Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2017/0104820 METHOD FOR LOGICAL MIRRORING IN A MEMORY-BASED FILE SYSTEM
A method and system for logical mirroring between nodes includes maintaining a log of a state modifying operation received at a memory-based file system of an...
2017/0104819 SYNCHRONIZATION SCHEME FOR PHYSICS SIMULATIONS
A server, which is in communication with a plurality of client computing devices configured to perform a reduced simulation function, comprises a ...
2017/0104818 METHODS AND SYSTEMS FOR SELECTIVELY SHARING CONTENT OVER A COMMUNICATION CONNECTION
Real time communication services are used to establish peer-to-peer connection (P2P) between computing devices to selectively share content, such as...
2017/0104817 SYSTEM AND METHOD FOR EFFICIENT NETWORK ISOLATION AND LOAD BALANCING IN A MULTI-TENANT CLUSTER ENVIRONMENT
A system and method for supporting load balancing in a multi-tenant cluster environment, in accordance with an embodiment. One or more tenants can be supported...
2017/0104816 OFFLOADING A DISTRIBUTION SERVER TASK TO A MEDIA GATEWAY
A server offloads one or more tasks to a first media gateway. The server receives, from the first media gateway that is receiving a video stream of a...
2017/0104815 SYSTEM AND METHOD FOR RISK-AWARE SERVER LOAD BALANCING
Systems and methods are provided for managing server loads that accounts for various measures of risk associated with different workloads assigned to servers....
2017/0104814 DISTRIBUTED EXTENSION EXECUTION IN COMPUTING SYSTEMS
Computing systems, devices, and associated processes for distributed execution of extensions are disclosed herein. In one embodiment, a method includes...
2017/0104813 CONTEXTUALIZED ANALYTICS PLATFORM
In an embodiment of the present disclosure, there is provided a computer-implemented method, wherein the computer is operable between a management server and...
2017/0104812 System and Method for Managing Applications as IoT Objects
A system, apparatus, and method for managing applications as Internet of Things (IoT) objects includes an IoT server, a computing device, and an IoT...
2017/0104811 FAST FILE SERVER METHODS AND SYSTEMS
The invention provides, in one aspect, an improved system for data access comprising a file server that is coupled to a client device or application executing...
2017/0104810 DEVICE AND METHOD FOR PROCESSING SLICE DATA
The present disclosure discloses a device and method for processing slice data. The method comprises: sending a download request for slice data adjacent to the...
2017/0104809 Media Acquisition, Processing and Distribution System for the Internet
The present invention, generally speaking, provides a broad-based solution for acquisition, processing and distribution of media objects including pictures...
2017/0104808 NETWORK APPLIANCE, FEATURE PHONE, NETWORK APPLIANCE, SYSTEM AND CONTROL METHOD OF NETWORK APPLIANCE
A control method of a network appliance, a network appliance, a mobile terminal and system, are provided. The control method includes: acquiring, by a feature...
2017/0104807 SYSTEMS AND METHODS FOR REMOTE CONTROL OF COMPUTERS
Systems and methods for remote control of computers and computing devices, such as tablets and mobile phones, including control software run on a control...
2017/0104806 METHODS AND SYSTEMS FOR CONTENT STREAM CODING
Methods and systems are provided for encoding content using a first encoding algorithm to produce first encoded content. Content can also be encoded using a...
2017/0104805 COMMENT LINK FOR SHARED STREAMING MEDIA CONTENT
Embodiments relate to providing a method for an authenticated user of an item of streaming media content to create a shareable clip of a portion of the item....
2017/0104804 ELECTRONIC DEVICE AND METHOD FOR ENCODING IMAGE DATA THEREOF
Methods and devices for image data encoding are provided. Image data is created using at least one image captured by a camera of the electronic device. First...
2017/0104803 Specifying Client Behavior and Sessions in Dynamic Adaptive Streaming over Hypertext Transfer Protocol (DASH)
An apparatus comprises a receiver configured to receive a request for an adaptive streaming media presentation description (MPD), a processor coupled to the...
2017/0104802 MIXING CONTENT INTO A CONTENT STREAM
Aspects of the subject technology relate to mixing an aggregated content data structure into a content stream. A first plurality of aggregated content data...
2017/0104801 PIPELINING GET REQUESTS IN ADAPTIVE STREAMING
In one embodiment, a client device includes a processor to send a first GET request to a server for a first data chunk of a data item, a communication...
2017/0104800 PERFORMANCE OPTIMIZATION FOR STREAMING VIDEO
Disclosed are various embodiments for a streaming video application. The application downloads, decodes, and renders video frame data at different frame rates....
2017/0104799 SYSTEM AND METHOD FOR COMMUNICATING INFORMATION ABOUT INTERESTING OCCURRENCES AT A DATA NODE TO A SUBSCRIBER...
A method and system for providing information to an application related to an occurrence at a data node. A data node may include an application running on a...
2017/0104798 SYSTEM FOR BROADCASTING EVENTS
Systems and methods for broadcasting events are provided. The system, for example, may include, but is not limited to, a communication system, a memory, and a...
2017/0104797 SYSTEM AND METHOD FOR MULTIMEDIA REDIRECTION FOR CLOUD DESKTOP CONFERENCING
In certain information handling system environments, remote conferencing may require the transmission of multi-media content. The server may query a client...
2017/0104796 SYSTEM, METHOD AND APPARATUS FOR SIMULTANEOUS MEDIA COLLABORATION
A method, system, and apparatus for simultaneous media collaboration between remotely located users is disclosed. Unlike the existing collaboration methods...
