Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0324246 USING A DECENTRALIZED AGREEMENT PROTOCOL TO RANK STORAGE LOCATIONS FOR TARGET WIDTH
A method for utilizing a decentralized agreement protocol to rank storage locations in a dispersed storage network (DSN) for data access operations. In...
2018/0324245 Load Balancing Method, Apparatus, and System
A load balancing system includes a load balancer and at least one service node, a virtual switch and at least one backend server run on the service node, and...
2018/0324244 SYSTEM AND METHOD FOR PROVIDING USERS FEEDBACK REGARDING THEIR READING HABITS
Content items are provided to users and their interactions with the provided content items are recorded in respective user profiles. The users' interactions...
2018/0324243 FAST FILE SERVER METHODS AND SYSTEMS
The invention provides, in one aspect, an improved system for data access comprising a file server that is coupled to a client device or application executing...
2018/0324242 WEBPAGE ANALYTICS AND CONTROL
Systems and methods for providing web analytics collection and analysis are disclosed. In some embodiments, a central instance control mechanism may be used to...
2018/0324241 APPARATUS AND METHOD FOR PROVIDING STREAMING CONTENT
A method and apparatus for an adaptive Hypertext Transfer Protocol (HTTP) streaming service using metadata of content are provided. The metadata may include...
2018/0324240 METHOD AND APPARATUS TO ENCODE AND DECODE TWO-DIMENSION POINT CLOUDS
The present disclosure relates to methods, devices or streams for encoding, transmitting and decoding two-dimension point clouds. When encoding point clouds as...
2018/0324239 EVENT STREAM PROCESSING SYSTEM
In one embodiment, a stream processing system ingests data from one or more data sources and converts the data into an unbounded stream for an event stream...
2018/0324238 A System and Methods Thereof for Auto-playing Video Content on Mobile Devices
A system is configured to auto-play video content item that comprises a plurality of frames on a web-page displayed on a mobile device. The system receives a...
2018/0324237 METHOD FOR CONGESTION CONTROL IN MULTIPARTY CONFERENCING, MULTIPOINT CONTROL UNIT, COMPUTER PROGRAM AND...
A method performed in a multipoint control unit for congestion control in multiparty conferencing is provided. The method includes forwarding packets of a...
2018/0324236 METHOD AND APPARATUS FOR VIEWING AND FILTERING MEDIA CONTENT
Embodiments of the present invention relate to viewing and filtering media content. In one embodiment, the invention is a system for networking based...
2018/0324235 NETWORK GATEWAY TRANSCODER-UTILIZATION-AWARE SESSION CONTROL
Some examples herein can permit increasing the number of concurrent sessions that a network can support. An anchoring network device can anchor the sessions. A...
2018/0324234 ESTIMATING NETWORK DATA STREAMING RATE
In one example, the present disclosure describes a device, computer-readable medium, and method for estimating the streaming rate at which data is delivered...
2018/0324233 DYNAMIC SEGREGATED SECURE DATA CONNECTION
A system can perform operations including receiving a first data stream from a first device, wherein the first data stream is associated with an active session...
2018/0324232 MULTIPATH DATA STREAMING OVER MULTIPLE WIRELESS NETWORKS
Embodiments described herein relate to real-time streaming of large quantities of time critical data over multiple distinct networks from a wireless...
2018/0324231 MULTICAST ADAPTIVE BITRATE CHANNEL SELECTION IN ACCESS NETWORKS
A network element comprises a memory storing a data structure arrangement. The data structure arrangement includes: an ordered list of asset blocks having a...
2018/0324230 SYSTEM AND METHOD FOR DIGITAL CONTENT BROADCASTING TO SUBSCRIBERS IN A NETWORK
The present disclosure relates to a method for broadcasting a digital content among a plurality of computing devices of users on a single tap or click, the...
2018/0324229 SYSTEMS AND METHODS FOR PROVIDING EXPERT ASSISTANCE FROM A REMOTE EXPERT TO A USER OPERATING AN AUGMENTED...
