Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0277471 SYSTEM AND METHOD FOR OPTIMIZING A COMMUNICATION SESSION BETWEEN MULTIPLE TERMINALS INVOLVING TRANSCODING...
System and method for optimizing a transcoding session between multiple terminals are disclosed. The method determines properties of the transcoding session,...
2016/0277470 VIDEO STREAM MANAGEMENT FOR REMOTE GRAPHICAL USER INTERFACES
Embodiments enable display updates other than a video stream in a graphical user interface (GUI) to be rendered, encoded, and transmitted exclusive of the...
2016/0277469 DATA PUBLICATION AND DISTRIBUTION
Described herein are methods and systems for data distribution over a network. A device can capture content. The device can be configured to publish the...
2016/0277468 Adapting Encoded Bandwidth
A method comprising: conducting a communication session between a first terminal and a second terminal, the session comprising transmitting an encoded...
2016/0277467 Adapting Encoded Bandwidth
A method, performed from a server, of regulating a selection of an encoded bandwidth with which an encoded bitstream is transmitted from an encoder of a...
2016/0277466 PROCESSING OF MULTIMEDIA DATA
The invention relates to techniques for providing media content in a broadcast scenario to a streaming player, like a DASH player. In order to compensate a...
2016/0277465 METHOD AND SYSTEM FOR CLIENT-SERVER REAL-TIME INTERACTION BASED ON STREAMING MEDIA
A method of processing real-time streaming media is performed at a computer system having one or more processors and a memory. The computer system obtains a...
2016/0277464 DATA TRANSMISSION METHOD AND SYSTEM THEREOF
A data transmission method and a system thereof are provided according to the disclosure. A first type is determined for the data to be transmitted by the...
2016/0277463 MULTICAST FLOW OVERLAY USING REGISTRATION OVER A RELIABLE TRANSPORT
An example method includes exchanging targeted hello messages to establish a targeted neighbor connection between a first routing device and a second routing...
2016/0277462 APPARATUS, SYSTEM, AND METHOD OF CONTROLLING OUTPUT OF CONTENT DATA, AND RECORDING MEDIUM
The communication terminal determines whether a delay in output of an output signal based on first content data is detected, the first content data being...
2016/0277461 MULTI-SITE SCREEN INTERACTIONS
A technology for interacting with a collaborative videoconferencing environment is disclosed. A display having a substantially "L-shaped" configuration allows...
2016/0277460 METHOD AND APPARATUS FOR INITIATING NETWORK CONFERENCE
The present application provides a method including: acquiring mail information related to the network conference; identifying sender address information,...
2016/0277459 SYSTEM AND METHOD FOR GROUP PARTICIPATION IN A DIGITAL MEDIA PRESENTATION
System and method for group participation in a digital media presentation are provided that are capable of selecting digital media items for inclusion in the...
2016/0277458 SYSTEM AND METHOD FOR COORDINATING DISPLAY OF SHARED VIDEO DATA
A system and method for coordinating multiple-user edits of shared digital data. A coordinating device may receive commands to edit shared digital data from...
2016/0277457 MULTI-GROUP METHODS AND SYSTEMS FOR REAL-TIME MULTI-TIER COLLABORATIVE INTELLIGENCE
Systems and methods for deriving a real-time closed-loop collaborative intelligence from a plurality of users of a plurality of computing devices, the...
2016/0277456 CONDUCTING ONLINE MEETINGS USING AUGMENTED EQUIPMENT ENVIRONMENT
Techniques for conducting online meetings involve expanding the scope of devices beyond basic peripheral devices, such as built-in cameras or displays, that...
2016/0277455 Online Meeting Initiation Based on Time and Device Location
A system comprises an interface and a processor communicatively coupled to the interface. The interface is configure to receive a first request from a first...
2016/0277454 IMAGE SHARING APPARATUS, IMAGE SHARING SYSTEM, AND GRAPHICAL USER INTERFACE
An image sharing apparatus is provided. The image sharing apparatus includes a first management unit configured to provide participation permission to one or...
2016/0277453 SYSTEM AND METHOD FOR PROVIDING ENTERPRISE VOICE CALL CONTINUITY
An improved system and method are disclosed for providing voice call continuity in an enterprise network. For example, an enterprise public branch exchange...
2016/0277452 ENHANCED CONTENT CONSUMPTION
Enhanced content consumption is provided by establishing a pairing between two computing devices, wherein at least one of the two computing devices provides a...
2016/0277451 SMALL-CAPACITY IMS CORE SYSTEM
A small-capacity IMS core is a system that provides support so that a group customer using an IMS service can manage a POTS system and an Internet telephone...
2016/0277450 SYSTEMS, METHODS, AND COMPUTER PROGRAM PRODUCTS FOR ADAPTING THE SECURITY MEASURES OF A COMMUNICATION NETWORK...
An adaptable network security system includes trust mediator agents that are coupled to each network component. Trust mediator agents continuously detect...
2016/0277449 UNIFIED GENERATION OF POLICY UPDATES
User input mechanisms are displayed for defining a compliance policy update. A unified compliance policy update is generated according to a unified schema that...
2016/0277448 MANAGEMENT SYSTEM, MANAGEMENT METHOD AND MANAGEMENT SERVER FOR COMMUNICATION TERMINALS, TERMINAL CONTROL...
A system, a method and a server for managing a communication terminal as well as a terminal control method are provided that make it possible to easily use a...
2016/0277447 SYSTEM AND APPARATUS FOR PROVIDING NETWORK SECURITY
A rule engine receives data flows. The data flows are between a network and an application. The rule engine determines data flow information and in dependence...
