Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0142458 METHOD AND DEVICE FOR DATA STREAMING IN A MOBILE COMMUNICATION SYSTEM
Interfacing between radio units in a base station in a mobile communication system uses a common public radio interface CPRI for streaming IQ data samples...
2016/0142457 CONTENT DISTRIBUTION SYSTEM AND METHOD
There are described methods and systems for distributing content in a network, in particular a multicast network. One method includes delivering content from a...
2016/0142456 Method and Device for Acquiring Media File
A method and device for acquiring a media file. The method includes receiving an acquiring instruction, where the acquiring instruction instructs to acquire a...
2016/0142455 MULTI-CHANNEL AUDIO ALIGNMENT SCHEMES
Multi-channel audio alignment schemes are disclosed. One aspect of the present disclosure provides for accumulation of audio samples across multiple related...
2016/0142454 MULTI-CHANNEL AUDIO ALIGNMENT SCHEMES
Multi-channel audio alignment schemes are disclosed. One aspect of the present disclosure provides for accumulation of audio samples across multiple related...
2016/0142453 FEATURES AND OPTIMIZATIONS FOR PERSONAL COMMUNICATION DEVICE BASED PUBLIC ADDRESSING SYSTEM
Systems and methods are described herein, a method including, but not limited to, receiving, by a client, audio data and uplink data simultaneously from one of...
2016/0142452 MANAGING DATA COMMUNICATIONS BASED ON PHONE CALLS BETWEEN MOBILE COMPUTING DEVICES
An example method comprises receiving, by at least one computing device, a first notification from a first mobile computing device and a second notification...
2016/0142451 ONLINE MEETING COMPUTER WITH IMPROVED NOISE MANAGEMENT LOGIC
In an embodiment, a method for calculating a noise index value for a digital audio source in a server computer system that is coupled to a plurality of audio...
2016/0142450 SYSTEM AND INTERFACE FOR DISTRIBUTED REMOTE COLLABORATION THROUGH MOBILE WORKSPACES
A system and method include a mobile workspace coupled to a communications network. The method includes providing a mobile workspace on a server, wherein the...
2016/0142449 COMMUNICATION EXCHANGES AND METHODS OF USE THEREOF
An exemplary specifically programmed electronic communications exchange which includes at least the following specifically programmed components: a...
2016/0142448 Methods and Systems to Assess an Ability to Playback Media Content
The present disclosure includes methods and systems to assess an ability to playback media content. The system progresses through media content playback...
2016/0142447 Telecommunications Network Call Control
Telecommunications network components configured to manage call control of a communication session of user equipment are described herein. An anchoring network...
2016/0142446 SYSTEM AND METHOD FOR INTEGRATING SESSION INITIATION PROTOCOL COMMUNICATION IN A TELECOMMUNICATIONS PLATFORM
A system and method for facilitating signaling and media communication at a communication platform that includes receiving a communication request to a...
2016/0142445 METHODS AND DEVICES FOR ANALYZING USER PRIVACY BASED ON A USER'S ONLINE PRESENCE
A method, non-transitory computer readable medium, and policy rating server device that receives a request from a client computing device for one or more...
2016/0142444 AUTHENTICATION POLICY USAGE FOR AUTHENTICATING A USER
A processor ascertains that a user is authorized to access a federated computing environment that includes at least two servers, which includes determining...
2016/0142443 PERSONAL DEVICE NETWORK FOR USER IDENTIFICATION AND AUTHENTICATION
Established user habits in carrying multiple wirelessly detectable devices are used to provide or substantiate authentication. In some embodiments, simply...
2016/0142442 System and Method for Intelligent State Management
A method is provided in one example embodiment and it includes receiving a state request and determining whether a state exists in a translation dictionary for...
2016/0142441 CENTRALIZED OPERATION MANAGEMENT
A novel security framework that is part of an operating system of a device is provided. The framework includes a security assessor that performs security...
2016/0142440 Method and Apparatus for Decryption of Encrypted SSL Data from Packet Traces
A system for decrypts encrypted Secure Sockets Layer (SSL) data from packet traces without using private keys or a proxy. Decryption of encrypted SSL data is...
2016/0142439 METHODS AND SYSTEMS FOR PHISHING DETECTION
A method of determining a probability that a received email comprises a phishing attempt may comprise analyzing a link therein to determine whether the link...
2016/0142438 METHOD OF IDENTIFYING AND COUNTERACTING INTERNET ATTACKS
The present disclosure relates to a method of identifying and counteracting Internet attacks, of Man-in-the-Browser and/or Man-in-the-Middle and/or Bot attack...
2016/0142437 METHOD AND SYSTEM FOR PREVENTING INJECTION-TYPE ATTACKS IN A WEB BASED OPERATING SYSTEM
A method for detecting a malicious code which is injected into the command stream of a widget running by a web-based OS at a device is disclosed. The method...
2016/0142436 METHODS, NODES AND COMPUTER PROGRAMS FOR REDUCTION OF UNDESIRED ENERGY CONSUMPTION OF A SERVER NODE
A method, computer program and a server node (100) in a communications network (50) for reduction of undesired energy consumption of the server node (100), the...
2016/0142435 SYSTEMS AND METHODS FOR DETECTION OF ANOMALOUS NETWORK BEHAVIOR
There is provided a computer implemented method for detecting anomalous behavior in a network, comprising: receiving data representing at least one network...
2016/0142434 AUTOMATED SECURITY TESTING
A method of automated security testing includes recording a macro. The recorded macro is played and a web request is intercepted while playing the macro. The...
