Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0164936 PERSONAL AUDIO DELIVERY SYSTEM
The personal audio delivery system executed in part on a personal communication device to facilitate an enhanced audio experience for a user to select one or...
2016/0164935 ADAPTIVE BIT RATES IN MULTICAST COMMUNICATIONS
A resource such as a server derives multiple streams of data based on particular content. Each of the multiple streams of data is encoded to enable play back...
2016/0164934 INTERACTIVE JUKEBOX SYSTEM AND DISPLAY
An interactive jukebox system. The system includes a local controller located at a venue and a central server located remotely to the venue. Patrons of the...
2016/0164933 DISCOVERY AND MANAGEMENT OF SYNCHRONOUS AUDIO OR VIDEO STREAMING SERVICE TO MULTIPLE SINKS IN WIRELESS DISPLAY...
Methods, systems, and devices are described for service discovery and session establishment framework to enable a synchronous audio/video streaming service...
2016/0164932 Encrypted streams to receivers
A stream receiver device that receives information indicative of streams to be played from remote devices. The stream receiver has a network connection,...
2016/0164931 METHOD AND SYSTEM FOR DISPLAYING ELECTRONIC INFORMATION
The invention discloses a method and system for displaying electronic information for an Online Dating Service. Information is received through a variety of...
2016/0164930 USAGE AUTHORIZATION CONTROL FOR GROUP COMMUNICATIONS IN A COMMUNICATION NETWORK
Embodiments described herein provide usage authorization control for group communications. In one embodiment, a network element identifies a group...
2016/0164929 CONTROL FOR CONTENT CHANNEL IN WEB REAL-TIME COMMUNICATION
In order to provide compatibility between WebRTC communication endpoints and legacy communication endpoints that use BFCP, a web media gateways is used to...
2016/0164928 Goal-Based Connection Management Between Parties
A monitoring computer system receives a message, from a first party, which identifies a goal of the first party. The monitoring computer system receives an...
2016/0164927 SOCIAL MEDIA SESSION ACCESS
A method for social media session access includes, by a computing device, receiving a user request to join a social media session. If the social media session...
2016/0164926 METHOD AND APPARATUS FOR INBOUND ROAMING OVER CELLULAR VOICE CHANNEL
An Internet Protocol (IP) telephony system comprises a radio communications interface and a processor. The processor is configured to execute a Communications...
2016/0164925 UNIVERSAL POINT OF CONTACT IDENTIFIER SYSTEM AND METHOD
A subscriber to a universal point of contact service designates a preferred point of contact at which a communication initiator, such as a telephone caller,...
2016/0164924 Stack Fusion Software Communication Service
A stack fusion method is implemented at an originator cluster of software services in a distributed Software-as-a-Service (SaaS) system. The method includes...
2016/0164923 METHOD FOR DATA ROUTING IN NETWORKS
An integrated security system integrates broadband and mobile access and control with conventional security systems and premise devices to provide a tri-mode...
2016/0164922 DYNAMIC ADJUSTMENT OF AUTHENTICATION POLICY
A computer-implemented method for managing an authentication policy for a user on a network of an organization includes determining at least one social media...
2016/0164921 Service Channel Authentication Processing Hub
A computer system receives a service request over a service channel from a user device, initiates a challenge to the user device to provide authentication...
2016/0164920 AUTHENTICATING MOBILE APPLICATIONS USING POLICY FILES
Examples of techniques for authenticating mobile applications are described herein. A method includes receiving, at a first server, a key pair and a policy...
2016/0164919 INCIDENT RESPONSE AUTOMATION ENGINE
Systems, methods, and software described herein enhances how security actions are implemented within a computing environment. In one example, a method of...
2016/0164918 MANAGING WORKFLOWS UPON A SECURITY INCIDENT
Systems, methods, and software described herein provide for managing service level agreements (SLAs) for security incidents in a computing environment. In one...
2016/0164917 ACTION RECOMMENDATIONS FOR COMPUTING ASSETS BASED ON ENRICHMENT INFORMATION
Systems, methods, and software described herein provide security action recommendations to administrators of a computing environment. In one example, a method...
2016/0164916 AUTOMATED RESPONSES TO SECURITY THREATS
Systems, methods, and software described herein provide security actions to computing assets of a computing environment. In one example, a method of operating...
2016/0164915 PRIVACY POLICY RATING SYSTEM
A system includes a processor and a memory accessible to the processor. The memory stores instructions that, when executed by the processor, cause the...
2016/0164914 METHODS AND APPARATUS FOR PROVIDING A SECURE OVERLAY NETWORK BETWEEN CLOUDS
A process capable of automatically establishing a secure overlay network ("SON") across different clouds is disclosed. The process, in one aspect, receives a...
2016/0164913 ACCESS CONTROL TO FILES BASED ON SOURCE INFORMATION
The present invention is a security tool for protection of data on a mobile computing device. The security tool provides a plurality of security policies to be...
2016/0164912 NEAR REAL-TIME DETECTION OF DENIAL-OF-SERVICE ATTACKS
Methods and systems for detection and mitigation of denial-of-service (DoS) attacks against network applications/services/devices in near real-time are...
2016/0164911 System and Method to Diffuse Denial-of-Service Attacks Using Virtual Machines
A system for diffusing denial-of-service attacks by using virtual machines is disclosed. In particular, the system may receive, from a measurement probe, a...
