Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0173551 SYSTEM AND METHOD FOR SESSION MOBILITY FOR ADAPTIVE BITRATE STREAMING
A system is provided, having a server, a first device for receiving a first plurality of segments of a media data stream from the server, and a second device...
2016/0173550 Custom Content Insertion
Provided are methods and systems for inserting custom content. An example method can comprise receiving, at a first computing device, an insertion instruction...
2016/0173549 VIDEO CONFERENCING DEVICE AND CONTROL METHOD THEREOF
A VC (video conferencing) device for a VC system comprises a first and a second electronic device including an input module. The VC device comprises a...
2016/0173548 HEAD UNIT FOR PROVIDING MULTI-STREAMING SERVICE BETWEEN DIFFERENT DEVICES, STREAMING CONTROL METHOD THEREOF,...
A head unit for a vehicle, for providing a multi-streaming service between different devices is disclosed. The head unit includes a resource controller for...
2016/0173547 SYSTEM AND METHOD FOR DELIVERING CONTENT OVER A MULTICAST NETWORK
A system for delivering content over a network includes a server. The server is configured to divide the content into multiple segments, to create multiple...
2016/0173546 TOPIC-BASED MESSAGING USING CONSUMER ADDRESS AND POOL
In a multicast publisher-subscriber environment, a plurality of receiver machines are managed by a configurator machine. A consumer address of a receiver...
2016/0173545 METHOD OF SHARING CONTROL RIGHT ADAPTED TO INTERACTIVE WHITEBOARD SYSTEM AND HOST DEVICE THEREOF
A method for sharing a control right and a host device are provided. The method of sharing the control right is adapted to the host device of an interactive...
2016/0173544 Method And System For Providing An Audio Element Cache In A Customized Personal Radio Broadcast
Playing preselected content by a processor-based communications device includes maintaining a user profile associated with a user device including information...
2016/0173543 METHOD AND SYSTEM FOR CONCURRENT COLLABORATIVE UNDO OPERATIONS IN COMPUTER APPLICATION SOFTWARE
Multi-user real-time collaborative software applications may synchronize data between multiple users or multiple devices. Current aspects describe a method and...
2016/0173542 System and Methods for Creating and Updating Virtual Groups and Locating Other Groups All in Real Time
A system and methods for creating, forming or generating one or more virtual groups of individuals' names and information about the individuals, updating or...
2016/0173541 PRESENTATION OF CONTENT FROM WITHIN SPREADSHEET APPLICATION
A spreadsheet application may enable a user to organize, analyze, and store data in a tabular form. In some situations, the user may want to provide a brief...
2016/0173540 PROVIDING PERSISTENT ACTIVITY SESSIONS ACROSS CLIENT DEVICES
One or more embodiments of the disclosure provide systems and methods for improving a user experience related to interacting with content using multiple client...
2016/0173539 Method And System For Routing Of Session-Based Services
A method including receiving a request for a communication session with a recipient having a recipient identifier; querying a subscription database for...
2016/0173538 PUSHING EVENTS TO WEB PAGES USED FOR INTERACTION WITH APPLICATIONS
A web server provided according to aspect of the present disclosure maintains registration data indicating the browsers to be notified upon occurrence of...
2016/0173537 Effecting Communication Events
Disclosed are methods and devices (e.g. servers) for establishing a real-time communication event between a user of a client device and another user of another...
2016/0173536 SYSTEM AND METHOD FOR PROCESSING MEDIA REQUESTS DURING TELEPHONY SESSIONS
In a preferred embodiment, the method of caching media used in a telephony application includes: receiving a media request; sending the media request to a...
2016/0173535 CONTEXT-AWARE NETWORK SERVICE POLICY MANAGEMENT
A method includes converting, by a computer, a set of context-aware data forwarding policies to a set of network configuration forwarding rules for one or more...
2016/0173534 PROTECTED APPLICATION STACK AND METHOD AND SYSTEM OF UTILIZING
A secure appliance for use within a multi-tenant cloud computing environment which comprises: a) a policy enforcement point (PEP); b) a hardened Operating...
2016/0173533 Systems and Methods for Assessing the Compliance of a Computer Across a Network
The disclosed principles describe systems and methods for assessing the security posture of a target device, wherein the assessment is performed by a scanning...
2016/0173532 ELECTRONIC DEVICE AND METHOD FOR SUGGESTING RESPONSE MANUAL IN OCCURRENCE OF DENIAL
An electronic device and a method for suggesting a response manual in the occurrence of a denial are provided. The electronic device and the method, according...
2016/0173531 CONTEXT BASED DYNAMICALLY SWITCHING DEVICE CONFIGURATION
Various embodiments of systems and methods for dynamically switching device configuration based upon context are described herein. In an aspect, the method...
2016/0173530 Vehicle-Mounted Network System
Provided is a vehicle-mounted network system that enhances security of a vehicle by detecting or eliminating an attack on a vehicle-mounted network from an...
2016/0173529 CONTROLLED RESOURCE ACCESS TO MITIGATE ECONOMIC DENIAL OF SUSTAINABILITY ATTACKS AGAINST CLOUD INFRASTRUCTURES
Systems and methods include determining whether a CRPS value has been breached in a number of requests for access by an IP address, and dropping the requests...
2016/0173528 SAFE INPUT BROWSER, OPERATION METHOD THEREOF, AND COMPUTER SYSTEM HAVING THE SAFE INPUT BROWSER
The disclosure provides a safe input browser, an operation method thereof, and a computer system having the safe input browser. Upon receiving a command for...
