Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0359939 FEEDBACK OPTIMIZED VIDEO CODING PARAMETERS
A system for managing delivery of video content. The system includes a controller and one or more players. The controller may be configured to control...
2016/0359938 MANAGING ADAPTIVE STREAMING OF DATA VIA A COMMUNICATION CONNECTION
An example method includes requesting a data stream using a buffer with an initial maximum window size for buffering received data associated with the...
2016/0359937 CONTEXTUAL VIDEO CONTENT ADAPTATION BASED ON TARGET DEVICE
Methods and apparatus for contextual video content adaptation are disclosed. Video content is adapted based on any number of criteria such as a target device...
2016/0359936 METHOD AND SYSTEM FOR PROVIDING MEDIA PROGRAMMING
A method of generating media programming includes the steps of providing by an aggregator to a client a list of feeds; receiving by the aggregator from the...
2016/0359935 METHOD AND SYSTEM FOR SHARING DIGITAL MEDIA CONTENT
Methods and systems for generating and sharing media clips are described. Consistent with some embodiments, while a selection of digital media content (e.g., a...
2016/0359934 EFFICIENT AND SCALABLE CACHING AND REPRESENTATION OF MEDIA WITH CROSS-SIMILARITIES
A system for making available at an end-user a media file, from a media provider comprising a media file patch related to at least one object, the system...
2016/0359933 METHODS AND APPARATUS FOR EFFICIENT IP MULTICASTING IN A CONTENT DELIVERY NETWORK
Methods and apparatus for assigning physical channels in a content-based network. In an exemplary embodiment, the network comprises a cable television network...
2016/0359932 DISPLAY DEVICE AND METHOD OF CONTROLLING THE SAME
A method of controlling a display device is provided. The display device includes a communicator configured to establish a connection with a first mobile...
2016/0359931 METHOD AND APPARATUS FOR DOWNLOADING AN APPLICATION
There is disclosed a method of downloading an application to an electronic device associated with a user. The method is executed at a server, the server being...
2016/0359930 SYSTEM AND METHOD FOR AUGMENTED AND VIRTUAL REALITY
One embodiment is directed to a system for enabling two or more users to interact within a virtual world comprising virtual world data, comprising a computer...
2016/0359929 Method To Initiate Server Based Collaboration On E-Mail Attachments
Server-based collaboration is initiated by an email. When the user creates the email message with attachments, a collaboration website is provisioned. The...
2016/0359928 METHOD OF SEARCHING FOR AND REGISTERING NETWORK DEVICE USING HTTP AND NETWORK REGISTRATION SERVICE APPARATUS
A method of searching for a network device and registering the network device to a network using HTTP and a network registration service apparatus are...
2016/0359927 METHOD AND DEVICE FOR ESTABLISHING CHANNEL
Embodiments of the present disclosure provide a method and a device for establishing a channel, capable of reducing data transmission path length when two...
2016/0359926 METHOD FOR PROCESSING TELEPHONY SESSIONS OF A NETWORK
A method for processing telephony sessions of a network including at least one application server and a call router, the method including the steps of...
2016/0359925 Method and apparatus for transmitting and receiving data in wireless communication system
Provided is a method for sending and receiving, by a first device, data to and from a second device using a Bluetooth Low Energy (BLE) technology in a wireless...
2016/0359924 ACCESS CONTROL USING IMPERSONIZATION
A first service submits a request to a second service on behalf of a customer of a service provider. The request may have been triggered by a request of the...
2016/0359923 METHOD, SYSTEM AND SERVER FOR SELF-HEALING OF ELECTRONIC APPARATUS
A method, a system and a server for self-healing of an electronic apparatus are provided. In the method, the components installed in the electronic apparatus...
2016/0359922 Security policy editor
A shared computing infrastructure has associated therewith a portal application through which users access the infrastructure and provision one or more...
2016/0359921 SECURE LOCAL WEB APPLICATION DATA MANAGER
Apparatus, systems and methods may provide a browser interface to detect an attempt by web content to manipulate data in a local data store. In addition, the...
2016/0359920 ENFORCING RUNTIME POLICIES IN A NETWORKED COMPUTING ENVIRONMENT
Embodiments of the present invention provide approaches for enforcing runtime policies in a networked computing environment (e.g., a cloud computing...
2016/0359919 MANAGING COMMUNICATIONS BETWEEN COMPUTING NODES
Techniques are described for managing communications between multiple intercommunicating computing nodes, such as multiple virtual machine nodes hosted on one...
2016/0359918 POLICY-BASED SLICE DELETION IN A DISPERSED STORAGE NETWORK
A method for execution in a dispersed storage network operates to determine one or more slice names of one or more slices to consider for deletion; determine...
2016/0359917 SYSTEM AND METHOD OF RECOMMENDING POLICIES THAT RESULT IN PARTICULAR REPUTATION SCORES FOR HOSTS
A method provides for associating reputation scores with policies, stacks and hosts within a network and upon receiving information about a newly provisioned...
2016/0359916 ELECTRONIC DEVICE AND METHOD FOR ENCRYPTING CONTENT
An electronic device for encrypting content and a method thereof are provided. First and second data segments of a content file may be received. The first data...
2016/0359915 POLICY-DRIVEN COMPLIANCE
A network can achieve compliance by defining and enforcing a set of network policies to secure protected electronic information. The network can monitor...
2016/0359914 DETERMINING THE CHRONOLOGY AND CAUSALITY OF EVENTS
An example method includes calculating latency bounds for communications from two sensors to a collector (i.e., maximum and minimum latencies). After the...
