Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,888,055 Firewall for a virtual network and related techniques
A system for filtering traffic in virtual networks includes a first virtual machine executed by a first physical server connected to a physical network and a...
US-9,888,054 Seamless video pipeline transition between WiFi and cellular connections for real-time applications on mobile...
Performing a real-time application on a mobile device, involving communication of audio/video packets with a remote device. The mobile device may initially...
US-9,888,053 Systems and methods for conditional download using idle network capacity
Systems and methods for downloading data by conditionally using idle network capacity are described. In some embodiments, the systems and methods downloads into...
US-9,888,052 ABR allocation for statistical multiplexing
As one example, a method includes analyzing profile metadata for each of a plurality of ABR program streams within a lookahead window from a current chunk...
US-9,888,051 Heterogeneous video processing using private or public cloud computing resources
A system including one or more cloud computing units and a ground unit. The one or more cloud computing units may be configured to process video content. The...
US-9,888,050 Method and apparatus for integrating various network elements and providing media processing services
An approach for integrating network elements and providing media processing services, which includes generating at least one integration interface for...
US-9,888,049 Transmission apparatus, instruction apparatus, transmission method, instruction method, and storage medium
The present invention can determine whether to enable or disable a restriction function of viewing an image to be transmitted, for each video stream. There is...
US-9,888,048 Supporting millions of parallel light weight data streams in a distributed system
A system for sending a command stream comprises a first input interface, a processor, and an output interface. The first input interface is configured to...
US-9,888,047 Efficient on-demand generation of ABR manifests
In one embodiment of the present invention, an HLS transcoder inserts a plurality of encoder boundary points (EBPs) into an HLS formatted content item, a...
US-9,888,046 Systems, methods and media for identifying and associating user devices with media cues
Systems, methods, and media for identifying and associating user devices with media cues are provided. In some embodiments, a plurality of data streams from a...
US-9,888,045 IP multimedia subsystem and method for MBMS file repair using HTTP servers
Disclosed in some examples is a method of media repair in an IMS based network, the method includes communicating with an IMS network using SIP to setup a...
US-9,888,044 Extending communication services to a consumption device using a proxy device
A system for data communications comprising a handset having a processor, a wireless communications device, a speaker and a microphone and one or more software...
US-9,888,043 Method for providing voice communication service and electronic device thereof
An apparatus and a method for providing a voice communication service using a Long Term Evolution (LTE) network in an electronic device are provided. A method...
US-9,888,042 Systems and methods for multipath transmission control protocol connection management
The present invention is directed towards systems and methods for multipath transmission control protocol connection (MPTCP) management. A first device,...
US-9,888,041 Virtual communication endpoint services
Customers can utilize resources of a multi-tenant environment to provide one or more services available to various users. In order to simplify the process for...
US-9,888,040 Secure application zones for cloud burst environments
A cloud infrastructure security assurance service is enhanced to facilitate bursting of cloud applications into other cloud infrastructures. The security...
US-9,888,039 Network-based permissioning system
Aspects of the present disclosure include a system comprising a computer-readable storage medium storing at least one program and a method for managing access...
US-9,888,038 Method and apparatus for providing mobile and social services via virtual individual servers
A method, computer readable medium and apparatus for providing a virtual individual server service within a communications network are disclosed. For example,...
US-9,888,037 Cipher suite negotiation
A client and a server negotiate a cipher suite as part of establishing a TLS connection. Cipher suites are rated with an associated level of security. In one...
US-9,888,036 Message sending device, message receiving device, message checking method, and recording medium
A message sending device includes a processor that executes a process. The process includes: obtaining an operation characteristic during creating a message;...
US-9,888,035 Systems and methods for detecting man-in-the-middle attacks
A computer-implemented method for detecting man-in-the-middle attacks may include (1) registering a mobile device of a user within a computing environment as an...
US-9,888,034 Pluggable API firewall filter
A web server includes a servlet and a pluggable API firewall filter coupled to the servlet. The pluggable filter protects the web server from content based...
US-9,888,033 Methods and apparatus for detecting and/or dealing with denial of service attacks
Methods and apparatus for detecting and minimizing the effects of Denial Of Service (DOS) attacks in high-speed networks in which packet processing is carried...
US-9,888,032 Method and system for mitigating the effects of ransomware
Computerized methods and systems mitigate the effect of a ransomware attack on an endpoint by detecting access events associated with requests by processes,...
