Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2019/0222605 SYSTEMS AND METHODS FOR ATTACK SIMULATION ON A PRODUCTION NETWORK
The disclosure is directed towards systems and methods for improving security in a computer network. The system can include a planner and a plurality of...
2019/0222604 METHOD AND APPARATUS FOR MEASURING AND PREDICTING THREAT RESPONSIVENESS
Methods, apparatus, and software are provided for utilizing result data generated by various security evaluation and testing methods in measuring and...
2019/0222603 METHOD AND APPARATUS FOR NETWORK FORENSICS COMPRESSION AND STORAGE
The present invention provides a method for detecting a website attack, comprising: selecting multiple uniform resource locators (URLs) from history access...
2019/0222602 DETERMINING DIGITAL VULNERABILITY BASED ON AN ONLINE PRESENCE
Methods, systems and computer program products are provided to determine an individual's risk of being targeted by a cyberattack based on quantifying their...
2019/0222601 NETWORK ANOMALY DETECTION AND PROFILING
A security system detects and attributes anomalous activity in a network. The system logs user network activity, which can include ports used, IP addresses,...
2019/0222600 Detection of SSL / TLS malware beacons
A method for detecting malware beaconing in a network is provided. The method includes maintaining a database identifying a plurality of server certificates...
2019/0222599 COMMUNICATION SYSTEM, COMMUNICATION DEVICE, RELAY DEVICE, COMMUNICATION INTEGRATED CIRCUIT (IC), CONTROL IC,...
Provided are a communication system and method that can block transmission of an abnormal message while allowing transmission and reception of an authorized...
2019/0222598 DIGITAL AUDITING SYSTEM AND METHOD FOR DETECTING UNAUTHORIZED ACTIVITIES ON WEBSITES
An auditing system (10) is provided for detecting at least one unauthorized operational activity in at least one website, and includes a processor coupled to...
2019/0222597 SYSTEM AND METHOD FOR COMPREHENSIVE DATA LOSS PREVENTION AND COMPLIANCE MANAGEMENT
A system and method to identify and prevent cybersecurity attacks on modern, highly-interconnected networks, to identify attacks before data loss occurs, using...
2019/0222596 RELIABLE CYBER-THREAT DETECTION IN RAPIDLY CHANGING ENVIRONMENTS
In some embodiments, a plurality of monitoring nodes each generate a series of current monitoring node values over time that represent a current operation of...
2019/0222595 DECISION SYSTEM AND METHOD FOR SEPARATING FAULTS FROM ATTACKS
According to some embodiments, a plurality of monitoring nodes may each generate a series of current monitoring node values over time that represent a current...
2019/0222594 Network flow control of Internet Of Things (IoT) devices
A method, apparatus and computer program product for use in monitoring and controlling network behavior of Internet of Things (IoT) devices connected to a...
2019/0222593 ANTICIPATORY CYBER DEFENSE
According to various embodiments, techniques for anticipatory cyber defense are disclosed. The techniques includes receiving cyber incident reports, extracting...
2019/0222592 DETECTION DEVICE, DETECTION METHOD, DETECTION SYSTEM, AND DETECTION PROGRAM
A device and method to accurately detect list-based attacks without reducing the convenience for authorized users. An acquirer acquires information on accounts...
2019/0222591 METHOD AND SERVER FOR DETERMINING MALICIOUS FILES IN NETWORK TRAFFIC
There is disclosed a method for determining malicious files in a network traffic, the method executable by a server. The method comprises: receiving the...
2019/0222590 CYBER SECURITY FRAMEWORK FOR INTERNET-CONNECTED EMBEDDED DEVICES
Methods, systems and computer program products for intrusion detection are provided. Aspects include receiving, by a processor, internet of things (IoT) device...
2019/0222589 METHOD COMPUTING DEVICE FOR DETECTING MALICIOUS DOMAIN NAMES IN NETWORK TRAFFIC
There are disclosed a method and computing device for detecting malicious domain names in network traffic. The method comprises: receiving the network traffic...
