31st week of 2018 patent applcation highlights part 62 |
Patent application number | Title | Published |
20180219825 | NOTIFYING A USER ABOUT A PREVIOUS CONVERSATION | 2018-08-02 |
20180219826 | PRIORITIZATION OF LOCK ALLOCATION | 2018-08-02 |
20180219827 | METHOD, DEVICE AND SOFTWARE PRODUCT FOR FILLING AN ADDRESS FIELD OF AN ELECTRONIC MESSAGE | 2018-08-02 |
20180219828 | POSTING CONTENT TO SOCIAL MEDIUM | 2018-08-02 |
20180219829 | ELECTRONIC MESSAGE LIFECYCLE MANAGEMENT | 2018-08-02 |
20180219830 | INTRODUCING A NEW MESSAGE SOURCE INTO AN ELECTRONIC MESSAGE DELIVERY ENVIRONMENT | 2018-08-02 |
20180219831 | METHOD AND APPARATUS FOR EXPEDITED DOMAIN NAME SYSTEM QUERY RESOLUTION | 2018-08-02 |
20180219832 | SECURITY APPARATUS, ATTACK DETECTION METHOD, AND STORAGE MEDIUM | 2018-08-02 |
20180219833 | MITIGATION AGAINST DOMAIN NAME SYSTEM (DNS) AMPLIFICATION ATTACK | 2018-08-02 |
20180219834 | SYSTEMS AND METHODS FOR PROVIDING MULTI-LEVEL NETWORK SECURITY | 2018-08-02 |
20180219835 | SECURE COMMUNICATION SYSTEM | 2018-08-02 |
20180219836 | Distributed Data System | 2018-08-02 |
20180219837 | MAPPING AND OBSCURING DIGITAL REPRESENTATIONS OF A NUMBER OF USER ACCOUNTS ON A SOCIAL NETWORK MAP | 2018-08-02 |
20180219838 | SECURED TRANSFER OF DATA BETWEEN DATACENTERS | 2018-08-02 |
20180219839 | DEVICE IDENTIFICATION ENCRYPTION | 2018-08-02 |
20180219840 | SERVER AND METHOD FOR TRANSMITTING A GEO-ENCRYPTED MESSAGE | 2018-08-02 |
20180219841 | DYNAMIC AND EFFICIENT PROTECTED FILE LAYOUT | 2018-08-02 |
20180219842 | Performing Privacy-Preserving Multi-Party Analytics on Vertically Partitioned Local Data | 2018-08-02 |
20180219843 | MANAGEMENT OF ACCESS SESSIONS | 2018-08-02 |
20180219844 | SYSTEM AND METHOD FOR DETERMINING USE OF NON-HUMAN USERS IN A DISTRIBUTED COMPUTER NETWORK ENVIRONMENT | 2018-08-02 |
20180219845 | CONTROL METHOD | 2018-08-02 |
20180219846 | INTEGRATING SENSITIVE DATA FROM A DATA PROVIDER INTO INSTANCES OF THIRD-PARTY APPLICATIONS EXECUTED ON USER DEVICES | 2018-08-02 |
20180219847 | MESSAGING APPLICATION HOSTING FOR MESSAGE CAPTURE | 2018-08-02 |
20180219848 | SYSTEM AND METHOD FOR PROVIDING SECURITY MONITORING | 2018-08-02 |
20180219849 | Method and Apparatus for Enabling Co-Browsing of Third Party Websites | 2018-08-02 |
20180219850 | CONNECTION SYSTEM AND CONNECTION METHOD | 2018-08-02 |
20180219851 | METHOD AND SYSTEM FOR AUTHENTICATION | 2018-08-02 |
20180219852 | HIGHLY AVAILABLE WEB-BASED DATABASE INTERFACE SYSTEM | 2018-08-02 |
20180219853 | AUTHENTICATION APPARATUS AND AUTHENTICATION PROGRAM | 2018-08-02 |
20180219854 | SINGLE AUTHENTICATION TO A MULTI-TENANCY SINGLE-PAGE CLOUD APPLICATION | 2018-08-02 |
20180219855 | COMPUTER READABLE STORAGE MEDIA FOR LEGACY INTEGRATION AND METHODS AND SYSTEMS FOR UTILIZING SAME | 2018-08-02 |
20180219856 | Device Control Method, Control Terminal Device and Device Control System | 2018-08-02 |
20180219857 | SYSTEMS AND METHODS FOR CERTIFICATE CHAIN VALIDATION OF SECURE ELEMENTS | 2018-08-02 |
