Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0255136 METHOD AND SYSTEM FOR DISPLAYING SIMILAR EMAIL MESSAGES BASED ON MESSAGE CONTENTS
A method and system for identifying changes to a data set, such as data within a mailbox, and performing actions based on the identified changes is discussed....
2018/0255135 Computer Device for Distributed Processing
Disclosed is a computer program stored in a computer readable storage medium including encoded commands according to an exemplary embodiment of the present...
2018/0255134 SUPPORTING MULTIPLE CLIPBOARD ITEMS IN A VDI ENVIRONMENT
Multiple clipboard items are supported in a VDI environment. A client clipboard service can monitor the system clipboard to detect when a clipboard item is...
2018/0255133 SYSTEM AND METHOD FOR PEER-TO-PEER COMMUNICATION IN CELLULAR SYSTEMS
Systems and methods are provided for delivering both PMP communications, for example standard cellular communications via a base station, and also delivering...
2018/0255132 CONTROL APPARATUS FOR GATEWAY IN MOBILE COMMUNICATION SYSTEM
A control apparatus for a gateway functioning as the endpoint of a core network in a mobile communication system is provided. The gateway includes a first...
2018/0255131 System and Method for Transporting an Object
Embodiments of a system that includes at least one transport broker entity is provided. The transport broker entity is configured to provide at least one...
2018/0255130 BLOCKCHAIN-ENHANCED MOBILE TELECOMMUNICATION DEVICE
A computer-implemented method tracks and maintains a record of telecommunication device events using a blockchain that is supported by a peer-to-peer network....
2018/0255129 SERVER LOAD MANAGEMENT FOR DATA MIGRATION
A system and method for controlling a migration of data items in a data directory from a source system to a destination system by setting one or more target...
2018/0255128 SERVER LOAD MANAGEMENT FOR DATA MIGRATION
A system and method for controlling a migration of data items in a data directory from a source system to a destination system by setting one or more target...
2018/0255127 MANAGING PERSISTENT TCP CONNECTIONS IN AN IPVS ENVIRONMENT
Methods and systems for managing a connection in an internet protocol virtual server (IPVS). At least a portion of checkpoint data is transmitted by a first...
2018/0255126 METHODS, SYSTEMS, AND MEDIA FOR CONTROLLING INFORMATION USED TO PRESENT CONTENT ON A PUBLIC DISPLAY DEVICE
Methods, systems, and media for controlling information utilized to present content using a public display device are provided. In some implementations a...
2018/0255125 PROVIDING VIRTUAL MARKERS BASED UPON NETWORK CONNECTIVITY
A system is provided wherein a processor in a distributed network system determines a network connectivity value associated with a first node in a network of a...
2018/0255124 DATA CENTER NETWORK CONTAINERS
Techniques include systems, computerized methods and computer readable media for creating a private network for one or more execution environments inside of an...
2018/0255123 DISTRIBUTED RESOURCE ALLOCATION IN A FEDERATED CLOUD ENVIRONMENT
Status information associated with a set of cloud servers is received. Each cloud server in the set has an associated cloud agent, and the status information...
2018/0255122 LEARNING-BASED RESOURCE MANAGEMENT IN A DATA CENTER CLOUD ARCHITECTURE
A mobile device, computer readable medium, and method are provided for allocating resources within a cloud. The method includes the steps of receiving metrics...
2018/0255121 MANAGING PHYSICAL RESOURCES OF AN APPLICATION
A method includes, for components of an application, identifying a plurality of groups including a first group and a second group, The method also includes...
2018/0255120 CURRENT EVENT TRIGGERED WEBSITE UPDATES
A website hosting system may host a plurality of websites and update and publish some of the websites that may be customized based on a current event received...
2018/0255119 COMMUNICATION SYSTEM INCLUDING EAVESDROPPING
The disclosure presents a method and a communication system comprising; an audio gateway including; a first wireless interface configured to transmit and...
2018/0255118 MEDIA ASSET STREAMING OVER NETWORK TO DEVICES
Streaming of a media asset from a cloud server computer to a media playback device is disclosed. In an embodiment, a list of media assets stored in the cloud...
2018/0255117 METHODS AND DEVICES FOR CONTROLLING STREAMING OVER A RADIO NETWORK
Method carried out in a radio terminal for playing streaming media, which terminal includes a modem for connecting to a radio network, and a data streaming...
2018/0255116 SYSTEM AND METHOD FOR SWITCHING BETWEEN ADAPTIVE BIT RATE AND FIXED RATE STREAMS
Aspects of the subject disclosure may include, for example, a method in which a connection is initiated to an adaptive bit rate (ABR) content delivery network...
2018/0255115 METHOD FOR TRANSFERRING CONTROL OF A CONFERENCE CALL
A method for transferring control of an existing multi-participant conversation in which at least two communication terminals are connected to each other...
2018/0255114 PARTICIPANT SELECTION FOR MULTI-PARTY SOCIAL MEDIA SESSIONS
Introduced here are computer programs and associated computer-implemented techniques for enabling a host (also referred to as a "communicator") to interact...
2018/0255113 METHODS, APPARATUS, AND SYSTEMS FOR INSTANTLY SHARING VIDEO CONTENT ON SOCIAL MEDIA
Methods, apparatus, and systems for instantly posting images or video clips to social media websites during recording of video content are provided. A video...
2018/0255112 INSTANT CALLING METHOD, APPARATUS AND SYSTEM
A real-time call method performed by a calling side, the calling side being a Voice over Internet Protocol (VoIP) terminal, includes: initiating a multi-party...
