Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2019/0104164 METHOD, COMPUTER-READABLE STORAGE DEVICE AND APPARATUS FOR ESTABLISHING PERSISTENT MESSAGING SESSIONS
Creating a persistent messaging session includes providing a web application that enables browser-to-browser multimedia communications, creating the persistent...
2019/0104163 MULTIWAY AUDIO-VIDEO CONFERENCING
A device implementing a system for audio-video conferencing using multiple stream identifiers includes a processor configured to receive, from a sending...
2019/0104162 ENTERPRISE CLIENT-SERVER SYSTEM AND METHODS OF PROVIDING WEB APPLICATION SUPPORT THROUGH DISTRIBUTED EMULATION...
A request to establish a bi-directional full-duplex network connection is received. The request conforms to a half-duplex network connection protocol and the...
2019/0104161 SYSTEMS AND METHODS FOR DIRECTLY ACCESSING VIDEO DATA STREAMS AND DATA BETWEEN DEVICES IN A VIDEO SURVEILLANCE...
Systems and methods for directly accessing video data streams and data between devices in a video surveillance system can include a first camera of a mobile...
2019/0104160 METHOD AND APPARATUS FOR CENTRALIZED POLICY PROGRAMMING AND DISTRIBUTIVE POLICY ENFORCEMENT
A method and apparatus for centralized policy programming and distributive policy enforcement is described. A method comprises centrally maintaining a...
2019/0104159 REAL-TIME POLICY DISTRIBUTION
In one example, there is disclosed a domain master for a data exchange layer (DXL), including: a hardware platform configured to execute instructions; and one...
2019/0104158 NETWORKING FLOW LOGS FOR MULTI-TENANT ENVIRONMENTS
Computing resource service providers may provide computing resources to customers in a multi-tenant environment. These computing resources may be behind a...
2019/0104157 CHATBOT INTERFACE FOR NETWORK SECURITY SOFTWARE APPLICATION
A chatbot interface is provided for a network security software application. The chatbot interface can receive and act upon text utterances from a user or from...
2019/0104156 SYSTEMS AND METHODS FOR AUTOMATED GOVERNANCE, RISK, AND COMPLIANCE
Systems and methods for configuration vulnerability checking and remediation are provided. The systems provided herein map vulnerability data with compliance...
2019/0104155 Automated Mitigation of Electronic Message Based Security Threats
An example embodiment may include a security enforcement point device disposed within a managed network and a security decision point device disposed within a...
2019/0104154 PHISHING ATTACK DETECTION
A computerized method for analyzing a subject URL to determine whether the subject URL is associated with a phishing attack is disclosed. The method includes...
2019/0104153 DETECTING ATTACKS USING COMPROMISED CREDENTIALS VIA INTERNAL NETWORK MONITORING
The threat of malicious parties exposing users' credentials from one system and applying the exposed credentials to a different system to gain unauthorized...
2019/0104152 BLIND INJECTION ATTACK MITIGATION
Blind injection attacks can compromise computer systems and their data. These attacks can appear in SQL, XML, LDAP, OS commands, or other contexts. Blind...
2019/0104151 CLOUD-BASED FORENSIC IP TRACEBACK
A method for IP traceback is provided comprising receiving a traceback request including the identity of a traceback-deployed autonomous system closest to the...
2019/0104150 DENIAL OF SERVICE MITIGATION WITH TWO-TIER HASH
A computing apparatus for providing a node within a distributed network function, including: a hardware platform; a network interface to communicatively couple...
2019/0104149 HARDWARE MODULE-BASED AUTHENTICATION IN INTRA-VEHICLE NETWORKS
A secure hardware-based module or Security Electronic Control Unit (SECU) for a Controller Area Network (CAN) prevents an attacker from sending malicious...
2019/0104148 Retrieving Network Packets Corresponding to Detected Abnormal Application Activity
A method for preventing abnormal application activity is provided. Packets are retrieved from a packet buffer using packet location information corresponding...
2019/0104147 INTRUSION INVESTIGATION
A process to investigate intrusions with an investigation system is disclosed. The process receives forensic facts from a set of forensic events on a system or...
2019/0104146 Retrieving Network Packets Corresponding to Detected Abnormal Application Activity
A system and computer program product for preventing abnormal application activity is provided. Packets are retrieved from a packet buffer using packet...
2019/0104145 SYSTEMS AND METHODS FOR NETWORK TRAFFIC ANALYSIS
Systems and methods are disclosed for identifying malicious traffic associated with a website. One method includes receiving website traffic metadata...
2019/0104144 ENHANCED FLOW-BASED COMPUTER NETWORK THREAT DETECTION
In one example embodiment, a threat detection server receives metadata of a network flow in a network; a zone definition that correlates the metadata of the...
2019/0104143 METHOD FOR SENSING FRAUDULENT FRAMES TRANSMITTED TO IN-VEHICLE NETWORK
A fraud sensing method for use in an in-vehicle network system including a plurality of electronic control units that communicate with each other via a network...
2019/0104142 SECURING SERVICES IN A NETWORKED COMPUTING ENVIRONMENT
A computer-implemented method includes: detecting, by a user device, an event that indicates a potential security compromise of the user device; determining,...
2019/0104141 System and Method for Providing and Facilitating an Information Security Marketplace
Malware detection is provided via a marketplace for the analyzing and remediating of cyber-related threats and disseminating related resolution templates. An...
2019/0104140 SYSTEM AND METHOD OF CLOUD DETECTION, INVESTIGATION AND ELIMINATION OF TARGETED ATTACKS
Disclosed are systems and methods for cloud detection, investigation and elimination of targeted attacks. In one exemplary aspect, the system comprises a...
