Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0352799 STREAMING WITH COORDINATION OF VIDEO ORIENTATION (CVO)
Technology a client operable to receive streaming content from a server is disclosed. The client can signal a device capability exchange message for...
2016/0352798 SYSTEMS AND METHODS FOR CAPTURE AND STREAMING OF VIDEO
A system may provide capture and streaming of analog video, from one or more analog cameras to one or more client devices and/or servers, in a single device...
2016/0352797 COORDINATING METADATA
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for coordinating metadata for media streaming content and for sending...
2016/0352796 DISTRIBUTED MEDIA CLASSIFICATION ALGORITHM IN A SERVICE CONTROLLER PLATFORM FOR ENHANCED SCALABILITY
A network system and the method is described that splits media identification logic and media classification and/or general data session processing/management...
2016/0352795 NEGOTIATION OF MESSAGE CHUNK SIZE FOR MESSAGE SESSION RELAY PROTOCOL SESSION
Embodiments of the invention relates to methods, and apparatuses for exchanging the preferred MSRP chunk sizes between an end-point and a remote end-point,...
2016/0352794 SCALABLE ARCHITECTURE FOR MEDIA MIXING
A proxy mixer includes a transceiver configured to receive one or more first requests to provide one or more first media streams to one or more first...
2016/0352793 APPARATUS FOR PROCESSING A HYBRID BROADCAST SERVICE, AND METHOD FOR PROCESSING A HYBRID BROADCAST SERVICE
The present invention provides a method of processing a hybrid broadcast service. The method comprises, receiving broadcast signals for the hybrid broadcast...
2016/0352792 REAL-TIME MESSAGING METHOD AND APPARATUS
A system and method for the late-biding of time-based media in real-time. With late binding, the sender may create time-based media before or at the same time...
2016/0352791 STREAMING SPHERICAL VIDEO
A method includes receiving a first video stream at a playback device, the first video stream having a first quality, receiving at least two second video...
2016/0352790 COLLABORATIVE BUSINESS COMMUNICATION INFORMATION SYSTEM
A collaborative business communication information system that includes one or more communication devices communicatively coupled to one or more networks, and...
2016/0352789 SOCIAL NETWORKING AND VIRTUAL FRIENDS FOR WEARABLE DEVICES
Techniques described herein may be used to provide wearable devices (e.g., a watch, a clip on device, etc.) for children with virtual friend and social...
2016/0352788 CONTEXTUALIZING INTERACTIONS IN WEB MEETING SESSIONS
In various implementations, a computing device is configured to provide context to annotating inputs made during a web meeting session. In some ...
2016/0352787 COMMUNICATION TERMINAL, COMMUNICATION SYSTEM, COMMUNICATION METHOD, AND RECORDING MEDIUM
A communication terminal receives, from a mobile terminal, counterpart terminal identification information for identifying a counterpart communication terminal...
2016/0352786 METHOD AND SYSTEM FOR SELF-REGISTRATION AND SELF-ASSEMBLY OF ELECTRICAL DEVICES
A method for self-registration and/or self-assembly of a plurality of electrical devices, the method including: performing the self-registration of the...
2016/0352785 Method and System for Enabling a Communication Device to Remotely Execute an Application
A communication system capable of enabling one or more communication devices to remotely execute one or more applications includes one or more communication...
2016/0352784 METHOD AND DEVICE FOR PERFORMING COMMUNICATION SERVICE
A method of performing a communication service includes: requesting, by a first device, a second device for data; receiving, by the first device, the data from...
2016/0352783 Partitioning Media Data
Techniques for partitioning media data are described. According to various embodiments, a set of wireless access points are selected for receiving wireless...
2016/0352782 PROXY ADVERTISEMENTS IN A NEIGHBOR AWARE NETWORK
A method for registering a service for proxy advertisement includes selecting, at a client device, a proxy device to proxy advertise the service of the client...
2016/0352781 POLYMORPHIC SECURITY POLICY ACTION
In one embodiment, a method of improving the security of a computing device comprises using a computing device that has received one or more messages that have...
2016/0352780 METHOD AND SYSTEM FOR MANAGING SECURITY POLICIES
A system and method of managing security policies in an information technologies (IT) system are provided. In an example, the method includes receiving an...
2016/0352779 TECHNIQUES FOR ESTABLISHING A TRUSTED CLOUD SERVICE
Techniques for establishing a trusted cloud service are provided. Packages are created for services that include certificates, configuration information, trust...
2016/0352778 Inferring Security Policies from Semantic Attributes
Techniques for inferring security policies from semantic attributes are provided. In one aspect, a method for building a query component executable by a...
2016/0352777 METHODS AND SYSTEMS FOR PHISHING DETECTION
A method of determining a probability that a received email comprises a phishing attempt may comprise analyzing a link therein to determine whether the link...
2016/0352776 LOCAL PORT MANAGING METHOD AND DEVICE, PACKET-ORIENTED DATA NETWORK, DIGITAL STORAGE MEDIA, AND COMPUTER...
A method for managing local ports in a packet-oriented data network is proposed, wherein packets are assigned to a selected local port, and assignment of a...
2016/0352775 IDENTIFYING SUSPICIOUS ACTIVITY IN A LOAD TEST
Identifying suspicious activity in utilizing a load testing service can include establishing an amount of domain calls to a domain, modifying the amount, and...
