Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0366209 TRANSMISSION OF HIERARCHICAL DATA FILES BASED ON CONTENT SELECTION
A method, a computer program product, and a computer system for transmitting a hierarchical data file from a first computer device to a second computer device....
2016/0366208 Contextual, Two Way Remote Control
This application is directed to enabling interaction between computer devices. An application is executed at a first computer device to access Internet-based...
2016/0366207 DATA LOCKER SYNCHRONIZATION
Disclosed are various embodiments enabling a saved state of an application to be stored at a central location and to be retrieved by multiple computing devices...
2016/0366206 PLATFORM FOR MULTIPLE DEVICE PLAYOUT
Provided is a platform for data devices in which the architecture and runtime parameters of the platform are adaptively updated based on real-time data...
2016/0366205 METHOD AND APPARATUS FOR TIME STRETCHING TO HIDE DATA PACKET PRE-BUFFERING DELAYS
A special rendering mode for the first few seconds of play out of multimedia data minimizes the delay caused by pre-buffering of data packets in multimedia...
2016/0366204 VIDEO INFORMATION PLAYING SYSTEM AND METHOD
The embodiments of the present disclosure provide a video information play system and method. The video information play system comprises: a video file...
2016/0366203 CAPTURING A USER REACTION TO MEDIA CONTENT BASED ON A TRIGGER SIGNAL AND USING THE USER REACTION TO DETERMINE...
A device may receive an indication of a playback of media content. The device may receive a trigger signal associated with the playback of the media content....
2016/0366202 SYSTEM AND METHOD FOR MANAGING ABR BITRATE DELIVERY RESPONSIVE TO VIDEO BUFFER CHARACTERISTICS OF A CLIENT
A scheme for managing delivery of segmented media content in an ABR network, wherein bitrates of a manifest file may be selectively modified or removed based...
2016/0366201 SUPPRESSING STREAM FUNCTIONALITY TO EXPEDITE PREFERRED DATA
A controller analyzes a tuple in an operator graph. The controller determines that the tuple includes one or more selected characteristics. These...
2016/0366200 SYSTEMS AND METHODS TO ORGANIZE, AGGREGATE, FILTER, SORT, SHARE, AND DISCOVER, DIGITAL CONTENT
Methods and systems to enable system users to share, discover, stream, purchase, and otherwise support content generated by other users. An interest indication...
2016/0366199 APPARATUS AND METHOD FOR ON-DEMAND MULTI-DEVICE SOCIAL NETWORK EXPERIENCE SHARING
Methods, computer-readable media and apparatuses for sharing an experience via a social network on demand are disclosed. A processor establishes a first video...
2016/0366198 HTTP LIVE STREAMING (HLS) VIDEO CLIENT SYNCHRONIZATION
A streaming media server is provided that receives a request over a network from a customer premises gateway to receive a streaming media content item that is...
2016/0366197 PLATFORM FOR FACILITATING PACED, SYNCHRONOUS INTERACTIVE EXPERIENCES
Various embodiments concern a platform for creating and managing paced, synchronous interactions between a celebrity and one or more audience members. More...
2016/0366196 GLOBAL ONLINE DIGITAL ASSET MANAGEMENT (DAM)
A method, system, apparatus, article of manufacture, and computer program product provide the ability to manage a digital asset. One or more media content...
2016/0366195 Relayed Communication Channel Establishment
Establishing a communication channel via a relay server with reduced setup time. Upon request by an initiating communication device a relay allocation server...
2016/0366194 SESSION PROCESSING IN INSTANT MESSAGING
An example method including: with respect to a local session contained in a local session list, determining a remote user account corresponding to the local...
2016/0366193 SYSTEM AND METHOD FOR PROCESSING TELEPHONY SESSIONS
In one embodiment, the method of processing telephony sessions includes: communicating with an application server using an application layer protocol;...
2016/0366192 AUTOMATICALLY CONFIGURING A WEB-ENABLED PORTABLE DEVICE TO ACCESS THE INTERNET
Automatically configuring a portable electronic device for accessing a site on a public network is disclosed. The method and system include establishing a...
2016/0366191 Single Proxies in Secure Communication Using Service Function Chaining
A first service node receives a message configured to set up a secure communication session between a client and a server, in which the first service node acts...
2016/0366190 Method and Device for Negotiating Media Capability
A method includes sending, by a first device, a first message to a second device, sending a third message to the second device, where the first message...
2016/0366189 METHODS, APPARATUS AND SYSTEMS TO INCREASE MEDIA RESOURCE FUNCTION AVAILABILITY
Communications methods, apparatus and systems for detecting a status condition indicative of a failure of a media processing entity and providing media...
2016/0366188 SYSTEM, APPARATUS AND METHOD FOR ACCESS CONTROL LIST PROCESSING IN A CONSTRAINED ENVIRONMENT
In one embodiment, a method includes receiving a first request from a first device to access a first resource of the system and determining whether to grant...
2016/0366187 DYNAMIC DATA SOCKET DESCRIPTOR MIRRORING MECHANISM AND USE FOR SECURITY ANALYTICS
According to another embodiment, a system includes a processing circuit and logic integrated with and/or executable by the processing circuit. The logic is...
2016/0366186 DATA SOCKET DESCRIPTOR BASED POLICIES FOR APPLICATION AND DATA BEHAVIOR AND SECURITY
In one embodiment, a system includes a processing circuit and logic integrated with and/or executable by the processing circuit. The logic is configured to...
2016/0366185 System and Method for Security Health Monitoring And Attestation Of Virtual Machines In Cloud Computing Systems
A system for security health monitoring and attestation of virtual machines in cloud computing systems is provided. The system includes a cloud server having a...
