Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0241795 TECHNIQUES FOR OPTIMIZING ENCODING PARAMETERS FOR DIFFERENT SHOT SEQUENCES
In various embodiments, an encoding optimization application encodes a source video sequence. The encoding optimization application partitions a source video...
2018/0241794 SHARING A STREAMING VIDEO
A video segment can be shared over a computer network by first receiving the video segment at a receiving computer on the network. The receiving computer...
2018/0241793 VIRTUAL SLICER APPLIANCE
The disclosure provides an approach for virtualizing a slicer server. A slicer program running in a virtual machine receives a multicast Internet Protocol (IP)...
2018/0241792 ELECTRONIC DEVICES FOR CAPTURING MEDIA CONTENT AND TRANSMITTING THE MEDIA CONTENT TO A NETWORK ACCESSIBLE MEDIA...
A client device is operated by obtaining a list of contacts, wherein the list of contacts includes contact information of authorized users, recording media...
2018/0241791 SYSTEM AND METHOD FOR EVENT CONTENT STREAM
A computer-implemented method, computer program product, and computing system for providing a live stream of event content is provided. In an embodiment, a...
2018/0241790 TRANSMITTING APPARATUS, RECEIVING APPARATUS, AND CONTROL METHODS THEREOF
A transmitting apparatus is provided. The transmitting apparatus includes: an L1 signaling generator configured to generate L1 signaling including first...
2018/0241789 SYSTEM, METHOD AND APPARATUS FOR BINDING COMMUNICATION DEVICES THROUGH COMMON ASSOCIATION
Systems, methods and apparatuses for binding two or more communication devices through their common association with one or more other devices. Information...
2018/0241788 INFORMATION PROCESSING APPARATUS
A streaming data acquisition section acquires streaming data distributed from a server and including an application image, and a streaming data reproduction...
2018/0241787 TRANSMISSION DEVICE AND METHOD FOR CONTROLLING SAME
Provided are a transmission device for transmitting a data signal to a reception device and a method for controlling the same. The present method for...
2018/0241786 SYSTEM, METHOD FOR PROCESSING INFORMATION, AND INFORMATION PROCESSING APPARATUS
A system including a first output apparatus and a second output apparatus that are connected to an information processing apparatus via a network and includes...
2018/0241785 Systems and Methods for Recording and Storing Media Content
In an example, a method for recording media content using a mobile device includes establishing a communication session between a control system and the mobile...
2018/0241784 P-CSCF RECOVERY AND REREGISTRATION
A method in an IP multimedia subsystem, IMS, of a telecommunications network. The loss of a secure association between a P-CSCF of the IMS and a user...
2018/0241783 APPARATUS AND METHOD FOR COMMUNICATIONS INVOLVING A LEGACY DEVICE
A gateway receives a message from a first terminal to establish a connection between the first terminal and a second terminal. The gateway sends a second...
2018/0241782 Methods and Devices for Detecting and Correlating Data Packet Flows in a Lawful Interception System
The following disclosure relates a method and mediation device (100) in a Lawful Interception (LI) system for detecting and correlating copies of SIP and RTP...
2018/0241781 SECURITY RULES INCLUDING PATTERN MATCHING FOR IOT DEVICES
The disclosed technology is generally directed to device security in an IoT environment. In one example of the technology, a set of security rules is stored....
2018/0241780 SECURITY INSPECTION OF MASSIVE VIRTUAL HOSTS FOR IMMUTABLE INFRASTRUCTURE AND INFRASTRUCTURE AS CODE
A method and system are provided for performing a security inspection of a set of virtual images. The method includes merging the virtual images into a tree...
2018/0241779 QUERY SYSTEM AND METHOD TO DETERMINE AUTHENTICATION CAPABILITIES
A system, apparatus, method, and machine-readable medium are described for determining the authentication capabilities. For example, one embodiment of a method...
2018/0241778 DEVICE TO PERFORM POLICY VERIFICATION
Aspect may relate to a device that comprises an interface and a processor. The interface may be configured to: obtain a statement from an asserting party...
2018/0241777 OPTIMIZING DATA REDUCTION, SECURITY AND ENCRYPTION REQUIREMENTS IN A NETWORK ENVIRONMENT
A specification of a target network environment including target devices is received. The specification includes an identity of each of the target devices and...
2018/0241776 Splicing into an active TLS session without a certificate or private key
An origin server selectively enables an intermediary (e.g., an edge server) to shunt into and out of an active TLS session that is on-going between a client...
2018/0241775 SYSTEMS AND METHODS FOR UTILIZING CLIENT SIDE AUTHENTICATION TO SELECT SERVICES AVAILABLE AT A GIVEN PORT NUMBER
Typically, clients request a service from a computer hosting multiple services by specifying a destination port number associated with the desired service. In...
2018/0241774 DETECTING MAN-IN-THE-BROWSER ATTACKS
Methods and apparatus are described for automatically modifying web page code. Specific implementations relate to the modification of web page code for the...
2018/0241773 METHOD AND APPARATUS FOR DETECTING HIDDEN CONTENT OF WEB PAGE
According to an example, a web page is loaded and description information of the web page and layout information of the web page are generated, the description...
2018/0241772 AUTO CONFIGURATION SERVER AND METHOD
An Auto Configuration Server is coupled via at least one Load Balancer in a broadband network to at least one device, including at least one gateway device, in...
