Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,807,147 Program recording webification
A method of providing a program recording to a user includes: accessing an application service provider that includes a program database via a first connection...
US-9,807,146 System and method for providing cloud based user interfaces
Provided is a method and system for providing cloud based user interface (UIs) that may store video content and a UI resource in a storage separate from a...
US-9,807,145 Adaptive tile framework
The present disclosure includes an adaptive tile framework. In one embodiment, a method is disclosed comprising sending an access request from a mobile...
US-9,807,143 Systems and methods for event routing and correlation
A collaboration environment provides a generic event distributing framework that can distribute both synchronous and asynchronous events. The distributed events...
US-9,807,142 Client, a content creator entity and methods thereof for media streaming
The embodiments of the present invention relate to methods and arrangements for accomplishing trick modes. This is achieved by assigning samples within a track...
US-9,807,141 Playing of media content among multiple devices using a temporal progress
In a playing of media content among multiple devices, a first device creates a first progress information associated with a media content and the first device....
US-9,807,140 Method, terminal, and system for reproducing content
A method of reproducing content is provided. The method includes, when a sync terminal reproduces content by receiving the content from a source terminal via a...
US-9,807,139 System and method for active transcoding of content in a distributed system
A system and method for streaming media and, more particularly, to a system and method for active transcoding of content in a distributed system. The method...
US-9,807,138 Adaptive streaming using chunked time-to-offset mapping
Systems and methods are provided herein relating to adaptive video streaming. Time-to-offset mapping associated with a set of video blocks can be broken up into...
US-9,807,137 Virtualization in adaptive stream creation and delivery
An adaptive streaming server, a method, and a system are described herein that create a content stream to be delivered to one or more clients by segmenting the...
US-9,807,136 System and method for streaming application isolation
Providing streaming of one or more applications from streaming servers onto one or more clients. The computer readable medium includes computer-executable...
US-9,807,135 Methods and computing systems for sharing cloud files using a social network
A computing system for sharing a cloud data file using a social network is disclosed. The system includes a social network server and a cloud server. The cloud...
US-9,807,134 Method and device for filtering media packets
A method including: receiving, at a video conferencing device, a packet of a video conferencing media stream, the video conferencing device including a...
US-9,807,133 Notification control apparatus for replying to received information and notification control method
In accordance with one embodiment, a notification control apparatus comprises an interface and a control section. The interface receives first information sent...
US-9,807,132 Collective operation management in a parallel computer
Methods, apparatuses, and computer program products for collective operation management in a parallel computer are provided. Embodiments include a parallel...
US-9,807,131 Collective operation management in a parallel computer
Methods, apparatuses, and computer program products for collective operation management in a parallel computer are provided. Embodiments include a parallel...
US-9,807,130 Multiple avatar personalities
Perception of multiple online personas is enabled in an instant messaging communications session. At least two identities within a communications environment to...
US-9,807,129 Host enabled management channel
A logical communication path is provided between a target virtual machine (VM) and a host or application communicating with the VM. The target VM runs on a...
US-9,807,128 Communication system and computer readable medium
A communication system include: a first acquisition unit configured to acquire request information of session initiation and authentication information of...
US-9,807,127 Method and apparatus for distributed compositional control of end-to-end media in IP networks
A method and an apparatus for performing a distributed control of end-to-end media on packet networks such as Voice over Internet Protocol and Service over...
US-9,807,126 Operating a network node
Measures, including methods, apparatus and computer programs, for use in operating a network node. At the network node a database of session description...
US-9,807,125 System and method for tracking and auditing data access in a network environment
A system and method that correlate business transaction in a system and traffic generated from this business transaction in a network back to a user identity...
US-9,807,124 Lawful intercept provisioning system and method for a network domain
A network provisioning system includes a computer-based set of instructions that receive, from a third party network provisioning system managed by a third...
US-9,807,123 Electronic messaging exchange
A computer-implemented system and method for secure electronic message exchange including coupling a control platform to a workstation of a plurality of...
US-9,807,122 Security considerations for outgoing communications
A method includes determining a topic and a media type of a communication to be sent from a sending communication device to a designated receiving communication...