Providing expert assistance from a remote expert to a user operating an augmented reality device. Particular systems and methods receive, at a server, a remote...
2018/0324228 COMMUNICATION TERMINAL, COMMUNICATION SYSTEM, COMMUNICATION MANAGEMENT METHOD, AND MEDIUM
A communication terminal includes an obtainer to obtain, for each destination candidate, attributes of the destination candidate, and state information that...
2018/0324227 COLLABORATION SESSIONS FOR CLOUD BASED VIRTUAL COMPUTING SYSTEM
A method includes instantiating a first virtual machine on a first computing device, establishing a first remote desktop connection between a second computing...
2018/0324226 NETWORK MANAGEMENT SYSTEM AND METHOD FOR AUTOMATIC REGISTRATION OF NETWORK DEVICE THEREOF
A network management system and method for automatic registration of network device thereof are disclosed. The system has an electronic device, a network...
2018/0324225 METHOD AND SYSTEM FOR OVER-THE-TOP VOICE FOR INTERNET OF THINGS DEVICES
A method, a device, and a non-transitory storage medium are provided to receive, from an end device, a registration message pertaining to a voice service that...
2018/0324224 Method And Apparatus For Controlling Services In An Internet Protocol Multimedia Subsystem
A method for controlling services in an Internet Protocol Multimedia Subsystem, IMS, the IMS comprising a Home Subscriber Server, HSS, and a Serving Call...
2018/0324223 SYSTEM AND METHOD FOR INTEGRATING SESSION INITIATION PROTOCOL COMMUNICATION IN A TELECOMMUNICATIONS PLATFORM
A system and method for facilitating signaling and media communication at a communication platform that includes receiving a communication request to a...
2018/0324222 TESTING DISTRIBUTED APPLICATIONS THAT HAVE AN ESTABLISHED EXCHANGE IN AN ADVANCED MESSAGE QUEUING PROTOCOL...
A method for testing a distributed application. The method includes receiving the automation test code and initiating execution of the automation test code. A...
2018/0324221 ADVANCED ASSET TRACKING AND CORRELATION
A security management system may be remotely deployed (e.g., using a cloud-based architecture) to add security to an enterprise network. For example, the...
2018/0324220 USING INDICATIONS OF COMPROMISE FOR REPUTATION BASED NETWORK SECURITY
Threat detection instrumentation is simplified by providing and updating labels for computing objects in a context-sensitive manner. This may include simple...
2018/0324219 NETWORK SECURITY FRAMEWORK BASED SCORING METRIC GENERATION AND SHARING
Systems and methods are described for analysing, sharing and comparing security configurations. According to one embodiment, a security metric for a network...
2018/0324218 LEARNING NETWORK TOPOLOGY AND MONITORING COMPLIANCE WITH SECURITY GOALS
Systems and methods for monitoring compliance with security goals by a network or part thereof are provided. According to one embodiment, a topology of a...
2018/0324217 BUILDING A COOPERATIVE SECURITY FABRIC OF HIERARCHICALLY INTERCONNECTED NETWORK SECURITY DEVICES
Systems and methods for implementing a cooperative security fabric (CSF) protocol are provided. According to one embodiment, a CSF of multiple network security...
2018/0324216 SYSTEMS AND METHODS FOR EXECUTING PROCESSOR EXECUTABLE APPLICATIONS
Methods and systems for executing an application by a computing device are provided. One method includes generating an operating policy for a processor...
2018/0324215 Unidirectional Trust Based Decision Making for Information Technology Conversation Agents
A method and system of processing an information technology (IT) electronic request is provided. The electronic request is received in natural language from a...
2018/0324214 Crypto-Ransomware Compromise Detection
A memory system includes a controller having a processor and one or more memory media, and a method of operating the memory system. A host generates honeypot...
2018/0324213 METHODS AND SYSTEMS FOR CYBER-HACKING DETECTION
Methods and systems for cyber-hacking detection are provided. One method includes generating, by a processor, one or more artificial accounts for a type of...