2016/0359913 CONDITIONAL POLICIES
Conditional policies can be defined that change based on security measurements of network endpoints. In an example embodiment, a network traffic monitoring...
2016/0359912 SYSTEM AND METHOD FOR NETWORK POLICY SIMULATION
This disclosure generally relate to a method and system for network policy simulation in a distributed computing system. The present technology relates...
2016/0359911 TRUSTED PUBLIC INFRASTRUCTURE GRID CLOUD
Systems and methods of implementing a secured cloud environment allow for design and instantiation of a security policy at the infrastructure level. An example...
2016/0359910 HANDLING OUT OF ORDER EVENTS
Processing streaming data in accordance with policies that group data by source, enforce a maximum permissible late arrival value for streaming data, a maximum...
2016/0359909 VIRTUAL PRIVATE NETWORK BASED PARENTAL CONTROL SERVICE
In various embodiments, methods and systems for implementing parental controls on mobile devices using virtual private network (VPN)-based parental control...
2016/0359908 AUTOMATIC REAL-TIME ALERTING OF SECURITY HARDENING NON-COMPLIANCE
In a computer-implemented method for automatic real-time alerting of security hardening non-compliance security policies of virtual machines in a...
2016/0359907 AUTOMATICALLY AUDITING VIRTUAL MACHINES FOR SECURITY HARDENING COMPLIANCE
In a computer-implemented method for automatically auditing virtual machines for security hardening compliance security policies of virtual machines in a...
2016/0359906 AUTOMATIC SECURITY HARDENING OF AN ENTITY
In a computer-implemented method for automatic security hardening of an entity at time of creation in a virtualization infrastructure, creation of an entity is...
2016/0359905 AUTOMATICALLY GENERATING NETWORK RESOURCE GROUPS AND ASSIGNING CUSTOMIZED DECOY POLICIES THERETO
A cyber security system to detect attackers, including a data collector collecting data regarding a network, the data including network resources and users, a...
2016/0359904 METHOD AND SYSTEM FOR DETECTION OF HEADLESS BROWSER BOTS
A method and system for detecting an access to a protected resource by headless browser bots are provided. The method includes receiving a request from a...
2016/0359903 SECURE MESSAGE FILTERING TO VEHICLE ELECTRONIC CONTROL UNITS WITH SECURE PROVISIONING OF MESSAGE FILTERING RULES
A method according to one embodiment includes the operations of configuring a host processor to receive a message filtering rule, the host processor associated...
2016/0359902 NETWORK SIGNALING INTERFACE AND METHOD WITH ENHANCED TRAFFIC MANAGEMENT DURING SIGNALING STORMS
A signaling controller (DSC) performs dynamic management in networks such as Evolved Packet Core (EPC) networks that rely on Diameter signaling interfaces. The...
2016/0359901 MITIGATING SCRIPTED ATTACKS USING DYNAMIC POLYMORPHISM
In an embodiment, a data processing system comprises one or more processors; script analysis logic coupled to the one or more processors and configured to...
2016/0359900 SYSTEM FOR ANONYMOUSLY DETECTING AND BLOCKING THREATS WITHIN A TELECOMMUNICATIONS NETWORK
A system is provided for anonymously detecting and blocking threats within a telecommunications network. A network analyzer of the system may intercept...
2016/0359899 SYSTEM AND METHOD FOR CYBER ATTACKS ANALYSIS AND DECISION SUPPORT
A method for cyber attack risk assessment is disclosed. The method uses at least one hardware processor for: continuously collecting, from a networked...
2016/0359898 COMPUTER NETWORK ATTRIBUTE BILATERAL INHERITANCE
Current approaches to managing security intelligence data often address both threat and malicious behavior at the individual computer level, tracked by the...
2016/0359897 DETERMINING A REPUTATION OF A NETWORK ENTITY
An example method can include monitoring a network to identify flows between nodes in the network. Once flows have been identified, the flows can be tagged and...
2016/0359896 APPLICATION TESTING FOR SECURITY VULNERABILITIES
In an approach for testing an application for a security vulnerability, a processor inserts an instrumentation hook in the application to be tested, wherein...
2016/0359895 SYSTEMS AND METHODS FOR PROVIDING CYBERSECURITY ANALYSIS BASED ON OPERATIONAL TECHNOLOGIES AND INFORMATION...
The disclosed technology can acquire a first set of data from a first group of data sources including a plurality of network components within an energy...
2016/0359894 INGESTING DOCUMENTS USING MULTIPLE INGESTION PIPELINES
A primary ingestion pipeline configured for use in natural language processing includes annotators configured for annotating documents. The annotators and...
2016/0359893 ANOMALY DETECTION ELECTRONIC CONTROL UNIT, ONBOARD NETWORK SYSTEM, AND ANOMALY DETECTION METHOD
An anomaly detection electronic control unit, that performs anomaly detection processing and that is connected to a bus which a plurality of electronic control...
2016/0359892 VALIDATING E-MAILS USING MESSAGE POSTING SERVICES
Validation of e-mails is provided. An e-mail is received. A sender of the e-mail is determined. A message posting service account that is associated with the...
2016/0359891 APPLICATION MONITORING PRIORITIZATION
An approach for establishing a priority ranking for endpoints in a network. This can be useful when triaging endpoints after an endpoint becomes compromised....
2016/0359890 SYSTEM AND METHOD OF DETECTING WHETHER A SOURCE OF A PACKET FLOW TRANSMITS PACKETS WHICH BYPASS AN OPERATING...
A method includes capturing first data associated with a first packet flow originating from a first host using a first capture agent deployed at the first host...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.