Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0381107 SYSTEM AND METHOD FOR CONTENT STREAMING WITH FEATURE DETECTION
A system and method for content streaming with feature detection, comprising determining a streaming format compatibility criteria of a remote web browser,...
2016/0381106 METHOD AND AN ELECTRONIC DEVICE FOR PERFORMING PLAYBACK AND SHARING OF STREAMED MEDIA
Described herein are methods and electronic devices for performing playback of streamed media, including uploading an associated second media content item...
2016/0381105 LOCAL STREAMING PROXY SERVER
A local application streaming proxy can create a virtual image of storage media, which allows cloud operators to rapidly deliver applications, or deliver any...
2016/0381104 USER ASSEMBLED CONTENT DELIVERED IN A MEDIA STREAM
A system and method for a user to send a message to another user of a streaming media service. The message is directed to a specific recipient and is sponsored...
2016/0381103 Media Content Delivery over Telephone Networks
A media service server provides media content to users over telephone networks. The media content server receives a request for media items, where the request...
2016/0381102 MEDIA DEVICE AND METHOD OF ENHANCING USE OF MEDIA DEVICE
A method of enhancing the use of a media device and a media device are provided. The media device receives a broadcast media stream transmitted by a broadcast...
2016/0381101 METHOD AND APPARATUS FOR STREAMING MEDIA
The present invention relates to a method and apparatus for streaming media content between nodes on a network (10). The method comprises storing data of media...
2016/0381100 ACCELERATOR CONTROL METHOD AND ACCELERATOR USING THE SAME
A method of controlling an accelerator for transmitting media content received from a media server to at least one media player, includes receiving from the at...
2016/0381099 REAL-TIME DISTRIBUTED COAUTHORING VIA VECTOR CLOCK TRANSLATIONS
Systems and methods for improving real-time coauthoring in a distributed environment without a central document manager are disclosed herein. Due to...
2016/0381098 METHOD AND APPARATUS FOR MULTI-EXPERIENCE METADATA TRANSLATION OF MEDIA CONTENT WITH METADATA
A method or apparatus that incorporates teachings of the present disclosure may include, for example, a method for retrieving a plurality of sensory...
2016/0381097 GUIDING A DESIRED OUTCOME FOR AN ELECTRONICALLY HOSTED CONFERENCE
Arrangements described herein relate to guiding a desired outcome for an electronically hosted conference. During the electronically hosted conference,...
2016/0381096 Supplementing User Web-Browsing
An apparatus and method of providing a user with a web-browser supplement is disclosed. One method includes providing access to a focal group, wherein the...
2016/0381095 TECHNOLOGIES FOR AUDIOVISUAL COMMUNICATION USING INTERESTINGNESS ALGORITHMS
Technologies for audiovisual communication include an audiovisual server and a number of audiovisual client devices, including a presenter device and a number...
2016/0381094 COMMUNICATION TERMINAL, COMMUNICATION SYSTEM, COMMUNICATION CONTROL METHOD, AND RECORDING MEDIUM
A communication terminal determines whether counterpart information of a candidate counterpart communication terminal obtained from a memory is described in a...
2016/0381093 METHOD AND NODES FOR CONFIGURING A COMMUNICATION PATH FOR A MEDIA SERVICE
A network node is operated to configure a communication path for a media service. The communication path is configured in a cloud network that includes at...
2016/0381092 EPHEMERAL INTERACTION SYSTEM
Techniques for enabling members that have interacted physically to interact thereafter via an online social networking service are described. According to...
2016/0381091 SYSTEM AND METHOD FOR MANAGING MULTI-MODAL COMMUNICATION SESSIONS
A computing system for managing a multi-modal communication session in an enterprise is disclosed. The computing system includes a monitoring module for...
2016/0381090 ANIMATED SNAPSHOTS
Current embodiments relate to generation/sharing of a snapshot of content that the user is viewing. Upon generation of a request for a snapshot of currently...
2016/0381089 RELATIONSHIP-CENTRIC PORTALS FOR COMMUNICATION SESSIONS
A method for providing relationship-centric resources includes establishing a communication session between a first device and a second device, determining,...
2016/0381088 Forward request queuing in a distributed edge processing environment
A server in a distributed environment includes a process that manages incoming client requests and selectively forwards service requests to other servers in...
2016/0381087 NETWORK-BASED DYNAMIC DATA MANAGEMENT
In one embodiment, a router operating in a hierarchically routed computer network may receive collected data from one or more hierarchically lower devices in...
2016/0381086 Multi-Access Gateway for Direct to Residence Communication Services
Different residences can be communicatively linked to a communication backbone via a multi-access gateway, where each residence comprises an adapter through...
2016/0381085 TAMPER-PROOF COMMUNICATION CHANNEL
A method for preventing tampering with the accessibility of resources specified by Universal Resource Locators (URLs) comprising establishing a tamper-proof...
2016/0381084 DELIVERY OF NON-MULTIMEDIA CONTENT VIA A STANDARDIZED NETWORK ARCHITECTURE
Non-multimedia information may be produced from devices such as alarms, appliances, automobiles, building systems, weather stations, home automation systems,...
2016/0381083 SECURE SOCIAL NETWORK
Systems and methods for facilitating and securing the exchange of digital information between individuals within the social network of a person or group of...
2016/0381082 ELECTRONIC MESSAGING EXCHANGE
A computer-implemented system and method for secure electronic message exchange including coupling a control platform to a workstation of a plurality of...
2016/0381081 System, Apparatus And Method For Access Control List Processing In A Constrained Environment
In one embodiment, a method includes receiving a first request from a first device to access a first resource of the system and determining whether to grant...