2016/0164910 Processing Method and Apparatus for Preventing Packet Attack
A processing method and apparatus for preventing a packet attack. A network protocol negotiation status of a port of a network device is monitored; a port that...
2016/0164909 LEARNING BASED SECURITY THREAT CONTAINMENT
Systems, methods, and software described herein provide action recommendations to administrators of a computing environment based on effectiveness of...
2016/0164908 CONTAINMENT OF SECURITY THREATS WITHIN A COMPUTING ENVIRONMENT
Systems, methods, and software described herein provide for identifying and implementing security actions within a computing environment. In one example, a...
2016/0164907 SECURITY ACTIONS FOR COMPUTING ASSETS BASED ON ENRICHMENT INFORMATION
Systems, methods, and software described herein provide enhancements for implementing security actions in a computing environment. In one example, a method of...
2016/0164906 CYBER THREAT MONITOR AND CONTROL APPARATUSES, METHODS AND SYSTEMS
The cyber threat monitor and control apparatuses, methods and systems (hereinafter "CTMC") determines risk across a global Internet network graph model for...
2016/0164905 CYBER THREAT MONITOR AND CONTROL APPARATUSES, METHODS AND SYSTEMS
The cyber threat monitor and control apparatuses, methods and systems (hereinafter "CTMC") determines risk across a global Internet network graph model for...
2016/0164904 DETECTION OF PRIVILEGE ESCALATION VULNERABILITIES USING BAG OF WORDS
A method for detecting a privilege escalation vulnerability comprises selecting an address identifier of a web address with secure content. A first response to...
2016/0164903 RESOLVING CUSTOMER COMMUNICATION SECURITY VULNERABILITIES
Customer communication security vulnerabilities are resolved. A usage history is obtained for a user device including communications involving the user device....
2016/0164902 SYSTEM AND METHOD FOR NETWORK INSTRUCTION DETECTION ANOMALY RISK SCORING
Systems, methods, and computer-readable storage media for scoring network anomaly risk. A system identifies a baseline usage for a facet of a server and...
2016/0164901 METHODS AND SYSTEMS FOR ENCODING COMPUTER PROCESSES FOR MALWARE DETECTION
A method for encoding computer processes for malicious program detection. The method includes the steps of (a) randomly sampling a trace of system calls...
2016/0164900 SYSTEM AND METHOD FOR FAST AND SCALABLE FUNCTIONAL FILE CORRELATION
A method, computer program product, and computer system for obtaining, by a computing device, a file, wherein the file includes a plurality of portions. A...
2016/0164899 DATA-ORIENTED INFORMATION TECHNOLOGY SYSTEM
A data-oriented information technology system has a data registration center, a data resource pool and a data service unit layer. The data resource pool is a...
2016/0164898 SIMULATED PHISHING RESULT ANONYMIZATION AND ATTRIBUTION PREVENTION
Described herein are methods, network devices and machine-readable media for preventing the malicious use of phishing simulation records. A phishing simulation...
2016/0164897 DETECTION OF AND RESPONSES TO NETWORK ATTACKS
Disclosed are various embodiments for detecting and responding to attacks on a computer network. One embodiment of such a method describes monitoring dropped...
2016/0164896 ANTI-CYBER HACKING DEFENSE SYSTEM
Systems, devices, and methods for performing rate limiting and/or sending fabricated acknowledgments and/or silently dropping a received packet based on logged...
2016/0164895 MANAGEMENT OF SECURITY ACTIONS BASED ON COMPUTING ASSET CLASSIFICATION
Systems, methods, and software described herein provide for responding to security threats in a computing environment based on the classification of computing...
2016/0164894 AUTOMATIC NETWORK ATTACK DETECTION AND REMEDIATION USING INFORMATION COLLECTED BY HONEYPOTS
A method for securing a computer system includes detecting a malware attack on a honeypot node, and, based on the detected malware attack, automatically...
2016/0164893 EVENT MANAGEMENT SYSTEMS
According to an example, an event management system determines context for received events. The event management system generates a context query for an event...
2016/0164892 IDENTIFYING RELATED COMMUNICATION INTERACTIONS TO A SECURITY THREAT IN A COMPUTING ENVIRONMENT
Systems, methods, and software described herein provide security actions based on related security threat communications. In one example, a method of operating...
2016/0164891 CLASSIFYING KILL-CHAINS FOR SECURITY INCIDENTS
Systems, methods, and software described herein provide security actions based on the current state of a security threat. In one example, a method of operating...
2016/0164890 Techniques for sharing network security event information
This disclosure provides an architecture for sharing information between network security administrators. Events converted to a normalized data format (CCF)...
2016/0164889 ROGUE ACCESS POINT DETECTION
Methods and systems for detecting on-wire unauthorized/rogue access points (APs) within a network are provided. According to one embodiment, a potential rogue...
2016/0164888 DETECTION OF FALSE MESSAGE IN SOCIAL MEDIA
Communications in social networking environment are monitored and patterns of sharing a communication are identified. The patterns of sharing are compared to...
2016/0164887 Malicious Program Finding And Killing Device, Method And Server Based On Cloud Security
Disclosed are a malicious program finding and killing device, method and server. The device comprises: one or more non-transitory computer readable medium...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.