2016/0173527 METHOD AND SYSTEM FOR PROTECTING AGAINST MOBILE DISTRIBUTED DENIAL OF SERVICE ATTACKS
A DDoS attack mitigation system implemented by a DDoS attack mitigation central processing server configured to execute server-side machine instructions and a...
2016/0173526 Method and System for Protecting Against Distributed Denial of Service Attacks
A DDoS attack mitigation process, comprising: receiving a request from a client device; computing a data access frequency for the client device, data access...
2016/0173525 SERVER DRIFT MONITORING
Threat detection is improved by monitoring variations in observable events and correlating these variations to malicious activity. The disclosed techniques can...
2016/0173524 METHOD AND SYSTEM FOR PROVIDING AN EFFICIENT ASSET MANAGEMENT AND VERIFICATION SERVICE
A virtual asset creation template associated with a class of virtual assets is identified and analyzed to identify and remedy vulnerabilities in the virtual...
2016/0173523 ENHANCED BROWSING WITH SECURITY SCANNING
A method scans a second web page linked to a first web page being displayed by a browser. The method identifies a target link to the second web page. Prior to...
2016/0173522 ENTITY IP MAPPING
Systems and methods for mapping IP addresses to an entity include receiving at least one domain name associated with the entity. Embodiments may further...
2016/0173521 CALCULATING AND BENCHMARKING AN ENTITY'S CYBERSECURITY RISK SCORE
Determining an entity's cybersecurity risk and benchmarking that risk includes non-intrusively collecting one or more types of data associated with an entity....
2016/0173520 SOCIAL NETWORK SECURITY MONITORING
A computer-implemented method includes security settings data associated with one or more profiles of a protected social entity on one or more social networks...
2016/0173519 Detection of Infected Network Devices and Fast-Flux Networks By Tracking URL And DNS Resolution Changes
A system and method for detecting Fast-Flux malware are presented. Domain name system (DNS) lookup requests to DNS servers from a local area network (LAN) to a...
2016/0173518 ADAPTIVE CLIENT-AWARE SESSION SECURITY
Source information for requests submitted to a system are classified to enable differential handling of requests over a session whose source information...
2016/0173517 DDOS PROTECTION INFRASTRUCTURES USING IP SHARING ACROSS WIDE AREA NETWORKS
According to some embodiments, a plurality of geographically remote distribution points may be established, each distribution point being associated with a...
2016/0173516 Methods And Systems For Malware Detection
Methods, system, and media for detecting malware are disclosed. A network may be monitored for a configured time interval collecting all of or some of the...
2016/0173515 Method and Product for Providing a Predictive Security Product and Evaluating Existing Security Products
A method, product and computer program product for evaluating a generation of malware variants, the method including the steps of: scanning, with one or more...
2016/0173514 Method and Product for Providing a Predictive Security Product and Evaluating Existing Security Products
A method, product and computer program product for providing evolutionary selection of malware variants, the method including the steps of: receiving a malware...
2016/0173513 APPARATUSES AND METHODS FOR SECURITY IN BROADCAST SERIAL BUSES
Apparatuses and methods are disclosed for monitoring broadcast serial communication buses, analyzing communications on those buses, and providing information...
2016/0173512 ROOTKIT DETECTION BY USING HARDWARE RESOURCES TO DETECT INCONSISTENCIES IN NETWORK TRAFFIC
A technique allows detection of covert malware that attempts to hide network traffic. By monitoring network traffic both in a secure trusted environment and in...
2016/0173511 NETWORK PROTECTION
A network security system for a network, the network comprising a plurality of networked appliances, the security system comprising one or more security...
2016/0173510 THREAT DETECTION USING URL CACHE HITS
Threat detection is improved by monitoring variations in observable events and correlating these variations to malicious activity. The disclosed techniques can...
2016/0173509 THREAT DETECTION USING ENDPOINT VARIANCE
Threat detection is improved by monitoring variations in observable events and correlating these variations to malicious activity. The disclosed techniques can...
2016/0173508 DYNAMIC MALICIOUS APPLICATION DETECTION IN STORAGE SYSTEMS
Improved techniques involve comparing access patterns in a storage system to expected access patterns under similar circumstances. An intrusion detection...
2016/0173507 NORMALIZING AND DETECTING INSERTED MALICIOUS CODE
A method, system, and computer program product for detecting malicious code insertion in data are provided in the illustrative embodiments. At an application...
2016/0173506 PROTECTING MOBILE DEVICES FROM MALWARE
Using a system distinct from a mobile device, the mobile device is switched from a first mode to a second mode to access a set of data storage locations in the...
2016/0173505 ON-VEHICLE COMMUNICATION SYSTEM
An on-vehicle communication system, performing message authentication using transmitter and receiver codes that are message authentication codes respectively...
2016/0173504 USER AUTHENTICATION BASED ON FOB/INDICIA SCAN
Embodiments of the invention are directed to systems, methods and computer program products for receiving a request from a user for access to at least one...
2016/0173503 Controlling Incoming Data Processing Requests
Aspects described herein relate to controlling incoming data processing requests or messages and whether the incoming data processing requests are allowed to...
2016/0173502 JURISDICTIONAL CLOUD DATA ACCESS
A request from a first user to access data stored in a first location is received. A profile of the first user is determined, wherein the profile includes one...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.