Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0294891 MULTI-USER MEDIA PRESENTATION SYSTEM
One or more embodiments of the disclosure provide systems and methods for providing media presentations to users of a media presentation system. A media...
2016/0294890 MULTI-USER MEDIA PRESENTATION SYSTEM
One or more embodiments of the disclosure provide systems and methods for providing media presentations to users of a media presentation system. A media...
2016/0294889 CLOUD-BASED CONFERENCING SYSTEM
One or more examples provide a method of web conferencing that includes: receiving an initiation request at a management server from a host client device to...
2016/0294888 CLOUD-BASED CONFERENCING SYSTEM
One or more examples provide a method of web conferencing that includes: receiving an initiation request at a management server from a host client device to...
2016/0294887 CLOUD-BASED CONFERENCING ON A MOBILE DEVICE
One or more examples provide a method of attending a scheduled web conference that includes: receiving a notification at a recipient client device authorized...
2016/0294886 Registration Method and System for Common Service Entity
A registration method and system for a common service entity (CSE) relate to the field of machine type communication; solve the problem that a CSE registration...
2016/0294885 Live Video Communications System
A live video communications system that enables clients to monitor media views and user interaction with media files. The system also enables clients and...
2016/0294884 Establishing Communication between Digital Media Servers and Audio Playback Devices in Audio Systems
A method includes receiving via an audio playback device a first multicast transmission (e.g., an SSDP(HTTP)/Bonjour(DNS) presence announcement) from a...
2016/0294883 CONTENT PROVISION SYSTEM, CONTENT PROVISION METHOD, CONTENT SERVER, AND NON-TRANSITORY COMPUTER-READABLE...
A content provision system includes a content server and a terminal, and a plurality of pieces of additional content including first and second content used in...
2016/0294882 AIRCRAFT DATA NETWORKS
An aircraft data network is provided that can include a first Remote Data Concentrator (RDC), a network switch and a second RDC. The first RDC can receive one...
2016/0294881 DELEGATING ADMINISTRATION RIGHTS USING APPLICATION CONTAINERS
A computer implemented method for delegating administration duties using application containers may include associating, by a database system, a custom object...
2016/0294880 USER-BASED NETWORK ONBOARDING
A request related to an access to a network by a first user device may be received. The user device may be included in a plurality of user devices associated...
2016/0294879 RESOURCE PROTECTION USING TOKENIZED INFORMATION
A method of using tokens to securely process actions for protected resources may include receiving a request to activate a token associated with a resource...
2016/0294878 SCALING A TRUSTED COMPUTING MODEL IN A GLOBALLY DISTRIBUTED CLOUD ENVIRONMENT
A distributed cloud environment system comprising: a repository; a plurality of cloud managed nodes with a client program interface; a plurality of service...
2016/0294877 USING DNS COMMUNICATIONS TO FILTER DOMAIN NAMES
Using DNS communications to filter domain names is disclosed. A domain name is extracted from a received DNS request. The received DNS request is blocked in...
2016/0294876 UNIQUE GRAPHIC IDENTIFIER
Techniques are described herein for authenticating a client device using a unique graphic identifier. A user device may generate a unique graphic identifier...
2016/0294875 SYSTEM AND METHOD FOR THREAT-DRIVEN SECURITY POLICY CONTROLS
Methods, systems, and media for a security system are provided herein. Exemplary methods may include: acquiring a firewall security policy from a policy...
2016/0294874 DISTRIBUTED NETWORK SECURITY SYSTEM
Some embodiments of the invention provide a method that performs security operations for packets that are processed by a forwarding element. The method of some...
2016/0294873 Modes of Policy Participation For Feedback Instances
Concepts and technologies disclosed herein are directed to modes of policy participation for feedback instances. According to one aspect, a system can receive...
2016/0294872 Policy Setting for Content Sharing of a Plurality of Remotely Connected Computing Devices in Physical or...
An information handling system includes a method for executing instructions for a content sharing system having mixed operating system capabilities, detecting...
2016/0294871 SYSTEM AND METHOD FOR MITIGATING AGAINST DENIAL OF SERVICE ATTACKS
A computer-implemented system and method for mitigating against denial of service attacks. The system includes a network having a plurality of programmable...
2016/0294870 NETWORKING FLOW LOGS FOR MULTI-TENANT ENVIRONMENTS
Computing resource service providers may provide computing resources to customers in a multi-tenant environment. These computing resources may be behind a...
2016/0294869 APPARATUSES, METHODS AND SYSTEMS FOR A SECURE RESOURCE ACCESS AND PLACEMENT PLATFORM
The APPARATUSES, METHODS AND SYSTEMS FOR A SECURE RESOURCE ACCESS AND PLACEMENT PLATFORM ("SRAP PLATFORM") provides a secure supporting infrastructure within a...
2016/0294868 DYNAMIC SECURE PACKET BLOCK SIZING
Disclosed herein are methods, systems, and software for handling secure transport of data between end users and content serving devices. In one example, a...
2016/0294867 METHOD AND SYSTEM FOR SECURITY PROTECTION OF ACCOUNT INFORMATION
A method for security protection of account information is provided, where the method includes: detecting an account input event on an accessed web page;...
2016/0294866 LOAD BALANCING IN A NETWORK WITH SESSION INFORMATION
Methods and systems for balancing load among firewall security devices (FSDs) are provided. According to one embodiment, service group and VLAN associations...
