Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,000,9407 Analyte data retriever
Methods and apparatus, including computer program products, are provided for processing analyte data. In some example implementations, a method may include...
US-1,000,9406 Incentivized sharing for toll-free data
A network device provides, to a user device, an application for managing viewing and sharing of content available via an Internet service provider, and assigns...
US-1,000,9405 Dynamically adjusting quality of service using cognitive focus of attention detection
An approach is provided for managing a quality of service (QoS) of an application running in a networked computing environment. Based on information received...
US-1,000,9404 Enterprise class virtual desktop infrastructure
Methods and systems for providing an enterprise class virtual desktop infrastructure (VDI) are provided. Aspects of the VDI include providing support for...
US-1,000,9403 Checkpointing a set of stream computing data
Disclosed aspects relate to checkpointing a set of stream computing data with respect to a stream computing environment having a set of windowed stream...
US-1,000,9402 System and method for optimizing a communication session between multiple terminals involving transcoding...
System and method for optimizing a transcoding session between multiple terminals are disclosed. The method determines properties of the transcoding session,...
US-1,000,9401 Call continuity in high uplink interference state
A method, an apparatus, and a computer program product for wireless communication are provided. The apparatus receives a stream of RTP data packets over a...
US-1,000,9400 Insertion of supplementary content into a segmented content stream
Techniques for insertion of supplementary content into a segmented content stream are described. In at least some embodiments, a content stream includes primary...
US-1,000,9399 Asset streaming and delivery
Streaming assets to an asset streaming client is described. An asset streaming system is configured to generate a request to retrieve at least a portion of an...
US-1,000,9398 System for providing event-related contents to users attending an event and having respective user terminals
The present invention provides a system for providing event-related contents to users attending an event, comprising: a set of cameras (110, 111, 112) for...
US-1,000,9397 Optimizing teleconferencing using transparent relays
Disclosed herein are systems, methods, and machine readable media for implementing a teleconferencing system using transparent relays. The transparent relays...
US-1,000,9396 Queue-based adaptive chunk scheduling for peer-to-peer live streaming
A method and apparatus are described for scheduling content delivery in a peer-to-peer network, including receiving a message from a peer, classifying the...
US-1,000,9395 Systems and methods for automated real-time Internet streaming and broadcasting
A real-time Internet streaming system and method includes a scheduling server that receives queries from encoders and determines if any scheduled events...
US-1,000,9394 Techniques to broadcast live event data in real-time
An apparatus to broadcast live event data in real-time includes one or more processor circuits; and a subscription component operatively executing on a...
US-1,000,9393 Joining an on-line meeting from an off-line meeting
Converting an off-line meeting to an on-line meeting. A method includes, at a communal meeting device, receiving user input requesting access to an off-line...
US-1,000,9392 System health and integration monitoring system
A method and system for monitoring the system health and/or integration of networks of a collaboration conferencing system of a telecommunications network is...
US-1,000,9391 Apparatus and method for acquiring, managing, sharing, monitoring, analyzing and publishing web-based time...
A computer-implemented method of providing time series data includes maintaining by a web server user account data for each of a plurality of user accounts....
US-1,000,9390 System and method for location-based sharing of information and location-based response to the shared information
The disclosure is directed to a system and method for sharing, broadcasting, or publishing information by a user from a location in real-time and allowing one...
US-1,000,9389 Scalable conference bridge
In one embodiment, a conference bridge receives a call initiated by a first caller endpoint. The conference bridge identifies a conference to which the call...
US-1,000,9388 Method and system for establishing integrated group ISC session based on content interest
A method and system for establishing an integrated group Immersive Social Center (ISC) session for a content viewing and a communication by an ISC server to...
US-1,000,9387 Systems and methods of assigning and using virtual telephone numbers
A single virtual telephone number that is used to route telephony communications is assigned to first and second users if the first and second users rarely, if...
US-1,000,9386 Computerized system and method for advanced network content processing
A computerized system and method for processing network content in accordance with at least one content processing rule is provided. According to one...
US-1,000,9385 Method and system for managing security policies
A policy management system includes a policy management device that is configured to manage a policy input and/or a template and/or a functional model, a policy...
US-1,000,9384 Information security systems and methods
Systems and methods for governing derived electronic resources are provided. In one embodiment, a digital resource is associated with one or more rules and a...
US-1,000,9383 Data network microsegmentation
Methods and systems for microsegmentation of data networks are provided herein. Exemplary methods include: receiving a high-level declarative policy; getting...
