Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,006,3610 Apparatus and method for dynamically providing web-based multimedia to a mobile phone
An apparatus and method for dynamically providing web-based multimedia to a mobile phone are described. According to one embodiment, an RSS feed is received...
US-1,006,3609 Methods and apparatus for multimedia conferences using single source multi-unicast
Methods and apparatus are disclosed for communication in a conference using a single source multi-unicast architecture. In one aspect, a method for...
US-1,006,3608 Vehicle detection for media content player connected to vehicle media content player
A system for automatically initiating a travel mode of a media playback device is disclosed. The system operates to determine that the media playback device is...
US-1,006,3607 Delivery of content associated with a broadcast work
A processing system provides works associated with a unified number system (UNS) identifier, and the UNS identifier itself, for broadcast. The system receives a...
US-1,006,3606 Systems and methods for using client-side video buffer occupancy for enhanced quality of experience in a...
A network node, and a method for operating a network node, such as a base station, may transmit multiple video streaming sessions from servers to clients in...
US-1,006,3605 Apparatus, systems and methods for providing edge cached media content to media devices based on user history
Systems and methods provide media content events to media devices. An exemplary system receives a request for a media content event from a first media device;...
US-1,006,3604 Systems and methods for facilitating video communication using virtual avatars
A system and method for enhancing video communication among two or more users is provided. According to an aspect, a method is provided. The method comprises...
US-1,006,3603 Method and system for concurrent collaborative undo operations in computer application software
Multi-user real-time collaborative software applications may synchronize data between multiple users or multiple devices. Current aspects describe a method and...
US-1,006,3602 System, method and apparatus for content eavesdropping
Techniques, devices, systems and methods to facilitate the ability of a user to simultaneously and substantially in real time transmit content to others, like a...
US-1,006,3601 Client identification for enforcing computer resource quotas
A system, method, and apparatus are provided for identifying clients or consumers of one or more controlled resources within a computing environment (e.g., a...
US-1,006,3600 Distributed control of media content item during webcast
Disclosed embodiments include systems and methods for distributed control of media-playback components of a webcast. In an example, a webcast presenter's device...
US-1,006,3599 Controlling registration floods in VOIP networks via DNS
A mechanism controls global synchronization, or registration floods, that may result when a large number of endpoints in a Voice over Internet Protocol (VoIP)...
US-1,006,3598 Method and apparatus for establishing, authenticating, and accessing a content channel
An approach is provided for establishing, authenticating, and accessing a content channel. A channel platform receives an input/request for specifying at least...
US-1,006,3597 Loss of signalling bearer transport
Being aware of a loss of signalling bearer transport through an IP Connectivity Access Network is an important issue. Therefore, the present invention relies on...
US-1,006,3596 Devices for managing data associated with an audio communication
An electronic device for managing data associated with an audio communication is described. The electronic device includes a processor memory in electronic...
US-1,006,3595 Secure execution of enterprise applications on mobile devices
A system is disclosed that includes components and features for enabling enterprise users to securely access enterprise resources (documents, data, application...
US-1,006,3594 Network access control with compliance policy check
Embodiments of the present invention include methods involving an authentication application, a client application, or a combination of a network access control...
US-1,006,3593 Propagating fraud awareness to hosted applications
A policy enforcement point includes fraud prevention information associated with devices and/or users which is collected from: (i) many cloud fraud services...
US-1,006,3592 Network authentication beacon
A variety of different mobile computing devices, such as a laptop, tablet or smartphone, may be used in a mixed set of computing environments. At least some of...
US-1,006,3591 Implementing and optimizing secure socket layer intercept
Provided are methods and systems for intercepting encrypted data packets. A system for intercepting encrypted data packets may comprise a first device, a second...
US-1,006,3590 Secure message protocol
Observable characteristics of an encrypted data transmission can be analyzed and used to make inferences about the content of the data transmission. This...
US-1,006,3589 Microcheckpointing as security breach detection measure
A method includes: deploying at least one shadow system in association with each of one or more components of a network environment; periodically recording a...
US-1,006,3588 Device and method for transferring files from a portable storage device
The invention proposes a new device and method that allows scanning and downloading the content of a portable storage device (i.e., USB drive) from any computer...
US-1,006,3587 Management of security actions based on computing asset classification
Systems, methods, and software described herein provide for responding to security threats in a computing environment based on the classification of computing...
US-1,006,3586 Methods, nodes and computer programs for reduction of undesired energy consumption of a server node
A method, computer program and a server node (100) in a communications network (50) for reduction of undesired energy consumption of the server node (100), the...
