Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,024,3995 Image processing apparatus that operates according to security policies, control method therefor, and storage...
An image processing apparatus which is capable of restraining operation that does not comply with security policies even in a case where security policies are...
US-1,024,3994 Quantitatively measuring recertification campaign effectiveness
An identity management system is augmented to provide a methodology to generate an objective measure of administrative effectiveness with respect to account...
US-1,024,3993 Systems and method for providing dynamic computer networks in which behavior models drive cyber mission models
Systems and methods for controlling operations of a computer network. The methods involve: receiving, by a first computing device (1404, 2200), User-Software...
US-1,024,3992 Secure content delivery over a domain portal
In one embodiment, a method includes sending a login request to a server computing device; receiving a first derivative identifier from the server computing...
US-1,024,3991 Methods and systems for generating dashboards for displaying threat insight information
Dashboards for displaying threat insight information are provided herein, as well as systems and methods for generating the same. According to some embodiments,...
US-1,024,3990 Systems and methods for detecting replay attacks on security space
A system and method for detecting replay attacks on secure data are disclosed. A system on a chip (SOC) includes a security processor. Blocks of data...
US-1,024,3989 Systems and methods for inspecting emails for malicious content
An email inspection system receives emails that are addressed to recipients of a private computer network. The emails are inspected for malicious content, and...
US-1,024,3988 Configurable network security
According to an example, configurable network security may include receiving data flows directed to end node modules of a server, and selecting data flows from...
US-1,024,3987 Runtime protection of web services
Protecting a runtime Web service application. A web service application is instrumented to log its operation and allow recreation of its execution trace. Trace...
US-1,024,3986 Runtime protection of web services
Protecting a runtime Web service application. A web service application is instrumented to log its operation and allow recreation of its execution trace. Trace...
US-1,024,3985 System and methods thereof for monitoring and preventing security incidents in a computerized environment
A system detects and handles security incidents in a computerized environment. The system collects metadata respective of one or more user devices...
US-1,024,3984 Path scanning for the detection of anomalous subgraphs and use of DNS requests and host agents for...
A system, apparatus, computer-readable medium, and computer-implemented method are provided for detecting anomalous behavior in a network. Historical parameters...
US-1,024,3983 System and method for using simulators in network security and useful in IoT security
The invention provides a system and method for detecting intrusion is an intranet, determining of attack intent; identifying compromised servers and network...
US-1,024,3982 Log analyzing device, attack detecting device, attack detection method, and program
A device including: a parameter extracting unit that extracts each parameter from an access request, a character-string class converting unit that, with regard...
US-1,024,3981 Bot detection based on divergence and variance
A system automatically detects bots and/or botnets.
US-1,024,3980 Edge-based machine learning for encoding legitimate scanning
In one embodiment, a device in a network receives an indication that a network anomaly detected by an anomaly detector of a first node in the network is...
US-1,024,3979 Protecting network devices from suspicious communications
According to some aspects, disclosed methods and systems may comprise generating a profile that is based on monitoring a communication pattern associated with a...
US-1,024,3978 Detecting attacks using passive network monitoring
Embodiments are directed to detecting one or more attacks in a network. One or more network flows may be monitored using one or more network monitoring...
US-1,024,3977 Automatically detecting a malicious file using name mangling strings
Automatically detecting a malicious file using name mangling strings. In one embodiment, a method may include (a) identifying a file, (b) identifying name...
US-1,024,3976 Information securities resource propagation for attack prevention
A system for verifying resource propagations in real-time typically includes a classical computer apparatus and a quantum optimizer in communication with the...
US-1,024,3974 Detecting deauthentication and disassociation attack in wireless local area networks
The present disclosure relates to a network device that detects a deauthentication and/or disassociation attack in a wireless local area network (WLAN). In...
US-1,024,3973 Cloud optimizer
A system that communicates with one or more host providers to monitor a computing load on the computing resources of the host providers and then compares this...
US-1,024,3972 Correlation-based detection of exploit activity
A security agent implemented on a monitored computing device is described herein. The security agent is configured to receive an event notification indicative...
US-1,024,3971 System and method for retrospective network traffic analysis
A method is provided to monitor network traffic, including reserving a portion of a system memory for short-term storage of copied network traffic, wherein the...