2016/0142433 INFORMATION ASSESSMENT SYSTEM, INFORMATION ASSESSMENT APPARATUS, AND INFORMATION ASSESSMENT METHOD
An information assessment system includes: an information management apparatus; and an information assessment apparatus connected to an information device via...
2016/0142432 RESOURCE CLASSIFICATION USING RESOURCE REQUESTS
In one implementation, a resource classification system identifies a plurality of resource requests and generates a plurality of resource access measures based...
2016/0142431 SESSION PROCESSING METHOD AND DEVICE, SERVER AND STORAGE MEDIUM
A method for processing session and a device thereof, a server and a storage medium are provided. The method includes: capturing packets sent from a client...
2016/0142430 Data Resource Anomaly Detection
Anomaly detection is provided. A first component of a first data resource of a plurality of data resources is identified. Each data resource of the plurality...
2016/0142429 PREVENTING ACCESS TO MALICIOUS CONTENT
System and techniques for preventing access to malicious websites are described herein. A communication message containing content may be received. A query may...
2016/0142428 SYSTEM AND METHOD FOR IDENTIFYING INTERNET ATTACKS
A system and a method that employs such system to detect and counteract Internet attacks of Man-in-the-Browser and/or Man-in-the-Middle type are disclosed. The...
2016/0142427 SECURITY ENHANCEMENTS FOR A SOFTWARE-DEFINED NETWORK WITH NETWORK FUNCTIONS VIRTUALIZATION
A communication network can be constructed to support software-defined networking (SDN) protocols and network functions virtualization (NFV) protocols. Such a...
2016/0142426 ENDPOINT TRAFFIC PROFILING FOR EARLY DETECTION OF MALWARE SPREAD
According to one exemplary embodiment, a method for detecting malware in a network stream to at least one host computer is provided. The method may include...
2016/0142425 ANTI-MALWARE DETECTION AND REMOVAL SYSTEMS AND METHODS
An anti-malware system including at least one database, remote from a plurality of computers to be protected, which stores identification of computer...
2016/0142424 SYSTEM AND METHOD THEREOF FOR IDENTIFYING AND RESPONDING TO SECURITY INCIDENTS BASED ON PREEMPTIVE FORENSICS
A system is connected to a plurality of user devices coupled to an enterprise's network. The system continuously collects, stores, and analyzes forensic data...
2016/0142423 ENDPOINT TRAFFIC PROFILING FOR EARLY DETECTION OF MALWARE SPREAD
According to one exemplary embodiment, a method for detecting malware in a network stream to at least one host computer is provided. The method may include...
2016/0142422 SYSTEM FOR CROSS-HOST, MULTI-THREAD SESSION ALIGNMENT
A method of detecting aberrant behavior in a software application is described. The method includes instantiating replicated applications on computing devices...
2016/0142421 VALIDITY CONTROL SYSTEM, TERMINAL DEVICE, AND METHOD
The validity/invalidity of a credit card, an IC card storing electronic money, or the like is appropriately determined based on a blacklist. A terminal device...
2016/0142420 METHOD AND SYSTEM FOR DYNAMICALLY CONTROLLING A REMOTE TERMINAL BASED ON RUNTIME AUTHORIZATION AND RULES
A content validation server is provided. The server can include at least one processor and a memory operatively coupled to the processor, the memory storing...
2016/0142419 PROTECTING DOCUMENTS FROM CROSS-SITE SCRIPTING ATTACKS
In various implementations, an embedded document receives untrusted content from a containing document, where the embedded document is in the containing...
2016/0142418 Validating the Identity of an Application for Application Management
A method of managing access to enterprise resources is provided. An access manager may operate at a mobile device to validate a mobile application installed at...
2016/0142417 Automated Credentialing of Device Newly Added to a Network
A device newly introduced to a network is automatically credentialed to be able to communicate over a network before the device first communicates with the...
2016/0142416 SYSTEM AND METHOD FOR USING A SEPARATE DEVICE TO FACILITATE AUTHENTICATION
A system that incorporates the subject disclosure may perform, for example, operations including receiving a request from a first device to access information...
2016/0142415 Securing Communication over a Network using Client Integrity Verification
A method for protecting application servers from network-based attacks and verifying the security posture of end client systems is disclosed. A trust broker...
2016/0142414 METHOD, APPARATUS, AND SYSTEM FOR ACHIEVING PRIVILEGE SEPARATION
Methods, apparatus, and systems for achieving privilege separation are provided herein. In an exemplary method, an operation-applying instruction sent by a...
2016/0142413 EPHEMERAL APPLICATIONS
A method of executing an application in a direct launch mode includes receiving a user input to download an application from a remote server to a client...
2016/0142412 METHOD AND SYSTEM FOR PREVENTING INFORMATION LEAKAGE BASED ON TELEPHONE
The present invention relates to a method and a system for preventing an information leakage based on a telephone authentication. The present invention...
2016/0142411 Homogenizing Tooling for a Heterogeneous Cloud Environment
A method, system and computer-usable medium are disclosed for controlling access to a node deployed in a cloud environment. A new node, based upon a common...
2016/0142410 ELECTRONIC CONTROL UNIT NETWORK SECURITY
A system and method of controlling access to a vehicle network that includes a plurality of electronic control units (ECUs) communicating over the network. The...
2016/0142409 OPTIMIZED TOKEN-BASED PROXY AUTHENTICATION
Methods, systems, apparatuses, and computer program products are provided for authentication of users in a service-to-service context. At a first service, a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.