Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2017/0223075 Streaming Application Upgrading Method, Master Node, and Stream Computing System
A streaming application upgrading method and a stream computing system, where the method includes obtaining a updated logical model of a streaming application,...
2017/0223074 EXTENDED SELECTION AND ALIGNMENT OF VIDEO SEGMENTS FOR ADAPTIVE STREAMING
Disclosed herein are system, apparatus, article of manufacture, method, and/or computer program product embodiments for extended selection and alignment of...
2017/0223073 APPLICATION PROGRAMMING INTERFACE FOR A SHARING SERVICE
A computing device executes an application that is configured to call a sharing service application programming interface ("API") to create a sharing session...
2017/0223072 SYSTEM AND METHOD FOR MULTI-PARTY COMMUNICATION
A system and method provides for multi-party communication including engaging a network communication engine from a mobile communication interface and...
2017/0223071 CONNECTING A DEVICE TO A MEETING
One or more techniques and/or systems are disclosed for joining a device to a meeting. A device can send a request to join the meeting, such as by selecting a...
2017/0223070 USER ELECTRONIC DEVICE, USER INTERFACE AND COMPUTER PROGRAM PRODUCT
A user electronic device includes a storage unit, a processing unit, a networking unit and a screen. The screen displays a chat room interface for interacting...
2017/0223069 Meetings Conducted Via A Network
A method comprising: conducting a meeting via a computer network between a plurality of user terminals each used by at least one respective user, wherein the...
2017/0223068 BULK JOB PROVISIONING SYSTEM
A method and system for receiving and executing a bulk provisioning job for a collaboration conferencing system is disclosed. In particular, the system...
2017/0223067 COMMUNICATIONS METHODS, APPARATUS AND SYSTEMS FOR CORRELATING REGISTRATIONS, SERVICE REQUESTS AND CALLS
The present invention relates to communications methods, apparatus and systems for correlating registrations with subsequent requests for service, e.g.,...
2017/0223066 DETECTING AND REPORTING CONTENT CAPTURE EVENTS DURING AN ONLINE CONFERENCE SESSION
Detecting and reporting content capture (e.g., screen capture) events during an online conference session includes, at a server having connectivity to a...
2017/0223065 INFORMATIONAL ENRICHMENT FOR INTERACTIVE SYSTEMS
Interactive services are enhanced by intercepting, in a telecommunications network, a session initiation protocol message used to initiate a communication. The...
2017/0223064 SYSTEM FOR ENABLING COMMUNICATIONS AND CONFERENCING BETWEEN DISSIMILAR COMPUTING DEVICES INCLUDING MOBILE...
In one general embodiment, a system for enabling communications and conferencing between dissimilar computing devices including mobile computing devices. In...
2017/0223063 CONCENTRATION OF INDEPENDENT TUNNELED ENCAPSULATED MEDIA
A system for transmitting encapsulated media over tunnels, in response to a first request from a first application, establishes a first tunnel between a first...
2017/0223062 MEASURING SESSION INITIATION PROTOCOL (SIP) MESSAGING LATENCY
A device may receive a first session initiation protocol (SIP) message from another device, and may determine a first timestamp associated with the first SIP...
2017/0223061 METHOD AND ENTITY IN A LI SYSTEM FOR POSITIONING OF A TARGET CONNECTED TO A WI-FI NETWORK
The present invention relates to a mediation function node in a Lawful Intercept system and a method (S100) in a Lawful Intercept system for enabling a Law...
2017/0223060 SECURITY CONTROL
Some implementations may include obtaining a security control configuration for a pair of endpoints for a security control type. A virtual security control...
2017/0223059 METHOD AND APPARATUS FOR PROVIDING VENDOR REMOTE SUPPORT AND MANAGEMENT
An approach is provided for establishing a vendor portal configured to provide remote control and management of one or more devices of a customer by a...
2017/0223058 SERVICE DELIVERY CONTROLLER FOR LEARNING NETWORK SECURITY SERVICES
A learning-based computer network security system may include a service delivery controller executing on one or more of hardware processors that receives...
2017/0223057 SYSTEM AND METHOD FOR ACCESS CONTROL SERVICES
A system and method for access control services are disclosed. In some example embodiments, the method includes storing a user attribute of a user, a resource...
2017/0223056 SECURING INTERNAL SERVICES IN AN APPLIANCE
Disclosed herein are methods, systems, and processes to secure internal services in an appliance. A service call initiated by a client process of a client is...
2017/0223055 Dynamic Application Versioning System
A computer system authenticates a user of a mobile application. In response to authenticating the user, the computer identifies a user profile for the user....
2017/0223054 Methods and Apparatus for Verifying Transport Layer Security Server by Proxy
A proxy device intercepts a client transport layer security message including a server name indicator from a client device. The first client transport layer...
2017/0223053 SYSTEM AND METHOD OF PRE-ESTABLISHING SSL SESSION CONNECTIONS FOR FASTER SSL CONNECTION ESTABLISHMENT
An appliance and a method of pre-establishing SSL session connections for SSL connection establishment are provided. The appliance comprises a secure session...
2017/0223052 HONEYPOT NETWORK SERVICES
In general, in one aspect, a system for providing honeypot network services may monitor network activity, and detect network activity indicative of network...
2017/0223051 CROSS-SITE REQUEST FORGERY DEFENSE
An HTML document includes a JavaScript element that manages CSRF token use. When the HTML document is rendered, the JavaScript element asynchronously requests...
