Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0182594 ADAPTIVE STREAMING
Adaptively streaming media encoded at variable bit rates and/or optimizing the presentation thereof according perceivable capabilities of a client or other...
2016/0182593 METHODS, DEVICES, AND COMPUTER PROGRAMS FOR IMPROVING CODING OF MEDIA PRESENTATION DESCRIPTION DATA
The invention relates to improving coding of media presentation description data. Requesting streamed timed media data associated with a media item, organized...
2016/0182592 Publish/Subscribe Mashups For Social Networks
Described herein is a mashing technology that facilitates mashup creation over a plurality of publish/subscribe social network data stream. These mashing...
2016/0182591 AUTOMATED COMPRESSION OF DATA
The application relates to a system comprising at least two processing nodes (1), wherein the nodes (1) comprise an execution environment (2) and a processing...
2016/0182590 SYSTEM AND METHOD FOR MODIFYING A STREAMING MEDIA SERVICE FOR A MOBILE RADIO DEVICE
The present disclosure relates to a method performed in a network server of a service provider providing a service comprising media streaming. The method...
2016/0182589 METHOD AND SYSTEM FOR RENDERING DIGITAL CONTENT ACROSS MULTIPLE CLIENT DEVICES
A method and a system for rendering digital content across multiple client devices are provided. Digital content is downloaded to a first client device from a...
2016/0182588 DYNAMIC WORKLOAD BALANCING FOR REAL-TIME STREAM DATA ANALYTICS
Router threads read real-time stream data as that data is received at processing nodes along a processing path for the data. The data is initially parsed into...
2016/0182587 In-Band Quality Data
A method of transmitting data in a media stream in accordance with a media streaming protocol includes generating data of a first type associated with a first...
2016/0182586 METHOD AND APPARATUS FOR MEDIA STREAM TRANSMISSION, AND USER EQUIPMENT
The present invention discloses a method and an apparatus for media stream transmission, and user equipment. According to the method and the apparatus for...
2016/0182585 Media playback redirected to a networked renderer
A single stream receiver is preselected from a global list residing on a client computing device hosting a content casting application. Once a user launches a...
2016/0182584 Replacing Media Item
An example implementation involves a playback device receiving, from a control device, data indicating an addition of a first media item to a queue that is...
2016/0182583 GENERATING AN AUTOMATED MULTIMEDIA FEED BASED ON VIRTUAL IT INFRASTRUCTURE USERS NEEDS/INTEREST
Techniques for generating multimedia feed based on virtual IT infrastructure user's needs in a virtual datacenter are described. In one example embodiment, a...
2016/0182582 Sequential Pre-fetch in a Cached Network Environment
An origin-edge node architecture is provided herein where the edge node caches next fragments of media content while fulfilling current media content requests,...
2016/0182581 NETWORK PROXY FOR ENERGY EFFICIENT VIDEO STREAMING ON MOBILE DEVICES
Examples of systems and methods for network proxy server for energy efficient video streaming on mobile devices are generally described herein. A proxy server...
2016/0182580 OFFLINE VIRTUAL PARTICIPATION IN AN ONLINE CONFERENCE MEETING
Systems, methods, and non-transitory computer-readable storage media for allowing an invitee to record a presentation prior to an online conference meeting....
2016/0182579 METHOD OF ESTABLISHING AND MANAGING MESSAGING SESSIONS BASED ON USER POSITIONS IN A COLLABORATION SPACE AND A...
A computerized method and system of managing a collaboration space having a plurality of users collaborating therein, the method comprising: establishing a...
2016/0182578 DYNAMIC PROFILE SHARING USING EXPIRING TOKENS
Access to a user profile of a user device at a location may be provided to a destination device upon detecting that the location is within a proximity of a...
2016/0182577 CONTENT SELECTION
One or more systems and/or techniques for generating a content item from content within a content area are described herein. A first boundary and a second...
2016/0182576 Electronic Meetings with Known Participants but Anonymous Comments
Computer-readable media embodying instructions executable by a computer to perform functions having corresponding methods comprise: joining a user of the...
2016/0182575 SYSTEM AND METHOD TO CUSTOMIZE A MULTIPOINT CONTROL UNIT
Various disclosed embodiments include methods and systems for constructing a multipoint control unit (MCU). The method includes generating an abstract...
2016/0182574 METHOD AND APPARATUS FOR SUPPORTING FACILITY CONTROL OF TERMINAL
A method and an apparatus for supporting facility control of a terminal are provided. The method includes a sensor device receiving facility-related...
2016/0182573 LOCAL SESSION LOOPBACK PROTOCOL
A method for efficient utilization of available bandwidth over a data connection between a client computer and a server computer. An echo component on both the...
2016/0182572 METHOD, DEVICE, AND SYSTEM FOR IMPLEMENTING PROMPTING AND COLLECTING USER INFORMATION
The present invention discloses a method, a device, and a system for implementing prompting and collecting user information, and belongs to the field of...
2016/0182571 Lawful Interception and Security for Proximity Service
Lawful interception and security for proximity service There are provided measures for lawful interception and security for proximity service. Such measures...
2016/0182570 SYSTEM AND METHOD FOR IMPLEMENTING DATA MIGRATION WHILE PRESERVING SECURITY POLICIES OF A SOURCE FILER
A data migration system in which security policies of a source file system are preserved, in an environment in which clients actively issue communications for...