20180219858 | HYPERVISOR AGNOSTIC BIDIRECTIONAL SECURE CHANNEL FOR GUEST AGENT TRANSPORT | 2018-08-02 |
20180219859 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR GENERATING A COGNITIVE ONE-TIME PASSWORD | 2018-08-02 |
20180219860 | METHOD AND SYSTEM FOR TRACKING AN ELECTRONIC DEVICE AT AN ELECTRONIC DEVICE DOCKING STATION | 2018-08-02 |
20180219861 | BIOMETRIC DATA HASHING, VERIFICATION AND SECURITY | 2018-08-02 |
20180219862 | ACTIVELY FEDERATED MOBILE AUTHENTICATION | 2018-08-02 |
20180219863 | INVOCATION PATH SECURITY IN DISTRIBUTED SYSTEMS | 2018-08-02 |
20180219864 | ACCOUNT LOGIN METHOD AND APPARATUS | 2018-08-02 |
20180219865 | TRUSTED NETWORK ENTITY SECURE CONNECTIVITY | 2018-08-02 |
20180219866 | System and Method for Application Route Management | 2018-08-02 |
20180219867 | SECURE REMOTE SUPPORT AUTHORIZATION | 2018-08-02 |
20180219868 | COMMUNICATION FRAMEWORK FOR A FEDERATION OF NETWORK CONTROLLERS | 2018-08-02 |
20180219869 | LOCALIZATION BASED ON NETWORK OF WIRELESS NODES | 2018-08-02 |
20180219870 | MANAGEMENT OF TRANSACTIONS IN A DISTRIBUTED TRANSACTION SYSTEM | 2018-08-02 |
20180219871 | VERIFICATION OF FRAGMENTED INFORMATION CENTRIC NETWORK CHUNKS | 2018-08-02 |
20180219872 | COMMUNICATION SYSTEM, MANAGEMENT NODE, NORMAL NODE, COUNTER SYNCHRONIZATION METHOD, AND STORAGE MEDIUM | 2018-08-02 |
20180219873 | COMMUNICATION SYSTEM, COUNT VALUE SYNCHRONIZATION METHOD, AND COUNT VALUE SYNCHRONIZATION PROGRAM PRODUCT | 2018-08-02 |
20180219874 | CLOUD-BASED SURVEILLANCE WITH INTELLIGENT TAMPER PROTECTION | 2018-08-02 |
20180219875 | GROUPING ALERTS INTO BUNDLES OF ALERTS | 2018-08-02 |
20180219876 | DETERMINING CONTEXTUAL INFORMATION FOR ALERTS | 2018-08-02 |
20180219877 | SECURITY-BASED CONTAINER SCHEDULING | 2018-08-02 |
20180219878 | FIREWALL | 2018-08-02 |
20180219879 | SECURITY MONITORING OF NETWORK CONNECTIONS USING METRICS DATA | 2018-08-02 |
20180219880 | Reactive virtual security appliances | 2018-08-02 |
20180219881 | Detecting Anomalous Hypertext Transfer Protocol (HTTP) Events from Semi-Structured Data | 2018-08-02 |
20180219882 | SYSTEMS AND METHODS FOR IP SOURCE ADDRESS SPOOF DETECTION | 2018-08-02 |
20180219883 | SECURED EVENT MONITORING LEVERAGING BLOCKCHAIN | 2018-08-02 |
20180219884 | CHANGING THE DEPLOYMENT STATUS OF A PRE-PROCESSOR OR ANALYTIC | 2018-08-02 |
20180219885 | Network Attack Detection Using Multi-Path Verification | 2018-08-02 |
20180219886 | CLUSTERING NETWORK ADDRESSES | 2018-08-02 |
20180219887 | CONTINUOUS LEARNING FOR INTRUSION DETECTION | 2018-08-02 |
20180219888 | Graph-Based Network Security Threat Detection Across Time and Entities | 2018-08-02 |
20180219889 | ANOMALY DETECTION BASED ON RELATIONSHIPS BETWEEN MULTIPLE TIME SERIES | 2018-08-02 |
20180219890 | IDENTIFYING A SECURITY THREAT TO A WEB-BASED RESOURCE | 2018-08-02 |
20180219891 | INDIVIDUALIZED CYBERSECURITY RISK DETECTION USING MULTIPLE ATTRIBUTES | 2018-08-02 |
20180219892 | Methods and Systems for Detecting Viruses in Emails | 2018-08-02 |
