Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,781,053 Request routing and processing using a cancellation token
Remote computing resource service providers allow customers to reduce overhead by using computer hardware resources of the service provider to execute a variety...
US-9,781,052 Virtual machine and application movement over local area networks and a wide area network
Long distance cloud migration (LDCM) to overcome the limitations faced by the cloud migration techniques over long distance, high speed WAN infrastructures....
US-9,781,051 Managing information technology resources using metadata tags
A resource manager is tasked with monitoring and managing information technology (IT) resources in a virtual environment. The IT resources are assigned tags...
US-9,781,050 Globalization management system and method therefor
A globalization management system for managing resources of multiple interrelated data sources corresponding to a plurality of sites through a communications...
US-9,781,049 Resolving information in a database environment
Disclosed herein are techniques for identifying computing resources specified by a representation of a computing service. In some implementations, a request to...
US-9,781,048 Dynamic packet traffic performance adjustment systems and methods
A method, a network, and a network element use dynamic packet traffic performance adjustment techniques. In an exemplary embodiment, the dynamic resizing...
US-9,781,047 Wireless communication terminal and wireless communication method
A wireless communication terminal includes a processor; and a non-transitory memory storing thereon a program which is executed by the processor, the program...
US-9,781,046 Bandwidth throttling in vulnerability scanning applications
Apparatus and methods are disclosed for implementing bandwidth throttling to regulate network traffic as can be used in, for example, vulnerability scanning and...
US-9,781,045 Method and apparatus for providing multimedia broadcast and multicast service (MBMS) in wireless communication...
A method for receiving a multimedia broadcast multicast service (MBMS) by a user equipment (UE) in a wireless communication system; the UE therefore; a method...
US-9,781,044 Automated discovery and forwarding of relevant network traffic with respect to newly connected network tools...
Network tool optimizers and related methods are disclosed that provide automated discovery and configuration of network tool devices. The disclosed embodiments...
US-9,781,043 Identification of internal dependencies within system components for evaluating potential protocol level deadlocks
Systems and methods for automatically building a deadlock free inter-communication network in a multi-core system are described. The example implementations...
US-9,781,042 Network controller security monitor
Technologies are generally described for systems, devices and methods effective to compare network element instructions and network control instructions. In...
US-9,781,041 Systems and methods for native network interface controller (NIC) teaming load balancing
Systems and methods are provided that may be employed in a network environment to implement load balancing for multi-network interface controller (NIC) teaming...
US-9,781,040 Congestion detection based on resource utilization information and user quality-of-experience indicators
A capability is provided for detecting congestion in a communication network. A congestion condition is detected for the network based on resource utilization...
US-9,781,039 Times-sliced design segmentation
Systems and methods for multi-channel signal processing by a series of single processing core logic circuitries in time-slicing. A first logic circuitry is...
US-9,781,038 Packet routing and forwarding in information centric networking
A method may include receiving a content packet at an incoming interface of a network device; determining whether the content packet matches an identifier of...
US-9,781,037 Method and apparatus for advanced statistics collection
Systems, methods, and computer-readable media provide for collection of statistics relating to network traffic between virtual machines (VMs) in a network. In...
US-9,781,036 Emulating end-host mode forwarding behavior
Apparatuses, methods, program products, and systems for emulating end-host forwarding behavior is disclosed. A data module receives a data packet at an ingress...
US-9,781,035 Transitioning between communication protocols between networks
A method is provided in one particular example and may include obtaining routing information for a plurality of Internet Protocol (IP) addresses in a first...
US-9,781,034 Electronic device, network relay device, and non-transitory computer readable storage medium
An electronic device that relays an Internet Protocol (IP) packet compliant with one of a plurality of IP versions includes circuitry configured to process the...
US-9,781,033 Providing requested content in an overlay information centric networking (O-ICN) architecture
Methods and systems for providing requested content to a user device in an Overlay Information Centric Network (O-ICN) architecture are disclosed herein. The...
US-9,781,032 MPLS label usage in ethernet virtual private networks
In general, techniques are described for configuring a provider edge (PE) network device of an Ethernet virtual private network (EVPN) to use a common traffic...
US-9,781,031 Wireless home network routing protocol
An example method for a device to implement one of the nodes in a wireless network for processing packets includes submitting a request to a network-management...
US-9,781,030 Fast re-route protection using GRE over MPLS
Techniques are described for providing fast re-route (FRR) node and/or link protection along a primary label switched path (LSP) using generic routing...
