Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2017/0237793 Client Device, Method and Computer Program for Playing Media Content
Client device for playing media content, comprising: a connection interface for establishing a connection with a server and for receiving a media content from...
2017/0237792 Feature Generation for Online/Offline Machine Learning
A system for utilizing models derived from offline historical data in online applications is provided. The system includes a processor and a memory storing...
2017/0237791 USER INTERFACE CONTENT STATE SYNCHRONIZATION ACROSS DEVICES
Methods for synchronizing a client application user interface (UI) state of content of a client application on a client device corresponding with a host...
2017/0237790 Method for Providing Dynamic Quality of Service for Push-to-Talk Service
A system and method for providing dynamic quality-of-service (QoS) for Push-to-Talk (PTT) services in a wireless communications network. One or more servers...
2017/0237789 APPARATUSES, METHODS AND SYSTEMS FOR SHARING VIRTUAL ELEMENTS
Aspects of the disclosed apparatuses, methods and systems provide sharing virtual elements between users of different 3-D virtual spaces. In another generation...
2017/0237788 CONTROLLING AGGREGATION OF SHARED CONTENT FROM MULTIPLE ENDPOINTS DURING AN ONLINE CONFERENCE SESSION
Controlling aggregation of shared content from multiple presenters during an online conference session includes, at a server having network connectivity, at a...
2017/0237787 DATA SYSTEM CONFIGURATIONS FOR GENERATING PAGES
Various systems, mediums, and methods herein describe aspects of presentations of information from several different sources. In one implementation, a data...
2017/0237786 SYSTEMS AND METHODS FOR FACILITATING VIDEO COMMUNICATION USING VIRTUAL AVATARS
A system and method for enhancing video communication among two or more users is provided. According to an aspect, a method is provided. The method comprises...
2017/0237785 SYSTEM AND METHOD FOR MANAGING ONLINE GROUP CHAT
A system for managing online group chat and methods for making and using same. A server computer can create a topic in a chat group and receive a request from...
2017/0237784 METHODS AND SYSTEMS FOR DYNAMIC ADJUSTMENT OF SESSION PARAMETERS FOR EFFECTIVE VIDEO COLLABORATION AMONG...
Methods and systems for mobile video communications may include using a wireless network for video communications when a wired network is unavailable by...
2017/0237783 METHODS AND APPARATUS FOR DEDICATED BEARER ESTABLISHMENT HANDLING DURING CALL SETUP FOR LTE
Aspects relate to methods and apparatus for dedicated bearer (DB) establishment handling during call setup for long term evolution. According to aspects, a...
2017/0237782 IMS RESTORATION SUPPORT FOR TEMPORARY GRUU
The present invention provides apparatuses, methods, computer programs, computer program products and computer-readable media regarding IMS (Internet Protocol...
2017/0237781 METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR CLEARING DIAMETER SESSION INFORMATION
The subject matter described herein includes methods, systems, and computer readable media for clearing Diameter session information. According to one method,...
2017/0237780 METHODS AND SYSTEMS FOR ENABLING LEGAL-INTERCEPT MODE FOR A TARGETED SECURE ELEMENT
Disclosed herein are methods and systems for enabling legal-intercept mode for a targeted secure element. In an embodiment, a method includes embedding a first...
2017/0237779 METHODS AND SYSTEMS FOR PERFORMING LAWFUL INTERCEPTION (LI) IN COMMUNICATION NETWORKS INVOLVING CONTENT...
A method for lawful interception in a communication network involving adulteration by colluding agent is disclosed. The method includes activating,...
2017/0237778 CONTINUOUS SECURITY DELIVERY FABRIC
A continuous security delivery fabric is disclosed. One or more security functions, comprising one or more tasks to be performed by a security tool, utility or...
2017/0237777 SYSTEM AND METHOD TO ESTIMATE QUALITY OF EXPERIENCE FOR CONSUMPTION OF ENCRYPTED MEDIA NETWORK TRAFFIC
A system and method is provided for analyzing media traffic having encrypted application-layer and payload data. The method includes determining from network...
2017/0237776 SUSPICIOUS MESSAGE PROCESSING AND INCIDENT RESPONSE
The present invention relates to methods, network devices, and machine-readable media for an integrated environment for automated processing of reports of...
2017/0237775 METHOD FOR IMPLEMENTING ONLINE ANTI-PHISHING
A method for implementing online anti-phishing, related to the field of information security, comprising: a browser loads an online anti-phishing control, the...
2017/0237774 PROTECTION AGAINST REROUTING A COMMUNICATION CHANNEL OF A TELECOMMUNICATION DEVICE HAVING AN NFC CIRCUIT AND A...
A method and associated circuits protect data stored in a secure data circuit of a telecommunication device equipped with a near-field communication (NFC)...
2017/0237773 ENDPOINT-BASED MAN IN THE MIDDLE ATTACK DETECTION USING MACHINE LEARNING MODELS
A first node of a networked computing environment initiates each of a plurality of different types of man-in-the middle (MITM) detection tests to determine...
2017/0237772 Systems, Methods and Apparatuses for Prevention of Relay Attacks
The systems, methods and apparatuses described herein provide an apparatus configured for preventing relay attacks on a communication link between the...
2017/0237771 SCARECROW FOR DATA SECURITY
A method, computer program product and/or system receives information pertaining to network data traffic from and/or to a network accessible resource, analyzes...
2017/0237770 METHOD FOR MITIGATING A DoS ATTACK ON A DEVICE
There is described a method for mitigating a power-denial of service attack on a first device by a second device, the method comprising: transmitting, from the...
2017/0237769 PACKET TRANSFER METHOD AND PACKET TRANSFER APPARATUS
A packet transfer method includes requesting a terminal apparatus for a physical address corresponding to a logical address of a transmission source of a...