2016/0352774 MITIGATION OF COMPUTER NETWORK ATTACKS
Various techniques for mitigating computer network attacks are disclosed herein. In one embodiment, a method includes receiving indications of denial of...
2016/0352773 SECURITY ACTION VERIFICATION IN A COMPUTING NETWORK
Systems, methods, and software described herein provide for validating security actions before they are implemented in a computing network. In one example, a...
2016/0352772 Domain Classification And Routing Using Lexical and Semantic Processing
Domain classification based on lexical and semantic processing of target domains is provided. A target domain name or URL may undergo a lexical analysis to...
2016/0352771 AUTOMATED PENETRATION TESTING DEVICE, METHOD AND SYSTEM
A method for performing automatic penetration testing (PT) in an organization having at least one end unit, the method comprising: providing a PT device having...
2016/0352770 Software/Hardware Device with Uncertain Service Function and Structural Characterization, and Scheduling Method...
The present invention discloses a software/hardware device with uncertain service function and structural characterization and a method for scheduling the...
2016/0352769 SECURITY WITH RESPECT TO MANAGING A SHARED POOL OF CONFIGURABLE COMPUTING RESOURCES
Disclosed aspects include management of a shared pool of configurable computing resources having a first region and a second region. Using an analysis...
2016/0352768 NETWORK ANOMALY DETECTION
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for determining network related anomaly scores. One of the...
2016/0352767 IDENTIFYING DEVIATIONS IN DATA
In an example, metrics that cause a deviation in data may be identified by collecting the data for selected metrics stored in a plurality of tables. A metric...
2016/0352766 NETWORK-CENTRIC VISUALIZATION OF NORMAL AND ANOMALOUS TRAFFIC PATTERNS
In one embodiment, a device in a network analyzes local network data regarding a portion of the network that is local to the device using a first anomaly...
2016/0352765 FINGERPRINT MERGING AND RISK LEVEL EVALUATION FOR NETWORK ANOMALY DETECTION
In one embodiment, a device in a network receives fingerprints of two or more network anomalies detected in the network by different anomaly detectors. Each...
2016/0352764 WARM-START WITH KNOWLEDGE AND DATA BASED GRACE PERIOD FOR LIVE ANOMALY DETECTION SYSTEMS
In one embodiment, a device in a network loads an anomaly detection model for warm-start. The device filters input data for the model during a warm-start grace...
2016/0352763 Method And System For Detecting Malicious Code
The present application discloses a method and a system for detecting malicious code. The method comprises receiving a testing sample; testing the sample with...
2016/0352762 Probabilistically Detecting Low Intensity Threat Events
A method, system, and/or computer program product probabilistically detects a low intensity threat event against an attack surface. A notification of disparate...
2016/0352761 DETECTION OF MALWARE AND MALICIOUS APPLICATIONS
A method comprises receiving, at a network infrastructure device, a flow of packets, determining, using the network infrastructure device and for a first...
2016/0352760 Tracking Users over Network Hosts Based on User Behavior
A method of tracking users over network hosts based on behavior includes analyzing data representing behavior of active network hosts during two or more time...
2016/0352759 Utilizing Big Data Analytics to Optimize Information Security Monitoring And Controls
Disclosed herein is a method comprising: obtaining one or more responses of a security sensor to events from each of a plurality of sources; clustering each of...
2016/0352758 Media Stream Trust Display
Media stream trust display techniques are described in which trust information regarding content elements is accessible on an individual element basis. In...
2016/0352757 INFORMATION INTERACTION METHOD, APPARATUS AND SYSTEM
An information interaction method, apparatus and system are provided. A sensitive operation pre-performing message is received from a terminal where a...
2016/0352756 DATA PROCESSING APPARATUS
A data processing apparatus (30) comprising: a local source of data (4); a first controller (31); and a tamper-resistant second controller (32) configured to...
2016/0352755 Decrypting Content Samples Including Distinct Encryption Chains
Embodiments may be configured to receive a protected version of content that includes multiple encrypted content samples. In various embodiments, each...
2016/0352754 METHOD FOR SENDING CONTENTS INCLUDING TRACKING INFORMATION AND APPARATUS THEREOF, AND METHOD FOR RECEIVING...
A method for transmitting contents including tracking information is described. The method comprising the steps of generating a content transmission stream...
2016/0352753 DELEGATED PERMISSIONS IN A DISTRIBUTED ELECTRONIC ENVIRONMENT
Permissions can be delegated to enable access to resources associated with one or more different accounts, which might be associated with one or more different...
2016/0352752 ONE TIME USE PASSWORD FOR TEMPORARY PRIVILEGE ESCALATION IN A ROLE-BASED ACCESS CONTROL (RBAC) SYSTEM
Techniques to facilitate temporary escalation of access privileges for a control program associated with a machine system in an industrial automation...
2016/0352751 METHOD FOR CONTROLLING ACCESS TO A SERVICE
The invention relates to a method for controlling the access to an on-line service, the access to the service being requested, via a communications network, by...
2016/0352750 SCALABLE APPLICATION-AS-A-SERVICE ENVIRONMENT AND SYSTEMS AND METHODS USEFUL IN CONJUNCTION THEREWITH
A computerized method of managing a computer remote session operation, comprising providing a server for hosting application execution; configuring a number of...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.