Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2017/0134456 INITIATING A COLLABORATION SESSION BETWEEN DEVICES USING AN AUDIBLE MESSAGE
In one embodiment, a network interface broadcasts an audible message from a first computing device to a plurality of second computing devices over a first...
2017/0134455 METHOD AND SYSTEM FOR DYNAMIC PROXIMITY-BASED MEDIA SHARING
Disclosed embodiments provide an approach for sharing media items between mobile devices that are in proximity to one another. A device ID is generated and...
2017/0134454 SYSTEM FOR CLOUD STREAMING SERVICE, METHOD FOR STILL IMAGE-BASED CLOUD STREAMING SERVICE AND APPARATUS THEREFOR
The present invention relates to a system for a cloud streaming service, a method for a still image-based cloud streaming service and an apparatus therefor....
2017/0134453 SYSTEMS AND METHODS FOR AUTOMATED REAL-TIME INTERNET STREAMING AND BROADCASTING
A real-time Internet streaming system and method includes a scheduling server that receives queries from encoders and determines if any scheduled events...
2017/0134452 SYSTEM AND METHOD FOR INITIATING CONTENT STREAMING
A system for streaming content, the system comprising a consumer electronics device, a mobile communication device, and a triggering device, wherein: the...
2017/0134451 PERSONALIZED CONTENT DELIVERY USING A DYNAMIC NETWORK
Personalized content delivery using a dynamic network may include, using a processor, continually receiving, from each of a plurality of mobile devices, a...
2017/0134450 MULTIPLE STREAM CONTENT PRESENTATION
A client may, for example, initiate presentation of the content item in a hybrid stream mode in which both a client stream and a content provider stream are...
2017/0134449 SHARED EXPERIENCE INFORMATION CONSTRUCTION SYSTEM
In an information terminal processing device of a first user, after selection of a content on a prescribed experience by the first user, content identification...
2017/0134448 METHOD, SYSTEM AND PROGRAM PRODUCT FOR COLLABORATION OF VIDEO FILES
A method, system and program product comprise communicating to a server system. The server system is at least configured to receive video/audio uploads from...
2017/0134447 REAL TIME VOICE PARTICIPATE SELF-ASSESSMENT
Aspects include a method, a system and a computer program product for performing a sound quality self-assessment on a voice conference. The method includes...
2017/0134446 Electronic Meeting Intelligence
Techniques related to electronic meeting intelligence are disclosed. An apparatus receives audio/video data including first meeting content data for an...
2017/0134445 Telecommunications Directory Services
A method and service for enabling routing of calls to a user is described. Connection rules for a user are established, and organisational or social network...
2017/0134444 Establishing a Session Initiation Protocol Session
The present disclosure describes methods and systems for establishing a Session Initiation Protocol Session. One method includes transmitting a first message...
2017/0134443 SYSTEM AND METHOD FOR PROCESSING TELEPHONY SESSIONS
In one embodiment, the method of processing telephony sessions includes: communicating with an application server using an application layer protocol;...
2017/0134442 AUTOMATED DISCOVERY AND LAUNCH OF AN APPLICATION ON A NETWORK ENABLED DEVICE
A method, apparatus and system related to automated discovery and launch of an application on a network enabled device are disclosed. In one embodiment, a...
2017/0134441 PROXY BASED DATA TRANSFER UTILIZING DIRECT MEMORY ACCESS
A method for transferring data utilizing direct memory access. The method includes a computer processor establishing a networking connection, using a proxy,...
2017/0134440 MANAGEMENT SYSTEM AND METHOD OF STARTING COMMUNICATION
A management system is provided that includes a memory storing a program and a processor configured to execute the program to implement processes of receiving...
2017/0134439 METHOD AND APPARATUS FOR MANAGING CALLS
A system that incorporates teachings of the present disclosure may include, for example, receiving a request for a voice call at a mobile switching center...
2017/0134438 METHODS AND APPARATUS FOR PROVIDING NETWORK BASED SERVICES TO NON-REGISTERING ENDPOINTS
Methods and apparatus to provide data network services to a non-registering endpoint are disclosed herein. A disclosed method includes, transmitting, by...
2017/0134437 Methods, Systems, And Computer Program Products For Security Protocol Selection In Internet Protocol Multimedia...
A method includes receiving a first secured registration request message from user equipment at a registration server in an Internet Protocol multimedia...
2017/0134436 SYSTEM AND METHOD FOR PREVENTING DATA LOSS USING VIRTUAL MACHINE WRAPPED APPLICATIONS
A method in one example implementation includes selecting at least one criterion for controlling data transmission from within a virtual machine. At least one...
2017/0134435 Access Requests at IAM System Implementing IAM Data Model
Systems and methods are provided for provisioning access rights to physical computing resources using an IAM system implementing an IAM data model. The IAM...
2017/0134434 ROLE-BASED ACCESS CONTROL ASSIGNMENT
A first probability that indicates a probability that a user is associated with a role is determined, with the first probability having a first score. The...
2017/0134433 PROVIDING A COMMON SECURITY POLICY FOR A HETEROGENEOUS COMPUTER ARCHITECTURE ENVIRONMENT
A common security policy for a heterogeneous computer architecture environment is provided. A configuration of a security policy of a heterogeneous computer...
2017/0134432 PROVIDING A COMMON SECURITY POLICY FOR A HETEROGENEOUS COMPUTER ARCHITECTURE ENVIRONMENT
A common security policy for a heterogeneous computer architecture environment is provided. A configuration of a security policy of a heterogeneous computer...
