Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,838,457 Redirection service mechanism
A system can include an interface that receives a URL that includes information; circuitry that processes at least a portion of the information for entity...
US-9,838,456 Media file synchronization
The description generally relates to a system designed to synchronize the rendering of a media file between a master device and a sister device. The system is...
US-9,838,455 Fast encoding of live streaming media content
Techniques and mechanisms described herein facilitate the management of encoders for live media content streams. A media content system may employ potentially...
US-9,838,454 Policy-based payload delivery for transport protocols
Information describing a rule to be applied to a traffic stream is received at an edge network device. The traffic stream is received at the edge network...
US-9,838,453 Systems and methods for dynamic access to program features
The multimedia client-server system provides a multimedia client program with a set of features and a server system that creates feature access information that...
US-9,838,452 Method and system for generating bandwidth adaptive segment file for HTTP based multimedia streaming service
Provided is a method and system for generating a network bandwidth adaptive content, the method including: measuring bandwidth information of a transmission...
US-9,838,451 Systems and methods for dynamic access to program features
The multimedia client-server system provides a multimedia client program with a set of features and a server system that creates feature access information that...
US-9,838,450 Dynamic chunking for delivery instances
Techniques are provided for dynamically creating index files for streaming media based on a determined chunking strategy. The chunking strategy can be...
US-9,838,449 Local streaming proxy server
A local application streaming proxy can create a virtual image of storage media, which allows cloud operators to rapidly deliver applications, or deliver any...
US-9,838,448 Method for reducing interference caused by overlapping channels in a wireless communication system
A method of reducing interference between wireless networks operating on channels with different bandwidths is proposed. One wireless network operates on a...
US-9,838,447 Method of conveying a location information representing a physical location of a first communication device, a...
A method of conveying a location information (2) representing a physical location of a first communication device (D) from the first communication device (D) to...
US-9,838,446 Facilitating user communication about a common topic
Among other things, we describe identifying, in first data available to a first user and not available to a second user, and in second data available to the...
US-9,838,445 Quantifying social capital
For each of a group of nodes including a node corresponding to a first member and a plurality of nodes corresponding to members with which the first member is...
US-9,838,444 Systems and methods for dynamically providing fonts based on language settings
A server dynamically provides fonts to a user device. The user device is provided with access to a document via a network. An update to a language parameter...
US-9,838,443 Real-time media control for audio and multimedia conferencing services
A method for controlling media presentation during a teleconference. The method generally includes the steps of coupling a buffer operatively to a host device...
US-9,838,442 Systems and methods for implementing data analysis workflows in a non-destructive testing system
A collaboration system may include a first computing device that may communicate with at least one other computing device via a computing network. The computing...
US-9,838,441 Hybrid communications system using peer-to-peer and centralized architecture
A hybrid communication system estimates a quality of service (QoS) for a plurality of session channels available to couple a first device on a first network...
US-9,838,440 Managing voice over internet protocol (VoIP) communications
The disclosed embodiments include a computer implemented method for managing network communications. In one embodiment, the method includes gathering, using...
US-9,838,439 Telephone number simplification for VoIP networks
A telecommunications network includes a network service computing device and a host routing device. The host routing device includes a switch. The host routing...
US-9,838,438 Communication system using heterogeneous networks
Disclosed is a communication system and, more particularly, a communication system using heterogeneous networks to support voice calls by combining private...
US-9,838,437 Method, device, and system for implementing prompting and collecting user information
The present invention discloses a method, a device, and a system for implementing prompting and collecting user information, and belongs to the field of...
US-9,838,436 Aircraft data networks
An aircraft data network is provided that can include a first Remote Data Concentrator (RDC), a network switch and a second RDC. The first RDC can receive one...
US-9,838,435 Authenticator for user state management
Different types of soft-lockout policies can be associated with different organizations (or groups) in an identity management system. Each soft-lockout policy...
US-9,838,434 Creating and managing a network security tag
An apparatus, computer readable medium, and method are provided in one example embodiment and include a network device, an analysis module, and a tag module....
US-9,838,433 Information processing apparatus and control method for information processing apparatus
In an information processing apparatus that communicates with a printing control apparatus, whether the printing control apparatus is connected is determined in...
