Images List Premium Download Classic

Computer Network

Computer Network-related patent applications - as published by the U.S. Patent and Trademark Office (USPTO).


loading
Methods and systems for implementing a phishing assessment
Duo Security, Inc.
August 17, 2017 - N°20170237765

A system, method, and computer program product for implementing a phishing assessment of a target computer network that includes a phishing assessment platform for generating parameters for the phishing assessment; generating the phishing assessment parameters includes identifying a target domain name for the phishing assessment; identifying a pseudo domain name based on the target domain name; generating a pseudo web ...
Geographic filter for regulating inbound and outbound network communications
Iorhythm, Inc.
August 17, 2017 - N°20170237748

A system and method for regulating and analyzing inbound and outbound communications in and between computer networks on the basis of geographic security assertions are provided. Geographic information is collected, optimized, and shared between network objects to enforce network access control on the basis of configurable security assertions. Security assertions are configured and metrics displayed using maps and other geographic ...
Central switch for coupling virtual desktops to peripheral devices
Vmware, Inc.
August 17, 2017 - N°20170237688

A method and system include compatibly interfacing a suitably adapted central switch in a computer network virtualization environment to one or more user-end peripheral device(s) to dispense with a need for a user-end thin client. The method and system also include appropriately routing a data associated with a direct and exclusive communication between a virtual machine on a host ...
Computer Network Patent Pack
Download 483+ patent application PDFs
Computer Network Patent Applications
Download 483+ Computer Network-related PDFs
For professional research & prior art discovery
inventor
  • 483+ full patent PDF documents of Computer Network-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Telemedicine data and video management system
Reach Health, Inc.
August 17, 2017 - N°20170235905

A telemedicine system includes a patient treatment unit, a provider unit that is in a location remote from the patient treatment unit, and a server in communication with the global computer network. An application interface is configured to effect a peer-to-peer communication protocol between the patient treatment unit and the provider unit. Patient video from the patient treatment unit is ...
System and method for advising wireless computer networks on inter-network interferences
Abb Technology Ltd
August 10, 2017 - N°20170230982

The present invention provides a system and method for advising wireless computer networks on inter-network interferences during their life time. The method of the present invention initially observes initial channel utilization profiles along with corresponding time-slots of dynamic network elements and network characteristics of a first network and stores as historical channel utilization profiles. The initial transmission profiles an interfering ...
Method and apparatus for collecting and disseminating information over a computer network
Mblast, Inc.
August 10, 2017 - N°20170230460

The apparatus comprises at least one database for storing digital information associated with at least a first user and a second user, at least one links module for the first user and for the second user, at least one manipulations module and at least one display device for respectively displaying at least said linked digital information wherein said linked digital ...
Computer Network Patent Pack
Download 483+ patent application PDFs
Computer Network Patent Applications
Download 483+ Computer Network-related PDFs
For professional research & prior art discovery
inventor
  • 483+ full patent PDF documents of Computer Network-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Securing a computing device accessory
Microsoft Technology Licensing, Llc
August 10, 2017 - N°20170230356

Various embodiments are disclosed that relate to security of a computer accessory device. For example, one non-limiting embodiment provides a host computing device configured to conduct an initial portion of a mutual authentication session with an accessory device, and send information regarding the host computing device and the accessory device to a remote pairing service via a computer network. The ...
Tagging similar images using neural network
International Business Machines Corporation
August 10, 2017 - N°20170228870

An approach is provided in which a knowledge manager selects an extraction layer from a convolutional neural network that was trained on an initial set of images. The knowledge manager processes subsequent images obtained from crawling a computer network that includes extracting image feature sets of the subsequent images from the selected extraction layer and generating tags from metadata associated ...
Mapping retail offers
Target Brands, Inc.
August 10, 2017 - N°20170228756

A computer-implemented method includes providing at least one user interface to allow a user to select an offer through a computer network, the offer being applicable to more than one product. A request to display a map of a retail store is received and in response the map of the retail store is displayed. The displayed map includes a plurality ...
System and method for high speed threat intelligence management using unsupervised machine learning and prioritization ...
Certis Cisco Security Pte Ltd
August 10, 2017 - N°20170228658