2017/0134430 MODIFYING SECURITY POLICIES OF RELATED RESOURCES
A method for a managing security in a networked computing environment. The method included a processor detecting an unauthorized activity that is targeting a...
2017/0134429 METHOD AND APPARATUS FOR RELIABLE TOKEN REVOCATION
Methods and systems for reliable token revocation at a server are described. The server receives, a token revocation policy, which includes an identification...
2017/0134428 FIREWALL INFORMED BY WEB SERVER SECURITY POLICY IDENTIFYING AUTHORIZED RESOURCES AND HOSTS
A user of a client device that is protected by a firewall may navigate to a website using a particular browser process (e.g., a window/tab of a browser) of the...
2017/0134427 SECURING RESOURCES WITH A REPRESENTATIONAL STATE TRANSFER APPLICATION PROGRAM INTERFACE
Embodiments provide techniques for enforcing a security policy in a server application that provides a Representational State Transfer (RESTful) Application...
2017/0134426 PROVIDING A COMMON SECURITY POLICY FOR A HETEROGENEOUS COMPUTER ARCHITECTURE ENVIRONMENT
A common security policy for a heterogeneous computer architecture environment is provided. A configuration of a security policy of a heterogeneous computer...
2017/0134425 CYBER SECURITY SHARING AND IDENTIFICATION SYSTEM
Systems and techniques for sharing security data are described herein. Security rules and/or attack data may be automatically shared, investigated, enabled,...
2017/0134424 NETWORK DEVICES USING TLS TICKETS FOR SESSION PERSISTENCE
Processing a connection request is disclosed. The connection request is received. It is determined whether the connection request identifies a Transport Layer...
2017/0134423 DECOY AND DECEPTIVE DATA OBJECT TECHNOLOGY
A computer implemented method of detecting unauthorized access to a protected network by monitoring a dynamically updated deception environment, comprising...
2017/0134422 Deception Techniques Using Policy
Methods and systems for diversifying coverage of a deception point are provided. Exemplary methods include: receiving, by a first enforcement point in a first...
2017/0134421 MANAGING DYNAMIC DECEPTIVE ENVIRONMENTS
A deception management system (DMS) to detect attackers within a network of computer resources, including a discovery tool auto-learning the network naming...
2017/0134420 VIRTUAL MACHINE COMPLIANCE CHECKING IN CLOUD ENVIRONMENTS
A method of transferring a virtual machine between a virtualized computing system and a cloud computing system includes determining that a virtual machine is...
2017/0134419 ZERO DAY THREAT DETECTION USING HOST APPLICATION/PROGRAM TO USER AGENT MAPPING
A technique allows associating host applications and user agents in network traffic and detecting possible malware without relying on signatures of the user...
2017/0134418 SYSTEM AND METHOD FOR A UNIFORM MEASURE AND ASSESSEMENT OF AN INSTITUTION'S AGGREGATE CYBER SECURITY RISK AND...
A system and method for a uniform measure and assessment of an institution's aggregate cyber security risk and of the institution's cybersecurity confidence...
2017/0134417 COMPUTER SYSTEM FOR DISTRIBUTED DISCOVERY OF VULNERABILITIES IN APPLICATIONS
In one aspect, the disclosure provides: A method comprising: inviting a distributed plurality of researchers to participate in one or more computer...
2017/0134416 SECURITY TECHNIQUES ON INTER-TERMINAL COMMUNICATIONS WITHIN THE SAME SSID UNDER THE SAME AP USING OPENFLOW
A security management method includes receiving a security check list from a security monitoring device, the security check list containing security issues...
2017/0134415 Network Security Threat Detection by User/User-Entity Behavioral Analysis
A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The...
2017/0134414 SYSTEMS AND METHODS FOR DETECTING AND SCORING ANOMALIES
Systems and methods for detecting and scoring anomalies. In some embodiments, a method is provided, comprising acts of: (A) identifying a plurality of values...
2017/0134413 SYSTEM AND METHOD FOR CONNECTION FINGERPRINT GENERATION AND STEPPING-STONE TRACEBACK BASED ON NETFLOW
The method for tracking a cyber hacking is provided. The method of connection fingerprint generation and stepping-stone traceback based on NetFlow includes...
2017/0134412 ADAPTIVE BEHAVIOR PROFILING AND ANOMALY SCORING THROUGH CONTINUOUS LEARNING
Generating a behavior profile is provided. A newness score is calculated for a data point corresponding to a context of an access request to a resource made by...
2017/0134411 Methods and Automated Systems to Effectively Resist (PAMD) Cyber Attacks
This patent includes three claims of inventions for the methods and automated systems to effectively resist (predict|attenuate|measure|detect--P.A.M.D.) cyber...
2017/0134410 Dual-Path Distributed Architecture for Network Security Analysis
A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The...
2017/0134409 METHOD AND AN APPARATUS TO PERFORM MULTIPLE PACKET PAYLOADS ANALYSIS
A method and an apparatus to perform multiple packet payload analysis have been disclosed. In one embodiment, the method includes receiving a plurality of data...
2017/0134408 STANDARD METADATA MODEL FOR ANALYZING EVENTS WITH FRAUD, ATTACK, OR ANY OTHER MALICIOUS BACKGROUND
A standard metadata model for analyzing events with fraud, attack or other malicious background is disclosed. Log data for two or more computing systems is...
2017/0134407 Identifying Attack Patterns in Requests Received by Web Applications
A system and a method are disclosed for determining malicious web requests. The system processes incoming web requests to determine whether a request matches...
2017/0134406 Pre-Filtering Digital Content In A Digital Content System
A digital content system enables users of the content system to access, view and interact with digital content items in a safe, efficient and enjoyable online...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.