Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2019/0098062 DISTRIBUTING COMMUNICATION OF A DATA STREAM AMONG MULTIPLE DEVICES
Methods, apparatus and articles of manufacture for distributing communication of a data stream among multiple devices are disclosed. An example first device...
2019/0098061 PACKET FORWARDING APPARATUS FOR HANDLING MULTICAST PACKET
A packet forwarding apparatus includes: a multicast determination unit that determines whether a packet that flows through a virtual network is a multicast...
2019/0098060 On Demand In-Band Signaling for Conferences
A computer implemented method comprises transmitting initial signaling data for a video conference from a signaling server to a plurality of client computing...
2019/0098059 METHODS, APPARATUS AND/OR SYSTEM FOR USING EMAIL TO SCHEDULE AND/OR LAUNCH GROUP COMMUNICATIONS SESSIONS
Methods and system for scheduling or launching online and phone sessions between two or more people via email and other electronic communication channels...
2019/0098058 CONTROL APPARATUS AND CONTROL METHOD FOR ENFORCING SECURITY POLICIES
A control apparatus for enforcing security policies includes a network interface, a storage device that stores policy information indicating a type of a device...
2019/0098057 SYSTEM IN COMMUNICATION WITH A MANAGED INFRASTRUCTURE
A system is in communication with a managed infrastructure comprising. At least a first engine one engine receives message data from managed infrastructure...
2019/0098056 REST-BASED DECLARATIVE POLICY MANAGEMENT
One embodiment performs policy evaluation in a multi-tenant cloud-based identity and access management ("IAM") system. The embodiment receives a request for an...
2019/0098055 REST-BASED DECLARATIVE POLICY MANAGEMENT
One embodiment provides declarative policy management in a multi-tenant cloud-based identity and access management ("IAM") system. The embodiment receives at...
2019/0098054 Tag-Based Security Policy Creation in a Distributed Computing Environment
Concepts and technologies are disclosed herein for tag-based security policy creation in a distributed computing environment. A security management module can...
2019/0098053 SECONDARY COMMUNICATION CHANNEL FOR SECURITY NOTIFICATIONS
Exemplary methods, apparatuses, and systems include a communication system accessing a request received from an application on a user device to log into a...
2019/0098052 APPARATUS INCLUDING SECURE COMPONENT AND METHOD OF PROVISIONING SECURITY INFORMATION INTO THE APPARATUS
An apparatus into which security information is provisioned through communication with a server may include: a communication interface receiving security data...
2019/0098051 Systems and Methods of Virtual Honeypots
Virtual honeypots methods and systems disclosed herein route all IP space of an ISP to a Darknet server as a default. When an IP address is used, it is...
2019/0098050 NETWORK GATEWAY SPOOFING DETECTION AND MITIGATION
Endpoint security systems and methods include a distance estimation module configured to calculate a travel distance between a source Internet Protocol (IP)...
2019/0098049 NETWORK ENDPOINT SPOOFING DETECTION AND MITIGATION
Endpoint security systems and methods include a distance estimation module configured to calculate a travel distance between a source Internet Protocol (IP)...
2019/0098048 NEURAL NETWORK BASED SPOOFING DETECTION
Methods and systems for mitigating a spoofing-based attack include calculating a travel distance between a source Internet Protocol (IP) address and a target...
2019/0098047 CONTROLLER AREA NETWORK FRAME OVERRIDE
The present disclosure relates to suppressing malicious transmissions by overriding frames on a Controller Area Network (CAN) bus. In an embodiment, a method...
2019/0098046 CONSTRUCTIBLE AUTOMATA FOR INTERNET ROUTES
In an example method, a computer system retrieves a plurality of data items. Each data item indicates a respective network route on the network. The computer...
2019/0098045 BROWSER INJECTION PREVENTION METHOD, BROWSER CLIENT AND APPARATUS
The present invention discloses a browser injection prevention method, relating to the technical field of browsers. The method comprises: copying a source...
2019/0098044 MITIGATING TCP SYN DDOS ATTACKS USING TCP RESET
Provided are methods and systems for recognizing network devices as trusted. A system for recognizing network devices as trusted may include a network module,...
2019/0098043 DDOS DEFENCE IN A PACKET-SWITCHED NETWORK
A method, network system and computer storage medium for DDoS defence in a packet-switched network are provided. The method is performed by a network system...
2019/0098042 CLASSIFIER BYPASS BASED ON MESSAGE SENDER TRUST AND VERIFICATION
In some embodiments, techniques for computer security comprise receiving an email message; determining a sender of the email message; determining whether the...
2019/0098040 DETECTION AND IDENTIFICATION OF TARGETED ATTACKS ON A COMPUTING SYSTEM
Malicious activity data is obtained, that is indicative of attempted attacks on a computing system. Clusters of targets are identified and it is determined...
2019/0098039 DETERMINATION OF CYBERSECURITY RECOMMENDATIONS
A method and apparatus can include a system controller and a system processor. The system controller can retrieve a cybersecurity dataset from at least one...
2019/0098038 REDUCING A POSSIBLE ATTACK ON A WEAK POINT OF A DEVICE VIA A NETWORK ACCESS POINT
A method for reducing a possible attack on a weak point of a device via a network access point to a network is proposed, wherein a configuration of the device...
2019/0098037 CLOUD-BASED THREAT DETECTION
In certain embodiments, a security system is provided to receive activity data associated with a first source. The security system may scan the activity data...
