Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0226943 System And Method For Transferring Playlists
A method, computer program product and computing device for selecting at least one playlist for transfer, the at least one playlist being stored on a first...
2016/0226942 Insertion of Supplementary Content into a Segmented Content Stream
Techniques for insertion of supplementary content into a segmented content stream are described. In at least some embodiments, a content stream includes...
2016/0226941 SYSTEM AND METHOD FOR STREAMING MUSIC ON MOBILE DEVICES
In accordance with an embodiment, described herein is a system and method for streaming music on mobile devices, including those which may have limited support...
2016/0226940 COMMUNICATION SYSTEM
Methods and systems for integrated communications are pro-vided. In one embodiment, a user input is received via a user interface. Media data is received in...
2016/0226939 DEVICE FOR TRANSMITTING BROADCAST SIGNAL, DEVICE FOR RECEIVING BROADCAST SIGNAL, METHOD FOR TRANSMITTING...
Proposed herein is a method for transmitting a broadcast signal. The method for transmitting a broadcast signal proposes a system that can support next...
2016/0226938 SERVER CONFIGURATION INCLUDING STREAM PREVIEW
A method includes receiving first input from a computing device, the first input corresponding to selection of a first media player associated with a first...
2016/0226937 Session Management and Notification Mechanisms for Push-to-Talk (PTT)
An embodiment method includes receiving, by a notification service running on a processor, a notification from a first component of a push-to-talk (PTT)...
2016/0226936 INFORMATION MANAGEMENT PROBLEM INITIATIVE SYSTEM
An information management problem definition system has a processing device configured for receiving a plurality of messages comprising a chat session from a...
2016/0226935 ANNOTATING COLLABORATIVE INFORMATION STRUCTURES
Embodiments of the present invention address deficiencies of the art in respect to collaborative information object management and provide a method, system and...
2016/0226934 Grid Encoded Media Asset Data
Metadata can identify temporal segments of content associated with a media asset and can identify asset data types. In response to a request for a particular...
2016/0226933 METHOD AND DEVICE FOR COMMUNICATING BETWEEN AT LEAST A FIRST TERMINAL AND A SECOND TERMINAL
The invention concerns a method and a device for communicating between at least a first terminal (15) and a second terminal (12), a first communication session...
2016/0226932 MOBILE CONTENT COLLABORATION WITH ONE CLICK MULTIMEDIA CAPABILITY
A method includes performing operations as follows on a processor: receiving a selection of a content item by a first user from a first mobile device, sending...
2016/0226931 VIRTUAL MULTI-CLUSTER CLOUDS
An improved scalable object storage system includes methods and systems allowing multiple clusters to work together. Users working with a first cluster, or...
2016/0226930 METHOD AND SYSTEM FOR COMMUNICATION DEVICES
In one embodiment a user interface for a communication device is described, the user interface including a first icon representing a first communication event...
2016/0226929 METHOD AND APPARATUS FOR CONFIGURING IP MULTIMEDIA SUBSYSTEM NETWORK ELEMENTS
A system that incorporates teachings of the present disclosure may include, for example, a method for receiving initial filter criteria from a home subscriber...
2016/0226928 NEIGHBOR AWARE NETWORKING (NAN) DEVICE AND METHOD FOR SERVICE DISCOVERY
Embodiments of a Neighbor Aware Networking (NAN) device, NAN proxy device, and method for service discovery in a wireless network are generally described...
2016/0226927 FIELD DEVICE
To immediately reflect replacement of a field device in a network, a field device is provided. When a field device is newly connected to a low-order network...
2016/0226926 INITIATING A COMMUNICATION SESSION BASED ON AN ASSOCIATED CONTENT ITEM
This disclosure describes techniques in which one or more computing devices receive a signal from a first client computing device. The signal indicates that...
2016/0226925 METHOD AND APPARATUS FOR CONTROLLING POWER OUTPUT FROM AN ELECTRONIC DEVICE TO AN EXTERNAL ELECTRONIC DEVICE
A mobile terminal for supporting Rich Communication Suite (RCS) and Voice Over Long Term Evolution (VoLTE) based services is provided. The mobile terminal...
2016/0226924 CALL PROCESSING METHOD AND CONTROL APPARATUS, AUTOMATIC CALL DISTRIBUTION APPARATUS, AND AGENT TERMINAL
Embodiments of the present invention provide a call processing method and control apparatus, an automatic call distribution apparatus, and an agent terminal....
2016/0226923 VOICE SESSION TERMINATION FOR MESSAGING CLIENTS IN IMS
An IMS structure is described that hosts an IMS service based on a Rich Communication Suite (RCS) protocol for messaging only and IMS service based on VoLTE or...
2016/0226922 Control of Accesses for IMS Services
A method for operating a UE is provided. The method comprises retrieving, by the UE, an IMS transport policy comprising a set of service transport rules. The...
2016/0226921 OBTAINING SERVICES THROUGH A LOCAL NETWORK
One or more endpoints may be registered with a gateway at a premises. The gateway may include local physical interfaces for communicating with a first subset...
2016/0226920 MULTI-SERVICES GATEWAY DEVICE AT USER PREMISES
An application gateway including application service programming positioned at a user premises can provide voice controlled and managed services to a user and...
2016/0226919 Facilitating Separation-of-Duties When Provisioning Access Rights in a Computing System
Systems and methods for managing risk management rules are provided. A risk management rule may be configured at a rule configuration interface are described....
