Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,565,241 Control method and control apparatus for apparatus including short range wireless communication module
A control method and control apparatus for determining a relative location of a mobile terminal with respect to a display apparatus by using short range...
US-9,565,240 Media file access
A server system stores media library associated with a user. The media library includes at least one media file. The server system determines whether the media...
US-9,565,239 Selective access of multi-rate data from a server and/or peer
Aspects of the disclosed subject matter are directed to facilitating peer-to-peer data exchange in a common domain. In accordance with one embodiment, a method...
US-9,565,238 Method for controlling electronic apparatus, handheld electronic apparatus and monitoring system
A method for controlling an electronic apparatus, a handheld electronic apparatus, and a monitoring system are provided. An image within an image capturing...
US-9,565,237 Information processing apparatus, information processing system, and non-transitory computer readable medium
An information processing apparatus includes the following elements. An estimated processing time information obtaining unit obtains estimated processing time...
US-9,565,236 Automatic genre classification determination of web content to which the web content belongs together with a...
A mechanism is provided for automatic genre determination of web content. For each type of web content genre, a set of relevant feature types are extracted from...
US-9,565,235 System and method for controlling access to internet sites
A method and system for providing flexible access to Internet sites is described. In one aspect, a method includes receiving, via a computing device, a request...
US-9,565,234 Content request identification via a computer network
Systems and methods of providing information via a computer network are provided. A data processing system can obtain, via the computer network, a query...
US-9,565,233 Preloading content for requesting applications
Methods for preloading content in one application for another application are provided. In one aspect, a method includes receiving a request by a first...
US-9,565,232 Importing content items
Content items stored on a client device can be imported to a content management system. The client device can be configured to search on the client device for...
US-9,565,231 System and methods for providing multiple voice over IP service modes to a wireless device in a wireless network
Systems and methods are described for providing multiple voice service modes to a wireless device using data packet transmission through a wireless network....
US-9,565,230 System and method of encrypted media encapsulation
A system for and method of media encapsulation is presented. The method may include receiving, via an audio digitizer, a plurality of packets of data and...
US-9,565,229 Systems and methods for transmitting data
A server receives an update image for transmission to a client and encodes and compresses the update image data using a progressive encoding scheme. In one...
US-9,565,228 Streaming and downloading of content
Methods, apparatuses, systems, and software are described for providing content to a device comprising streaming content and sending content in a non-streaming...
US-9,565,227 Composition control method for remote application delivery
A method for communicating an image stream, one embodiment comprising negotiating, between a server and client, an MTCC identifying: a window as a portion of a...
US-9,565,226 Message capturing and seamless message sharing and navigation
A system, computer-readable storage medium storing at least one program, and a computer-implemented method for creating video streams is provided. An indication...
US-9,565,225 Server configuration including stream preview
A method includes receiving first input from a computing device, the first input corresponding to selection of a first media player associated with a first...
US-9,565,224 Methods, systems, and media for presenting a customized user interface based on user actions
Methods, systems, and media for presenting a customized user interface based on user actions are provided. In some implementations, a method for presenting a...
US-9,565,223 Social network interaction
In a mobile communications terminal 100, there is provided a gestural control application for associated operation with an image viewing application. The...
US-9,565,222 Granting access in view of identifier in network
Discussion of content between users of social networks is described. A request from a first user to discuss content with a recipient user in a first social...
US-9,565,221 Apparatus, system, and method of managing communication, and recording medium storing communication management...
A communication management system that manages a plurality of communication terminals transmits, to a request communication terminal, one of operation state...
US-9,565,220 Systems and methods for preventing fraud in an internet protocol telephony system
Systems and methods for preventing fraud in an IP based telephony system include noting when an IP based telephony device sent to a new customer is not...
US-9,565,219 Methods and apparatus for automatically adding a media component to an established multimedia collaboration session
A multimedia collaboration system that facilitates more efficient, free-flowing collaboration sessions. In order to make addition of new participants, media...
US-9,565,218 Resource management for WebRTC
A system performs client wake up for real-time communications ("RTC"). The system closes a connection between a gateway and an RTC application of a device. The...
US-9,565,217 Method, system, network and computer-readable media for controlling outgoing telephony calls
The present invention discloses numerous implementations for IP-based call processing systems that can selectively control an outgoing call initiated by a...
