Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,871,862 Managing object identifiers based on user groups
A method, system, and computer program product for managing an object related to a plurality of groups of users is disclosed. The method, system, and computer...
US-9,871,860 Method and system for providing remote access to a state of an application program
A method and system for providing remote access to a state of an application executing on a remote server. A client computer includes a client remote access...
US-9,871,859 Control apparatus, control method and medium
A first control apparatus according to the present invention includes: a first receiving unit which receives a second message from any one of switch apparatuses...
US-9,871,858 System and method for peer to peer utility sharing
A method, computer program product, and computer system for receiving, at a second computing device by a first computing device, an invitation to establish a...
US-9,871,857 Optimal allocation of dynamic cloud computing platform resources
In various embodiments, methods and systems for optimizing allocation of dynamic resources are provided. A user service request resource instance is received at...
US-9,871,856 Resource allocation diagnosis on distributed computer systems
A system and method for performing a resource allocation diagnosis on a distributed computer system includes computing current resource allocation of the...
US-9,871,855 Balancing load across cache servers in a distributed data store
A technology for balancing computing resource load across cache servers in a distributed data store is disclosed. The technology can monitor computing resource...
US-9,871,854 Interaction with a virtual network
Systems and method for the management of virtual machine instances are provided. A network data transmission analysis system can host virtual machine networks....
US-9,871,853 Systems and methods for policy based integration to horizontally deployed WAN optimization appliances
The present disclosure presents systems and methods for policy based redirection of network traffic, by an intermediary device, to a horizontally deployed WAN...
US-9,871,852 Monitoring system with message forwarding, a method, and a computer program
Monitoring installations for buildings, building complexes, open spaces or other monitoring areas can comprise a plurality of system components. These system...
US-9,871,851 Migrating private infrastructure services to a cloud
Implementations are provided herein for the migration of known infrastructure services, such as those existing on a private cloud infrastructure, to a public...
US-9,871,850 Enhanced browsing using CDN routing capabilities
An edge node of a content delivery network (CDN) service receives a representation of a browsing request from a client-side component of a split-browser service...
US-9,871,849 Systems and methods for just-in-time state sharing
Methods and systems for sharing variable states from an appliance to one or more servers is disclosed. The appliance may identify a script, and identify the...
US-9,871,848 Integration engine for communications between source and target applications
An integration engine is provided for communications between source and target applications. A message is sent from a source application to a target...
US-9,871,847 Data-sharing system and method
The present invention provides a data-sharing system, including a media server, a first device and a second device. The media server has a media server address...
US-9,871,846 Download booths
A download booth comprising a local file server operatively connected to a removable disk drive containing, in use, multimedia content, the local file server...
US-9,871,845 Portlet scheduling with improved loading time and loading efficiency
A data processing, and more specifically, to a method and system for portlet scheduling. The method for scheduling a plurality of portlets according to the...
US-9,871,844 Method and apparatus for transmitting and receiving adaptive streaming mechanism-based content
An apparatus is provided for receiving a content in a system. The apparatus includes a receiver configured to receive a media presentation description including...
US-9,871,843 Method and system for downloading and playing media file, client, server, and storage medium
The present disclosure relates to method and system for downloading and playing a media file, a client, a server, and a storage medium. The client is configured...
US-9,871,842 Methods and systems for network based video clip processing and management
Methods and system for managing media clips over a data network. Media streams may be received over a data network and stored by a storage server. Metadata...
US-9,871,841 Media enhancement mechanism using embed code
A method to provide additional media objects for data objects containing one or more existing media objects is described. The existing media object is analyzed...
US-9,871,840 Electronic apparatus and method for transferring contents on cloud system to device connected to DLNA
An electronic apparatus is capable of transferring contents on a cloud system to a device connected to a DLNA. In a method for operating a client on the cloud...
US-9,871,839 Seamless multicast and unicast switching for content playback
Content streams, such as video streams, may be seamlessly provided as both multicast and unicast transmissions. For example, in one implementation, a mobile...
US-9,871,838 Media playback redirected to a networked renderer
A single stream receiver is preselected from a global list residing on a client computing device hosting a content casting application. Once a user launches a...
US-9,871,837 Establishing a social application layer
A virtual space may be presented within a plurality of virtual environments provided by different platforms without requiring idiosyncratic APIs associated with...