2019/0098036 CYBER SECURITY ENHANCED MONITORING
Systems for and methods of detecting cyber-attacks by selecting a group of users and monitoring those user's computer systems for behavior that indicates a...
2019/0098035 SYSTEMS, METHODS AND COMPUTER PROGRAM PRODUCTS FOR ANOMALY DETECTION
The invention provides systems and methods for detection of anomaly events or error events within a process environment by implementing a hybrid of centralized...
2019/0098034 ANOMALY DETECTION METHOD AND RECORDING MEDIUM
An anomaly detection method includes generating second data by adding normal noise to first data; generating third data by adding abnormal noise to the first...
2019/0098033 Data Surveillance System with Patterns of Centroid Drift
Data surveillance techniques are presented for the detection of security issues, especially of the kind where privileged data may be stolen by steganographic,...
2019/0098032 SYSTEMS AND METHODS FOR DETECTING NETWORK SECURITY THREAT EVENT PATTERNS
Techniques and mechanisms are disclosed for a data intake and query system to generate "meta-notable" events by applying a meta-notable event rule to a...
2019/0098031 SYSTEM CONVERSION IN A NETWORKED COMPUTING ENVIRONMENT
Approaches for providing security in a networked computing environment are provided. The method includes detecting, by at least one computer device, a breach...
2019/0098030 SOFTWARE TAMPERING DETECTION AND REPORTING PROCESS
A method is disclosed. The method includes determining, by a security software application on a communication device, that the communication device has been...
2019/0098029 Distributed Denial-of-Service Attack Detection Based on Shared Network Flow Information
A system, method and computer program product for detecting distributed denial-of-service (DDoS) attacks is provided. Current aggregated flow information for a...
2019/0098028 IOT DEVICE MANAGEMENT VISUALIZATION
Techniques for visualizing IoT device management. A system utilizing such techniques can include an IoT device risk assessment system and an IoT device...
2019/0098027 JOINT DEFENCE METHOD AND APPARATUS FOR NETWORK SECURITY, AND SERVER AND STORAGE MEDIUM
A method for network security joint defense includes: obtaining security log information of security devices, wherein the security log information includes...
2019/0098026 CONFIGURABLE CYBER-ATTACK TRACKERS
A computing system includes a processor and memory coupled to the processor and storing instructions that, when executed by the processor provide a user...
2019/0098025 AUTONOMIC INCIDENT TRIAGE PRIORITIZATION BY PERFORMANCE MODIFIER AND TEMPORAL DECAY PARAMETERS
This invention relates to a system and method for prioritizing an incident triage process in an autonomic manner. In particular, the system employs performance...
2019/0098024 INTRUSION DETECTION
A process to detect intrusions with an intrusion detection system is disclosed. The intrusion detection system identifies instance types, and each instance...
2019/0098023 BLOCKING MALICIOUS INTERNET CONTENT AT AN APPROPRIATE HIERARCHICAL LEVEL
Blocking malicious Internet content at an appropriate hierarchical level. In one embodiment, a method may include identifying evidence of security risks in...
2019/0098022 SECURITY SURVEILLANCE SYSTEM AND SECURITY SURVEILLANCE METHOD
A security surveillance system for a mobile device with a wireless interface and a control unit that is connected to the wireless interface comprises a...
2019/0098021 ENHANCED SYSTEMS FOR IDENTIFYING AND MONITORING EXPECTED COMMUNICATION PATTERNS OF COMPUTING DEVICES
A system for enforcing expected communication patterns is provided. In some configurations, a routing device can determine one or more dedicated functions that...
2019/0098020 SYSTEMS AND METHODS FOR COMMAND AND CONTROL PROTECTION
A host computer system may be configured to connect to a network. The host computer system may be configured to implement a workspace and an isolated computing...
2019/0098019 THREAT ISOLATION USING A PLURALITY OF CONTAINERS
Methods and systems are disclosed for implementing one or more isolated computing environment via one or more memory spaces. The isolated computing environment...
2019/0098018 NON-TRANSACTION ENABLING DATA SECURITY
The present disclosure includes an electronic device for processing a wireless transaction. The electronic device includes a wireless communication interface,...
2019/0098017 DATA COMMUNICATION METHOD AND APPARATUS FOR VEHICLE NETWORK
A data communication method of a vehicle network may include: receiving, by a reception controller, a message from a transmission controller; determining, by...
2019/0098016 METHOD OF PERFORMING INTEGRITY VERIFICATION BETWEEN CLIENT AND SERVER AND ENCRYPTION SECURITY PROTOCOL-BASED...
An encryption security protocol-based communication method of supporting integrity verification between a client and a server includes receiving, by the...
2019/0098015 Integrity of Data Records
Methods and apparatuses of securing integrity of data collected in a data storage arrangement for an object are disclosed. Data storage apparatus is provided...
2019/0098014 SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR MANAGING ACCESS TO SYSTEMS, PRODUCTS, AND DATA BASED ON...
In accordance with embodiments, there are provided mechanisms and methods for managing access to data based on information associated with a physical location...
2019/0098013 System and Methods for Location Verification with Blockchain Controls
Described in detail herein is a location verification system that includes a central computing system can generate a cryptographically verifiable ledger. The...
2019/0098012 USER MANAGEMENT METHOD AND APPARATUS OF HYBRID CLOUD
Embodiments of the present application disclose a user management method and apparatus of a hybrid cloud. The user management method of a hybrid cloud is...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.