US-9,565,216 Methods, systems, and computer program products for security protocol selection in internet protocol multimedia...
A method includes receiving a first secured registration request message from user equipment at a registration server in an Internet Protocol multimedia...
US-9,565,215 Policy enforcement by end user review
Embodiments are disclosed that relate to enforcement of user policies in a multi-user interactive computing environment by end user review. For example, one...
US-9,565,214 Real-time module protection
Technologies for securing an electronic device include trapping an attempt to access a secured system resource of the electronic device, determining a module...
US-9,565,213 Methods and systems for protecting a secured network
Methods and systems for protecting a secured network are presented. For example, one or more packet security gateways may be associated with a security policy...
US-9,565,212 Secure mobile framework
Systems and methods for a secure mobile framework to securely connect applications running on mobile devices to services within an enterprise are provided....
US-9,565,211 Managing exchanges of sensitive data
A method, system or computer usable program product for managing exchanges of sensitive data including utilizing a processor to request a service across a...
US-9,565,210 Appliance for processing a session in network communications
A session of network communications is processed between a client terminal and a server by intercepting a request generated from a network transport unit of the...
US-9,565,209 Detecting electronic messaging threats by using metric trees and similarity hashes
Each node of a metric tree comprises a similarity hash of a member of a dataset of known message threats, calculated using a given similarity hashing algorithm....
US-9,565,208 System and method for detecting network intrusions using layered host scoring
Approaches for detecting network intrusions, such as malware infection, Trojans, worms, or bot net mining activities includes: identifying one or more threat...
US-9,565,207 Firmware updates from an external channel
When providing a user with native access to at least a portion of device hardware, the user can be prevented from modifying firmware and other configuration...
US-9,565,206 Security management in a networked computing environment
An approach for addressing (e.g., preventing) detected network intrusions in a virtualized/networked (e.g., cloud) computing environment is provided. In a...
US-9,565,205 Detecting fraudulent activity from compromised devices
A technique for detecting fraudulent activity in a compromised device involves downloading a software application from a processor that controls access to a...
US-9,565,204 Cyber-security system and methods thereof
A system and method for adaptively securing a protected entity against cyber-threats are presented. The method includes selecting at least one security...
US-9,565,203 Systems and methods for detection of anomalous network behavior
There is provided a computer implemented method for detecting anomalous behavior in a network, comprising: receiving data representing at least one network...
US-9,565,202 System and method for detecting exfiltration content
Techniques for detecting exfiltration content are described herein. According to one embodiment, a malicious content suspect is executed within a virtual...
US-9,565,201 Security threat identification/testing using annotated sequence diagrams
Embodiments provide apparatuses and methods supporting software development teams in identifying potential security threats, and then testing those threats...
US-9,565,200 Method and system for forensic data tracking
The present invention relates to a method and system for tracking the movement of data elements as they are shared and moved between authorized and unauthorized...
US-9,565,199 System and method for authentication of a communication device
A system and method for authentication of a communication device is disclosed. A system that incorporates teachings of the present disclosure may include, for...
US-9,565,198 Tenant based signature validation
Methods and systems are provided for validating a signature in a multi-tenant environment. A server or other computing device that is part of a distributed...
US-9,565,197 Secure verification of website claims
The disclosed embodiments provide a system that facilitates use of a website. During operation, the system enrolls a claim containing an assertion of a...
US-9,565,196 Trust level modifier
A computer establishes normal activity levels of a factor associated with an application, system, network, or computing environment. The computer receives rules...
US-9,565,195 User authentication based on FOB/indicia scan
Embodiments of the invention are directed to systems, methods and computer program products for receiving a request from a user for access to at least one...
US-9,565,194 Utilizing a social graph for network access and admission control
Technologies for providing access control for a network are disclosed. The method may include receiving a request from a user to access a network, receiving a...
US-9,565,193 Utilization of multiple keypads for password inputs
A computer system includes program instructions to generate a first virtual keypad for entry of a first portion of a password, wherein the first portion...
US-9,565,192 Router based securing of internet of things devices on local area networks
IoT devices are secured on multiple local area networks. Each local network contains a router which monitors activities of IoT devices, and transmits...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.