2016/0182569 Real-Time Module Protection
Technologies for securing an electronic device include trapping an attempt to access a secured system resource of the electronic device, determining a module...
2016/0182568 METHOD AND SYSTEM FOR PORTING GATEWAY FUNCTIONALITY ASSOCIATED WITH A USER FROM A FIRST GATEWAY TO ONE OR MORE...
A broadband gateway, which enables communication with a plurality of devices, handles at least one physical layer connection to at least one corresponding...
2016/0182567 Techniques to Deliver Security and Network Policies to a Virtual Network Function
Examples may include techniques to securely provision, configure, and de-provision virtual network functions for a software defined network or a cloud...
2016/0182566 INCIDENT RESPONSE TOOL USING A DATA EXCHANGE LAYER SYSTEM
This disclosure describes systems, methods, and computer-readable media related to an incident response tool using data exchange layer. In some embodiments, a...
2016/0182565 LOCATION-BASED NETWORK SECURITY
Methods and systems for a location-aware network security device are provided. According to one embodiment, a resource access request is received at a network...
2016/0182564 DOMAIN NAME HIJACK PROTECTION
A domain name registering entity (such as a domain registry, registrar, or reseller) or an independent proxy registration service may offer a domain name...
2016/0182563 EMBEDDED SCRIPT SECURITY USING SCRIPT SIGNATURE VALIDATION
A technique allows a client computer with a web browser to receive a web page having active content in response to transmitting a request for content. The...
2016/0182562 TIME BASED AUTHENTICATION CODES
Systems and methods of the present invention provide for one or more server computers communicatively coupled to a network and configured to: receive a request...
2016/0182561 ROUTE MONITORING SYSTEM FOR A COMMUNICATION NETWORK
A route monitoring system disclosed herein includes a computing system executing a route monitoring service coupled to a communication network. The route...
2016/0182560 SYSTEMS AND METHODS FOR PROTECTING AN ONLINE SERVICE AGAINST A NETWORK-BASED ATTACK
Techniques for protecting an online service against network-based attacks are described. In some cases, protection is performed by way of a scalable protection...
2016/0182559 POLICY-BASED NETWORK SECURITY
A method includes, responsive to detecting network activity indicative of a threat, selecting a threat mitigation scheme corresponding to a set of response...
2016/0182558 Auto-tuning program analysis tools using machine learning
Machine learning (ML) significantly reduces false alarms generated by an automated analysis tool performing static security analysis. Using either ...
2016/0182557 MULTI-DIMENSIONAL GEOMETRY FOR ENHANCEMENT OF SIMULATIONS OF NETWORK DEVICES
A computer-implemented method for using multi-dimensional geometry in simulations of packet flows through network devices, is provided. The ...
2016/0182556 SECURITY RISK SCORE DETERMINATION FOR FRAUD DETECTION AND REPUTATION IMPROVEMENT
A technique allows a system to determine online user activity for a user associated with a user client device. The online user activity includes private...
2016/0182555 MULTI-DIMENSIONAL GEOMETRY FOR ENHANCEMENT OF SIMULATIONS OF NETWORK DEVICES
A computer-implemented method for using multi-dimensional geometry in simulations of packet flows through network devices, is provided. The ...
2016/0182554 METHODS, SYSTEMS, AND DEVICES FOR DETECTING AND ISOLATING DEVICE POSING SECURITY THREAT
Methods and systems are disclosed for detecting a security threat. The methods and systems comprise detecting that a first device is coupled with the first I/O...
2016/0182553 Auto-tuning program analysis tools based on user feedback
User-guided machine learning (ML) significantly reduces false alarms generated by an automated analysis tool performing static security analysis. User...
2016/0182552 Modeling and Outlier Detection in Threat Management System Data
Methods, systems, and computer-readable media for identifying potential threats on a network based on anomalous behavior in communication between endpoints are...
2016/0182551 Automated Security Analytics Platform with Multi-Level Representation Conversion for Space Efficiency and...
Active memory for managing network telemetry information, or other types of information stored as objects, has objects partially-serialized to allow greater...
2016/0182550 DETERMINING A REPUTATION FOR A PROCESS
Particular embodiments described herein provide for an electronic device that can be configured to identify a process running on the electronic device, assign...
2016/0182549 PROCESS SECURITY VALIDATION
Techniques for process security validation are described herein. In one example, a method includes determining, via a processor, that a process is in a first...
2016/0182548 Apparatus and Method for Detecting Location of Wireless Device to Prevent Relay Attack
A passive entry passive start (PEPS) method for preventing relay attack includes detecting a distance of a wireless device to a vehicle based on a time of...
2016/0182547 REAL-TIME NETWORK ATTACK DETECTION AND MITIGATION INFRASTRUCTURE
The invention features systems and methods for detecting and mitigating network attacks in a Voice-Over-IP (VoIP) network. A server is configured to receive...
2016/0182546 Identifying Possible Security Threats Using Event Group Summaries
A disclosed computer-implemented method includes receiving and indexing the raw data. Indexing includes dividing the raw data into time stamped searchable...
2016/0182545 METHODS, SYSTEMS, AND MEDIA FOR MASQUERADE ATTACK DETECTION BY MONITORING COMPUTER USER BEHAVIOR
Methods, systems, and media for masquerade attack detection by monitoring computer user behavior are provided. In accordance with some embodiments, a method...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.