At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Patent # | Description |
---|---|
US-9,930,102 |
Method and system for using emotional state data to tailor the user
experience of an interactive software system Emotional state data is used to tailor the user experience of an interactive software system, by monitoring and obtaining data about a user's emotional state.... |
US-9,930,101 |
Receiving a communication event Method, node and user terminal for receiving communication events over a communications network. The method comprising: executing a communication client at the... |
US-9,930,100 |
Progressive background uploading In one embodiment, a method includes accessing a first instance of content to be uploaded to a server, generating a second instance of the content from the... |
US-9,930,099 |
Hybrid segment-oriented file server and WAN accelerator In a network including WAN accelerators and segment-oriented file servers, a method comprises responding to a client request to manipulate a file via a network... |
US-9,930,098 |
Method and system for ISP network performance monitoring and fault
detection A monitoring tool to facilitate real-time system performance monitoring, fault detection, fault isolation, and fault remediation verification, wherein the... |
US-9,930,097 |
Transport accelerator systems and methods According to some aspects, a transport accelerator of a client device may generate a chunk request that is derived from a fragment request and that has... |
US-9,930,096 |
Recommending posts to non-subscribing users In general, the subject matter described in this specification can be embodied in methods, systems and program products. A server system receives from a... |
US-9,930,095 |
System for managing extension modifications to web pages A method and system provide, using a microprocessor of computing device associated with a web publisher, content including a web page. The method includes... |
US-9,930,094 |
Content complex providing server for a group of terminals The present invention provides a content complex providing server capable of providing a content complex containing a plurality of different constituent content... |
US-9,930,093 |
Dynamic web session clean-up A "sign-off" cookie is generated and stored upon initiation of a web session between a client and a web application executing on a server. The sign-off cookie... |
US-9,930,092 |
Editing an unhosted third party application A document editing system using a third party application having an embedded document editing module is disclosed. The system include a client-side document... |
US-9,930,091 |
Transport path-aware quality of service for mobile communications Embodiments provide quality of service for media content delivery over capacity-constrained communications links to user devices by exploiting usage models and... |
US-9,930,090 |
Optimizing transfer to a remote access client of a high definition (HD)
host screen image A host-client protocol facilitates delivery of screen images from a host to a remote access client when the host content is continuous or large (such as high... |
US-9,930,089 |
Memory management of digital audio data A system, method and computer-readable code for the management of digital media on a device with memory and storage restrictions. As with any device, memory and... |
US-9,930,088 |
Utilizing VoIP codec negotiation during a controlled environment call Controlled-environment communication systems are increasingly using voice over internet protocol (VoIP) to serve their users. VoIP allows voice to be sent in... |
US-9,930,087 |
Scheduling downloads based on metadata in a client-server topology A method, a computer program product, and a computer system for scheduling downloads based on metadata in a client-server topology. A server receives from a... |
US-9,930,086 |
Content presentation for MPEG media transport A method for simplified MPEG Media Transport (MMT) content presentation is provided. Two or more assets of an MMT package Processing Unit (MPU) are identified.... |
US-9,930,085 |
System and method for intelligent configuration of an audio channel with
background analysis Methods, systems and computer program products for configuring an audio channel are provided. Aspects include generating a confidence metric indicative of at... |
US-9,930,083 |
Method and apparatus for an interchangeable wireless media streaming
device It is possible to capture video information using one or more body mounted cameras, to transmit that information over a wireless communication channel, and to... |
US-9,930,082 |
Method and system for network driven automatic adaptive rendering
impedance A system and method for network driven automatic adaptive rendering impedance are presented. Embodiments of the present invention are operable to dynamically... |
US-9,930,081 |
Streams optional execution paths depending upon data rates Processing elements in a streaming application may contain one or more optional code modules--i.e., computer-executable code that is executed only if one or... |
US-9,930,080 |
Method and apparatus for sharing presentation data and annotation A method and apparatus for sharing presentation data, interactions, and annotation information between devices. The method includes: converting the presentation... |
US-9,930,079 |
Device-driven social network In one embodiment, a method includes receiving information from a network-enabled device, the network-enabled device being associated with a first user of a... |
US-9,930,078 |
Third-party communications to social networking system users using user
descriptors Based on information used by the external system to identify a target user, the external system generates a target user hash identifier that is communicated to... |
US-9,930,077 |
Informational enrichment for interactive systems Interactive services are enhanced by intercepting, in a telecommunications network, a session initiation protocol message used to initiate a communication. The... |