US-9,807,121 Apparatus and method for decryption of secure communication sessions
An apparatus includes a processor and a memory storing instructions executed by the processor to receive a first communication session using a first key, where...
US-9,807,120 Method and system for automated incident response
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for implementing a response to one or more security incidents in...
US-9,807,119 System and method for supporting web services in a multitenant application server environment
In accordance with an embodiment, described herein is a system and method for supporting web services in a multitenant application server environment. The...
US-9,807,118 Security orchestration framework
In an example, there is disclosed a computing apparatus, including: a network interface; one or more logic elements providing a security orchestration server...
US-9,807,117 System and apparatus for providing network security
A rule engine receives data flows. The data flows are between a network and an application. The rule engine determines data flow information and in dependence...
US-9,807,116 Methods and apparatus to identify priorities of compliance assessment results of a virtual computing environment
Methods, apparatus, systems and articles of manufacture are disclosed to identify priorities of compliance assessment results of a virtual computing...
US-9,807,115 System and a method for identifying the presence of malware and ransomware using mini-traps set at network...
A system and a method for identifying the presence of ransomware on a network including a plurality of resources, and for trapping the ransomware therein.
US-9,807,114 System and a method for identifying the presence of malware using mini-traps set at network endpoints
A system for identifying the presence of advanced persistent threats on a network including a plurality of resources, interconnected to form a network, at least...
US-9,807,113 Polymorphic obfuscation of executable code
This document generally relates to systems, method, and other techniques for identifying and interfering with the operation of computer malware, as a mechanism...
US-9,807,112 Methods, apparatuses, and computer program products for facilitating randomized port allocation
A method, apparatus, and computer program product are provided for facilitating randomized port allocation. An apparatus may include a processor configured to...
US-9,807,111 Systems and methods for detecting advertisements displayed to users via user interfaces
The disclosed computer-implemented method for detecting advertisements displayed to users via user interfaces may include (1) monitoring, via an accessibility...
US-9,807,110 Method and system for detecting algorithm-generated domains
A method and system for detecting algorithm-generated domains (AGDs) is disclosed wherein domain names requested by an internal host are categorized or...
US-9,807,109 Profiling cyber threats detected in a target environment and automatically generating one or more rule bases...
A computer implemented method of profiling cyber threats detected in a target environment, comprising: receiving, from a Security Information and Event Manager...
US-9,807,108 Computer network attribute bilateral inheritance
Current approaches to managing security intelligence data often address both threat and malicious behavior at the individual computer level, tracked by the...
US-9,807,107 Monitoring and managing user privacy levels
Various embodiments pertain to techniques for measuring a user's privacy level as a user interacts with various web services. In various embodiments, entities...
US-9,807,106 Mitigating blockchain attack
A computer implemented method for detecting malicious events occurring with respect to a blockchain data structure comprising: defining a transaction creation...
US-9,807,105 Adaptive behavior profiling and anomaly scoring through continuous learning
Generating a behavior profile is provided. A newness score is calculated for a data point corresponding to a context of an access request to a resource made by...
US-9,807,104 Systems and methods for detecting and blocking malicious network activity
An authenticating device configured for network authentication is described. The authenticating device includes a processor. The authenticating device also...
US-9,807,103 Data communication
A client terminal sends a communication request to a server. The server generates at least one digit code according to a first preset rule. The server sends...
US-9,807,102 Real-time communication support system within a group
A communication support system among a plurality of users within a hierarchical structure is disclosed herein. An electronic note may be transcribed using a...
US-9,807,101 Inferring security-sensitive entities in libraries
A method for analyzing a software library may include obtaining the software library, identifying a candidate security-sensitive entity in the software library,...
US-9,807,100 System and method for private social networking
System protects user's data on social networking websites by creating a data filter, which operates between the user and the social networks accessed by the...
US-9,807,099 Utility portals for managing demand-response events
Various utility portals that enable utility companies to manage demand-response events are disclosed. The disclosed utility portals include several different...
US-9,807,098 Cross access login controller
Systems and methods here may be used for authorizing network access including using by a server computer with a processor and memory, for receiving, through the...
US-9,807,097 System for managing access to protected resources
A rules evaluation engine that controls user's security access to enterprise resources that have policies created for them. This engine allows real time...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.