2018/0255111 Audio Data Transmission Using Frequency Hopping
A method includes obtaining data representing multiple characters, determining a code for each character wherein each code corresponds to a different audio...
2018/0255110 REAL TIME COMMUNICATION HUB FOR MULTIPLE SECURE CONNECTIONS THROUGH SHARED SESSION
A gateway may establish a session with an endpoint, receive, from a healthcare application of the endpoint, a setup request for establishing a real time...
2018/0255109 METHOD AND APPARATUS FOR PROVIDING MEDIA RESOURCES IN A COMMUNICATION NETWORK
Aspects of the subject disclosure may include, for example, determining from a transport protocol message, capability information associated with user...
2018/0255108 Electronic Messaging Exchange
A computer-implemented system and method for secure electronic message exchange including coupling a control platform to a workstation of a plurality of...
2018/0255107 MULTI CLOUD POLICY ENACTMENT VIA ORGANIZATIONS TO CLOUD-PROVIDER PARTNERSHIPS
A method includes acts for establishing a subscription for an entity. The method includes receiving, at a cloud service provider, a request from an entity to...
2018/0255106 SYSTEMS, METHODS AND COMPUTER PROGRAM PRODUCTS FOR COMBINING PETS
A system configured to combine plural PETs, the system comprising a user interface operative to provide evaluations of each of plural raw aka known aka input...
2018/0255105 SECURITY SETTINGS AND INDICATIONS OF CONTROLLERS
A system and approach having security assurance for a controller relative to outside connections such as internet. The controller may have locked and exposed...
2018/0255104 ASSOCIATIONS AMONG DATA RECORDS IN A SECURITY INFORMATION SHARING PLATFORM
Examples disclosed herein relate to associations among data records in a security information sharing platform. Some examples may enable creating, in the...
2018/0255103 METADATA SUPPORTING CYBER CONTENT SHARING AND GOVERNANCE AND APPLICATION METHOD THEREOF
A method for identifying metadata for cyber content sharing and governance (abbreviated as an MDCCSG method) and application method thereof. The MDCCSG method...
2018/0255102 INCREMENTAL SECURITY POLICY DEVELOPMENT FOR AN ENTERPRISE NETWORK
A system may identify resources such as applications or network locations that are not adequately covered by an enterprise's security policy to notify a...
2018/0255101 DELEGATING SECURITY POLICY MANAGEMENT AUTHORITY TO MANAGED ACCOUNTS
A system may delegate authority to manage aspects of a security policy developed by administrative personnel to standard users (e.g. non-administrative...
2018/0255100 AUTOMATED SERVICE-ORIENTED PERFORMANCE MANAGEMENT
In an embodiment, a data processing method comprises creating and storing a scoring threshold value that is associated with determining whether a baseline...
2018/0255099 SECURITY AND COMPLIANCE ALERTS BASED ON CONTENT, ACTIVITIES, AND METADATA IN CLOUD
Correlated signals associated with one or more of stored content, content metadata, and activities associated with the stored content of a tenant may be...
2018/0255098 System and Method for Sharing Information in a Private Ecosystem
A system and method are disclosed for controlling a restricted ecosystem of software applications. The method may include originating software applications...
2018/0255097 METHOD AND DEVICE FOR APPLICATION INFORMATION RISK MANAGEMENT
Target application information for validation is received at a network device from user equipment. The received target application information is validated....
2018/0255096 SECURITY APPLIANCE
A security appliance may incorporate a touch screen or similar input/output interface, providing command and control over network functionality and...
2018/0255095 DISTRIBUTED DENIAL OF SERVICE (DDOS) DEFENSE TECHNIQUES FOR APPLICATIONS HOSTED IN CLOUD COMPUTING PLATFORMS
A defense platform for protecting a cloud-hosted application against distributed denial-of-services (DDoS) attacks, wherein the defense platform is deployed...
2018/0255094 DETECTION AND MITIGATION OF FLOOD TYPE DDOS ATTACKS AGAINST CLOUD-HOSTED APPLICATIONS
A system and method for protecting cloud-hosted applications against hypertext transfer protocol (HTTP) flood distributed denial-of-service (DDoS) attacks are...
2018/0255093 DETECTION AND MITIGATION OF SLOW APPLICATION LAYER DDoS ATTACKS
A method and system for protecting cloud-hosted applications against application-layer slow distributed denial-of-service (DDoS) attacks. The comprising...
2018/0255092 DYNAMIC DEVICE ISOLATION IN A NETWORK
In one embodiment, a device in a network inserts a profile tag into an address request sent by an endpoint node in the network to a lookup service. The lookup...
2018/0255091 CYBER-ATTACK DETECTION AND NEUTRALIZATION
The example embodiments are directed to a system and method for neutralizing abnormal signals in a cyber-physical system. In one example, the method includes...
2018/0255090 BLOCKCHAIN WEB BROWSER INTERFACE
A computer-implemented method records and maintains a record of browser events in a blockchain using a peer-to-peer network. One or more processors detect one...
2018/0255089 Determining Security Vulnerabilities in Application Programming Interfaces
A security system scans application programming interfaces (APIs) to detect security vulnerabilities by receiving API documentation from a third-party system...
2018/0255088 ABUSIVE TRAFFIC DETECTION
Aspects of an abuse detection system for a web service include an abuse detection engine executing on a server. The abuse detection engine includes a...
2018/0255087 CONTAINER DATA OFFLINE AND ONLINE SCAN IN A CLOUD ENVIRONMENT
Techniques for security scanning of containers executing within VMs. A virtualization system maintains container disk files that store data for containers. The...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.