2019/0222588 DETECTION OF MAN-IN-THE-MIDDLE IN HTTPS TRANSACTIONS INDEPENDENT OF CERTIFICATE TRUST CHAIN
Various methods for detecting a man-in-the-middle (MITM) during HTTPS communications are disclosed including, in some aspects, establishing a TCP connection...
2019/0222587 SYSTEM AND METHOD FOR DETECTION OF ATTACKS IN A COMPUTER NETWORK USING DECEPTION ELEMENTS
Systems and methods of detecting attacks in a computer network with a processor and at least one web server may include generating at least one deception...
2019/0222586 METHOD AND SYSTEM OF DECENTRALIZED MALWARE IDENTIFICATION
Non-limiting embodiments of the present technology are directed to a system and a method for ensuring cybersecurity, namely, to a method for distributed...
2019/0222585 ARTIFICIAL INTELLIGENCE SYSTEM AND METHOD FOR THREAT ANTICIPATION
According to various embodiments, a system for, and method of, predicting and remediating malware threats in an electronic computer network, is provided. The...
2019/0222584 Slow Protocol Packet Processing Method and Related Apparatus
A Slow Protocol packet processing method and a related apparatus, where the method includes receiving, by a network device, a first Slow Protocol packet,...
2019/0222583 SIGNED ENVELOPE ENCRYPTION
Clients within a computing environment may establish a secure communication session. Sometimes, a client may trust another client to read, but not modify, a...
2019/0222582 DECENTRALIZED METHOD OF TRACKING USER LOGIN STATUS
Systems and methods can track user login statuses across independent systems to determine whether to automatically grant access to a given domain....
2019/0222581 NETWORKED COMMUNICATIONS CONTROL FOR VEHICLES
A vehicle includes a lower security network (LSN) and higher security network (HSN) having therebetween a read only filter and path in parallel to respectively...
2019/0222580 ENABLING A MULTI-DIMENSIONAL COLLABORATIVE EFFORT SYSTEM
Methods to provide, by a processor, a user interface allowing a first user access to a collaborative effort system. Responsive to the first user utilizing the...
2019/0222579 SECURITY TRACKING OF COMPUTER RESOURCES
An allocation system that tracks allocation of computer resources is provided. The allocation system allocates a number of user-periods to an organization for...
2019/0222578 COMMUNICATION APPARATUS AND NON-TRANSITORY COMPUTER READABLE STORAGE MEDIUM
A communication apparatus that transfers received data stores a whitelist to manage an allowed object that is allowed to perform communications via the...
2019/0222577 AUTOMATICALLY DETECTING A VIOLATION IN A PRIVILEGED ACCESS SESSION
Disclosed embodiments include securing privileged access communication with target systems. Techniques include identifying a request for access to a target...
2019/0222576 USER AUTHENTICATION SYSTEMS AND METHODS
Data processing systems and methods for authenticating users are disclosed. In one embodiment a data processing system for authenticating a user of a device...
2019/0222575 SYSTEMS AND METHODS FOR MANAGING RELATIONSHIPS AMONG DIGITAL IDENTITIES
Methods and apparatus for performing access control for a first entity. The method comprises using a pointer associated with a second entity to access, from a...
2019/0222574 AUTOMATING ESTABLISHMENT OF INITIAL MUTUAL TRUST DURING DEPLOYMENT OF A VIRTUAL APPLIANCE IN A MANAGED VIRTUAL...
System and method for securely deploying a virtual machine in a data center is disclosed. In one embodiment, public keys are established between the requesting...
2019/0222573 SYSTEM AND METHOD FOR BIOMETRIC AUTHENTICATION USING SOCIAL NETWORK
Techniques described herein include systems and methods for biometric authentication utilizing a dynamically updated biometric template derived from social...