US-1,006,3585 Methods and systems for automated anonymous crowdsourcing of characterized device behaviors
Methods, and devices implementing the methods, use device-specific classifiers in a privacy-preserving behavioral monitoring and analysis system for...
US-1,006,3584 Advanced processing of electronic messages with attachments in a cybersecurity system
A system manages computer security risks associated with message file attachments. When a user of an electronic device with a messaging client attempts to open...
US-1,006,3583 System and method of mitigating cyber attack risks
A security system comprising a computer, a memory, a data store comprising a cyber threat intent dictionary and a technology dictionary; and an application...
US-1,006,3582 Securing compromised network devices in a network
Securing compromised network devices in a network. In one embodiment, a method may include (a) identifying a Positive Unlabeled (PU) machine learning...
US-1,006,3581 Measure based anomaly detection
Method and system for detecting an unknown undesirable event, such as (but not limited to) a cyber-threat, a cyber-intrusion, a financial fraud event or a...
US-1,006,3580 Collaborative infrastructure supporting cyber-security analytics in industrial networks
A system comprising a computer-readable storage medium storing at least one program, and a method for reducing cyber-security related false positive alerts is...
US-1,006,3579 Embedding the capability to track user interactions with an application and analyzing user behavior to detect...
Techniques for fraud detection based on user behavior that monitor and analyze user interactions with an application executing on an end user device. The...
US-1,006,3578 Network-centric visualization of normal and anomalous traffic patterns
In one embodiment, a device in a network analyzes local network data regarding a portion of the network that is local to the device using a first anomaly...
US-1,006,3577 Securing deployments using command analytics
Methods, systems, and computer program products for securing deployments using command analytics are provided herein. A computer-implemented method includes...
US-1,006,3576 Detecting network anomalies by probabilistic modeling of argument strings with markov chains
Systems, methods, and media for detecting network anomalies are provided. In some embodiments, a training dataset of communication protocol messages having...
US-1,006,3575 Anomaly detection in a network coupling state information with machine learning outputs
In one embodiment, a device in a network receives an output of an anomaly detection model. The device receives state information surrounding the output of the...
US-1,006,3574 Apparatus method and medium for tracing the origin of network transmissions using N-gram distribution of data
A method, apparatus, and medium are provided for tracing the origin of network transmissions. Connection records are maintained at computer system for storing...
US-1,006,3573 Unstructured security threat information analysis
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for creating structured data using data received from...
US-1,006,3572 Antivirus signature distribution with distributed ledger
This document generally describes techniques for using a distributed ledger to implement a framework for the validation and distribution of virus signatures,...
US-1,006,3571 Systems and methods for the detection of advanced attackers using client side honeytokens
There is provided a method for detecting a malicious attempt to access a service providing server using credentials of a client terminal in a network, the...
US-1,006,3570 Probabilistic suffix trees for network security analysis
A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security...
US-1,006,3569 Custom protection against side channel attacks
Embodiments of an invention for custom protection against side channel attacks are disclosed. In one embodiment, a processor includes instruction hardware and...
US-1,006,3568 User behavior profile in a blockchain
A method, system and computer-usable medium are disclosed for generating a cyber behavior profile, comprising: monitoring user interactions between a user and...
US-1,006,3567 System for cross-host, multi-thread session alignment
A method of detecting aberrant behavior in a software application is described. The method includes instantiating replicated applications on computing devices...
US-1,006,3566 Intelligent network access control
A method for managing a private wireless network includes a processor that generates the private wireless network within a part of a coverage area of a local...
US-1,006,3565 Method and system for geolocation verification of resources
A method of geolocation verification, including obtaining the geolocation of an operating system, generating a unique system ID for an installed operating...
US-1,006,3564 Identity authentication using multiple devices
A system, method, and computer-readable medium for performing an authentication operation comprising: identifying a plurality of user devices associated with a...
US-1,006,3563 Trustworthiness of processed data
A method indicates a trustworthiness of data processed in accordance with a processing rule. A first trust weight is assigned to a data item to be processed to...
US-1,006,3562 Flexible access management framework based on measuring application usage behavior
Techniques of controlling access to a resource involve selecting an authentication scheme for authenticating a user based on an environmental context in which...
US-1,006,3561 Authentication and authorization without the use of supplicants
Provided is authentication and authorization without the use of supplicants. Authentication and authorization includes generating a profile for a device based...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.