US-1,024,3970 Event views in data intake stage of machine data processing platform
A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security...
US-1,024,3969 Method and system for identifying network loops
Identifying network loops is disclosed including determining a first data packet having a time to live (TTL) that at least meets a first condition, the first...
US-1,024,3968 Signed envelope encryption
Clients within a computing environment may establish a secure communication session. Sometimes, a client may trust another client to read, but not modify, a...
US-1,024,3967 Method, apparatus and system for detecting fraudulant software promotion
A method, system and apparatus for detecting fraudulent promotion of a software application, the method including acquiring comment information associated with...
US-1,024,3966 Configuration management for virtual machine environment
A computer-implemented method for controlling a connection between a virtual machine and a physical device comprises receiving a connection request for...
US-1,024,3964 Zero knowledge reputation service
A reputation service running on a server, for example as a cloud server, includes receiving a request from a first user device and a second user device. The...
US-1,024,3963 Systems and methods for generating device-specific security policies for applications
The disclosed computer-implemented method for generating device-specific security policies for applications may include (1) installing, onto a computing device,...
US-1,024,3962 Multiple data store authentication
Systems and methods for authenticating access to multiple data stores substantially in real-time are disclosed. The system may include a server coupled to a...
US-1,024,3961 Enhanced security using wearable device with authentication system
An approach is provided for securing a network-accessible site such as a bank, financial institution, or a user's home system. A request is received from a user...
US-1,024,3960 Source device and systems and methods of verifying an identification using dynamic scoring
A source device for systems and methods of verifying an authentication based on dynamic scoring is disclosed, wherein the source device is configured to receive...
US-1,024,3959 Secure cloud computing framework
A cloud computing system. The system comprises a network, a data store communicatively coupled to the network, a plurality of compute nodes, at least some of...
US-1,024,3958 Systems and methods for device push provisoning
Techniques for provisioning access data may include receiving, by a first application installed on a communication device, user input selecting an account to...
US-1,024,3957 Preventing leakage of cookie data
Disclosed are various embodiments for preventing the unintended leakage of cookie data between network sites using a shared high-level domain and vice versa. In...
US-1,024,3956 Internetwork authentication
A technique for network authentication interoperability involves initiating an authentication procedure on a first network, authenticating on a second network,...
US-1,024,3955 Securely establishing time values at connected devices
A system and method of establishing a secure time value in a connected device. The method includes: receiving a hash of a pinset at the connected device from...
US-1,024,3954 Access network assisted bootstrapping
The Generic Bootstrapping Architecture is used in a method for assigning the bootstrapping transaction ID so that a machine-to-machine server or other device...
US-1,024,3953 Systems and methods for secure resource access and network communication
Systems and methods for secure resource access and network communication are provided. A plurality of policies are received on a client device, each policy...
US-1,024,3952 Anonymizing biometric data for use in a security system
An anonymized biometric representation of a target individual is used in a computer based security system. The system receives a record of a target individual...
US-1,024,3951 System and method for confirmation of information
A system for information confirmation using a cloud computing platform to provide a service by which an individual's video recorded and fingerprint ...
US-1,024,3950 Authorization flow initiation using short-term wireless communication
In general, aspects of the disclosure are directed towards techniques for initiating an authorization flow with a user to enable a user interface-limited client...
US-1,024,3949 Connection system and connection method
A connection server is a connection system that is able to perform communication with a plurality of user side terminals and establishes a connection between...
US-1,024,3948 Communication apparatus, electronic mail transmitting method, and electronic mail transmitting program
A communication apparatus enhances security in transmitting electronic mail to a destination mail address without degrading operability. An MFP is connected to...
US-1,024,3947 Method and system to enable a virtual private network client
Aspects of the subject disclosure may include, for example, a method comprising transmitting, by a controller comprising a processor, a request to a server to...
US-1,024,3946 Non-intrusive security enforcement for federated single sign-on (SSO)
The technology disclosed relates to non-intrusively enforcing security during federated single sign-on (SSO) authentication without modifying a trust...
US-1,024,3945 Managed identity federation
Managed identity federation provides numerous options for authentication to access one or more services. A user authenticates with an identity verification...
US-1,024,3944 Systems and methods for location-based device security
A device may collect environmental information surrounding the device. Based on the collected environmental information, the device may automatically identify a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.