US-9,888,031 System and method thereof for identifying and responding to security incidents based on preemptive forensics
A system is connected to a plurality of user devices coupled to an enterprise's network. The system continuously collects, stores, and analyzes forensic data...
US-9,888,030 Detection of stealthy malware activities with traffic causality and scalable triggering relation discovery
A computer system for distinguishing user-initiated network traffic from malware-initiated network traffic comprising at least one central processing unit (CPU)...
US-9,888,029 Classifying kill-chains for security incidents
Systems, methods, and software described herein provide security actions based on the current state of a security threat. In one example, a method of operating...
US-9,888,028 Combination of remote triggered source and destination blackhole filtering
A method for remote triggered black hole filtering can include advertising a first modified next hop address for a destination address of network traffic, and...
US-9,888,027 Security risk mapping of potential targets
A method comprising: receiving an identification of the target assets at risk of being attacked and of the technology layers of the organization, wherein each...
US-9,888,026 Computer system for distributed discovery of vulnerabilities in applications
In one aspect, the disclosure provides: A method comprising: inviting a distributed plurality of researchers to participate in one or more computer...
US-9,888,025 Method and system for providing an efficient asset management and verification service
A virtual asset creation template associated with a class of virtual assets is identified and analyzed to identify and remedy vulnerabilities in the virtual...
US-9,888,024 Detection of security incidents with low confidence security events
Techniques are disclosed for detecting security incidents based on low confidence security events. A security management server aggregates a collection of...
US-9,888,023 Presentation of threat history associated with network activity
Methods and systems for extracting, processing, displaying, and analyzing events that are associated with one or more threats are provided. According to one...
US-9,888,022 Providing application-specific threat metrics
Assessment of threat risks associated with a given mobile device application (app) on a device type specific basis, so that the threat assessment is specific to...
US-9,888,021 Crowd based detection of device compromise in enterprise setting
A computer-implemented method, computer program product, and system for detecting anomalous behavior of computing devices are provided. The computer-implemented...
US-9,888,020 Global clustering of incidents based on malware similarity and online trustfulness
In an embodiment, a method, performed by processors of a computing device for creating and storing clusters of incident data records based on behavioral...
US-9,888,019 System and method for detecting malicious links in electronic messages
According to one embodiment, in response to receiving a plurality of uniform resource locator (URL) links for malicious determination, any known URL links are...
US-9,888,018 Configuration management for network activity detectors
Network activity detectors, such as firewalls, communicate with one another to form a Unified Threat Management System. A first network activity detector sends...
US-9,888,017 Collaborative content evaluation
In an example embodiment, a system for evaluating published content is provided. The system includes at least one processor and a plurality of components...
US-9,888,016 System and method for detecting phishing using password prediction
Phishing detection techniques for predicting a password for decrypting an attachment for the purpose of malicious content detection are described herein....
US-9,888,015 Systems and methods of managing access to remote resources
A method and system are provided for managing access to resources available remotely from at least one computing device. The resources include at least one...
US-9,888,014 Enforcing security for sensitive data on database client hosts
A restriction agent resides on a database client host, the database client host receiving first data from a database secured by a database access control...
US-9,888,013 Determining virtual adapter access controls in a computing environment
A control component of a computing environment initiates sending of request(s) over a network of the computing environment by an activated virtual adapter. The...
US-9,888,012 Determining virtual adapter access controls in a computing environment
A control component of a computing environment initiates sending of request(s) over a network of the computing environment by an activated virtual adapter. The...
US-9,888,011 Social media login and interaction management
A hardware or software firewall may be installed within a private network. The firewall may intercept a first set of login credentials entered into a login...
US-9,888,010 System and method for providing an integrated firewall for secure network communication in a multi-tenant...
An integrated firewall provides security in a multi-tenant environment having a connection-based switched fabric directly connecting database servers which...
US-9,888,009 Security bypass environment for circumventing a security application in a computing environment
Exemplary embodiments of the present disclosure are directed to performing an operation in a computing environment that is prohibited by a security application...
US-9,888,008 Remote monitoring system and remote monitoring apparatus
In one embodiment, a remote monitoring system includes a monitoring apparatus displaying a screen for monitoring a power plant, a remote monitoring apparatus...
US-9,888,007 Systems and methods to authenticate users and/or control access made by users on a computer network using...
A controller for user authentication and access control, configured to: store data representing a graph having: nodes representing data elements associated with...
US-9,888,006 Resource management in a presentation environment
A method comprises collecting context information for a presentation using a set of monitoring devices stationed in the presentation environment where the...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.