Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2017/0230455 COMPUTATION OF STORAGE NETWORK ROBUSTNESS
Embodiments of the invention include a method for determining the health of a storage network of electronic devices. In some embodiments, the method may...
2017/0230454 System and Method for Real-Time Customization and Synchronization of Media Content
A method for customizing media content includes: receiving over a network from a client device controlled by a user, by a server-side computing device, a...
2017/0230453 SHARING DATA BETWEEN A PLURALITY OF SOURCE DEVICES THAT ARE EACH CONNECTED TO A SINK DEVICE
In an embodiment, a first media presentation session is established between a first Source and the Sink, and a second media presentation session between a...
2017/0230452 NETWORK OPTIMIZED SCAN WITH DYNAMIC FALLBACK RECOVERY
As disclosed herein a computer-implemented method includes receiving a delta scan from an endpoint system comprising changes to a baseline inventory, and...
2017/0230451 SYSTEM AND METHOD FOR CLOUD AWARE APPLICATION DELIVERY CONTROLLER
The present disclosure is directed towards systems and methods of managing cloud-based services via a network. A controller intermediary to clients and servers...
2017/0230449 METHOD FOR MONITORING ELEMENTS OF A DISTRIBUTED COMPUTING SYSTEM
In an embodiment, a method for monitoring elements of a distributed computing system is disclosed. In the embodiment, the method involves evaluating a metric...
2017/0230448 CONTEXT-AWARE TASK OFFLOADING AMONG MULTIPLE DEVICES
The present disclosure relates to offloading computing tasks from a user device to a cloud service. In one embodiment, a method generally includes generating,...
2017/0230447 COMPUTE-COMMUNICATE CONTINUUM TECHNOLOGY
The present disclosure relates to Compute-Communicate Continuum ("CCC") technology, which challenges today's use model of Computing and Communications as...
2017/0230446 CONTEXT-AWARE TASK OFFLOADING AMONG MULTIPLE DEVICES
The present disclosure relates to offloading computing tasks from a user device to a cloud service. In one embodiment, a method generally includes generating,...
2017/0230445 METHOD AND APPARATUS FOR BINDING TERMINALS
A method and apparatus for binding terminals are disclosed in the field of communication technologies. In the method: a server receives first information...
2017/0230444 CLOUD SERVICE SERVER AND METHOD FOR MANAGING CLOUD SERVICE SERVER
The present invention provides a method for managing a cloud service server. The method includes receiving an HTTP request from a user device through the...
2017/0230443 SYSTEM AND METHOD FOR ZERO LATENCY BROWSING
A system replicates Internet websites on a large number of user computers having browsers. The system includes a gateway platform having a gateway server and a...
2017/0230442 ADAPTIVE CLIENT-DRIVEN PUSH OF RESOURCES BY A SERVER DEVICE
At least one embodiment of a method of transmitting data between a server device and a client device includes receiving, from the client device, an HTTP...
2017/0230441 BEHAVIOR-DRIVEN SERVICE QUALITY MANAGER
A method and system for improving communications is disclosed. For example, the method for improving communications includes using a user device having one or...
2017/0230440 Transcoding and Control of Distribution of Assets as part of a Shared Workspace
Techniques are described to transcode and control distribution of assets as part of a shared workspace. An asset is received for distribution as part of a...
2017/0230439 METHOD OF CONTROLLING A REAL-TIME CONFERENCE SESSION
In a method of controlling a real-time conference session there is a first user and a second user connected to a media processing unit. The first user has a...
2017/0230438 SYSTEM AND METHOD FOR ORDERING MEDIA CONTENT FOR SHUFFLED PLAYBACK BASED ON USER PREFERENCE
In accordance with an embodiment, described herein is a system and method for providing media content to a media playback device that includes a media server....
2017/0230437 Media Support in Secure Mobile Applications
Methods, systems, computer-readable media, and apparatuses for providing secure resources to a native operating system resource are described herein. Using one...
2017/0230435 Method for Transmitting Data Sets to Mobile Terminals
Data sets are transmitted to mobile terminals, which are connected by a radio network to a data server connected to a data network, wherein the data server is...
2017/0230434 MEDIATING CONTENT DELIVERY VIA ONE OR MORE SERVICES
A device for receiving streaming data includes a broadcast or multicast middleware unit configured to receive the streaming data via a second service and a...
2017/0230433 Cross Platform Asset Sharing
Cross platform shared asset techniques are described. In one or more implementations, a version of an asset is received that is configured to support...
2017/0230432 Systems and methods for video-conference network system suitable for scalable, automatable, private...
A multi-party conference system for multi-media multi-party conference communication, includes one or more multi-media encoding/decoding modules to support...
2017/0230431 FOCUS COORDINATION IN GEOGRAPHICALLY DISPERSED SYSTEMS
A method, system, and computer program product for focus coordination in geographically dispersed systems are provided in the illustrative embodiments. A...
2017/0230430 Dynamically Configured Conferencing
Systems and methods are provided for dynamic configuration of a digital conference call among customer premise equipment (CPE) such that CPEs that are...
2017/0230429 Systems And Methods For Multi-Context Media Control And Playback
In response to a request for a media-control operation to be implemented at a second electronic device distinct from a first electronic device, the first...