2018/0324212 METHOD AND DEVICE FOR SIMULATING AND DETECTING DDoS ATTACKS IN SOFTWARE DEFINED NETWORKING
The present disclosure provides a method and a device for simulating and detecting DDoS Attacks in software defined networking. The method comprises: adding...
2018/0324211 SYSTEM AND METHOD FOR PREVENING DENIAL OF SERVICE ATTACKS
A system for preventing a distributed denial of service (DDoS) attack is disclosed. The system includes a content delivery network (CDN) server connected to...
2018/0324210 METHOD AND SYSTEM FOR DETERMINING A READINESS OF A COMPUTER NETWORK OF AN ORGANIZATION TO DENIAL OF SERVICE...
A method, a system, and a computer readable medium for determining a readiness of a computerized network against distributed denial of service (DDoS) attacks...
2018/0324209 NETWORK ATTACK DEFENSE METHOD, APPARATUS, AND SYSTEM
A network attack defense method is provided. An access request transmitted from a client to a target server is intercepted by at least one processor of a...
2018/0324208 SYSTEM AND METHOD FOR IDENTIFYING AND PREVENTING MALICIOUS API ATTACKS
A system and method for identifying and preventing malicious application programming interface attacks is configured to, during a learning stage: monitor all...
2018/0324207 NETWORK SECURITY THREAT INTELLIGENCE SHARING
Systems and methods are disclosed for obtaining network security threat information and mitigating threats to improve computing network operations. For...
2018/0324206 Secure Analysis Application For Accessing Web Resources Via URL Forwarding
Embodiments described herein may be directed to systems, methods, apparatuses, devices, computer program products, computer-executable instructions, and/or...
2018/0324205 SYSTEM AND METHOD FOR PERFORMING REMOTE SECURITY ASSESSMENT OF FIREWALLED COMPUTER
Methods and systems for scanning an endpoint terminal across an open computer network are disclosed. An exemplary method includes providing a scanner engine in...
2018/0324204 SYSTEM AND METHOD FOR REAL-TIME ASYNCHRONOUS MULTITENANT GATEWAY SECURITY
Disclosed herein are system, apparatus, article of manufacture, method, and/or computer program product embodiments for real-time asynchronous multitenant...
2018/0324203 INTELLIGENT CONTAINER RESOURCE PLACEMENT BASED ON CONTAINER IMAGE VULNERABILITY ASSESSMENT
Determining placement of cloud resources and containers relative to nodes in a cloud managed platform by using placement criteria and leveraging image...
2018/0324202 System and Method for Threat Incident Corroboration in Discrete Temporal Reference Using 3D Dynamic Rendering
A system and method for evaluating cyber-security threat incidents of a computer network is described in this document. In particular, it is described that...
2018/0324201 SYSTEMS AND METHODS FOR PROVIDING USER INTERFACES BASED ON ACTIONS ASSOCIATED WITH UNTRUSTED EMAILS
The present disclosure describes a system that notifies users regarding specific user decisions with respect to solution phishing emails. The system notifies...
2018/0324200 METHOD FOR BLOCKING CONNECTION IN WIRELESS INTRUSION PREVENTION SYSTEM AND DEVICE THEREFOR
The present disclosure relates to a method for blocking the connection of an electronic device inside a wireless intrusion prevention system, the method...
2018/0324199 SYSTEMS AND METHODS FOR ANOMALY DETECTION
An anomaly detection module may include a time-series analyzer that classifies current time-series data into at least one of a plurality of classifications...
2018/0324198 COMPUTING RESOURCE IDENTIFICATION
Systems and methods are disclosed for computing network operations. For example, methods may include identifying one or more partial matches between a value...
2018/0324197 AGGREGATING NETWORK SECURITY DATA FOR EXPORT
Systems and methods are disclosed for computing network operations. For example, methods may include receiving, at a computing device located within a private...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.