Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,005,7312 Broadcasting telematics data to nearby mobile computing devices, vehicles, and infrastructure
A computer-implemented method of generating and broadcasting telematics and/or image data is provided. Telematics and/or image data may be collected, with...
US-1,005,7311 Method of transmitting system information with extended DRX cycle in wireless communication system and...
The present specification proposes a method for receiving system information by a user equipment (UE) configured with an extended discontinuous reception (eDRX)...
US-1,005,7310 Interactive spectating interface for live videos
In one embodiment, a method includes a system receiving a first request to publish a live video and a first network address associated with a third-party...
US-1,005,7309 Concurrent serving of a media stream
Examples discussed herein relate to a system including a first data processing system and a second data processing system. The first data processing system can...
US-1,005,7308 Customizable reproduction of electronic meetings
Customizable reproduction of electronic meetings is described. In one or more embodiments, content, such as slides or audio or chat, is obtained from multiple...
US-1,005,7307 Distributed programmable connection method to establish peer-to-peer multimedia interactions
The present invention proposes a technique for establishing peer-to-peer multimedia interactions and data exchanges via a discovery mechanism which relies on a...
US-1,005,7306 Dynamic social network allocation and data allocation based on real world social interaction patterns
A social networking system creates and manages dynamic social circles corresponding to real world social events where multiple people join in an event. The...
US-1,005,7305 Real-time sharing during a phone call
A real-time sharing component operating on a computing device such as a smartphone, tablet, or personal computer (PC) is configured to enable a local sharing...
US-1,005,7304 SIP IMS call forking to multiple associated devices
A system and method that fork incoming calls to a destination device or a device that is associated with the destination device is disclosed. The system...
US-1,005,7303 Method and system for securely authorizing VoIP interconnections between anonymous peers of VoIP networks
A peering authority or settlement clearinghouse can be used to control access, collect session accounting information, and provide financial settlement of...
US-1,005,7302 Context-based selection of instruction sets for connecting through captive portals
Embodiments personalize a set of network access points (NAPs) acting as captive portals for each user and/or user device. A cloud service, or the user device,...
US-1,005,7301 Obtaining services through a local network
One or more endpoints may be registered with a gateway at a premises. The gateway may include local physical interfaces for communicating with a first subset of...
US-1,005,7300 Selective access control to mobile IP network
Systems and methods are described for managing access of a computing device to services over a mobile network where requests for managed or unmanaged services...
US-1,005,7299 Method and system for communicating between a media processor and network processor in a gateway device
A gateway device includes a media processor module comprising a gateway application module. The gateway device also includes a router module comprising a...
US-1,005,7298 Configurable investigative tool
This disclosure provides example techniques to invoke one or more tools, with an investigative tool. The investigative tool provides a common framework that...
US-1,005,7297 Information processing apparatus and information processing method
An information processing apparatus which can prevent reduction of user's usability when securing security by restricting establishing communication by the...
US-1,005,7296 Detecting and managing abnormal data behavior
Methods and systems for providing destination-specific network management are described. One example method includes determining a normal data movement profile...
US-1,005,7295 System and method for providing network and computer firewall protection with dynamic address isolation to a device
A computer performs dynamic address isolation. The computer comprises an application associated with an application address, a network interface coupled to...
US-1,005,7294 Cloud-based security policy configuration
Systems and methods for configuring security policies based on security parameters stored in a public or private cloud infrastructure are provided. According to...
US-1,005,7293 Method to modify android application life cycle to control its execution in a containerized workspace environment
Methods, devices, and systems are described to modify the life cycle of a Google Android.RTM. application, in its application manifest file and byte code, such...
US-1,005,7292 Method for operating a security gateway of a communication system for vehicles
A method for operating a security gateway between data buses of a vehicle, in which a correlation between an identification information item (ID) of the message...
US-1,005,7291 Comparing networking access control lists
Techniques and solutions are provided for assessing the semantic difference between networking access control lists (ACLs). For example, a semantic difference...
US-1,005,7290 Shared MAC blocking
For enhancing security in a complex network by a computer processor device, a processor collaborates with at least one additional processor device in a higher...
US-1,005,7289 Adjusting multi-factor authentication using context and pre-registration of objects
A system and method and computer program product for user authentication that uses information about a user's context or context of their personal device(s) to...