2017/0230428 SESSION INITIATION PROTOCOL (SIP) COMMUNICATIONS OVER TRUSTED HARDWARE
A server system exchanges trust signaling with a first access network, establishes hardware trust with the first access network, and determines that the first...
2017/0230427 ESTABLISHING COMMUNICATION LINKS USING ROUTING PROTOCOLS
Systems and methods for facilitating shared access-right evaluation using linked communication channels are provided. A first communication can be received...
2017/0230426 ESTABLISHING COMMUNICATION LINKS USING ROUTING PROTOCOLS
Systems and methods for facilitating shared access-right evaluation using linked communication channels are provided. A first communication can be received...
2017/0230425 SECURITY POLICY UNIFICATION ACROSS DIFFERENT SECURITY PRODUCTS
A management entity generates for display multiple icons, each icon representing an actor or a resource in a networking environment, and defines a generic...
2017/0230424 Advanced Asset Tracking and Correlation
A security management system may be remotely deployed (e.g., using a cloud-based architecture) to add security to an enterprise network. For example, the...
2017/0230423 POLICY ENFORCEMENT IN A SECURE DATA FILE DELIVERY SYSTEM
A server interacts with a sender to form a package which can include one or more attached data files to be sent to one or more recipients, and the server...
2017/0230422 APPARATUS THAT IS MANAGED IN ACCORDANCE WITH A SECURITY POLICY, CONTROL METHOD THEREOF, AND STORAGE MEDIUM
A state of following a policy is maintained without troubling a person in the case where an operation setting relating to the policy is added by the update of...
2017/0230420 METHOD FOR PROTECTING INTANGIBLE ASSETS IN TELECOMMUNICATIONS NETWORKS
The invention relates to a method for protecting assets used by certified communication devices connected to networks, and for guaranteeing the behavior of...
2017/0230419 HARMONIZED GOVERNANCE SYSTEM FOR HETEROGENEOUS AGILE INFORMATION TECHNOLOGY ENVIRONMENTS
A harmonized governance system for a heterogeneous agile environment affords abstraction and normalization of resources, operations, and roles, and respective...
2017/0230418 MONITORING USER AUTHENTICITY
Systems and methods for monitoring user authenticity according to user activities on an application server. A user-modeling process and a user-verification...
2017/0230417 MONITORING USER AUTHENTICITY IN DISTRIBUTED SYSTEM
Systems and methods for monitoring user authenticity during user activities in a user session on an application server is provided. The method being carried...
2017/0230416 System and methods for preventing phishing attack using dynamic identifier
The invention includes a method and apparatus for preventing phishing attacks. A first method, for informing a user that a remote server is valid, remote...
2017/0230415 PREVENTING MAC SPOOFING
Example embodiments relate to preventing MAC spoofing. In this manner, the embodiments disclosed herein enable sending, from a requesting mobile device, a...
2017/0230414 IDENTIFYING AND DETERMINISTICALLY AVOIDING USE OF INJECTED OR ALTERED QUERY FILES
In one embodiment, a method includes obtaining a list of registered applications, each application indicated by the list having been provided permission and...
2017/0230413 TECHNIQUES FOR DETECTING ATTACKS IN A PUBLISH-SUBSCRIBE NETWORK
A publish-subscribe network includes a network infrastructure configured to support the exchange of data. An intrusion detection system is coupled to the...
2017/0230412 DYNAMIC ADAPTIVE DEFENSE FOR CYBER-SECURITY THREATS
Disclosed is a cyber-security system that is configured to aggregate and unify data from multiple components and platforms on a network. The system allows...
2017/0230411 Malicious Message Detection and Processing
Systems and methods for malicious message detection and processing are provided herein. According to various embodiments, a method includes detecting, via an...
2017/0230410 Telemetry Analysis System for Physical Process Anomaly Detection
Systems, methods, and apparatus, including computer programs encoded on computer storage media, for analyzing telemetry data from physical process sensors to...
2017/0230409 DETECTING AND PREDICTING CYBER-ATTACK PHASES IN ADJACENT DATA PROCESSING ENVIRONMENT REGIONS
A set and a second set of collections of forecasted feature vectors are selected from a repository for a future time window, a cyber-attack being in progress...
2017/0230408 DETECTING AND PREDICTING CYBER-ATTACK PHASES IN DATA PROCESSING ENVIRONMENT REGIONS
A set of collections of forecasted feature vectors is selected from a repository for a future time window after a present time, a cyber-attack being in...
2017/0230407 FORECASTING AND CLASSIFYING CYBER-ATTACKS USING CROSSOVER NEURAL EMBEDDINGS
A first collection including a first feature vector and a Q&A feature vector is constructed. A second collection is constructed from the first collection by...
2017/0230406 METHOD, APPARATUS AND SYSTEM
A method comprising partitioning a space of user requests into subsets, and determining a risk score for a user request based on the evolution of the number of...
2017/0230405 System and Method for Managed Security Assessment and Mitigation
Systems and methods for managed security assessment and mitigation are disclosed. An example system includes a security management system (SMS), a network...
2017/0230404 AUTOMATIC DETECTION OF POINTS OF COMPROMISE
Techniques described herein include determining, for each account of several accounts, an element blame score (EBS) for each potential point of compromise...
2017/0230402 AUTOMATED DATA RISK ASSESSMENT
A method is described for receiving a plurality of node data streams through a data network from a plurality of source nodes, respectively, each of the...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.