Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0205161 METHOD AND APPARATUS FOR CONTENT DISTRIBUTION OVER A NETWORK
A method that incorporates teachings of the subject disclosure may include, for example performing, by a wireless communication device comprising a processor,...
2016/0205160 MULTIFUSION OF A STREAM OPERATOR IN A STREAMING APPLICATION
Embodiments of the present disclosure include a method, a system, and a computer program product for fusing a stream operator into more than one processing...
2016/0205159 BROADCAST RESPONSE SYSTEM
A broadcast response system provides, e.g., a radio broadcast listener with the ability to obtain media content such as music or speech while listening to the...
2016/0205158 SESSION DESCRIPTION INFORMATION FOR OVER-THE-AIR BROADCAST MEDIA DATA
An over-the-air (OTA) broadcast middleware unit is configured to receive aggregated session description data for a plurality of sessions, wherein each of the...
2016/0205157 BROADCASTING IN COMMUNICATION NETWORKS
In one embodiment, a first node is adapted for communication with a plurality of additional nodes of a communication network, such as a Delaunay Triangulation...
2016/0205156 Method for the Processing of a Multimedia Stream, Corresponding Device and Computer Program
A method is provided for processing multimedia streams between a platform for digital distribution of interactive applications and a customer terminal,...
2016/0205155 METHOD FOR TRANSFERRING CONTROL OF A CONFERENCE CALL
A method for transferring control of an existing multi-participant conversation in which at least two communication terminals are connected to each other...
2016/0205154 PROVIDING A MEETING LINK TO A PARTICIPANT WHO HAS LEFT A LOCATION OF THE MEETING
In one embodiment, a method includes identifying a first device as being located at a first physical location associated with a meeting, and determining when...
2016/0205152 REMOTE CALLING METHOD AND APPARATUS
Disclosed are a remote calling method and terminal, wherein the method includes: a service end registering released services to a register center; a client end...
2016/0205151 METHOD AND APPARATUS FOR ENABLING COMMUNICATIONS BETWEEN USERS
A method and device are provided for creating and utilizing a database which enables ascribing a plurality of communication addresses to each of a plurality of...
2016/0205150 METHOD AND APPARATUS FOR DELIVERY OF DATA-BASED/VOICE SERVICES OVER PICONETS AND WIRELESS LANs (WLANs) COUPLED...
Method and apparatus delivering voice/data services within a piconet operating over a limited range or over a WLAN communicating with 3GPP devices by...
2016/0205149 TECHNIQUES FOR DEVICE INDEPENDENT SESSION MIGRATION
Techniques for device independent session migration are presented. A secure mechanism is presented for a target device to receive a current authenticated...
2016/0205148 METHOD AND DEVICE FOR PERFORMING AUDIO/VIDEO STREAMING IN WIRELESS COMMUNICATION SYSTEM
A method for performing Audio/Video (A/V) streaming between at least one source device and at least one sink device in a wireless communication system, the...
2016/0205147 Session Information Recording Method and Recording Server
A session information recording method, where the method is executed by a recording server, the recording server is connected to a unified communications...
2016/0205146 SYSTEM AND METHOD FOR SCHEDULING A VIDEO CONFERENCE IN AN AUTONOMOUS VEHICLE
A system, a multi-user scheduling unit comprised in the system, and corresponding methods are described for scheduling a video conference call for at least one...
2016/0205145 PEER-TO-PEER INTERNET PROTOCOL TELEPHONE SYSTEM WITH SYSTEM-WIDE CONFIGURATION DATA
Various embodiments of the invention provide a Peer-to-Peer (P2P, Internet Protocol (IP) telephone system. The telephone system includes a plurality of...
2016/0205144 METHOD OF CONTROLLING SESSION INITIATION PROTOCOL SESSIONS WITH STATE CHARTS
A method involves acts of receiving a Session Initiation Protocol (SIP) request, initiating by a computing device having a processor, a SIP session as a result...
2016/0205143 ADAPTIVE NETWORK SECURITY POLICIES
A method and system for dynamic identification of network security policies are provided. The method comprises inspecting network traffic using a number of...
2016/0205142 SECURITY-CONNECTED FRAMEWORK
In an example, a security-connected platform is provided on a data exchange layer (DXL), which provides messaging on a publish-subscribe model. The DXL...
2016/0205141 POLICY ENFORCEMENT BY END USER REVIEW
Embodiments are disclosed that relate to enforcement of user policies in a multi-user interactive computing environment by end user review. For example, one...
2016/0205140 Distributed Storage Processing Statement Interception and Modification
A non-transitory computer readable storage medium has instructions executed by a processor to intercept a query statement at a master machine. The query...
2016/0205139 SECURED MOBILE COMMUNICATIONS DEVICE
A method is provided for securing a mobile communications device to a level required for accessing a network, for example a secured enterprise network, by...
2016/0205138 REAL-TIME POLICY DISTRIBUTION
In an example, there is disclosed a method and system for real-time policy and task distribution to endpoints over a data exchange layer. According to one...
2016/0205137 VISUALIZATION AND ANALYSIS OF COMPLEX SECURITY INFORMATION
In one example, a visualization data engine may be responsible for rendering the visualization data obtained from the backend data server and providing the...
2016/0205136 DATA COLLECTION
A method includes accessing user data corresponding to a user profile. The method may also include accessing at least one privacy setting corresponding to the...