US-9,930,076 |
Central conferencing routing server Aspects of the present disclosure involve systems, methods, computer program products, and the like, for collaboration conferencing with multiple participants... |
US-9,930,075 |
Radio access network control of media session A method for controlling media communication session between a user and a receiving equipment via a core network is disclosed. The method includes checking a... |
US-9,930,074 |
Method and apparatus for controlling power output from an electronic
device to an external electronic device A mobile terminal for supporting Rich Communication Suite (RCS) and Voice Over Long Term Evolution (VoLTE) based services is provided. The mobile terminal... |
US-9,930,073 |
Radio communication system, radio apparatus, radio communication method,
packet generation method, and method... When operating the radio communication system in a mode for transmitting data for data communication instead of audio signal data, a transmission unit of a... |
US-9,930,072 |
Providing SIP signaling data for third party surveillance A method for facilitating surveillance of a targeted user participating in communication sessions conducted over a communications network, such as a voice over... |
US-9,930,071 |
System and methods for secure utilization of attestation in policy-based
decision making for mobile device... Policy-based client-server systems and methods for attestation in managing and securing mobile computing devices. Attestation provides the means to make... |
US-9,930,070 |
Modifying security policies of related resources A method for a managing security in a networked computing environment. The method included a processor detecting an unauthorized activity that is targeting a... |
US-9,930,069 |
Operation of a security element with the set of operating parameters
matched to the selected use profile A method for operating a security element which is part of a mobile end device, and a security element, have functionality depending on a set of operating... |
US-9,930,068 |
Image forming apparatus, method of controlling the same, and storage
medium storing program An image forming apparatus and a method of controlling the same, when it is instructed that the security policy be enabled, changes a setting item corresponding... |
US-9,930,067 |
Techniques for secure session reestablishment A client establishes a network session with a server. The network session is used to establish an encrypted communications session. The client establishes... |
US-9,930,066 |
Infrastructure level LAN security Techniques are disclosed for securing traffic flowing across multi-tenant virtualized infrastructures using group key-based encryption. In one embodiment, an... |
US-9,930,065 |
Measuring, categorizing, and/or mitigating malware distribution paths Systems and methods for event path traceback may utilize a processor and a path traceback and categorization (ATC) module in communication with the processor.... |
US-9,930,064 |
Network management security and protection system A system for the monitoring, management, and protection of networks and network-connected devices is described. The system employs an agent configured to run on... |
US-9,930,063 |
Random identifier generation for offline database Various embodiments of the present technology involve creating a secure unique identifier for a content item to be used in a synchronized content management... |
US-9,930,062 |
Systems and methods for cyber security risk assessment The present invention is directed to methods, systems, and non-transitory computer readable mediums which can evaluate cyber readiness of an organization. The... |
US-9,930,061 |
System and method for cyber attacks analysis and decision support A method for cyber attack risk assessment is disclosed. The method uses at least one hardware processor for: continuously collecting, from a networked resource,... |
US-9,930,060 |
Method for enforcing endpoint health standards An approach for enforcing standards regarding security vulnerabilities for an endpoint user device associated with a user includes collecting, at an inline... |
US-9,930,059 |
Methods and apparatus for analyzing asynchronous cyber-threat event data
using discrete time intervals Apparatus and methods described herein relate to a global workspace manager that can dynamically update historical cyber-threat data for a network. The global... |
US-9,930,058 |
Analyzing cyber-security risks in an industrial control environment A method of analyzing cyber-security risks in an industrial control system (ICS) including a plurality of networked devices includes providing a processor and a... |
US-9,930,057 |
Dynamic deep packet inspection for anomaly detection In one embodiment, a device in a network captures a first set of packets based on first packet capture criterion. The captured first set of packets is provided... |
US-9,930,056 |
Systems and methods of viral enablement of features by peer-to-peer
connection The technology disclosed relates to identifying and notifying a user of nearby attendees at a mega attendance event who are in user's social graph by comparing... |
US-9,930,055 |
Unwanted tunneling alert system Various systems and methods are provided that detect malicious network tunneling. For example, VPN logs and data connection logs may be accessed. The VPN logs... |
US-9,930,054 |
Detecting network traffic content A device for detecting network traffic content is provided. The device includes a memory configured for storing one or more signatures, each of the one or more... |
US-9,930,053 |
Method and system for detecting bot behavior A bot detection engine to determine whether hosts in an organization's network are performing bot-related activities is disclosed. A bot detection engine can... |
US-9,930,052 |
Pre-processing before precise pattern matching A method for pattern matching finds a target pattern from a stream of patterns, both of the stream of patterns and the target pattern being comprised of... |