2017/0104795 VOICE OVER LTE SUPPORT FOR NON-UICC DEVICES ATTACHED TO AN LTE MOBILE ROUTER
In one embodiment a router connects to a cellular network using at least one authentication credential stored on a smart card of the router. The router...
2017/0104794 DYNAMIC VIRTUAL PRIVATE NETWORK
Various embodiments establish a virtual private network (VPN) between a remote network and a private network. In one embodiment, a first system in the remote...
2017/0104793 REAL-TIME SYNCHRONOUS COMMUNICATION WITH PERSONS APPEARING IN IMAGE AND VIDEO FILES
Systems and methods are provided for enabling real-time synchronous communication with persons appearing in image or video files. For example, an image or...
2017/0104792 ESTABLISHING MEDIA SESSIONS VIA MQTT AND SIP
A method of establishing a media session between a first mobile station and a second mobile station, the method including receiving, at an MQTT messaging...
2017/0104791 METHOD, SYSTEM AND COMPUTER PROGRAM PRODUCT FOR ENFORCING ACCESS CONTROLS TO FEATURES AND SUBFEATURES ON...
Embodiments disclosed herein provide feature-level access control functionality useful for enforcing access controls to features and subfeatures on...
2017/0104790 SECURITY POLICY BASED ON RISK
In one implementation, a risk assessment of an asset is compared to a risk level of a security policy and network traffic associated with the asset is assigned...
2017/0104789 SERVER WORKLOAD ASSIGNMENT BASED ON KNOWN UPDATE/SECURITY VULNERABILITIES
Methods to perform an operation comprising determining that a first component of a first compute node violates a compliance rule, wherein the first compute...
2017/0104788 SERVER WORKLOAD ASSIGNMENT BASED ON KNOWN UPDATE/SECURITY VULNERABILITIES
Systems, methods, and computer program products to perform an operation comprising determining that a first component of a first compute node violates a...
2017/0104787 LOGGING ENCRYPTED DATA COMMUNICATIONS FOR QOE ANALYSIS
A device such as a smartphone may communicate with a server or other network entity using encrypted communications, making it difficult to examine such...
2017/0104786 Splicing into an active TLS session without a certificate or private key
An origin server selectively enables an intermediary (e.g., an edge server) to shunt into and out of an active TLS session that is on-going between a client...
2017/0104785 GENERATING HIGHLY REALISTIC DECOY EMAIL AND DOCUMENTS
A system that generates decoy emails and documents by automatically detecting concepts such as dates, times, people, and locations in e-mails and documents,...
2017/0104784 SYSTEMS AND METHODS OF IDENTIFYING SUSPICIOUS HOSTNAMES
A method includes receiving a set of strings and applying one or more filters to generate a subset of strings that are determined to correspond to strings of...
2017/0104783 WEB INJECTION PROTECTION METHOD AND SYSTEM
Computerized methods and systems detect unauthorized and potentially malicious, as well as malicious records, typically in the form of electronic forms, such...
2017/0104782 SECURITY THREAT IDENTIFICATION, ISOLATION, AND REPAIRING IN A NETWORK
A first computing system may identify a security threat located at least at a first virtual server. The first virtual server may be within a second computing...
2017/0104781 System and Method for Securing Server Data
A system is described for securing data saved on servers against external security threats. The system includes a computing device connected to a data vault...
2017/0104780 ASSESSING EFFECTIVENESS OF CYBERSECURITY TECHNOLOGIES
A method for assessing effectiveness of one or more cybersecurity technologies in a computer network includes testing each of two or more component stages of...
2017/0104779 VULNERABILITY EXPOSING APPLICATION CHARACTERISTIC VARIATION IDENTIFICATION ENGINE
Embodiments of the invention are directed to a system, method, or computer program product for an engine for exposing vulnerability within applications based...
2017/0104777 Device Time Accumulation
A method, system and computer-usable medium are disclosed for performing a device time accumulation operation. With a device time accumulation operation...
2017/0104776 SYSTEM FOR ANALYZING AND MAINTAINING DATA SECURITY IN BACKUP DATA AND METHOD THEREOF
A computer-implemented method and system for analyzing and maintaining data security in backup data, comprising of: accessing backup data of file systems...
2017/0104775 ANOMALY DETECTION SUPPORTING NEW APPLICATION DEPLOYMENTS
In one embodiment, a device in a network maintains information regarding anomaly detection models used in the network and applications associated with traffic...
2017/0104774 ANOMALY DETECTION IN A NETWORK COUPLING STATE INFORMATION WITH MACHINE LEARNING OUTPUTS
In one embodiment, a device in a network receives an output of an anomaly detection model. The device receives state information surrounding the output of the...
2017/0104773 COLD START MECHANISM TO PREVENT COMPROMISE OF AUTOMATIC ANOMALY DETECTION SYSTEMS
In one embodiment, a device in a network analyzes data indicative of a behavior of a network using a supervised anomaly detection model. The device determines...
2017/0104772 METHODS AND SYSTEMS FOR DETECTING AN ELECTRONIC INTRUSION
Methods and systems for detecting an electronic intrusion are described. A user activity may be identified for a user account. A location of a user...
2017/0104771 NETWORK MONITORING DEVICE, NETWORK MONITORING METHOD, AND NETWORK MONITORING PROGRAM
There is provided a network monitoring device including: a memory; and a processor coupled to the memory and the processor configured to: detect, based on...
2017/0104770 SYSTEM AND METHOD FOR PERFORMING INTRUSION DETECTION IN AN INFORMATION HANDLING SYSTEM
A method and information handling system (IHS) for identifying communication threats in an IHS. The method includes triggering a board management controller...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.