2016/0381080 SYSTEMS AND METHODS FOR FLEXIBLE, EXTENSIBLE AUTHENTICATION SUBSYSTEM THAT ENABLED ENHANCE SECURITY FOR...
The present disclosure is directed towards systems and methods of authenticating a client. A device intermediary to clients servers that provide one or more...
2016/0381079 Peer-to-Peer Group Vigilance
Providing peer-to-peer network security includes collecting, by a local trusted network device, local trust data related to behavior of the local trusted...
2016/0381078 AUTHENTICATOR FOR USER STATE MANAGEMENT
Different types of soft-lockout policies can be associated with different organizations (or groups) in an identity management system. Each soft-lockout policy...
2016/0381077 METHOD AND APPARATUS FOR IDENTIFYING AND DETECTING THREATS TO AN ENTERPRISE OR E-COMMERCE SYSTEM
Methods and apparatuses for identifying and detecting threats to an enterprise or e-commerce system are disclosed, including grouping log lines belonging to...
2016/0381076 SERVICE LEVEL AGREEMENTS AND APPLICATION DEFINED SECURITY POLICIES FOR APPLICATION AND DATA SECURITY REGISTRATION
According to one embodiment, a method includes determining one or more communication requirements for an application or application instance operating on a...
2016/0381075 METHODS AND APPARATUS FOR GENERATING AND USING SECURITY ASSERTIONS ASSOCIATED WITH CONTAINERS IN A COMPUTING...
Methods and apparatus are disclosed to generate a security assertion document associated with a container image, and to use the security assertion document to...
2016/0381074 ACTIVITY-BASED RISK SELECTION OF OPEN WI-FI NETWORKS
For activity-based risk assessment of open Wi-Fi networks, an activity occurring at a consumer application is analyzed to determine that a connection with a...
2016/0381073 CONTROLLING ACCESS TO CATEGORIZED MESSAGES
Controlling access to categorized messages includes categorizing a message into a number of categories according to a message objective. The message objective...
2016/0381072 TRUST OVERLAYS FOR DISAGGREGATED INFRASTRUCTURES
Trust characteristics attributable to components associated with a disaggregated infrastructure environment are obtained. A trust policy of an application to...
2016/0381071 Cognitive Protection of Critical Industrial Solutions Using IoT Sensor Fusion
A technique for cognitive protection of a system can include digital and analog sensors to measure or calculate operational parameters of a system. Digital...
2016/0381070 PROTOCOL BASED DETECTION OF SUSPICIOUS NETWORK TRAFFIC
Embodiments of the present invention relate to identification of suspicious network traffic indicative of a Botnet and/or an Advanced Persistent Threat (APT)...
2016/0381069 TECHNIQUES FOR TRAFFIC DIVERSION IN SOFTWARE DEFINED NETWORKS FOR MITIGATING DENIAL OF SERVICE ATTACKS
A method and system for mitigating of cyber-attacks in a software defined network (SDN) are presented. The method comprises operating a central controller and...
2016/0381068 SYSTEM AND METHOD FOR TIME BASED ANOMALY DETECTION IN AN IN-VEHICLE COMMUNICATION NETWORK
A system and method for providing security to a network may include maintaining, by a processor, a model of an expected behavior of data communications over...
2016/0381067 SYSTEM AND METHOD FOR CONTENT BASED ANOMALY DETECTION IN AN IN-VEHICLE COMMUNICATION NETWORK
A system and method for providing security to a network may include maintaining, by a processor, a model of an expected behavior of data communications over...
2016/0381066 SYSTEM AND METHOD FOR CONTENT BASED ANOMALY DETECTION IN AN IN-VEHICLE COMMUNICATION NETWORK
A system and method for providing security to a network may include maintaining, by a processor, a model of an expected behavior of data communications over an...
2016/0381065 SINKHOLING BAD NETWORK DOMAINS BY REGISTERING THE BAD NETWORK DOMAINS ON THE INTERNET
Techniques for sinkholing bad network domains by registering the bad network domains on the Internet are provided. In some embodiments, sinkholing bad network...
2016/0381064 MANAGING DATA PRIVACY AND INFORMATION SAFETY
Automatically screen data associated with a user that may have already been shared on a social network or about to be shared on the social network for a...
2016/0381063 SYSTEM AND METHOD FOR ASSESSING VULNERABILITY OF A MOBILE DEVICE
A system and method for assessing vulnerability of a mobile device including at a remote analysis cloud service, receiving at least one vulnerability...
2016/0381062 RISK ASSESSMENT OF OPEN WI-FI NETWORKS
For assessing a risk associated with a Wi-Fi network, an analysis to evaluate a risk element associated with the Wi-Fi network is performed at a mobile device....
2016/0381061 PROXY FOR MITIGATION OF ATTACKS EXPLOITING MISCONFIGURED OR COMPROMISED WEB SERVERS
Methods and systems for preventing cyber-attacks on web sessions are disclosed. These methods and systems comprise elements of hardware and software for...
2016/0381060 SYSTEMS AND METHODS FOR AGGREGATING ASSET VULNERABILITIES
In a system for determining vulnerabilities associated with a web property, a network accessible server associated with the property is identified. One or more...
2016/0381059 SYSTEM AND METHOD FOR TIME BASED ANOMALY DETECTION IN AN IN-VEHICLE COMMUNICATION NETWORK
A system and method for providing security to a network may include maintaining, by a processor, a model of an expected behavior of data communications over...
2016/0381058 CONTAINER DATA OFFLINE AND ONLINE SCAN IN A CLOUD ENVIRONMENT
Techniques for security scanning of containers executing within VMs. A virtualization system maintains container disk files that store data for containers. The...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.