This document discloses a system and method for consolidating threat intelligence data for a computer and its related networks. Massive volumes of raw threat intelligence data are collected from a plurality of sources and are partitioned into a common format for cluster analysis whereby the clustering of the data is done using unsupervised machine learning algorithms. The resulting organized threat ...
Tagging similar images using neural network
International Business Machines Corporation
August 10, 2017 - N°20170228619

An approach is provided in which a knowledge manager selects an extraction layer from a convolutional neural network that was trained on an initial set of images. The knowledge manager processes subsequent images obtained from crawling a computer network that includes extracting image feature sets of the subsequent images from the selected extraction layer and generating tags from metadata associated ...
Systems and methods for identifying relevant personnel over a network
International Business Machines Corporation
August 10, 2017 - N°20170228561

A system for identifying personnel within an organization, which is implemented on a computer network of the organization and includes: (a) a database that connects to the computer network and includes (i) knowledge, skill, experience or information held by one or more personnel of the organization, and (ii) contact details of the one or more personnel; and (b) one or ...
Modeling trends in crop yields
The Climate Corporation
August 10, 2017 - N°20170228475

A method and system for modeling trends in crop yields is provided. In an embodiment, the method comprises receiving, over a computer network, electronic digital data comprising yield data representing crop yields harvested from a plurality of agricultural fields and at a plurality of time points; in response to receiving input specifying a request to generate one or more particular ...
Computer Network Patent Pack
Download 483+ patent application PDFs
Computer Network Patent Applications
Download 483+ Computer Network-related PDFs
For professional research & prior art discovery
inventor
  • 483+ full patent PDF documents of Computer Network-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Meetings conducted via a network
Microsoft Technology Licensing, Llc
August 03, 2017 - N°20170223069

A method comprising: conducting a meeting via a computer network between a plurality of user terminals each used by at least one respective user, wherein the meeting comprises each of a plurality of the users transmitting one or more respective messages from the respective user terminal to the others of the user terminals, with each of the messages being displayed ...
Service delivery controller for learning network security services
International Business Machines Corporation
August 03, 2017 - N°20170223058

A learning-based computer network security system may include a service delivery controller executing on one or more of hardware processors that receives requests for transmitting network flows to one or more destination machines via a communication network. The service delivery controller may group the network flows into one or more similarity groups, and direct the network flows in a particular ...
Method of forwarding data between computer systems, computer network infrastructure and computer program product
Fujitsu Technology Solutions Intellectual Property Gmbh
August 03, 2017 - N°20170223045

A method forwards data between secured computer systems in a computer network structure. Data packets are transmitted along a predetermined communication path structure from a source computer system to at least one target computer system by means of a group of task servers, wherein the communication path structure comprises a plurality of parallel sub-paths. Both the source computer system and ...
Recursive multi-layer examination for computer network security remediation
Varmour Networks, Inc.
August 03, 2017 - N°20170223038

Computer-implemented methods and apparatuses for recursive multi-layer examination for computer network security remediation may include: identifying one or more first communications originating from or directed to a first node; identifying at least one of a protocol and an application used for each of the one or more first communications; examining each of the one or more first communications for malicious ...
Model training and deployment in complex event processing of computer network data
Splunk Inc.
August 03, 2017 - N°20170223036

A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security platform is “big data” driven and employs machine learning to perform security analytics. The security platform performs user/entity behavioral analytics (ueba) to detect the security related anomalies and threats, regardless of whether ...
Multi-node affinity-based examination for computer network security remediation
Varmour Networks, Inc.
August 03, 2017 - N°20170223033

Multi-node affinity-based examination for computer network security remediation is provided herein. Exemplary methods may include receiving a query that includes a selection of internet protocol (ip) addresses belonging to nodes within a network, obtaining characteristics for the nodes, determining communications between the nodes and communications between the nodes and any other nodes not included in the selection, determining a primary ...
Malicious encrypted traffic inhibitor
British Telecommunications Public Limited Company
August 03, 2017 - N°20170223032

A malicious encrypted traffic inhibitor connected to a computer network is disclosed. A method for inhibiting malicious encrypted network traffic communicated via a computer network also is disclosed.
Access permissions entitlement review
Varonis Systems, Inc.
August 03, 2017 - N°20170223025

A system for operating an enterprise computer network including multiple network objects, said system comprising monitoring and collection functionality for obtaining continuously updated information regarding at least one of access permissions and actual usage of said network objects, and entitlement review by owner functionality operative to present to at least one owner of at least one network object a visually ...
Loading