2016/0226918 Method and apparatus for associating data loss protection (DLP) policies with endpoints
A method of policy management in a Data Loss Prevention (DLP) system uses a policy model that associates a user with one or more DLP endpoints. When an...
2016/0226917 PRIVACY AWARE CAMERA AND DEVICE STATUS INDICATOR SYSTEM
A privacy indicator is provided that shows whether sensor data are being processed in a private or non-private mode. When sensor data are used only for...
2016/0226916 CREATING AND MANAGING A NETWORK SECURITY TAG
An apparatus, computer readable medium, and method are provided in one example embodiment and include a network device, an analysis module, and a tag module....
2016/0226915 SYSTEM AND METHOD FOR PRIORITY-BASED RULE GENERATION WITH CONSISTENCY CHECK AND POLICY ENFORCEMENT
A network node receives rules from a plurality of different domain entities. Each domain entity has a different priority level, and each rule defines an action...
2016/0226914 RISK-BASED CREDENTIAL MANAGEMENT
Risk-based credential management is provided. A request to checkout credentials is received. The credentials are associated with at least one managed resource....
2016/0226913 TECHNOLOGIES FOR SCALABLE SECURITY ARCHITECTURE OF VIRTUALIZED NETWORKS
Technologies for performing security monitoring services of a network functions virtualization (NFV) security architecture that includes an NVF security...
2016/0226912 ENDPOINT POLICY CHANGE
Endpoint device policy change can, in various examples, include detecting a change in a first registered attribute associated with an endpoint device on a...
2016/0226911 DYNAMIC ENTERPRISE SECURITY CONTROL BASED ON USER RISK FACTORS
Aspects dynamically set enterprise-level security rules by assessing risk factors associated with a user. Risk values representing likelihoods of loss of...
2016/0226910 SEEDING OF MOBILE APPLICATION MANAGEMENT POLICIES
A method includes performing operations as follows on a processor: monitoring use of resources in an enterprise by mobile devices, receiving metrics from the...
2016/0226909 DOCUMENT MODIFICATION DETECTION AND PREVENTION
Methods and apparatus, including computer program products, implementing and using techniques for document authentication. An electronic document is presented...
2016/0226908 IDENTIFICATION OF AND COUNTERMEASURES AGAINST FORGED WEBSITES
A system, a method, and computer program product identify a website that is a forgery of a primary website. Client side executable code is included in a page...
2016/0226907 STATELESS ATTESTATION SYSTEM
A method includes assessing a trustworthiness level of a user computer by communication between the user computer and a first server. A record indicating the...
2016/0226906 SECURITY DATA AGGREGATION AND BUSINESS INTELLIGENCE FOR WEB APPLICATIONS
Systems and methods may provide for detecting a browser request for web content. Additionally, interaction information associated with a plurality of sources...
2016/0226905 Risk Scoring For Threat Assessment
Threat risks to an enterprise are detected and assessed by assembling singular threats identified using both direct and behavioral threat indicators into...
2016/0226904 GLOBAL CLUSTERING OF INCIDENTS BASED ON MALWARE SIMILARITY AND ONLINE TRUSTFULNESS
In an embodiment, a method, performed by processors of a computing device for creating and storing clusters of incident data records based on behavioral...
2016/0226903 INTEGRATED NETWORK THREAT ANALYSIS
The inventive systems and methods aggregate network information to accompany file information in an indicator and warning environment. This system also...
2016/0226902 DETECTION OF MALICIOUS NETWORK CONNECTIONS
In one embodiment a method, system and apparatus is described for detecting a malicious network connection, the method system and apparatus including...
2016/0226901 Anomaly Detection Using Adaptive Behavioral Profiles
Anomalous activities in a computer network are detected using adaptive behavioral profiles that are created by measuring at a plurality of points and over a...
2016/0226900 SYSTEMS AND METHODS FOR DETECTING AND ADDRESSING HTML-MODIFYING MALWARE
Among other things, embodiments of the present disclosure help provide entities with the ability to remotely detect behavior associated with malware and...
2016/0226899 INSPECTED CONTENT DELIVERY WITH PEER-TO-PEER STREAMING
In one embodiment, A tracker computer receives from a first device in a peer-to-peer network that the first device has content for serving. A content request...
2016/0226898 Process For Identifying A Compromised Device
Methods and systems are described whereby a server can forward a request from a device behind a NAT router to a system to determine if the request is...
2016/0226897 Risk Ranking Referential Links in Electronic Messages
A computer system enables a business to reduce risks from phishing electronic messages. One or more original web links embedded in the electronic message may...
2016/0226896 ACTIVE VALIDATION FOR DDOS AND SSL DDOS ATTACKS
Methods and systems for detecting and responding to Denial of Service ("DoS") attacks comprise: detecting a DoS attack or potential DoS attack against a first...
2016/0226895 SPACE AND TIME EFFICIENT THREAT DETECTION
A security monitoring system operated by a downstream client continually collects event information indicating events that have occurred within the computing...
2016/0226894 SYSTEM AND METHOD FOR DETECTING INTRUSION INTELLIGENTLY BASED ON AUTOMATIC DETECTION OF NEW ATTACK TYPE AND...
Disclosed are a method and system, capable of performing adaptive intrusion detection proactively coping with a new type of attack unknown to the system and...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.