Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0344783 CONTENT PROVISION SYSTEM, INFORMATION PROCESSING APPARATUS AND CONTENT REPRODUCTION METHOD
There is provided a content provision system including an information processing apparatus and a terminal device wherein the information processing apparatus...
2016/0344782 UNICAST SUPPORT IN PROSE DIRECT DEVICE-TO-DEVICE COMMUNICATION
The present disclosure enables a multicast and/or unicast transmitting UE to configure a multicast device-to-device communication and/or the unicast...
2016/0344781 PROCESSING OF LIVE MULTIMEDIA CONTENT AND/OR DATA STREAMS OVER A COMMUNICATION NETWORK
A method and associated device for streaming multimedia data over a communication network. Data associated with live multimedia content is received. Portions...
2016/0344780 METHOD AND SYSTEM FOR CONTROLLING COMMUNICATIONS FOR VIDEO/AUDIO-CONFERENCING
The present invention relates to a method for controlling communications for an online meeting. The method includes, at each of a plurality of user devices,...
2016/0344779 Dynamic Personalized Content Presentation To Re-engage Users During Online Sessions
Users can participate in various different types of online sessions, such as webinars, massive open online courses (MOOCs), social learning sessions, and so...
2016/0344778 REROUTING DATA OF A STREAMING APPLICATION
A streams manager monitors performance of a streaming application and determines if operators are underperforming according to a threshold. When the...
2016/0344777 SYSTEM AND METHOD FOR PROVIDING A MEDIA COMMUNICATION CONVERSATION SERVICE
A system and method comprising configuring a conversation resource for an account within a communication platform; registering a set of endpoints as...
2016/0344776 END USER CONTROLLED MULTI-SERVICE DEVICE PRIORITY SETTING
A communication network allows an end user to dynamically select a user device among user devices associated with the user's subscription as the primary user...
2016/0344775 SYSTEM AND METHOD OF LAWFUL ACCESS TO SECURE COMMUNICATIONS
The present disclosure relates to systems and methods for secure communications. In some aspects, a method of signalling an interception time period is...
2016/0344774 METHODS AND NODES SUPPORTING LAWFUL INTERCEPT
The following invention relates to methods and nodes for performing Lawful Intercept, LI, when service related content is stored in a Radio Access Network, RAN...
2016/0344773 Integrated Development Environment (IDE) for Network Security Configuration Files
An integrated development environment (IDE) preprocesses a configuration file including security rules. The preprocessing maps object names in the security...
2016/0344772 MODELLING NETWORK TO ASSESS SECURITY PROPERTIES
A method of assessing a network uses a model (450) having nodes (100, 110) to represent parts of the network infrastructure and the application services, and...
2016/0344771 MANAGED APPLICATIONS
Embodiments relate to a system that includes a computing device and a managed application executable by the computing device. The managed application initiates...
2016/0344770 Automatic Phishing Email Detection Based on Natural Language Processing Techniques
A comprehensive scheme to detect phishing emails using features that are invariant and fundamentally characterize phishing. Multiple embodiments are described...
2016/0344769 SECURITY SYSTEMS FOR MITIGATING ATTACKS FROM A HEADLESS BROWSER EXECUTING ON A CLIENT COMPUTER
Computer systems and methods in various embodiments are configured for improving the security and efficiency of server computers interacting through an...
2016/0344768 INTRUSION DETECTION TO PREVENT IMPERSONATION ATTACKS IN COMPUTER NETWORKS
In an embodiment, a central computer performs a data processing method. The central computer receives telemetry data from intrusion sensors. The central...
2016/0344767 Preventing Spoofing Attacks for Bone Conduction Applications
Concepts and technologies are disclosed herein for preventing spoofing attacks for bone conduction applications. According to one aspect, a device can receive...
2016/0344766 SPOOFING DETECTION
A method for preventing spoofing in an automotive network, the method comprising storing at least one address of a first vehicle electronic control unit and...
2016/0344765 Unobtrusive and Dynamic DDoS Mitigation
Some embodiments provide techniques for mitigating against layer 7 distributed denial of service attacks. Some embodiments submit a computational intensive...
2016/0344764 NETWORK DEVICE AND NETWORK SYSTEM
A network device connected via a bus with a plurality of network devices includes: an authentication unit that executes authentication based upon message...
2016/0344763 FUZZING SERVER RESPONSES TO MALICIOUS CLIENT DEVICES
A security device may receive a request, from a client device and intended for a server device, to provide a resource. The resource may be associated with...
2016/0344762 METHOD AND SYSTEM FOR AGGREGATING AND RANKING OF SECURITY EVENT-BASED DATA
The present invention provides a method of identifying aggregating and mathematically ranking security alert data having the steps of identifying a plurality...
2016/0344761 System, Method And Apparatus To Visually Configure An Analysis Of A Program
A method extracts views from an application program, where at least some extracted views include at least one view component, and presenting the extracted...
2016/0344760 DYNAMICALLY-ADAPTIVE-RESILIENT MEASURED CYBER PERFORMANCE AND EFFECTS THROUGH COMMAND AND CONTROL INTEGRATION...
System-of-systems architectures and methods for dynamically and adaptively managing and executing a command and control system across a global cyber enterprise...
2016/0344759 METHOD FOR PATTERN PROCESSING
The invention relates to a method for pattern processing on a processor platform, the method comprising: compiling a plurality of patterns into a plurality of...
2016/0344758 EXTERNAL MALWARE DATA ITEM CLUSTERING AND ANALYSIS
Embodiments of the present disclosure relate to a data analysis system that may automatically generate memory-efficient clustered data structures,...