US-9,871,836 Featured items of distributed discussion collaboration
In an embodiment, a method for distributed discussion collaboration is provided. The computer-implemented method includes selecting a featured discussion item...
US-9,871,835 System and method for managing multi-modal communication sessions
A computing system for managing a multi-modal communication session in an enterprise is disclosed. The computing system includes a monitoring module for...
US-9,871,834 Goal-based connection management between parties
A monitoring computer system receives a message, from a first party, which identifies a goal of the first party. The monitoring computer system receives an...
US-9,871,833 Adjusting the display of social media updates to varying degrees of richness based on environmental conditions...
A method, system and computer program product for adjusting a display of social media updates to varying degrees of richness. A level of importance for each...
US-9,871,832 Method and apparatus for creating a dynamic history of presentation materials in a multimedia collaboration session
A system comprises client devices that include user interfaces that comprise workspaces that can be used to display a live history of a multimedia collaboration...
US-9,871,831 Method for supporting circuit switched interworking
A method includes receiving internet protocol (IP) multimedia core network subsystem (IMS) session content that includes voice call content in IMS domain and...
US-9,871,830 Internet of things context-enabled device-driven tracking
A determination is made at a server that a network connected device is to control monitoring performed by a first network connected sensor. A first connection...
US-9,871,829 Voice over IP (VoIP) network infrastructure components and method
A voice over Internet protocol communication system and method provides infrastructure components as intermediaries between networks, the components include...
US-9,871,828 Enhanced IMS services restriction and selection control for mobile devices roaming in foreign networks
A system and method that allows a mobile device to register for IMS services while the mobile device is roaming in a visited telecommunications network is...
US-9,871,827 System and method of lawful access to secure communications
The present disclosure relates to systems and methods for secure communications. In some aspects, a method of signalling an interception time period is...
US-9,871,826 Sensor based rules for responding to malicious activity
Systems and techniques are provided for creating sensor based rules for detecting and responding to malicious activity. Evidence corresponding to a malicious...
US-9,871,825 Policy enforcement for compute nodes
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for maintaining, by a policy enforcement system in a first...
US-9,871,824 Unified policy over heterogenous device types
A system and method are disclosed for enforcing a normalized set of policy-based behaviors across two or more disparate client devices. The policy definition...
US-9,871,823 Techniques to deliver security and network policies to a virtual network function
Examples may include techniques to securely provision, configure, and de-provision virtual network functions for a software defined network or a cloud...
US-9,871,822 Deployment using a context-based cloud security assurance system
A cloud infrastructure is enhanced to provide a context-based security assurance service to enable secure application deployment. The service inspects network...
US-9,871,821 Securely operating a process using user-specific and device-specific security constraints
A method for enforcing secure processes between a user and a device involves determining that the user has initiated installation of a secure application,...
US-9,871,820 Technologies for managing network privileges based on physical presence
Technologies for managing network privileges of members of graft-network include detecting a computing device in physical presence with a network ...
US-9,871,819 Zone-based security architecture for intra-vehicular wireless communication
Systems and methods provide secure and wireless intra-vehicular communication. An intra-vehicular communication system has a secured network segment including a...
US-9,871,818 Managing workflows upon a security incident
Systems, methods, and software described herein provide for managing service level agreements (SLAs) for security incidents in a computing environment. In one...
US-9,871,817 Social engineering simulation workflow appliance
A system for evaluating the susceptibility of an organization to social engineering, the organization having a plurality of sources and a plurality of members...
US-9,871,816 Systems and methods for security management of multi-client based distributed storage
There is provided a method of maintaining a security risk level of data objects stored in a distributed system, comprising: estimating a current security risk...
US-9,871,815 Method and system for automated computer vulnerability tracking
There is provided a method and system for tracking, compiling, and distributing information regarding computer vulnerabilities. The method and system involve...
US-9,871,814 System and method for improving security intelligence through inventory discovery
A system for monitoring devices in a network comprising a coordinator operating on a first processor and configured to detect a plurality of active devices and...
US-9,871,813 Method of and system for processing an unauthorized user access to a resource
There is provided a method of processing a potentially unauthorized user access request. The method is executable on a server. The method comprises: receiving a...
US-9,871,812 Methods and apparatus for application isolation
Processor(s) for detecting malicious software. A hardware virtual machine monitor (HVMM) operates under a host OS. Container(s) initialized with network...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.