US-1,005,7288 Synchronized issuance of public X.509 digital certificates
A method includes receiving, from a certificate requestor: a request for a public key certificate and a list of a plurality of distribution addresses. The...
US-1,005,7287 Secure data redaction and masking in intercepted data interactions
A method for modifying intercepted data interactions is provided in the illustrative embodiments. At a security application executing in a security data...
US-1,005,7286 Automotive ECU controller and data network having security features for protection from malware transmission
In one implementation, a method for providing security on controllers includes detecting, by a given controller, an attempted security attack on the given...
US-1,005,7285 System and method for auditing governance, risk, and compliance using a pluggable correlation architecture
Described herein is a system and method for auditing governance, risk, and compliance using an event correlation architecture. In particular, the event...
US-1,005,7284 Security threat detection
Systems and methods for retrospective scanning of network traffic logs for missed threats using updated scan engines are provided. According to an embodiment, a...
US-1,005,7283 Volumetric event forecasting tool
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for forecasting event volumes. One of the methods includes...
US-1,005,7282 Detecting and reacting to malicious activity in decrypted application data
Described herein are systems and methods for detecting potentially malicious activity in a network session. Embodiments may involve identifying a requested...
US-1,005,7281 Runtime detection of a bandwidth denial attack from a rogue interconnect
For runtime detection of a bandwidth denial attack from a rogue NoC. The apparatus includes a processor and a memory storing code executable by the processor....
US-1,005,7280 Methods and systems of detecting and analyzing correlated operations in a common storage
A method of detecting correlated operations in a common storage. The method comprises providing at least one input operation, each the input operation being...
US-1,005,7279 System and method for protecting computer against remote malware downloads
A system for protecting computers against remote malware downloads includes a malware download detection system and participating client computers that provide...
US-1,005,7277 System and method for partial URL signing with applications to dynamic adaptive streaming
A partial URL signing scheme for controlling access to content provided in adaptive streaming such as DASH is disclosed herein. Partial URL signing and...
US-1,005,7276 Global attestation procedure
A method, computer program product, and system for authenticating a computing device by geographic attestation includes a processor utilizing executing an...
US-1,005,7275 Restricted content publishing with search engine registry
A processor-implemented method is provided. The method may include providing a content registry with at least one application program interface (API) to manage...
US-1,005,7274 Systems and methods for profiling client systems
The disclosed computer-implemented method for profiling client systems may include (1) identifying one or more administrative categories used to categorize...
US-1,005,7273 System and method for ensuring per tenant mutual exclusion of data and administrative entities with low latency...
A request is received from a client device of a user for configuring a tenant of a multi-tenant storage system, the multi-tenant storage system storing data for...
US-1,005,7272 Universal subscriber identity recognition and data classification
An aspect includes storing data elements in a storage space of a memory device. The storage space is allocated for an account of a subscriber of a universal...
US-1,005,7271 Social media login and interaction management
A hardware or software firewall may be installed within a private network. The firewall may intercept a first set of login credentials entered into a login...
US-1,005,7270 Providing virtual desktops using resources accessed on public computer networks
A computer system supports hosting of virtual desktops using resources available in the cloud. Connections to various resources used by a desktop configuration...
US-1,005,7269 Systems and methods for device verification and authentication
In methods, systems, and computing devices configured to implement methods of authenticating a computing device, a first computing device and a second computing...
US-1,005,7268 Rule-based application access management
A container that manages access to protected resources using rules to intelligently manage them includes an environment having a set of software and...
US-1,005,7267 Integrating external devices with private networks in provider network environments
Methods and apparatus that extend private network functionality to client devices that are not part of a provider network. A net device may provide private...
US-1,005,7266 Integrated hosted directory
Methods, systems, and devices for enterprise-wide management of disparate devices, applications, and users are described. A cloud-based central server may...
US-1,005,7265 Computerized vehicular apparatus for location-based service provision
Computerized apparatus useful within vehicles for causing provision of location-based services to users via a portable wireless computerized device. In one...
US-1,005,7264 Analytics-based internet of things security platform
An apparatus comprises a processing platform configured to communicate with a plurality of IoT devices over at least one network. The processing platform...
US-1,005,7263 Application management system
An application management system, especially a web application management system, for enabling different clients to access specific versions of an application,...
US-1,005,7262 Device and authentication system
A device includes a storage unit that stores generated challenges which are challenges previously generated, a determination unit that determines whether a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.