2016/0344757 GLOBAL CLUSTERING OF INCIDENTS BASED ON MALWARE SIMILARITY AND ONLINE TRUSTFULNESS
In an embodiment, a method, performed by processors of a computing device for creating and storing clusters of incident data records based on behavioral...
2016/0344756 UNWANTED TUNNELING ALERT SYSTEM
Various systems and methods are provided that detect malicious network tunneling. For example, VPN logs and data connection logs may be accessed. The VPN logs...
2016/0344755 COMMUNICATION CHIPSET AND APPARATUS SECURE FROM INTERNET ATTACK
A communication chipset and a communication apparatus are disclosed. A register map establishes a communication channel with a plurality of apparatuses, a...
2016/0344754 Configurable Robustness Agent in a Plant Security System
A communications network security system includes a robustness agent that operates within a communications interface of a device at one or more nodes of the...
2016/0344753 METHOD FOR INSTRUCTION SET MORPHING TO INHIBIT MALICIOUS CODE INJECTION
A method for improving the reliability and security of computer-based processing by providing instruction set morphing to inhibit malicious software code...
2016/0344752 BRUTE FORCE ATTACK PREVENTION SYSTEM
A system for preventing a brute force attack includes an output interface, an input interface, and a processor. An output interface is to provide a workfactor,...
2016/0344751 CUSTOMIZED RECORD HANDLING IN A CONTENT DELIVERY NETWORK
Systems, methods, apparatus and software for customized record handling in a content delivery network are disclosed. In one implementation, a user request...
2016/0344750 Apparatus and Method for Characterizing the Risk of a User Contracting Malicious Software
A non-transitory computer readable storage medium includes executable instructions to identify specified network interactions initiated by a client machine....
2016/0344749 METHOD AND APPARATUS FOR PROTECTING COMPUTER FILES FROM CPU RESIDENT MALWARE
Apparatus for use with a computer to secure the computer's stored data against malware in the computer's central processing unit (CPU). The apparatus comprises...
2016/0344748 DISTRIBUTED TOPOLOGY ENABLER FOR IDENTITY MANAGER
Provided are techniques for combining existing identity management information from multiple Identity Manager (IM) nodes. The combined information from the...
2016/0344747 METHOD AND SYSTEM FOR SECURELY AND AUTOMATICALLY OBTAINING SERVICES FROM A MACHINE DEVICE SERVICES SERVER
A vehicle processing device authenticates that an authorized user has requested an action by the vehicle, and generates an authentication acknowledgement...
2016/0344746 TAINT MECHANISM FOR MESSAGING SYSTEM
A method for managing a plurality of messages associated with an online messaging system is provided. The method may include receiving a message from a...
2016/0344745 METHOD AND PROTOCOL FOR SECURE DEVICE DEPLOYMENT USING A PARTIALLY-ENCRYPTED PROVISIONING FILE
A method, system, and computer program product for Internet-connected device deployment, and to techniques for secure device deployment using a ...
2016/0344744 APPLICATION PROTOCOL QUERY FOR SECURING GBA USAGE
A network element provides an application service to a device over a network. Using a shared key generated according to the Generic Bootstrapping Architecture...
2016/0344743 User Interface Driven Translation, Comparison, Unification, and Deployment of Device Neutral Network Security...
A method is performed at a management device to manage multiple network security devices over a network. The security devices are configured to control access...
2016/0344742 Method and Apparatus for Providing an Adaptable Security Level in an Electronic Communication
A method of communicating in a secure communication system, comprises the steps of assembling a message at a sender, then determining a security level, and...
2016/0344741 Integration User for Analytical Access To Read Only Data Stores Generated From Transactional Systems
The technology disclosed preserves the tenant specificity and user specificity of the tenant data by associating user IDs to complementary special IDs referred...
2016/0344740 SYSTEM AND METHOD FOR ACCESS AND MANAGEMENT OF THINGS OVER A COMMUNICATION NETWORK RELATED THERETO
The system and method of the present invention to provide at least one cloud-based things access and management system (things-system) for things lifecycle...
2016/0344739 METHOD FOR CONTROLLING, CHARGING, AND POSITIONING A UE IN A SMALL CELL SYSTEM
A method for controlling, charging and positioning a UE is disclosed, which includes: a master base station sending closed subscriber group (CSG) member status...
2016/0344738 Determining Similarity Between Security Rules Based On Weighted Comparisons Of Their Rule Parameters
First and second security rules are accessed in a configuration file. Comparison points for comparing the first and second security rules are determined. Each...
2016/0344737 UNIQUENESS AND AUDITING OF A DATA RESOURCE THROUGH AN IMMUTABLE RECORD OF TRANSACTIONS IN A HASH HISTORY
Disclosed is a method, a device, and/or a system of uniqueness and auditing of a data resource through an immutable record of transactions in a hash history....
2016/0344736 SECURED ACCESS CONTROL TO CLOUD-BASED APPLICATIONS
A method and proxy device for securing an access to a cloud-based application are presented. The method includes receiving an authentication token, wherein the...
2016/0344735 SYSTEM AND METHOD FOR DELEGATION OF PERMISSIONS TO A THIRD PARTY
A system and method for delegating permissions to a third party are presented. A request to access a first computing resource of a computer server is received...
2016/0344734 SYSTEM FOR PREVENTING UNAUTHORIZED ACCESS TO OPERATIONAL AIRCRAFT DATA
Embodiments of the present invention provide improved systems and methods for a programmable portable electronic device for airborne operational ...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.