Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2017/0353518 CATCHING UP TO THE LIVE PLAYHEAD IN LIVE STREAMING
Techniques are described for reducing the delay between the live playhead of live streaming content and the client playhead of a client device consuming the...
2017/0353517 Method and Apparatus for Transmitting Encoded Media Data
A method for transmitting encoded media data on the basis of a layer model includes dividing the media data onto a basic layer and at least one additional...
2017/0353516 DETERMINING MANIFEST FILE DATA USED IN ADAPTIVE STREAMING VIDEO DELIVERY
Techniques for serving a manifest file of an adaptive streaming video include receiving a request for the manifest file from a user device. The video is...
2017/0353515 TECHNIQUES FOR WARMING UP A NODE IN A DISTRIBUTED DATA STORE
In various embodiments, a node manager configures a "new" node as a replacement for an "unavailable" node that was previously included in a distributed data...
2017/0353514 SYSTEM AND METHOD FOR ALL-IN-ONE CONTENT STREAM IN CONTENT-CENTRIC NETWORKS
One embodiment of the present invention provides a system for assembling a single content stream that enables downloading of a content collection using the...
2017/0353513 TECHNOLOGIES FOR MULTI-USER INTERACTIVE MEDIA STREAMING
Technologies for streaming multi-user broadcasts include a broadcast management server configured to receive multimedia data captured of a user from a remote...
2017/0353512 Device-resident media files
A device is configured for communications over an IP network. The device comprises a user interface, a memory interface for accessing information media files...
2017/0353511 SOCIAL NETWORKING SYSTEM AND METHOD
A social network is provided. The social network of the present invention may prompt a user to create a "moment". The moment of the present invention may...
2017/0353510 SYSTEM AND METHOD FOR MULTI-PARTY COMMUNICATION OF TRENDING TOPICS
A system and method for multi-party communication includes determining a trending common identifier within a media platform and generating a communication...
2017/0353509 ENHANCED ROSTER FOR A SCHEDULED COLLABORATION SESSION
An enhanced roster for a scheduled collaboration system provides information about invitees that have joined but left a collaboration session and invitees that...
2017/0353508 QUEUE ORGANIZED INTERACTIVE PARTICIPATION
Systems and methods for queue-based promotion within a multiparty interaction are described, wherein a participant in the multiparty interaction can join a...
2017/0353507 PRIVACY FOR INTER-USER EQUIPMENT TRANSFER (IUT) SUBSCRIBERS AND FOR REMOTE PARTIES INVOLVED IN SESSIONS WITH...
Systems, methods, and instrumentalities are disclosed to provide privacy for inter-user equipment transfer (IUT) subscribers and remote parties involved in...
2017/0353506 DYNAMICALLY ENABLING USER DEVICE TO UTILIZE NETWORK-BASED MEDIA SHARING PROTOCOL
A media system includes a computer network, a media device supporting a network-based media sharing protocol, a plurality of output devices located at a...
2017/0353505 RECOVERY FROM A POTENTIAL PROXY CALL SESSION CONTROL FUNCTION (P-CSCF) FAILURE DURING CALL ORIGINATION
A user device registers with a proxy-call session control function device (P-CSCF) associated with an Internet protocol (IP) multimedia subsystem (IMS). The...
2017/0353504 UNIVERSAL STATE-AWARE COMMUNICATIONS
A communications system for general business environments that exploits knowledge of user state to provide advantages of efficiency and control for individual...
2017/0353503 CROSSED-INVITE CALL HANDLING
A method and devices for handling crossed-invite situations in set-up of IP-based sessions. A local device receives an incoming session invite after sending an...
2017/0353502 DIGITMAP CONFIGURATION METHOD, SIP SERVER, SIP TERMINAL AND DIGITMAP CONFIGURATION SYSTEM
A digitmap configuration method, device and system are described. The method includes: detecting, by a session initiation protocol (SIP) server, a...
2017/0353501 NETWORK CACHING OF OUTBOUND CONTENT FROM ENDPOINT DEVICE TO PREVENT UNAUTHORIZED EXTRACTION
Methods, computer-readable media and devices are disclosed for storing content from an endpoint device in a network cache. For example, a processor receives a...
2017/0353500 SECURITY POLICY ENFORCEMENT FOR MOBILE DEVICES BASED ON DEVICE STATE
Techniques for network-based security for mobile devices based on device state are disclosed. In some embodiments, network-based security for mobile devices...
2017/0353499 Methods and Systems for Applying Security Policies in a Virtualization Environment Using a Security Instance
The various implementations described herein include systems, methods and/or devices method for applying security policies in a virtualization environment. In...
2017/0353498 Methods and Systems for Applying Security Policies in a Virtualization Environment
The various implementations described herein include systems, methods and/or devices method for applying security policies in a virtualization environment. In...
2017/0353497 Remote Data Securement on Mobile Devices
A server determines a status of a client device, wherein if the client device violates the compliance rule, the server accesses a device record established by...
2017/0353496 Hardware-Based Virtualized Security Isolation
A host operating system running on a computing device monitors network communications for the computing device to identify network resources that are requested...
2017/0353495 SYSTEM, METHOD, AND RECORDING MEDIUM FOR MOVING TARGET DEFENSE
A network management method, system, and non-transitory computer readable medium, include a data center gateway including a set of rules for moving target...
2017/0353494 VIRTUAL INFRASTRUCTURE PERIMETER REGULATOR
Methods, computer-readable media and devices are disclosed for generating a security decision for network management traffic for a virtual provider edge router...