2016/0277446 Apparatus and Method for Using Certificate Data to Route Data
A method of routing data across a network receives a session request from a client node to access at least one node in a local network having a plurality of...
2016/0277445 Security Activation for Dual Connectivity
Methods and apparatus for determining a security algorithm to be used for secured communications between a wireless terminal and a second node while the...
2016/0277444 SYSTEMS, METHODS, AND MEDIA FOR GENERATING BAIT INFORMATION FOR TRAP-BASED DEFENSES
Systems, methods, and media for generating bait information for trap-based defenses are provided. In some embodiments, methods for generating bait information...
2016/0277443 METHOD AND SYSTEM FOR USING SMART IMAGES
Embodiments of the invention provide systems and methods for using an anti-phishing image. More specifically, embodiments of the present invention provide for...
2016/0277442 SYSTEM AND METHOD FOR DETECTION OF TARGETED ATTACK BASED ON INFORMATION FROM MULTIPLE SOURCES
Disclosed are methods, systems, and computer programs for detecting targeted attacks on compromised computer from multiple sources. An example method includes...
2016/0277441 TAINT INJECTION AND TRACKING
An embodiment or embodiments of an electronic device can comprise an input interface and a hardware component coupled to the input interface. The input...
2016/0277440 MITIGATING NEIGHBOR DISCOVERY-BASED DENIAL OF SERVICE ATTACKS
In one embodiment, a device in a network determines whether a destination address of a packet received by the device is within a neighbor discovery (ND) cache...
2016/0277439 Locking Applications and Devices Using Secure Out-of-Band Channels
Systems and methods are provided for locking/unlocking a user account for accessing a client application. The systems and methods pair a user account for...
2016/0277438 SELECTIVE SINKHOLING OF MALWARE DOMAINS BY A SECURITY DEVICE VIA DNS POISONING
Techniques for selective sinkholing of malware domains by a security device via DNS poisoning are provided. In some embodiments, selective sinkholing of...
2016/0277437 Method of Physical Chip Identification for Networks of Electronic Appliance
A technology precluding attacks through peripheral devices thefts to a network of electronic appliance, by utilizing physical chip identification devices, is...
2016/0277436 System and Method for Information Security Threat Disruption via a Border Gateway
A system and method for disrupting an information security threat that constitutes an attack on a computer asset in a computer network is provided. The...
2016/0277435 Methods and Systems for Automated Anonymous Crowdsourcing of Characterized Device Behaviors
Methods, and devices implementing the methods, use device-specific classifiers in a privacy-preserving behavioral monitoring and analysis system for...
2016/0277434 METHOD AND SYSTEM FOR TRACKING FRAUDULENT ACTIVITY
A method and system for tracking potentially fraudulent activities associated with one or more web sites is disclosed. In an example embodiment, the system...
2016/0277433 NON-HARMFUL INSERTION OF DATA MIMICKING COMPUTER NETWORK ATTACKS
Non-harmful data mimicking computer network attacks may be inserted in a computer network. Anomalous real network connections may be generated between a...
2016/0277432 METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR CONVERGING ON NETWORK PROTOCOL STACK VULNERABILITIES USING...
A method for progressive convergence on network protocol stack vulnerabilities includes defining an initial protocol field and field value space for fuzz...
2016/0277431 SECURITY THREAT DETECTION
Systems and methods for retrospective scanning of network traffic logs for missed threats using updated scan engines are provided. According to an embodiment,...
2016/0277430 SYSTEM AND METHOD FOR DETECTING MOBILE CYBER INCIDENT
A method for detecting mobile cyber incidents includes: allowing a mobile incident collection server to determine whether new text is received; extracting the...
2016/0277429 TOKEN BASED AUTOMATED AGENT DETECTION
Service providers may operate one or more services configured to detect requests generated by automated agents. A CAPTCHA may be transmitted in response to...
2016/0277428 MECHANISM TO AUGMENT IPS/SIEM EVIDENCE INFORMATION WITH PROCESS HISTORY SNAPSHOT AND APPLICATION WINDOW CAPTURE...
A method to augment a plurality of IPS or SIEM evidence information is provided. The method may include monitoring a plurality of processes associated with a...
2016/0277427 DETECTION OF ROGUE ACCESS POINTS
A method and apparatus determine whether a rogue access point (AP) is present within a wireless network. The method includes sending a first AP discovery...
2016/0277426 MECHANISM TO AUGMENT IPS/SIEM EVIDENCE INFORMATION WITH PROCESS HISTORY SNAPSHOT AND APPLICATION WINDOW CAPTURE...
A method to augment a plurality of IPS or SIEM evidence information is provided. The method may include monitoring a plurality of processes associated with a...
2016/0277425 NETWORK INTERFACE DEVICES WITH REMOTE STORAGE CONTROL
Network interface devices with remote storage control. In some embodiments, a network interface device may include receiver circuitry and remote storage device...
2016/0277424 Systems and Methods for Calculating a Trust Score
Systems, devices, and methods are described herein for calculating a trust score. The trust score may be calculated between entities including, but not limited...
2016/0277423 MALWARE DETECTION BASED ON TRAINING USING AUTOMATIC FEATURE PRUNING WITH ANOMALY DETECTION OF EXECUTION GRAPHS
A threat detection system for detecting malware can automatically decide, without manual expert-level interaction, the best set of features on which to train a...
2016/0277422 SYSTEM AND METHOD FOR DETECTING FINAL DISTRIBUTION SITE AND LANDING SITE OF MALICIOUS CODE
A system and method for detecting final distribution and landing sites of a malicious code. The method extracts and collecting new article URLs and ...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.