2019/0104139 GENERATION OF MALWARE TRAFFIC SIGNATURES USING NATURAL LANGUAGE PROCESSING BY A NEURAL NETWORK
The technology disclosed herein enables the generation of malware traffic signatures by performing natural language processing on known malware traffic using a...
2019/0104138 AUTONOMOUS EDGE DEVICE FOR MONITORING AND THREAT DETECTION
Techniques are described for monitoring an operational technology environment (OTE) to detect threats, and performing actions to respond to detected threats....
2019/0104137 PLAYBOOK-BASED SECURITY INVESTIGATIONS USING A CARD SYSTEM FRAMEWORK
Examples disclosed herein relate to playbook-based security investigations using a card system framework. Some of the examples enable receiving an indication...
2019/0104136 APPARATUS, SYSTEM AND METHOD FOR IDENTIFYING AND MITIGATING MALICIOUS NETWORK THREATS
Implementations of the present disclosure involve a system and/or method for identifying and mitigating malicious network threats. Network data associated is...
2019/0104135 CROSS-SITE REQUEST FORGERY PROTECTION
Digital data processing systems of the type in which a server digital data device ("server") is coupled to a client digital data device ("client") over a...
2019/0104134 INCORPORATING NETWORK POLICIES IN KEY GENERATION
The present disclosure provides techniques that may be applied, for example, for providing network policy information in a secure manner. In some cases, a UE...
2019/0104133 MOVEMENT-BASED EVENT DETECTION IN A MOBILE DEVICE
Systems and methods are provided for enhancing security by providing additional authentication factors. Prior to authentication, a user may enroll a device...
2019/0104132 FORWARD PATH CONGESTION MITIGATION FOR SATELLITE COMMUNICATIONS
In one embodiment, a ground station server of a satellite communication system mitigates congestion on a particular forward communication path via an...
2019/0104131 SYSTEM AND METHOD FOR CONTROLLING COMMUNICATION BASED ON ONE OR MORE OF COMMUNICATION CHANNELS, POLARIZATION,...
A system in accordance with one aspect mitigates interference with PtPRs (Point to Point Receivers) that may be caused by a Wi-Fi base station or terminal...
2019/0104130 APPARATUS AND METHOD FOR CONTROLLING NETWORK ACCESS
An apparatus and method for controlling network access are provided. The apparatus for controlling network access includes an authentication information...
2019/0104129 DATA DRIVEN ROLE PERMISSIONS
An embodiment provides data driven role permissions. Computer executable instructions are received. The computer executable instructions define a role behavior...
2019/0104128 MULTI-SOURCE BROADCASTING ARCHITECTURE
Embodiments of the systems and methods disclosed herein provide a private broadcast platform architecture including a web server communication module, an...
2019/0104127 Enhanced Smart Process Control Switch Port Lockdown
A smart process control switch can implement a lockdown routine to lockdown its communication ports exclusively for use by devices having known physical...
2019/0104126 Authentication System and Method
An authentication system for authenticating the identity of a requester of access by an unauthorized service client to a secured resource. The system has a...
2019/0104125 CONTROLLING USER CREATION OF DATA RESOURCES ON A DATA PROCESSING PLATFORM
Methods and systems are disclosed for controlling user creation of data resources on a software platform for storing and executing data resources for multiple...
2019/0104124 SYSTEMS AND METHODS FOR PRIVACY-PROTECTING HYBRID CLOUD AND PREMISE STREAM PROCESSING
Systems and methods for privacy-protecting hybrid cloud and premise stream processing are disclosed. In one embodiment, in an information processing device...
2019/0104123 AUTHENTICATING FOR A SOFTWARE SERVICE
Systems, methods, and software can be used to provide authentication for a software service. In some aspects, an identity provider (IDP) receives an identity...
2019/0104122 IMEI STORAGE
A chip set for a terminal comprises at least one secure processor, in which a one-time programmable memory is integrated. At least one terminal serial number...
2019/0104121 METHODS FOR SECURE AUTHENTICATION
Embodiments include method for authentication including interacting with a user by a server in real time to collect verification data for authentication by...
2019/0104120 SYSTEM AND METHOD FOR OPTIMIZING MATCHED VOICE BIOMETRIC PASSPHRASES
Systems and methods for optimizing matched voice biometric passphrases may generate a set of k candidate passphrases; calculate a phonetic content of each...
2019/0104119 SINGLE NODE NETWORK CONNECTIVITY FOR STRUCTURE AUTOMATION FUNCTIONALITY
Facilitating single node network connectivity for structure automation functionality is provided herein. A system can comprise a memory that stores executable...
2019/0104118 SPACE-TIME SEPARATED AND JOINTLY EVOLVING RELATIONSHIP-BASED NETWORK ACCESS AND DATA PROTECTION SYSTEM
A network security system that employs space-time separated and jointly-evolving relationships to provide fast network access control, efficient real-time...
2019/0104117 METHODS AND APPARATUS FOR ELECTRONIC FILE USE AND MANAGEMENT
Methods and apparatus are disclosed for facilitating online storage of files (e.g., audio tracks, video, etc.) for playback/access or sale/exchange by the...
2019/0104116 SECURE SERVICE MATCHING
There is disclosed in one example a computing apparatus to broker purchase of an item or service between a consumer and seller, including: a hardware platform...
2019/0104115 RESTRICTING GUEST INSTANCES IN A SHARED ENVIRONMENT
A method includes a trusted component of a host computing system, obtaining, from a client, via a hypervisor of the host, a request to run an instance of a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.