US-9,838,432 System and method for automatic data protection in a computer network
A method of protecting data items in an organizational computer network, including, defining multiple information profiles for classifying the data item,...
US-9,838,431 Context-based cloud security assurance system
A cloud infrastructure is enhanced to provide a context-based security assurance service to enable secure application deployment. The service inspects network...
US-9,838,430 Temporarily providing a software product access to a resource
Functionality is disclosed herein for providing temporary access to a resource. A software product that is executing in response to a request from a customer...
US-9,838,429 Dynamic access policies
Securely granting access to a target system to a user is disclosed. A plurality of security policies is requested from a plurality of distributed policy...
US-9,838,428 Systems and methods for utilizing client side authentication to select services available at a given port number
Typically, clients request a service from a computer hosting multiple services by specifying a destination port number associated with the desired service. In...
US-9,838,427 Dynamic service handling using a honeypot
A network device comprises one or more processors coupled to a memory, and a dynamic services module configured for execution by the one or more processors to...
US-9,838,426 Honeyport active network security
A device comprises a processor. The processor is configured to generate a first signal using a first communication protocol. The first signal corresponds to...
US-9,838,425 Systems and methods for network access control
Network access control systems and methods are provided herein. A method includes receiving at a network device a SYN packet from a client device over a...
US-9,838,424 Techniques to provide network security through just-in-time provisioned accounts
Techniques to contain lateral movement of attackers through just-in-time (JIT) provisioned accounts comprising an account management component to receive a...
US-9,838,423 Perfect forward secrecy distributed denial of service attack defense
Provided are methods and systems for mitigating a DoS attack. A method for mitigating a DoS attack may commence with receiving, from a client, a request to...
US-9,838,422 Detecting denial-of-service attacks on graph databases
Detecting a denial-of-service attack on a graph database is provided. In response to receiving a request to process a graph query on the graph database from a...
US-9,838,421 Systems and methods utilizing peer measurements to detect and defend against distributed denial of service attacks
A method, operated by a Software Defined Networking (SDN) controller associated with an Autonomous System (AS) with one or more peering points, each peering...
US-9,838,420 System and method for distributing most effective antivirus records to user devices
Disclosed are system and method for distributing most effective antivirus records to user devices. An exemplary method includes: collecting, by a server,...
US-9,838,419 Detection and remediation of watering hole attacks directed against an enterprise
A method comprises obtaining data characterizing web browsing activity of a group of users of an enterprise, processing the data characterizing the web browsing...
US-9,838,418 Detecting malware in mixed content files
Computer systems and methods in various embodiments are configured to determine whether a file is likely to be malware-free or include malware. In an...
US-9,838,417 Intelligent context aware user interaction for malware detection
According to one embodiment, a malware detection system is integrated with at least a static analysis engine and a dynamic analysis engine. The static analysis...
US-9,838,416 System and method of detecting malicious content
A computer worm containment system comprises a detection system and a blocking system. The detection system orchestrates a sequence of network activities in a...
US-9,838,415 Fight-through nodes for survivable computer network
A network node includes enhanced functionality to fight through cyber-attacks. A plurality of virtual machines run at the network node. The network node...
US-9,838,414 System and method for a security asset manager
Implementations of the present disclosure involve a system and/or method of performing security asset management. The system and/or method may schedule...
US-9,838,413 Zero day threat detection based on fast flux detection and aggregation
A method in a cloud-based security system includes operating a Domain Name System (DNS) resolution service, proxy, or monitor in the cloud-based security...
US-9,838,412 Computer software application self-testing
Testing a computer software application by detecting an arrival of input data provided as input to a computer software application from a source external to the...
US-9,838,411 Subscriber based protection system
A system features one or more network devices communicatively coupled to a management system. Configured to receive a portion of the network traffic, a first...
US-9,838,410 Identity resolution in data intake stage of machine data processing platform
A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security...
US-9,838,409 Cold start mechanism to prevent compromise of automatic anomaly detection systems
In one embodiment, a device in a network analyzes data indicative of a behavior of a network using a supervised anomaly detection model. The device determines...
US-9,838,408 System, device and method for detecting a malicious attack based on direct communications between remotely...
In an embodiment, a system, device and method for detecting a malicious attack is described. Herein, the system includes a security network device that conducts...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.