US-9,781,029 Loop detection and prevention
Various systems and methods for preventing loops. For example, one method involves receiving a multicast data packet at a node. The node is coupled to a local...
US-9,781,028 Transcoding and dynamic error correction for content centric networks using a proxy server
A server according to the present disclosure includes: a converting unit that converts content data to enhance a real-time property, and creates a packet of the...
US-9,781,027 Systems and methods to communicate with external destinations via a memory network
Various systems and methods to facilitate general communication, via a memory network, between compute elements and external destinations, while at the same...
US-9,781,026 System and method to prevent polling overload for detection of presence information
A feature server determines a hierarchical network topology for identifying presence information of communication endpoints. The hierarchical network topology...
US-9,781,024 Supporting low latency applications at the edge of wireless communication networks
Various embodiments manage data flow between at least one wireless communication device and at least one application executing at an edge of the wireless...
US-9,781,023 Information processing device, information processing method, and recording medium
An information processing device includes a memory configured to store information related to data accesses by executions of a plurality of applications, and a...
US-9,781,022 Fault detection in communication system
Presented is a system for monitoring the integrity of a communication bus.
US-9,781,021 Method for determining connection status of wired network
A method applied to a wired network including a first network device and a second network device is disclosed. The first and second network devices each include...
US-9,781,020 Deploying applications in a networked computing environment
An approach for deploying and managing applications in a networked computing environment (e.g., a cloud computing environment). A user uploads an application...
US-9,781,019 Systems and methods for managing network communication
A computer-implemented method for managing network communication may include (1) identifying a pattern of network communication between a network node and a...
US-9,781,018 Time efficient counters and meters architecture
A network device includes a plurality of interfaces configured to receive, from a network, packets to be processed by the network device. A load determination...
US-9,781,017 Method for managing services on a network
The invention relates to a method for managing services on a network, comprising: at least two interconnected computer sites, each of which is capable of...
US-9,781,016 Dynamic addition of network function services
A method of dynamically adding a communication service function to a communication session comprises receiving a communication during a communication session on...
US-9,781,015 Making memory of compute and expansion devices available for use by an operating system
Examples disclosed herein relate to making memory of compute and expansion blade devices available for use by an operating system (OS). Examples include making...
US-9,781,014 Call establishment and maintenance in a wireless network
Techniques to configure quality of service (QoS) and utilize radio resources for a call in a WLAN are described. In an aspect, a station ensures that an access...
US-9,781,013 Homogenizing tooling for a heterogeneous cloud environment
A method, system and computer-usable medium are disclosed for controlling access to a node deployed in a cloud environment. A new node, based upon a common...
US-9,781,012 Behavior monitoring and compliance for multi-tenant resources
The behavior of multiple users with access to a multi-tenant resource can be monitored and compliance enforced by monitoring state information for each user....
US-9,781,011 Methods and systems for controlling network service quality
Methods and systems are provided for controlling network service quality. According to an aspect of the invention, a computer-implemented method is provided for...
US-9,781,010 Managing remote devices
A method and apparatus for managing remote devices. In one embodiment of the present invention, there is provided a method of managing a remote device,...
US-9,781,009 Methods and apparatus for standard protocol validation mechanisms deployed over a switch fabric system
An apparatus includes a destination edge device configured to receive a first validation packet according to a switch fabric validation protocol. The...
US-9,781,008 Visualization of dynamic fabric automation network topology
In one example embodiment, a computer-implemented method is provided in which data is received that represents connectivity state between a plurality of nodes...
US-9,781,007 Opportunistic block transmission with time constraints
A technique for determining a data window size allows a set of predicted blocks to be transmitted along with requested blocks. A stream enabled application...
US-9,781,006 Group isolation in wireless networks
Methods and systems here may be used for managing a wireless network including associating a first and second wireless access device to an access point (AP),...
US-9,781,005 Technique for ensuring congruency in link aggregation
The present disclosure provides a technique for ensuring that a service or conversation is carried in a congruent manner on a Link Aggregation Group (LAG). The...
US-9,781,004 Discovering and grouping application endpoints in a network environment
An example method for discovering and grouping application endpoints in a network environment is provided and includes discovering endpoints communicating in a...
US-9,781,003 Migration of profiles between virtual connect domains
Migration of profiles between virtual connect domains is described. In an example, a plurality of validations are performed on a profile from a first virtual...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.