Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2017/0318066 SYSTEM AND METHOD FOR LONG RANGE AND SHORT RANGE DATA COMPRESSION
A system and method are provided for use with streaming blocks of data, each of the streaming blocks of data including a number bits of data. The system...
2017/0318065 SIMILAR INTRODUCTION ADVERTISING CACHING MECHANISM
A method for reducing bandwidth needed for streaming media content. The method includes identifying, by the streaming media server, a subset of a plurality of...
2017/0318064 METHOD AND ELECTRONIC DEVICE FOR EDITING CONTENT
A content editing method and apparatus for efficiently editing of content by allowing one user who edits the content to confirm a region of the content edited...
2017/0318063 SYSTEM AND METHOD FOR RELIABLE MESSAGING BETWEEN APPLICATION SESSIONS ACROSS VOLATILE NETWORKING CONDITIONS
An electronic device is provided comprising a processor, a memory coupled to the processor, and a communications module saved in the memory and an application...
2017/0318062 METHOD FOR SETTING UP A COMMUNICATION LINK
In a method for setting up a communication link between a first telephony terminal (PA) and a second telephony terminal (PB) in a communication network which...
2017/0318061 METHOD, DEVICE, AND SYSTEM FOR MANAGING INFORMATION RECOMMENDATION
An inquiry for information recommendation sent by a terminal is received; the inquiry for information recommendation may include an account identification of a...
2017/0318060 NETWORK CONNECTION ESTABLISHMENT METHOD, TERMINAL DEVICE, AND NODE DEVICE
The present application provides a network connection establishment method, a terminal device, and a node device, and relates to the self-organizing network...
2017/0318059 SINGLE PASS LOAD BALANCING AND SESSION PERSISTENCE IN PACKET NETWORKS
Methods and systems for performing load balancing and session persistence in IP (e.g., IPv6) networks are described herein. Some aspects relate to a...
2017/0318058 Data Access Policies
To verify compliance with a data access policy, a query result including data specified by a requesting entity and a representation of a data access policy is...
2017/0318057 Modulation of the VPS10P-Domain Receptors for the Treatment of Cardiovascular Disease
The present invention relates to methods for modulating the activity of one or more Vps10p-domain receptors selected from the group consisting of Sortilin,...
2017/0318056 METHOD AND DEVICE FOR MONITORING THE SUPPLY OF AUTHENTICATION CERTIFICATES TO SERVICE NODES OF A...
A method for monitoring the supply of authentication certificates to service nodes of a high-performance computer, includes a first step of defining for each...
2017/0318055 USING ACTIVITIES TO MANAGE MULTI-TENANT FIREWALL CONFIGURATION
A novel method for managing firewall configuration of a software defined data center is provided. Such a firewall configuration is divided into multiple...
2017/0318054 AUTHENTICATION INCIDENT DETECTION AND MANAGEMENT
A system reports credentials on nodes of a network. Nodes are assigned to security silos. If a credential reported from a node is found to match a credential...
2017/0318053 Context-Aware Knowledge System and Methods for Deploying Deception Mechanisms
Methods, systems, and computer-readable mediums are described herein to provide context-aware knowledge systems and methods for deploying deception mechanisms....
2017/0318052 INTERCEPTING AND SUPERVISING CALLS TO TRANSFORMED OPERATIONS AND OBJECTS
In an embodiment, a method comprises intercepting a first set of instructions from a server computer that define one or more objects and one or more original...
2017/0318051 CYBER-SEMANTIC ACCOUNT MANAGEMENT SYSTEM
Systems, methods, and apparatus for identifying anomalous behavior are provided. For example, a method may include receiving raw data, generating a behavior...
2017/0318050 EVENT CORRELATION ACROSS HETEROGENEOUS OPERATIONS
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for determining a network security threat response. A data...
2017/0318049 MALWARE DETECTION SYSTEM BASED ON STORED DATA
A malware detection system based on stored data that analyzes an electronic message for threats by comparing it to previously received messages in a message...
2017/0318048 SYSTEM AND METHOD FOR MONITORING NETWORK VULNERABILITIES
A method for managing network vulnerabilities may include obtaining image data regarding a software container located on a network element. The image data may...
2017/0318047 TECHNIQUES FOR ASSOCIATING MEASUREMENT DATA ACQUIRED AT A WIRELESS COMMUNICATION DEVICE WITH CURRENT VALUES OF...
Techniques are described for wireless communication. A method for wireless communication at a user equipment (UE) includes transmitting, to a wireless...
2017/0318046 METHOD AND SYSTEM FOR ASSESSING DATA SECURITY
A method and system for conducting simulated phishing attacks. This may include identifying a target device from a list, such as a corporate directory, and...
2017/0318045 End-to-End Taint Tracking for Detection and Mitigation of Injection Vulnerabilities in Web Applications
The embodiments described in this disclosure may be adapted to detect and mitigate tainted content in network communications across client-server boundaries...
2017/0318044 NET SLEUTH
A method of identifying a node of a plurality of nodes in an in-vehicle communications network that transmitted a waveform propagating in the network,...
2017/0318043 METHOD FOR DETECTING NETWORK ANOMALY IN DISTRIBUTED SOFTWARE DEFINED NETWORKING ENVIRONMENT, APPARATUS...
A method, an apparatus, and a computer program for detecting network anomaly in a distributed software defined networking (SDN) environment. The method...
2017/0318042 DYNAMIC CONFIGURATION OF SETTINGS IN RESPONSE TO DDOS ATTACK
A system can monitor the server for indications of an attack and adjusts server settings accordingly. In response, the system can increase server tolerance in...