2016/0366184 SERVICE ORIENTED SOFTWARE-DEFINED SECURITY FRAMEWORK
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for service oriented software-defined security framework are...
2016/0366183 System, Apparatus And Method For Access Control List Processing In A Constrained Environment
In one embodiment, a system includes: a credential management server to provide credentials to a plurality of computing devices and a plurality of resource...
2016/0366182 EVALUATION SYSTEM
An evaluation system includes a network device, a gateway device, a policy evaluation device, and first and second control devices. The network device copies a...
2016/0366181 SYSTEM, APPARATUS AND METHOD FOR SECURITY INTEROPERABILITY PATH ANALYSIS IN AN INTERNET OF THINGS (IOT) NETWORK
In one embodiment, an apparatus comprises a first logic to receive security attribute information from a plurality of devices, generate a connectivity graph of...
2016/0366180 SYSTEM, APPARATUS AND METHOD FOR PRIVACY PRESERVING DISTRIBUTED ATTESTATION FOR DEVICES
In one embodiment, a method includes receiving, in a system of an external verifier of a first network, a plurality of attestation reports and a plurality of...
2016/0366179 Authenticated Sensor Interface Device
A system and method for the secure storage and transmission of data is provided. A data aggregate device can be configured to receive secure data from a data...
2016/0366178 System and Method for Guarding a Controller Area Network
Systems and methods for guarding a controller area network are disclosed. In one embodiment, a system for guarding a controller area network comprises one or...
2016/0366177 DIFFERENTIATING AMONG USERS BASED ON RESPONSES TO INJECTED INTERFERENCES
Devices, systems, and methods of detecting user identity, differentiating between users of a computerized service, detecting a cyber-attacker, and detecting...
2016/0366176 HIGH-LEVEL REPUTATION SCORING ARCHITECTURE
A method for improving enterprise network security may include accessing a plurality of reputation scoring sources for a corresponding plurality of reputation...
2016/0366175 SECURITY KEY DERIVATION IN DUAL CONNECTIVITY
The invention relates to methods for establishing a secure communication link between a mobile station and a secondary base station in a mobile communication...
2016/0366174 COMPUTERIZED SYSTEM AND METHOD FOR SECURELY DISTRIBUTING AND EXCHANGING CYBER-THREAT INFORMATION IN A...
Computerized systems and methods for sharing identified cyber-threat information in a standardized and secure format. The sharing of cyber-threat information...
2016/0366173 Security of VDI Clones
Utilizing a virtual desktop interface, including receiving, from a server, a clone image comprising an instance of an operating system and an application...
2016/0366172 PREVENTION OF CROSS SITE REQUEST FORGERY ATTACKS
A method is provided for preventing cross-site request forgery (CSRF) attacks at a server that includes embedding a hidden cryptographic nonce in a response...
2016/0366171 EXTRACTION CRITERION DETERMINATION METHOD, COMMUNICATION MONITORING SYSTEM, EXTRACTION CRITERION DETERMINATION...
An extraction criterion determination method performed by an extraction criterion determination apparatus includes collecting a log information entry that is...
2016/0366170 SYSTEMS AND METHODS OF DETECTING UTILITY GRID INTRUSIONS
Systems and methods of detecting an attack in a utility grid are described. An anomaly detector establishes a first metric generated using signals received...
2016/0366169 SYSTEMS, METHODS, AND MEDIA FOR DETECTING NETWORK ANOMALIES
Systems, methods, and media for detecting network anomalies are provided. In some embodiments, a training dataset of communication protocol messages having...
2016/0366168 ABUSIVE TRAFFIC DETECTION
Aspects of an abuse detection system for a web service include an abuse detection engine executing on a server. The abuse detection engine includes a...
2016/0366167 SYSTEMS AND METHODS FOR DETERMINING MALICIOUS-DOWNLOAD RISK BASED ON USER BEHAVIOR
The disclosed computer-implemented method for determining malicious-download risk based on user behavior may include (1) identifying a set of users that are at...
2016/0366166 CONTROLLING A COMPUTER SYSTEM
A method and apparatus for control of a computer system are disclosed. The computer system includes a terminal for operator based monitoring of the computer...
2016/0366165 SYSTEM AND METHODS FOR DETECTING MALICIOUS EMAIL TRANSMISSION
A system and methods of detecting an occurrence of a violation of an email security policy of a computer system. A model relating to the transmission of prior...
2016/0366164 NETWORK INTRUSION DATA ITEM CLUSTERING AND ANALYSIS
Embodiments of the present disclosure relate to a data analysis system that may automatically generate memory-efficient clustered data structures,...
2016/0366163 METHOD AND SYSTEM FOR MANAGING A PROTECTIVE DISTRIBUTION SYSTEM
A method and system for managing a protective distribution system is disclosed. In some embodiments, a physical information transmission line may be monitored....
2016/0366162 METHODS CIRCUITS DEVICES ASSEMBLIES SYSTEMS AND FUNCTIONALLY ASSOCIATED COMPUTER EXECUTABLE CODE FOR DETECTING...
Disclosed is a network appliance, and a system comprising same, for detection of a physical condition of a network cable. The appliance includes one or more...
2016/0366161 PASSIVE SECURITY ANALYSIS WITH INLINE ACTIVE SECURITY DEVICE
Techniques to facilitate network security analysis and attack response are disclosed herein. In at least one implementation, a passive analysis system receives...
2016/0366160 Systems and Methods for Processing Data Flows
A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.