2018/0241771 Unobtrusive and Dynamic DDoS Mitigation
Some embodiments provide techniques for mitigating against layer 7 distributed denial of service attacks. Some embodiments submit a computational intensive...
2018/0241770 COMMUNICATION SYSTEM AND REPEATER
A repeater serving as a relay device determines, when receiving a frame by a port, whether the received frame is a session request or not. When the received...
2018/0241769 CATEGORIZATION SYSTEM
A system for the categorization of interlinked information items, the system comprising: a trust flow module which is configured to receive a seed trust list...
2018/0241768 SYSTEMS FOR NETWORK RISK ASSESSMENT INCLUDING PROCESSING OF USER ACCESS RIGHTS ASSOCIATED WITH A NETWORK OF DEVICES
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for network risk assessment. One of the methods includes...
2018/0241767 SYSTEM AND METHOD FOR CYBERSECURITY ANALYSIS AND SCORE GENERATION FOR INSURANCE PURPOSES
A system for comprehensive cybersecurity analysis and rating based on heterogeneous data and reconnaissance is provided, comprising a multidimensional...
2018/0241766 TRUSTWORTHY CLOUD-BASED SMART SPACE RATING WITH DISTRIBUTED DATA COLLECTION
A method, apparatus, and system for a smart space rating service (106) are provided. A method includes receiving, from a user device (104a, 104b), a request...
2018/0241765 Malware Beaconing Detection Methods
A method for detecting malware beaconing in a network, the method includes capturing network traffic over a network connection at a network connected device,...
2018/0241764 COMPUTER SYSTEM TO IDENTIFY ANOMALIES BASED ON COMPUTER- GENERATED RESULTS
One or more embodiments may include techniques to identify anomalies based on computer-generated results. Moreover, embodiments may include applying scenario...
2018/0241763 METHOD AND SYSTEM FOR NETWORK INTRUSION DETECTION
A method and a system for the detection of an intrusion in a computer network compares network traffic of the computer network at multiple different points in...
2018/0241762 ANOMALY SELECTION USING DISTANCE METRIC-BASED DIVERSITY AND RELEVANCE
In one embodiment, a device in a network receives a notification of a particular anomaly detected by a distributed learning agent in the network that executes...
2018/0241761 Reporting Behavior Anomalies
A technique includes determining relations among a plurality of entities that are associated with a computer system; and selectively grouping behavior...
2018/0241760 NETWORK DATA OBFUSCATION
Network data obfuscation is disclosed. For example, an obfuscation driver is initialized in an endpoint device connected to an obfuscation gateway over a...
2018/0241759 BEHAVIOR-BASED AUTHENTICATION
In one embodiment, a method includes receiving an access request for a video service from a client device, authorizing the client device to access the video...
2018/0241758 INFORMATION LEAKAGE PREVENTION SYSTEM AND METHOD
Provided is an information leakage prevention technique which does not require a dedicated device for access management on a network, and which offers...
2018/0241756 VERIFICATION OF CREDENTIAL RESET
Methods and systems are provided for verifying reset of credentials for user accounts. The methods and systems receive a request to change a credential...
2018/0241755 Meeting Join for Meeting Device
Various embodiments enable an application on a first device to log into an online meeting in association with a trusted entity, such as a trusted user. Once...
2018/0241754 Meeting Join for Meeting Device
Various embodiments enable an application on a first device to log into an online meeting in association with a trusted entity, such as a trusted user. Once...
2018/0241753 Meeting Join for Meeting Device
Various embodiments enable an application on a first device to log into an online meeting in association with a trusted entity, such as a trusted user. Once...
2018/0241752 METHOD AND DEVICE FOR DYNAMICALLY UPDATING FUNCTIONALITY OF A DEVICE
A computer implemented method, device, and system are provided that are under the control of one or more processors having instructions. The method, device,...
2018/0241751 AUTOMATED SYSTEM IDENTIFICATION, AUTHENTICATION, AND PROVISIONING
A device may authenticate a user for access to a plurality of target systems. The device may provide information identifying the plurality of target systems....
2018/0241750 AUTHENTICATION USING CREDENTIALS SUBMITTED VIA A USER PREMISES DEVICE
An authentication system can be operable to receive from a user premises device credentials associated with a user identity, wherein the user premises device...
2018/0241749 CONTEXT-AWARE DEVICE PERMISSIONING FOR HIERARCHICAL DEVICE COLLECTIONS
Metadata associated with IoT devices is stored. The metadata may include categories associated with the IoT devices. At least a first category may be...
2018/0241748 AUTHENTICATION SERVER, AUTHENTICATION METHOD, AND PROGRAM
If a plurality of services in the same domain is provided as a plurality of subdomains when a cookie is used in web service, the cookie with a domain scope for...
2018/0241747 INFORMATION PROCESSING APPARATUS, AUTHENTICATION METHOD, AND RECORDING MEDIUM FOR RECORDING COMPUTER PROGRAM
An information processing apparatus that authenticates sets of distributed authentication information without collecting, the sets of distributed...
2018/0241746 FINGERPRINT RECOGNITION-BASED CONTROL METHOD AND DEVICE
A fingerprint recognition-based control method may include acquiring, by a fingerprint sensor, sensor data in response to a contact between a physical object...
2018/0241745 METHOD AND SYSTEM FOR VALIDATING WEBSITE LOGIN AND ONLINE INFORMATION PROCESSING
What is provided is a method and system for simply and securely pairing a web user with a specific URL or online-based content without requiring the user to...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.