2016/0294865 DETECTING AND PREVENTING FLOODING ATTACKS IN A NETWORK ENVIRONMENT
A method for processing network traffic data includes receiving a packet, and determining whether the packet is a previously dropped packet that is being...
2016/0294864 MANAGING ROGUE DEVICES THROUGH A NETWORK BACKHAUL
Managing rogue devices in a network through a network backhaul. A rogue device is detected in a network and a rogue device message that includes the rogue...
2016/0294863 CORRELATION BASED SECURITY RISK IDENTIFICATION
Methods and systems are disclosed for identifying security risks, arising from credentials existing on machines in the networks that enable access to other...
2016/0294862 MALICIOUS WEBSITE ADDRESS PROMPT METHOD AND ROUTER
Embodiments provide a malicious website address prompt method and a router. A router acquires a target website address in a network access request in access of...
2016/0294861 ANTI-VULNERABILITY SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT
A system, method, and computer program product are provided for identifying a first and second occurrence in connection with at least one of the networked...
2016/0294860 Honey user
Systems and methods of managing the security of a networked environment based on activity associated with deployed pseudo-accounts are presented. In one...
2016/0294859 APPARATUS AND METHOD FOR DETECTING MALICIOUS DOMAIN CLUSTER
An apparatus and method for detecting a malicious domain cluster. The apparatus for detecting a malicious domain cluster includes a domain name server (DNS)...
2016/0294858 DELIVERING SECURITY FUNCTIONS TO DISTRIBUTED NETWORKS
Systems and methods for delivering security functions to a distributed network are described herein. An exemplary method may include: processing a data packet...
2016/0294857 DETERMINING INTERNET-BASED OBJECT INFORMATION USING PUBLIC INTERNET SEARCH
A device may receive an object. The device may determine object information for the object. The device may cause an internet search, based on the object...
2016/0294856 Testing Frequency Control using a Volatility Score
Various implementations provide an approach to control of testing frequency based on the concept of behavior change detection or "volatility." Behavior change...
2016/0294855 METHOD FOR SENSING FRAUDULENT FRAMES TRANSMITTED TO IN-VEHICLE NETWORK
A fraud sensing method for use in an in-vehicle network system including a plurality of electronic control units that communicate with each other via a bus...
2016/0294854 Cyber Risk Analysis and Remediation Using Network Monitored Sensors and Methods of Use
Systems and methods for cyber risk analysis and remediation using network monitored sensors are provided herein. An example system includes one or more data...
2016/0294853 DYNAMIC THROTTLING OF SCAN REQUESTS FOR MULTIPLE SCANNERS A CLUSTER OF NODES
Techniques for dynamic throttling of scan requests for multiple scanners in a cluster of nodes are described. An apparatus may comprise a dynamic throttling...
2016/0294852 DETERMINING STRING SIMILARITY USING SYNTACTIC EDIT DISTANCE
Examples relate to determining string similarity using syntactic edit distance. In one example, a computing device may receive domain name system (DNS) packets...
2016/0294851 DETECTING A MALICIOUS FILE INFECTION VIA SANDBOXING
A device may receive a trigger to determine whether a malicious file is operating on a client device. The device may determine a network activity profile...
2016/0294850 SECURING CLOUD COMPUTING ENVIRONMENTS
Some examples of security cloud computing environments can be implemented as methods. A processor of a first computer system that lacks permission to store...
2016/0294849 DETECTING SUSPICIOUS FILES RESIDENT ON A NETWORK
A device may determine a first set of hash values corresponding to a first set of files stored by a plurality of client devices. The device may analyze...
2016/0294848 METHOD FOR PROTECTION OF AUTOMOTIVE COMPONENTS IN INTRAVEHICLE COMMUNICATION SYSTEM
Methods and systems for mitigating cyber attacks on components of an automotive communication system are disclosed. These methods and systems comprise elements...
2016/0294847 VIRUS-RELEASE-DATE-BASED PRIORITY VIRUS SCANNING
A method for more efficiently scanning files for viruses includes determining a vulnerability date associated with a virus, wherein the vulnerability date is...
2016/0294846 METHOD OF AND SYSTEM FOR PRESENTING TRUST INFORMATION IN RESPECT OF WEB RESOURCES USING FAVICONS
Method of presenting trust information in respect of web resources on a display of an electronic device, the method comprising: determining a first visual...
2016/0294845 SYSTEMS AND METHODS FOR GENERATING AND VALIDATING CERTIFIED ELECTRONIC CREDENTIALS
Systems and methods for generating and validating certified electronic credentials are disclosed. A certified electronic credential may comprise a...
2016/0294844 METHOD AND APPARATUS FOR VERIFYING VALIDITY OF BEACON SIGNAL
Provided are a method, system, and apparatus for verifying the validity of a beacon signal. More particularly, the user terminal determines whether...
2016/0294843 DIGITAL CONTENT ACCESS CONTROL
Access to a linked resource may be protected using a time-based transformation of links to the resource. A linked resource may be transmitted to a browser in a...
2016/0294842 BOOTSTRAPPING USER AUTHENTICATION ON DEVICES
Disclosed are various embodiments that facilitate bootstrapping authentication of a user at a first device using a second device. The second device is...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.