2017/0237768 Origin Controlled Attack Protections in a Distributed Platform
Some embodiments provide an origin whose content is distributed by a third party content distributor control over invoking attack protections from the third...
2017/0237767 APPARATUS AND METHODS FOR MITIGATION OF NETWORK ATTACKS VIA DYNAMIC RE-ROUTING
Apparatus and methods for mitigating network attacks, such as by dynamically re-routing traffic. Various disclosed embodiments manipulate path-based routing of...
2017/0237766 REVERSE PROXY COMPUTER: DEPLOYING COUNTERMEASURES IN RESPONSE TO DETECTING AN AUTONOMOUS BROWSER EXECUTING ON A...
A computer system configured to improve security of server computers interacting with client computers, the system comprising: one or more processors executing...
2017/0237765 METHODS AND SYSTEMS FOR IMPLEMENTING A PHISHING ASSESSMENT
A system, method, and computer program product for implementing a phishing assessment of a target computer network that includes a phishing assessment platform...
2017/0237764 NON-INTRUSIVE TECHNIQUES FOR DISCOVERING AND USING ORGANIZATIONAL RELATIONSHIPS
The present disclosure provides techniques for calculating an entity's cybersecurity risk based on identified relationships between the entity and one or more...
2017/0237763 NETWORK SECURITY FOR INTERNET OF THINGS
Two wireless networks are established in a local network, one for less-secure IoT devices and one for more-secure conventionally networked devices, with a...
2017/0237762 SYSTEMS, METHODS, AND COMPUTER-READABLE MEDIA FOR DATA SECURITY
Systems and methods are provided for data security. A server system provides data security using one or more processor devices, one or more communication...
2017/0237761 Monitoring Search Query Results Relating to Alert Notifications
The disclosed embodiments relate to a system that generates an alert based on information extracted from search results generated by a query. During operation,...
2017/0237760 Supplementing Network Flow Analysis with Endpoint Information
Techniques are disclosed for supplementing network flow analysis with data collected from endpoint computer systems in a network. An endpoint analysis agent...
2017/0237759 SYSTEM FOR UTILIZING ONE OR MORE DATABASES TO IDENTIFY A POINT OF COMPROMISE
Systems and computer-readable media are disclosed for utilizing one or more databases to detect a point of compromise ("POC"). A POC detection computing...
2017/0237758 Packet Transmission Method and Apparatus
A packet transmission method and an apparatus pertain to the field of network technologies. The method includes obtaining, by a terminal device, a source IP...
2017/0237757 Determining the Likelihood of Traffic Being Legitimately Received At a Proxy Server in a Cloud-Based Proxy Service
Message(s) are received from each one of multiple proxy servers, which are anycasted to the same IP address, that indicate source IP addresses of packets that...
2017/0237756 SYSTEM AND METHOD FOR PROVIDING A SELF-MONITORING, SELF-REPORTING, AND SELF-REPAIRING VIRTUAL ASSET CONFIGURED...
A trigger event monitoring system is provided in one or more virtual assets. One or more trigger parameters, including security threat patterns, are defined...
2017/0237755 SYSTEM AND METHOD FOR EVALUATING NETWORK THREATS AND USAGE
Systems and methods are presented for generating a threat score and a usage score of each of a plurality of IP addresses. The threat score may be determined...
2017/0237754 EVALUATING INSTALLERS AND INSTALLER PAYLOADS
A reputation of an installer may be determined based on contextual information including its source (e.g., its publisher), a cryptographic signature or...
2017/0237753 PHISHING ATTACK DETECTION AND MITIGATION
An edge service is disclosed herein that performs an anti-phishing attack function, to detect and mitigate against phishing attacks. In an implementation, the...
2017/0237752 PREDICTION OF POTENTIAL CYBER SECURITY THREATS AND RISKS IN AN INDUSTRIAL CONTROL SYSTEM USING PREDICTIVE CYBER...
This disclosure provides systems and methods for prediction of potential cyber security threats and risks in an industrial control system using predictive...
2017/0237751 INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND COMPUTER READABLE MEDIUM
An attack detection apparatus (6) collects packets a transmission source or a transmission destination of which is a protection target apparatus (5), and...
2017/0237750 PROTECTIVE SYSTEM, APPARATUS, AND METHOD FOR PROTECTING ELECTRONIC COMMUNICATION DEVICE
A protective system, apparatus, and method for protecting an electronic communication device of a user that can safely: execute at least one of execution data...
2017/0237749 System and Method for Blocking Persistent Malware
Systems and methods for allowing and blocking data packets sent to and from browser software applications and non-browser software applications operated on a...
2017/0237748 Geographic Filter For Regulating Inbound and Outbound Network Communications
A system and method for regulating and analyzing inbound and outbound communications in and between computer networks on the basis of geographic security...
2017/0237747 DIGITAL ASSET PROTECTION POLICY USING DYNAMIC NETWORK ATTRIBUTES
Various systems and methods for determining whether to allow or continue to allow access to a protected data asset are disclosed herein. For example, one...
2017/0237746 System and Method for Validating Users Using Social Network Information
A system and method uses any or all of information of a user and/or user's activity at a second web site, information of the user's friends or other...
2017/0237745 ENFORCING LABEL-BASED RULES ON A PER-USER BASIS IN A DISTRIBUTED NETWORK MANAGEMENT SYSTEM
State information is received from a server indicating an identity of a user logged into the server. An administrative domain wide policy is determined that...
2017/0237744 METHOD, APPARATUS, AND SYSTEM FOR CREATING SERVICE ACCOUNT
A system for creating a service account includes a first server associated with a first application, a second server associated with a second application, and...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.