2016/0205135 METHOD AND SYSTEM TO ACTIVELY DEFEND NETWORK INFRASTRUCTURE
Disclosed is an invention related to a system and device for actively defending a network infrastructure by implementing certain features that are attributed...
2016/0205134 ISP BLACKLIST FEED
Embodiments are provided for an actionable blacklist of DDoS offenders and ISPs associated offenders. The system can collect real-time attack data and perform...
2016/0205133 TRANSPARENT DENIAL OF SERVICE PROTECTION
Embodiments are directed toward transparent denial of service protection. Instruction set information that references a seed file may be communicated to a...
2016/0205132 METHODS AND SYSTEMS FOR PROVIDING COMPREHENSIVE CYBERSECURITY PROTECTION USING AN OPEN APPLICATION PROGRAMMING...
Methods of providing cyber-security services to a plurality of customers include providing a platform that includes a software program that is configured to...
2016/0205131 Method and Apparatus for Transmitting Information
A method for transmitting information from a first security module to a second security module involves a system comprising the first and the second security...
2016/0205130 METHOD AND SYSTEM FOR DESTROYING BROWSER-BASED MEMORY CORRUPTION VULNERABILITIES
Client-less methods and systems destroy/break the predictive layout of, for example, a client computer memory. The methods and systems operate by injecting a...
2016/0205129 NETWORK APPLIANCE FOR VULNERABILITY ASSESSMENT AUDITING OVER MULTIPLE NETWORKS
An apparatus, system, and method are directed towards enabling auditing of network vulnerabilities from multiple network vantage points virtually ...
2016/0205128 ADAPTIVE SECURITY INDICATOR FOR WIRELESS DEVICES
Methods and apparatus, including computer program products, are provided for adaptive security. In one aspect there is provided a method. The method may...
2016/0205127 DETERMINING A RISK LEVEL FOR SERVER HEALTH CHECK PROCESSING
Approaches are provided for determining a risk level for server health check processing. An approach includes creating statistical process control analyses for...
2016/0205126 INFORMATION TECHNOLOGY SECURITY ASSESSMENT SYSTEM
A method and system for creating a composite security rating from security characterization data of a third party computer system. The security...
2016/0205125 SYSTEM AND METHOD FOR ANALYZING MOBILE CYBER INCIDENT
A system and method for analyzing mobile cyber incidents that checks whether codes attacking the weaknesses of mobile users are inserted into collected URLs...
2016/0205124 SYSTEM AND METHOD FOR DETECTING MOBILE CYBER INCIDENT
A system for detecting mobile cyber incidents includes: a mobile incident collection server adapted to collect text messages sent through communication company...
2016/0205123 SYSTEM, APPARATUS, AND METHOD FOR DETECTING HOME ANOMALIES
An anomaly detection system includes appliances connected to a network and circuitry configured to receive statuses of the appliances. Patterns of use are...
2016/0205122 System and Method for Cyber Security Analysis and Human Behavior Prediction
An improved method for analyzing computer network security has been developed. The method first establishes multiple nodes, where each node represents an...
2016/0205121 MANAGING DOMAIN NAME ABUSE
A method for providing an abuse sentry service for responding to domain name abuse is described. The method comprises the following steps. A plurality of...
2016/0205120 VERTICAL THREAT ANALYTICS FOR DDOS ATTACKS
Embodiments are provided to allow institutions and individuals the ability to subscribe to notifications regarding DDoS attacks on certain types of...
2016/0205119 USER DETERMINATION DEVICE AND METHOD
A user determination device includes a processor that executes a procedure. The procedure includes causing a simulated abnormality to occur on a terminal,...
2016/0205118 CYBER BLACK BOX SYSTEM AND METHOD THEREOF
Provided is a cyber black box system. The cyber black box system includes a data collector configured to collect entire packet data, flow data, and a portable...
2016/0205117 METHOD AND SYSTEM FOR REFLECTOMETRY BASED COMMUNICATION NETWORK MONITORING, INTRUSION DETECTION, AND MESSAGE...
Systems and methods are provided for monitoring and detecting intrusions and authenticating messages on a communication network of a vehicle. A plurality of...
2016/0205116 METHOD AND SYSTEM FOR VIRTUAL SECURITY ISOLATION
A virtual security isolation method includes monitoring security status information of a plurality of virtual machines in a virtual LAN; determining whether...
2016/0205115 MANAGED SOFTWARE REMEDIATION
According to one example, a system and method are disclosed for malware and grayware remediation. For example, the system is operable to identify applications...
2016/0205114 METHOD AND APPARATUS FOR PRIVACY-ENHANCED EVIDENCE EVALUATION
A method for privacy-enhanced evidence evaluation may comprise: sending a request for pre-evaluation information regarding evidence data of a target object to...
2016/0205113 Method For Sharing A Media Collection In A Network Environment
In one aspect, the present disclosure provides for the accessing and playing of media files having differing associated rights such as non-DRM media files,...
2016/0205112 SYSTEM AND METHOD FOR TRANSACTION SECURITY ENHANCEMENT
A detection is made that a first entity residing on a mobile device is requesting authentication. The first entity resides in a first portion of the mobile...
2016/0205111 SHAREABLE CONTENT ITEM LINKS WITH USE RESTRICTIONS
Shareable content item links with use restrictions. In one embodiment, for example, a method comprises: receiving, from a client computing device used by an...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.