DETECTION VIA SEMANTIC FUZZING AND MESSAGE PROVENANCE
Intrusion detection systems and methods monitor legal control messages in an operational control system to detect subtly malicious sequences of control...
2019/0089721 DETECTION OF ALGORITHMICALLY GENERATED DOMAINS BASED ON A DICTIONARY
Techniques for detection of algorithmically generated domains based on a dictionary are disclosed. In some embodiments, a system, process, and/or computer...
2019/0089720 SYSTEMS AND METHODS FOR DETECTING ATTACKS IN BIG DATA SYSTEMS
Various examples of methods and systems are provided for an attack detection system that can detect attacks in big data systems. The attack detection system...
2019/0089719 SYSTEM AND METHOD FOR STRATEGIC ANTI-MALWARE MONITORING
The system and method described herein may leverage active network scanning and passive network monitoring to provide strategic anti-malware monitoring in a...
2019/0089718 SYSTEM AND METHOD FOR STRATEGIC ANTI-MALWARE MONITORING
The system and method described herein may leverage active network scanning and passive network monitoring to provide strategic anti-malware monitoring in a...
2019/0089717 SYSTEM AND METHOD FOR SECURING A COMMUNICATION CHANNEL
A system and method for validating an entity may include obtaining by at least a first system, a set of entity details related to the entity; associating with...
2019/0089716 PEER-TO-PEER NETWORK AND NODE OF A PEER-TO-PEER NETWORK
The invention relates to a peer-to-peer network having at least one first node with a first clock module and part of a peer-to-peer application. Also included...
2019/0089715 CONFIGURATION MANAGEMENT FOR VIRTUAL MACHINE ENVIRONMENT
A computer-implemented method for controlling a connection between a virtual machine and a physical device comprises receiving a connection request for...
2019/0089714 VERSATILE AUTOSCALING FOR CONTAINERS
A scaling policy associated with a notification received by one or more computer systems is obtained. A first request is submitted, to a software container...
2019/0089713 SYSTEM AND METHOD FOR PRODUCING A DYNAMICALLY ORDERED QUEUE
A method includes instantiating, by one or more processors, a queue comprising a finite number of queuing slots configured to provide prioritized access to a...
2019/0089712 CREDENTIAL DRIVING AN AUTOMATIC LOCK UPDATE
An access control system including a data storage device configured to store a master credential database having a plurality of master identifiers and master...
2019/0089711 ANONYMIZED PERSONA IDENTIFIER
Systems and methods are disclosed herein for tracking related and known attributes and/or online activities connected with a digital identity of an entity. In...
2019/0089710 EXTENSIBLE FRAMEWORK FOR AUTHENTICATION
Methods, systems, and apparatuses in a computing device enable user access to a resource. The method includes receiving, from a user, a request for access to a...
2019/0089709 PROTECTING SUPERVISOR MODE INFORMATION
Embodiments of an invention for protecting supervisor mode information are disclosed. In one embodiment, an apparatus includes a storage location, instruction...
2019/0089708 TECHNIQUES FOR IMPLEMENTING A DATA STORAGE DEVICE AS A SECURITY DEVICE FOR MANAGING ACCESS TO RESOURCES
Techniques are disclosed for implementation of a data storage device as a security device for managing access to resources. These techniques can be implemented...
2019/0089707 INTER-APPLICATION MANAGEMENT OF USER CREDENTIAL DATA
A system and apparatus for enhancing the functionality and utility of an authentication process for web applications is disclosed.
2019/0089706 PREVENTING CONNECTIONS TO A LOCKED DEVICE
Apparatuses, methods, systems, and program products are disclosed for preventing connections to a locked device. A method includes detecting, by a processor,...
2019/0089705 POLICY ACTIVATION FOR CLIENT APPLICATIONS
A policy management service receives a request from an application to access another service. The request identifies a desired access control policy and/or...
2019/0089704 Disabling MAC Address Aging Time for an Internet of Things (IoT) Device on a Network Switch
Examples described relate to disabling of MAC address aging time for an IoT device on a network switch. In an example, in response to a device joining a...
2019/0089703 Method and System for Service Verification Using Access Control System
A service management system facilitates and validates service on building management systems installed in a building with an access control system. A service...
2019/0089702 SYSTEMS AND METHODS FOR MANAGING DIGITAL IDENTITIES ASSOCIATED WITH MOBILE DEVICES
Systems and methods are provided for use in enabling, providing, and managing digital identities in association with mobile communication devices. One...
2019/0089701 DIGITAL CREDENTIALS BASED ON PERSONALITY AND HEALTH-BASED EVALUATION
Techniques relate to managing digital credentials. An operation evaluation system monitors, using sensors configured to detect physical attributes of a user in...
2019/0089700 DATA AGGREGATION USING A LIMITED-USE CODE
Apparatuses, methods, systems, and program products are disclosed for data aggregation using a limited-use code. An apparatus includes a message module...
2019/0089699 METHOD AND SYSTEM FOR AUTHENTICATING CUSTOMERS ON CALL
A method and system for authenticating customers on call are disclosed. The method includes providing a notification to a customer on an electronic device...
2019/0089698 END USER INITIATED ACCESS SERVER AUTHENTICITY CHECK
Techniques are disclosed for enabling a user to validate the authenticity of a computing system (e.g., an access management system) such as one which controls...
2019/0089697 CHAT BOT-BASED AUTHENTICATION OF CHAT BOTS
A method for authentication of chat bots includes determining that a first chat bot is authenticated, by a server, for first session communication at a first...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.