2017/0223050 Identifying a Denial-of-Service Attack in a Cloud-Based Proxy Service
A cloud-based proxy service identifies a denial-of-service (DoS) attack including determining that there is a potential DoS attack being directed to an IP...
2017/0223049 Detecting Human Activity to Mitigate Attacks on a Host
A system detects human activity through browser canvas events to mitigate the effects of an attack on a host, such as an application layer (layer 7) DDoS...
2017/0223048 DELEGATED AUTHENTICATION IN AN INTERNET OF THINGS (IoT) NETWORK
A method includes performing, by a processor of a network controller of a network: storing device identifications corresponding to respective ones of a...
2017/0223047 SYSTEM AND METHOD FOR AUTOMATIC FORENSIC INVESTIGATION
Automatic forensic investigation techniques to more effectively differentiate false positives from true positives. An incident is automatically investigated by...
2017/0223046 MULTIPHASE THREAT ANALYSIS AND CORRELATION ENGINE
Provided are systems, methods, and computer-program products for a targeted threat intelligence engine, implemented in a network device. The network device may...
2017/0223045 METHOD OF FORWARDING DATA BETWEEN COMPUTER SYSTEMS, COMPUTER NETWORK INFRASTRUCTURE AND COMPUTER PROGRAM PRODUCT
A method forwards data between secured computer systems in a computer network structure. Data packets are transmitted along a predetermined communication path...
2017/0223044 MANAGING DATA TRAFFIC IN THE PRESENCE OF A SENSITIVE SITE
Website security may be managed based on known site attributes and placing limits on communication outside a site. One example may include at least one of...
2017/0223043 DETERMINE VULNERABILITY USING RUNTIME AGENT AND NETWORK SNIFFER
Example embodiments disclosed herein relate to determination of vulnerability of an application under test using a runtime agent and network sniffer during a...
2017/0223042 DETECTION OF EMAIL-RELATED VULNERABILITIES
Examples relate to detection of email-related vulnerabilities. The examples disclosed herein enable monitoring, at a runtime, application programming interface...
2017/0223041 NETWORK TRAFFIC FILTERING AND ROUTING FOR THREAT ANALYSIS
Implementations disclosed herein provide a managed security service that distributes processing tasks among a number of network security modules working in...
2017/0223040 IDENTIFYING DEVICE, IDENTIFYING METHOD AND IDENTIFYING PROGRAM
An identifying device monitors malware to be analyzed and acquires, as log data, the malware, download data downloaded from a communication destination, and a...
2017/0223039 REMEDIATING A SECURITY THREAT TO A NETWORK
Remediating a security threat to a network includes obtaining, from a network, security information about the network to determine traffic patterns of the...
2017/0223038 Recursive Multi-Layer Examination for Computer Network Security Remediation
Computer-implemented methods and apparatuses for recursive multi-layer examination for computer network security remediation may include: identifying one or...
2017/0223037 USING HIGH-INTERACTION NETWORKS FOR TARGETED THREAT INTELLIGENCE
Provided are methods, network devices, and computer-program products for targeted threat intelligence using a high-interaction network. In some ...
2017/0223036 MODEL TRAINING AND DEPLOYMENT IN COMPLEX EVENT PROCESSING OF COMPUTER NETWORK DATA
A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The...
2017/0223035 SCALING METHOD AND MANAGEMENT DEVICE
A scaling method executed by a processor included in a management device that manages one or more first virtual networks formed in one or more physical...
2017/0223034 CLASSIFYING AN EMAIL AS MALICIOUS
Provided are systems, methods, and computer-program products for classifying an email as malicious. In some implementations, a malicious detection engine may...
2017/0223032 MALICIOUS ENCRYPTED TRAFFIC INHIBITOR
A malicious encrypted traffic inhibitor connected to a computer network is disclosed. A method for inhibiting malicious encrypted network traffic communicated...
2017/0223031 SYSTEMS AND METHODS FOR MODIFYING FILE BACKUPS IN RESPONSE TO DETECTING POTENTIAL RANSOMWARE
A computer-implemented method for modifying file backups in response to detecting potential ransomware may include (1) detecting, during a file backup process,...
2017/0223030 DETECTION OF SECURITY TRANSACTIONS
In a method, a plurality of events is accessed, wherein an event of the plurality of events includes a portion of raw-machine data from a data source of a...
2017/0223029 CONTENT DELIVERY NETWORK PROTECTION FROM MALWARE AND DATA LEAKAGE
Content Delivery Network (CDN) protection systems and methods, performed by a cloud node in a distributed security system include receiving traffic between one...
2017/0223028 APPARATUS, SYSTEMS AND METHODS FOR PROTECTING AGAINST MALICIOUS MESSAGES
A Message Filter receives a message intended for a specific Recipient and determines whether an escrow value has been deposited in relation to said message.
2017/0223027 SYSTEMS AND METHODS FOR MANAGING ELECTRONIC TRANSACTIONS USING ELECTRONIC TOKENS AND TOKENIZED DEVICES
Systems and methods are provided for managing electronic tokens associated with an account. A system may include a memory storing instructions and account...
2017/0223026 SYSTEM AND METHOD FOR ZONE ACCESS CONTROL
In some example embodiments, a method comprises receiving a web service request for accessing a resource of a web service, with the web service request...
2017/0223025 ACCESS PERMISSIONS ENTITLEMENT REVIEW
A system for operating an enterprise computer network including multiple network objects, said system comprising monitoring and collection functionality for...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.