Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0041556 BROADCAST SIGNAL TRANSMISSION APPARATUS, BROADCAST SIGNAL RECEPTION APPARATUS, BROADCAST SIGNAL TRANSMISSION...
A method for transmitting a broadcast signal, according to one embodiment of the present invention, may comprise the steps of: generating broadcast data for at...
2018/0041555 SYSTEMS AND METHODS TO MANAGE MULTICAST TRAFFIC
In various example embodiments, a system and method for optimizing management of a multicast tree are disclosed. The system receives first multicast group...
2018/0041554 Interactive Conferencing System
An interactive conferencing device enables conference participants to interact remotely through multiple multimedia channels based on the configured...
2018/0041553 TRANSMISSION SYSTEM, TRANSMISSION TERMINAL, METHOD, AND PROGRAM
A transmission system is provided. The transmission system includes a first transmission terminal and a second transmission terminal. The second transmission...
2018/0041552 SYSTEMS AND METHODS FOR SHARED BROADCASTING
Systems, methods, and non-transitory computer-readable media can determine one or more users in a list associated with a live content stream that is being...
2018/0041551 SYSTEMS AND METHODS FOR SHARED BROADCASTING
Systems, methods, and non-transitory computer-readable media can determine one or more users in a guest list associated with a broadcast of a live content...
2018/0041550 IP-BASED USSD COMMUNICATIONS
A USSD (Unstructured Supplementary Service Data) message may be transmitted by a communication device to an IMS (IP Multimedia Subsystem) within a SIP (Session...
2018/0041549 In-Session Communication
The invention relates to a method, by an initiating entity (100, 200, 210), to initiate the set up of one or more communication channels for exchange of...
2018/0041548 Low Latency IMS-Based Media Handoff Between a Cellular Network and a WLAN
Methods for transporting a media call between an IMS server and a User Equipment (UE) and of handing over the media call between a cellular network and a WLAN...
2018/0041547 Dynamic Service Point Triggering in an IP Multimedia Subsystem
The present invention relates to a first and second method and corresponding nodes for generating dynamic Service Point Triggers, SPTs, in an IP multimedia...
2018/0041546 AUTOMATED SECURITY DESIGN FOR INTERNET OF THINGS SYSTEMS
Embodiments are configured for automating security design in IoT systems. The achievable security level for any given IoT system may be assessed based on the...
2018/0041545 SOCIAL NETWORK IMAGE FILTERING
Technical solutions are described automatically filtering user images being uploaded to a social network. An example computer-implemented method includes...
2018/0041544 Security policy editor
A shared computing infrastructure has associated therewith a portal application through which users access the infrastructure and provision one or more...
2018/0041543 SYSTEMS AND METHODS FOR DYNAMIC ROOT OF TRUST MEASUREMENT IN MANAGEMENT CONTROLLER DOMAIN
A method may include, by a program of instructions embodied in a read-only memory of a management controller communicatively coupled to a host system processor...
2018/0041542 Spoofing Detection
Methods are described herein useful for detecting spoofing by wireless access devices. In some embodiments, spoofing can be detected based on locations for a...
2018/0041541 LOADING SECURITY INFORMTION
A method of distributing security information to a device quarantines the device and then, in the quarantine state, downloads security information using a...
2018/0041540 METHOD TO DETECT AND PROTECT AGAINST REMOTE CONTROL
The current invention discloses method and system to detect remote control and prevent critical application from being peeped at and manipulated. Solution...
2018/0041539 SYSTEM AND METHOD FOR MONITORING NETWORK VULNERABILITIES
A method for managing network vulnerabilities may include obtaining image data regarding a software container located on a network element. The image data may...
2018/0041538 Threat Indicator Analytics System
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for analyzing threat intelligence information. One of the...
2018/0041537 IDENTIFYING AND REMEDIATING PHISHING SECURITY WEAKNESSES
A threat management facility generates a simulated phishing threat based on one or more characteristics of a network user. Based on whether the user fails to...
2018/0041536 METHODS AND APPARATUS FOR DETECTING AND IDENTIFYING MALWARE BY MAPPING FEATURE DATA INTO A SEMANTIC SPACE
In some embodiments, an apparatus includes a memory and a processor operatively coupled to the memory. The processor is configured to identify a feature vector...
2018/0041535 SECURITY MEASURE INVALIDATION PREVENTION DEVICE, SECURITY MEASURE INVALIDATION PREVENTION METHOD, AND SECURITY...
A security measure invalidation prevention device includes an acquisition unit that acquires invalidated security point information about an invalidated...
2018/0041534 IT Audit Machine (ITAM)
Disclosed is a SaaS ITAM (Information Technology Audit Machine) having state-of-art and novel online features suitable to assess cybersecurity security risk,...
2018/0041533 SCORING THE PERFORMANCE OF SECURITY PRODUCTS
A method and system for scoring performance of a security product are provided. The method includes receiving security product performance data of the security...
2018/0041532 System for Handling Communicated Threats
A system has a threat-resolution server connected to a wide-area network and having a processor executing first threat-processing software from a ...
2018/0041531 LOG ANALYSIS SYSTEM, ANALYSIS DEVICE, ANALYSIS METHOD, AND STORAGE MEDIUM ON WHICH ANALYSIS PROGRAM IS STORED
To provide a log analysis system which is capable of detecting unauthorized access, an analysis device, an analysis method and a storage medium on which an...