2019/0222572 ANONYMOUS ASSOCIATION SYSTEM UTILIZING BIOMETRICS
Various exemplary embodiments relate to an anonymous database system. The system includes a plurality of biometric nodes in communication with one another....
2019/0222571 SYSTEM AND METHOD FOR REMOTE ACCESS TO A PERSONAL COMPUTER AS A SERVICE USING A REMOTE DESKTOP PROTOCOL AND...
Systems and methods for a network environment for client-side remote access of a server device from a client device may utilize a biometric sensor device of...
2019/0222570 METHOD AND SYSTEM FOR PERFORMING USER AUTHENTICATION
Systems and methods involving a user authentication system for granting access to digital systems and content, computing systems and devices and physical...
2019/0222569 METHOD AND SYSTEM FOR SECURELY PROVISIONING A REMOTE DEVICE
A method at a computing device for provisioning a network-connected device within a security platform, the method including receiving a first connection...
2019/0222568 Non-Intrusive Security Enforcement for Federated Single Sign-On (SSO)
The technology disclosed relates to non-intrusively enforcing security during federated single sign-on (SSO) authentication without modifying a trust...
2019/0222567 Identity Proofing and Portability on Blockchain
A system for combining data from various data providers, certain portions of said data necessary to perform identity related services, said portions of said...
2019/0222566 SYSTEM AND METHOD FOR KEY MANAGEMENT AND USER AUTHENTICATION
A system and method are presented for key management and user authentication. Secure SSH access may be performed through a public/private set of SSH keys where...
2019/0222565 METHODS AND SYSTEMS FOR GENERATING A SYMMETRIC KEY FOR MOBILE DEVICE ENCRYPTION
In one embodiment, a method of useful for generating a symmetric key includes the step of obtaining a sensor signal from a sensor of a mobile device. The...
2019/0222564 METHODS FOR PHYSICAL AUTHENTICATION OF MEDICAL DEVICES DURING WIRELESS PAIRING
Systems and methods for physical authentication of medical devices during wireless pairing are disclosed herein. The method can include receiving a request to...
2019/0222563 HARDWARE TRUSTED DATA COMMUNICATIONS OVER SYSTEM-ON-CHIP (SOC) ARCHITECTURES
A data communication system exchanges user data between a first System-On-Chip (SOC) and a second SOC. The SOCs hash and transfer their read-only...
2019/0222562 Systems, Methods, and Media for a Cloud Based Social Media Network
System and methods for providing private social networks, which are cloud-based in some instances, are provided herein. A method includes receiving a selection...
2019/0222561 USER TERMINAL DEVICE, ELECTRONIC DEVICE, SYSTEM COMPRISING THE SAME AND CONTROL METHOD THEREOF
A user terminal device is provided. The user terminal device includes a storage configured to store identification information of an external electronic device...
2019/0222560 SYSTEMS AND METHODS OF SECURE DATA EXCHANGE
A method is disclosed comprising providing a federated search facility adapted to search for content on a plurality of disparate computer content storage...
2019/0222559 PER-APPLICATION VPN IN CONTAINER BASED ENVIRONMENTS
One or more VPN tunnels are established in a site-to-site configuration. A VPN transition subnet is defined and associated with each VPN tunnel. Once the VPN...
2019/0222558 SYMBOLIC EXECUTION FOR WEB APPLICATION FIREWALL PERFORMANCE
Among other things, this document describes systems, devices, and methods for executing rules in an application layer firewall, including in particular a web...
2019/0222557 USE OF DHCP TO AUTOMATICALLY ASSIGN NICKNAMES IN A SPBM NETWORK
Systems, methods, and apparatuses are disclosed herein for automatically assigning nicknames in a SPBM network. In some aspects, a first switch of a plurality...
2019/0222556 CLIENT DEVICE ADDRESS ASSIGNMENT FOLLOWING AUTHENTICATION
Methods and systems are described for assigning the proper internet protocol (IP) address to a client device following authentication of the client device on a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.