2017/0318041 METHOD AND SYSTEM FOR DETECTING MALICIOUS BEHAVIOR, APPARATUS AND COMPUTER STORAGE MEDIUM
The present disclosure provides a method and system for detecting a malicious behavior, an apparatus and a computer storage medium. In one aspect, in...
2017/0318040 METHOD AND DEVICE FOR DEFENDING DHCP ATTACK
A method for defending a DHCP attack is provided. The method includes monitoring packets transmitted by a client terminal coupled to a target port, and...
2017/0318039 DETECTION OF SLEEP DEPRIVATION ATTACK AND MITIGATION
Systems and methods are provided for detecting and mitigating a sleep deprivation attack (SDA). A method for detection of the SDA includes one of tracking...
2017/0318038 Defending Against Malicious Electronic Messages
Defending against malicious electronic messages by analyzing electronic messages sent via a computer network to identify predefined risk elements found within...
2017/0318037 DISTRIBUTED ANOMALY MANAGEMENT
Examples relate to distributed anomaly management. In one example, a computing device may: receive real-time anomaly data for a first set of client devices,...
2017/0318036 PREEMPTIVE ALERTS IN A CONNECTED ENVIRONMENT
The present disclosure is related to devices, systems, and methods for preemptive alerts in a connected environment. An example device can include instructions...
2017/0318035 COGNITIVE AND CONTEXTUAL DETECTION OF MALICIOUS DNS
From a record of a packet in a Domain Name System (DNS) communication between a DNS client and a DNS server, an input feature is constructed. Using the packet,...
2017/0318034 SYSTEM AND METHOD TO DETECT ATTACKS ON MOBILE WIRELESS NETWORKS BASED ON NETWORK CONTROLLABILITY ANALYSIS
Described is a system for detecting attacks of misinformation on communication networks. Network controllability metrics on a graphical representation of a...
2017/0318033 SYSTEM AND METHOD TO DETECT ATTACKS ON MOBILE WIRELESS NETWORKS BASED ON MOTIF ANALYSIS
Described is a system for detecting attacks on networks. A hierarchical representation of activity of a communication network is used to detect and predict...
2017/0318032 SYSTEM AND METHOD FOR DETECTING ATTACKS ON MOBILE AD HOC NETWORKS BASED ON NETWORK FLUX
Described is a system for detecting attacks on mobile networks. The system includes the relevant hardware and components to perform a variety of operations...
2017/0318031 DIRECT CACHE ACCESS FOR NETWORK INPUT/OUTPUT DEVICES
Methods and systems for improving efficiency of direct cache access (DCA) are provided. According to one embodiment, a set of DCA control settings are defined...
2017/0318030 Methods, Apparatuses, and Storage Mediums for Acquiring Legitimate Installation Packages
Methods, apparatuses, and storage mediums are provided for acquiring a legitimate installation package the field of computer technology. The method includes:...
2017/0318029 CONFIGURATION MANAGEMENT FOR VIRTUAL MACHINE ENVIRONMENT
A computer-implemented method for controlling a connection between a virtual machine and a physical device comprises receiving a connection request for...
2017/0318028 INTELLIGENT NETWORK ACCESS CONTROL
A method for managing a private wireless network includes a processor that generates the private wireless network within a part of a coverage area of a local...
2017/0318027 EFFECTIVELY VALIDATING DYNAMIC DATABASE QUERIES THROUGH DATABASE ACTIVITY MONITORING
A database activity monitoring service, operating independent of a database server, in response to intercepting a database server response issued by the...
2017/0318026 INFERRING SECURITY-SENSITIVE ENTITIES IN LIBRARIES
A method for analyzing a software library may include obtaining the software library, identifying a candidate security-sensitive entity in the software...
2017/0318025 MANAGING SECURITY GROUPS FOR DATA INSTANCES
Access level and security group information can be updated for a data instance without having to take down or recycle the instance. A data instance created in...
2017/0318024 Controlling Access to Ideograms
In one embodiment, a method includes receiving, from a client device of an author of a message, a request for a restricted ideogram to be inserted into a...
2017/0318023 PERMISSION BASED RESOURCE AND SERVICE DISCOVERY
Current discovery mechanisms lack capabilities, such as capabilities related to permissions associated with a given registrant for example. In an example...
2017/0318022 PROTECTION OF RESOURCE INFORMATION BASED ON DYNAMIC ASSIGNMENT OF RESOURCES IN A WIRELESS NETWORK
An example technique may include determining a change in an assignment state for a network resource that is shared among a plurality of sharing partners in a...
2017/0318021 RESOURCE SHARING AND DESIGNATION OF PERMISSIONS FOR OTHER TENANTS AND UNREGISTERED USERS OF SAME TENANT
Autocompleting into an invite box for purposes of sharing an executable computing resource such as an application or portion thereof. However, the autocomplete...
2017/0318020 ACTIVITY FEED FOR HOSTED FILES
Described herein are various technologies pertaining to generating an activity feed for an entity hosted at a file hosting server. The activity feed includes a...
2017/0318019 GAZE-BASED AUTHENTICATION
A user may be authenticated to access an account, computing device, or other resource using gaze tracking. A gaze-based password may be established by...
2017/0318018 WIRELESS NETWORK ACCESS
A system and machine-implemented method of wireless network access are provided. An authentication request comprising credentials for a user account of a...
2017/0318016 TECHNOLOGIES FOR SUPPORTING MULTIPLE DIGITAL RIGHTS MANAGEMENT PROTOCOLS ON A CLIENT DEVICE
Technologies for supporting and implementing multiple digital rights management protocols on a client device are described. In some embodiments, the...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.