2018/0041530 METHOD AND SYSTEM FOR DETECTING MALICIOUS WEB ADDRESSES
The present application provides a method and system for detecting malicious web addresses. The method includes: receiving a uniform resource locator (URL)...
2018/0041529 METHOD AND DEVICE FOR ROBUST DETECTION, ANALYTICS, AND FILTERING OF DATA/INFORMATION EXCHANGE WITH CONNECTED...
A security appliance includes: a network port enabling direct connection to a gateway; a storage module having stored thereon firmware for operating the...
2018/0041528 JOINT ANOMALY DETECTION ACROSS IOT DEVICES
Systems and methods of the present disclosure provide technology to identify when network-connected devices are likely infected with malware. Network...
2018/0041527 USING INSTRUMENTATION CODE TO DETECT BOTS OR MALWARE
Techniques are provided for using instrumentation code to detect bots or malware. Data corresponding to requests from a plurality of client devices for a web...
2018/0041526 METHOD AND APPARATUS FOR MUTUAL-AID COLLUSIVE ATTACK DETECTION IN ONLINE VOTING SYSTEMS
Method and apparatus are disclosed for detecting mutual-aid collusive (MAC) attack in a voting action of an online voting system. According to some...
2018/0041525 APPARATUS AND METHODS THEREOF FOR INSPECTING EVENTS IN A COMPUTERIZED ENVIRONMENT RESPECTIVE OF A UNIFIED INDEX...
An apparatus collects data from a data network for the purpose of detection and interception of security incidents therein. The apparatus identifies at least...
2018/0041524 STEERING OF CLONED TRAFFIC IN A SERVICE FUNCTION CHAIN
Aspects of the embodiments are directed to a service classifier configured for steering cloned traffic through a service function chain. The service classifier...
2018/0041523 System and Method for 3D Abstract Object Modelling of High Entropic Information Security Threats
This invention relates to a system and method for simultaneously displaying real-time information security threat posture of a plurality of computers and its...
2018/0041522 Application Graph Builder
Disclosed is a system for recommending content of a predefined category to an account holder, detecting spam applications, or account holders based on the...
2018/0041521 MALWARE DOMAIN DETECTION USING PASSIVE DNS
Techniques for malware domain detection using passive Domain Name Service (DNS) are disclosed. In some embodiments, malware domain detection using passive DNS...
2018/0041520 DATA ACCESS METHOD BASED ON CLOUD COMPUTING PLATFORM, AND USER TERMINAL
A data access method based on a cloud computing platform, and a user terminal, are provided. The method is performed by a user terminal, and the method...
2018/0041519 System and Method for Controlling a Rendering Device Based Upon Detected User Proximity
A method is disclosed for generating a media playlist by a media rendering device having a proximity detector. The proximity detector detects a first...
2018/0041518 SYSTEMS AND METHODS FOR PROXIMITY IDENTITY VERIFICATION
Systems and methods are provided for authenticating a user of a computing device. An example system includes a memory storing instructions, and a processor...
2018/0041517 SYSTEMS AND METHODS FOR EFFICIENT AND SECURE TEMPORARY ANONYMOUS ACCESS TO MEDIA CONTENT
A method for providing access to media content from a media content provider is performed at an electronic device. The method comprises receiving, from a...
2018/0041516 Virtual Directory System for LDAP to SCIM Proxy Service
A method for providing an on-premises virtual directory system for an LDAP (Lightweight Directory Access Protocol) to SCIM (System for Cross-domain Identity...
2018/0041515 SERVICE DISCOVERY FOR A MULTI-TENANT IDENTITY AND DATA SECURITY MANAGEMENT CLOUD SERVICE
A system provides cloud-based identity and access management. The system receives a request for an identity management service, authenticates the request, and...
2018/0041514 COMMUNICATION DEVICE AUTHENTICATION IN SMALL CELL NETWORK
A technique is provided for authenticating a first communication device located in a coverage area of a base station. The base station receives a localization...
2018/0041513 TECHNOLOGIES FOR SECURE SERVER ACCESS USING A TRUSTED LICENSE AGENT
Technologies for secure server access include a client computing device that loads a license agent into a secure enclave established by a processor of the...
2018/0041512 NOTIFICATION FRAMEWORK FOR ACCESS POINT CONTROLLERS
A notification framework for access point controllers is provided. An access point controller receives, from a device, a request for an application token...
2018/0041511 Method and Apparatus for Password Management
Systems, methods, and a security management apparatus, for password management including the determination of the identity of a service requesting a security...
2018/0041510 MULTI-FACTOR AUTHENTICATION
An authenticated session with a remote system is established and identified through an authentication token for the session. During that session, a resource is...
2018/0041509 UNIQUE DEVICE AUTHENTICATION VIA A BROWSER
Techniques are disclosed relating to unique device authentication via browser. In one embodiment, a server computer system receives, from a browser program...
2018/0041508 SECURE TWO-WAY AUTHENTICATION USING ENCODED MOBILE IMAGE
A method of digital authentication and related devices are disclosed. The method includes providing a scanning application on a computing device prior to...
2018/0041507 System and methods for provisioning devices
System and methods for provisioning devices. Embodiments disclosed herein relate to headless devices, and more particularly to provisioning connectivity for...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.