US-1,000,9381 System and method for threat-driven security policy controls
Methods, systems, and media for a security system are provided herein. Exemplary methods may include: acquiring a firewall security policy from a policy...
US-1,000,9380 Systems and methods for security configuration
A method of configuring a network security device includes receiving a changed set of network rules to replace a current set of network rules; using a plurality...
US-1,000,9379 Systems and methods for sterilizing email attachments and other communications delivered by email
A system for sterilizing data sent through electronic messages includes first computing circuitry configured to receive a first electronic communication...
US-1,000,9378 Method and apparatus for providing authentication using policy-controlled authentication articles and techniques
A method and apparatus provides first or second factor authentication by providing selectability of a plurality of second factor authentication policies...
US-1,000,9377 Processing information based on policy information of a target user
An information processing apparatus includes a policy acquisition unit configured to acquire a policy on disclosure of information on a target user; a...
US-1,000,9376 Network-based secure input/output (I/O) module (SIOM)
A Secure Input/Output (I/O) Module (SIOM) is networked-enabled providing secure communications with terminals and peripherals integrated into the terminals....
US-1,000,9375 Systems and methods for artificial model building techniques
Embodiments disclosed describe a security awareness system may adaptively learn the best design of a simulated phishing campaign to get a user to perform the...
US-1,000,9374 Detecting URL scheme hijacking
A computer-implemented method for detecting malware is described. In some embodiments, the method includes identifying an application identifier of a first...
US-1,000,9373 System and method for software defined behavioral DDoS attack mitigation
Systems and methods for software defined behavioral DDoS attack mitigation are provided. According to one embodiment, a method is provided for mitigating DDoS...
US-1,000,9372 Method for compressing matching automata through common prefixes in regular expressions
The present disclosure provides a means for compressing Non-deterministic Finite Automata (NFA) for faster matching during Deep Packet Inspection (DPI) when a...
US-1,000,9371 Method and system for managing network storm
A method is provided for managing a network storm associated with a physical port of a physical switch. The method, performed by a management application,...
US-1,000,9370 Detection and remediation of potentially malicious files
A method comprises obtaining a potentially malicious file, decoding the file to identify one or more code streams, processing each of the identified code...
US-1,000,9368 Virtual machine compliance checking in cloud environments
A method of transferring a virtual machine between a virtualized computing system and a cloud computing system includes determining that a virtual machine is to...
US-1,000,9366 Network anomaly detection
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for determining network related anomaly scores. One of the...
US-1,000,9365 System and method for integrated header, state, rate and content anomaly prevention for session initiation protocol
Methods and systems for an integrated solution to the rate based denial of service attacks targeting the Session Initiation Protocol are provided. According to...
US-1,000,9364 Gathering flow characteristics for anomaly detection systems in presence of asymmetrical routing
In one embodiment, a first device in a network identifies a first traffic flow between two endpoints that traverses the first device in a first direction. The...
US-1,000,9363 Selecting representative metrics datasets for efficient detection of anomalous data
Certain embodiments involve selecting metrics that are representative of large metrics datasets and that are usable for efficiently performing anomaly...
US-1,000,9362 Systems and methods for targeted attack protection using predictive sandboxing
Provided herein are systems and methods for targeted attack protection using predictive sandboxing. In exemplary embodiments, a method includes retrieving a URL...
US-1,000,9361 Detecting malicious resources in a network based upon active client reputation monitoring
Systems and methods for detecting malicious resources by analyzing communication between multiple resources coupled to a network are provided. According to one...
US-1,000,9360 Malware detection and data protection integration
A computer system is monitored via malware detection modules deployed throughout input/output layers of the computer system. Each malware detection module is...
US-1,000,9359 System, apparatus and method for transferring ownership of a device from manufacturer to user using an embedded...
In one embodiment, a method includes receiving, in an on-boarding system for a first network, a request to transfer ownership of a first device to a new owner;...
US-1,000,9358 Graph based framework for detecting malicious or compromised accounts
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for detecting malicious attacks. One of the methods includes...
US-1,000,9357 Data frame for protected data transmissions
A method for generating a data frame is disclosed which contains a user data block with the message and a code block. To generate the code block, a first data...
US-1,000,9356 Redirection method for electronic content
Electronic content, for example, a web page, is configured for display by a web browser application to include content that is not included in or referenced by...
US-1,000,9355 Bootstrapping user authentication on devices
Disclosed are various embodiments that facilitate bootstrapping authentication of a user at a first device using a second device. The second device is...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.