2017/0353493 DYNAMIC SECURE PACKET BLOCK SIZING
Disclosed herein are methods, systems, and software for handling secure transport of data between end users and content serving devices. In one example, a...
2017/0353492 IN-BAND ASYMMETRIC PROTOCOL SIMULATOR
A method for emulating devices communicating over one or more networks includes intercepting and recording protocols used in communications between real...
2017/0353491 Deception to Detect Network Scans
Provided are systems, methods, and computer-program products for using deceptions to detect network scans. In various implementations, a network device,...
2017/0353490 METHOD AND SYSTEM OF MITIGATING NETWORK ATTACKS
A method for mitigating network attacks includes receiving traffic status information from sentries distributed in a network, and analyzing the traffic status...
2017/0353489 EMPLOYING PHYSICAL LOCATION GEO-SPATIAL CO-ORDINATE OF COMMUNICATION DEVICE AS PART OF INTERNET PROTOCOL
A current physical location value associated is incorporated with a communication device as part of internet protocol (IP). An IP management component obtains...
2017/0353488 CUSTOM SECURITY BROWSER
A custom browser can be setup or configured by end user to scan, monitor, filter out or eliminate any element of HTTP or HTTPS or Java script code or cookie...
2017/0353487 CONTROLLING DATA ACCESS IN A SECURITY INFORMATION SHARING PLATFORM
Examples disclosed herein relate to controlling data access on a security information sharing platform. Some examples may enable receiving, from a first member...
2017/0353486 Method and System For Augmenting Network Traffic Flow Reports
Methods and systems for augmenting network traffic flow reports with domain name service ("DNS") information are provided. A networking device system can...
2017/0353485 FACILITATING SCANNING OF PROTECTED RESOURCES
Example implementations relate to facilitating scanning of protecting computing resources. In example implementations, a computing device receives a scan...
2017/0353484 SYSTEM AND METHOD FOR BRIDGING CYBER-SECURITY THREAT INTELLIGENCE INTO A PROTECTED SYSTEM USING SECURE MEDIA
A method includes detecting a storage device. The method also includes performing a check-in process so that the storage device is recognizable by one or more...
2017/0353483 CLOUD BASED SYSTEMS AND METHODS FOR DETERMINING SECURITY RISKS OF USERS AND GROUPS
Systems and method are implemented by one or more servers associated with a cloud-based security system, for determining security risks of entities including...
2017/0353482 Systems and Methods for Use in Evaluating Vulnerability Risks Associated With Payment Applications
Disclosed are exemplary embodiments of systems and methods for evaluating payment applications based on associated vulnerability risks. In an exemplary...
2017/0353481 MALWARE DETECTION BY EXPLOITING MALWARE RE-COMPOSITION VARIATIONS USING FEATURE EVOLUTIONS AND CONFUSIONS
One embodiment provides a method comprising, in a training phase, receiving one or more malware samples, extracting multi-aspect features of malicious...
2017/0353480 NETWORK SECURITY APPARATUS AND METHOD OF DETECTING MALICIOUS BEHAVIOR IN COMPUTER NETWORKS VIA COST-SENSITIVE...
A network security apparatus includes a packet detector detecting transmission of data packets between a plurality of hosts and a plurality of domains and...
2017/0353479 Insider Attack Resistant System and Method For Cloud Services Integrity Checking
An insider attack resistant system for providing cloud services integrity checking is disclosed. In particular, the system utilizes an automated integrity...
2017/0353478 PACKET RELAY APPARATUS
A packet relay apparatus, which is configured to transmit from a mirror port a mirror packet copied from one of a packet to be received and a packet to be...
2017/0353477 MACHINE LEARNING BASED ANOMALY DETECTION
The technology disclosed relates to machine learning based anomaly detection. In particular, it relates to constructing activity models on per-tenant and...
2017/0353476 Disabling Malicious Browser Extensions
An extension manager can identify that a browser extension that is installed on a computing device is configured to modify the operation of a browser...
2017/0353475 THREAT INTELLIGENCE CLOUD
A Threat Intelligence Cloud is disclosed. The Threat Intelligence Cloud can include a machine. A receiver on the machine can receive an electronic file...
2017/0353474 SYSTEM, METHOD AND COMPUTER READABLE MEDIUM FOR PROCESSING UNSOLICITED ELECTRONIC MAIL
An internet service provider (ISP) is configured to analyze a subscriber's sent e-mail packets to determine a subscriber identity associated with the e-mail...
2017/0353473 ELECTRONIC DEVICES HAVING ADAPTIVE SECURITY PROFILES AND METHODS FOR SELECTING THE SAME
Adaptive security profiles are supported on an electronic device. One or more security profiles may be automatically or selectively applied to the device based...
2017/0353472 Registration And Credential Roll-out For Accessing A Subscription-based Service
A user may access a subscription-based service via a system comprising one or more devices with one or more separate domains where each domain may be owned or...
2017/0353470 PASSWORD SETUP MANAGEMENT
A technique is disclosed to manage password setup such as may be integrated within a login authentication setup process. In response to an initiated password...
2017/0353469 Search-Page Profile
In one embodiment, a method includes authenticating a user of the social-networking system to access a third-party account of the user registered with a...
2017/0353468 Enterprise Business Mobile Dashboard
Aspects of the subject disclosure may include, for example, a server, comprising a processing system including a processor and a memory that stores executable...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.