20180219893 | SECURED EVENT MONITORING LEVERAGING BLOCKCHAIN | 2018-08-02 |
20180219894 | USER AND ENTITY BEHAVIORAL ANALYSIS USING AN ADVANCED CYBER DECISION PLATFORM | 2018-08-02 |
20180219895 | METHOD AND SYSTEM FOR LEARNING REPRESENTATIONS OF NETWORK FLOW TRAFFIC | 2018-08-02 |
20180219896 | COMPUTER-IMPLEMENTED SYSTEM AND METHOD FOR CREATING AN ENVIRONMENT FOR DETECTING MALICIOUS CONTENT | 2018-08-02 |
20180219897 | EVENT SPECIFIC ENTITY RELATIONSHIP DISCOVERY IN DATA INTAKE STAGE OF A DISTRIBUTED DATA PROCESSING SYSTEM | 2018-08-02 |
20180219898 | Data Surveillance System | 2018-08-02 |
20180219899 | METHOD AND SYSTEM FOR PLACING A WORKLOAD ON ONE OF A PLURALITY OF HOSTS | 2018-08-02 |
20180219900 | SETTING-UP PENETRATION TESTING CAMPAIGNS | 2018-08-02 |
20180219901 | SETTING-UP PENETRATION TESTING CAMPAIGNS | 2018-08-02 |
20180219902 | ENDPOINT VULNERABILITY ANALYSIS PLATFORM | 2018-08-02 |
20180219903 | SYSTEMS AND METHODS FOR SELECTING A LATERAL MOVEMENT STRATEGY FOR A PENETRATION TESTING CAMPAIGN | 2018-08-02 |
20180219904 | Penetration Testing of a Networked System | 2018-08-02 |
20180219905 | Penetration Testing of a Networked System | 2018-08-02 |
20180219906 | METHODS AND SYSTEMS FOR IMPLEMENTING A PHISHING ASSESSMENT | 2018-08-02 |
20180219907 | METHOD AND APPARATUS FOR DETECTING WEBSITE SECURITY | 2018-08-02 |
20180219908 | METHOD AND APPARATUS FOR REDUCING SECURITY RISK IN A NETWORKED COMPUTER SYSTEM ARCHITECTURE | 2018-08-02 |
20180219909 | SYSTEMS AND METHODS FOR DETECTING COMPUTER VULNERABILITIES THAT ARE TRIGGERED BY EVENTS | 2018-08-02 |
20180219910 | DETECTING AND REMOVING INJECTED ELEMENTS FROM CONTENT INTERFACES | 2018-08-02 |
20180219911 | RESPONDING TO ALERTS | 2018-08-02 |
20180219912 | SYSTEM AND METHOD FOR SCRUBBING DNS IN A TELECOMMUNICATIONS NETWORK TO MITIGATE ATTACKS | 2018-08-02 |
20180219913 | PACKET INSPECTION AND FORENSICS IN AN ENCRYPTED NETWORK | 2018-08-02 |
20180219914 | SECURITY VIA ADAPTIVE THREAT MODELING | 2018-08-02 |
20180219915 | SYSTEMS AND METHODS FOR ALLOCATING SPI VALUES | 2018-08-02 |
20180219916 | SYSTEM FOR REAL TIME FEDERATION OF FILE PERMISSIONS FOR DIGITAL CONTENT PROTECTION | 2018-08-02 |
20180219917 | RECOMMENDATIONS FOR SECURITY ASSOCIATED WITH ACCOUNTS | 2018-08-02 |
20180219918 | SYSTEMS AND METHODS FOR MANAGING LOST DEVICES OF MULTIPLE TYPES WITH MULTIPLE POLICIES USING MELDED PROFILES ASSOCIATED WITH GROUPS | 2018-08-02 |
20180219919 | RATING ORGANIZATION CYBERSECURITY USING ACTIVE AND PASSIVE EXTERNAL RECONNAISSANCE | 2018-08-02 |
20180219920 | PROVIDING SECURITY FOR INTERNET OF THINGS (IoT) DEVICES | 2018-08-02 |
20180219921 | Methods for Providing Continuity in Chatbot Communications | 2018-08-02 |
20180219922 | Conference Room Audio Setup | 2018-08-02 |
20180219923 | COLLABORATIVE CLOUD-BASED DOCUMENT EDITING FROM A BROWSER-ENABLED PLATFORM NATIVE APPLICATION | 2018-08-02 |
20180219924 | Method and System for Providing Interactive Control of Shared Content Over a Video Conference | 2018-08-02 |