Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2017/0339208 CLASSIFIED MEDIA QUALITY OF EXPERIENCE
A method for reporting a streaming quality is shown, wherein at least one continuous media stream is streamed to a client (601), and wherein the streaming is...
2017/0339207 CLIENT, LIVE-STREAMING SERVER AND DATA STREAM USING AN INFORMATION ON A CURRENT SEGMENT OF A SEQUENCE OF SEGMENTS
A client configured to retrieve a live-stream media content is shown. The client is configured to receive from a live-streaming server a media presentation...
2017/0339206 Delivering Content in Multiple Formats
Content may be received at an edge location in one format, but delivered to a terminal on an access network in another format. The received content may be...
2017/0339205 USING SOCIAL SHARES TO UNLOCK MEDIA FILES
Embodiments are directed to a computer implemented method and system of restricting access to portions of a media file. The method includes marking a media...
2017/0339204 MULTIMEDIA STREAMING SERVICE PRESENTATION METHOD, RELATED APPARATUS, AND RELATED SYSTEM
A multimedia streaming service presentation method based on Hypertext Transport Protocol streaming, a related apparatus, and a related system are provided. The...
2017/0339203 Distributed Streaming Platform for Real-time Applications
Software for a distributed streaming platform receives a specification for a streaming application and converts the specification into a logical plan that...
2017/0339202 DISTRIBUTED STREAM PROCESSING IN THE CLOUD
A low-latency cloud-scale computation environment includes a query language, optimization, scheduling, fault tolerance and fault recovery. An event model can...
2017/0339201 STREAMING DATA ON DATA PROCESSES
A method, system and computer program product for servicing media content. In one embodiment, the media content is processed by having each of a group of...
2017/0339200 MULTICAST AGGREGATION OF MULTIPLE STREAMING CONNECTIONS
A terminal receives a first request by a client for a slice of a data stream, and transmits the request to a streaming server. The terminal receives a first...
2017/0339199 VIRTUAL MEETING ATTENDEE
A virtual meeting attendee includes a scheduling interface operatively coupled to a computerized meeting platform and configured to enable the virtual meeting...
2017/0339198 System And Method For Maintaining Associations Within A Social Network For A User
A system and method for maintaining associations within a social network for a user are provided. A device proximate a user device is identified. It is...
2017/0339197 SPI HANDLING BETWEEN UE AND P-CSCF IN AN IMS NETWORK
Managing Security Parameter Information (SPIs) to prevent race condition failures begins where a system negotiates SPIs along with associated expiration times,...
2017/0339196 VERSATILE AUTOSCALING
In response to receipt of a notification from a third service, a scaling policy specified by a customer of a computing resource service provider to be...
2017/0339195 MANAGEMENT APPARATUS AND METHOD FOR CONTROLLING MANAGEMENT APPARATUS
A device management apparatus sets a first password required to reflect a security policy managed by the device management apparatus on a device or change the...
2017/0339194 Apparatus and Method for Using Certificate Data to Route Data
A method of routing data across a network receives a session request from a client node to access at least one node in a local network having a plurality of...
2017/0339193 Centralized Validation of Email Senders Via EHLO Name and IP Address Targeting
A DNS server receives from a receiving email system, a DNS query for an email domain stored at the DNS server, the DNS query including identifying information...
2017/0339192 COMPUTER-IMPLEMENTED PROCESS AND SYSTEM EMPLOYING OUTLIER SCORE DETECTION FOR IDENTIFYING AND DETECTING...
Methods and apparatuses employing outlier score detection method and apparatus for identifying and detecting threats to an enterprise or e-commerce system for...
2017/0339191 TRANSMISSION/RECEPTION APPARATUS OF SECURITY GATEWAY FOR PHYSICAL UNIDIRECTIONAL COMMUNICATION PERFORMING...
The present invention provides a reception apparatus for performing security tunneling and data re-transmission and unidirectionally receiving data from a...
2017/0339190 DEVICE-SPECIFIC PACKET INSPECTION PLAN
In one embodiment, a system includes a hardware processor and a memory to store data used by the hardware processor, wherein the hardware processor is...
2017/0339189 WIRELESS PERIPHERAL ADMINISTRATION
Aspects of the subject technology relate to administration of wireless peripheral devices. A computer-implemented method includes connecting to a peripheral...
2017/0339188 MICROSEGMENTATION IN HETEROGENEOUS SOFTWARE DEFINED NETWORKING ENVIRONMENTS
Microsegmentation in a heterogeneous software-defined network can be performed by classifying endpoints associated with a first virtualized environment into...
2017/0339187 INTRUSION DETECTION AND PREVENTION SYSTEM AND METHOD FOR GENERATING DETECTION RULES AND TAKING COUNTERMEASURES
A detection rules generation engine includes an initial population creation subsystem configured to receive filtered network traffic instances from a network...
2017/0339186 PROTECTION OF CLOUD-PROVIDER SYSTEM USING SCATTERED HONEYPOTS
An apparatus for securing a cloud-provider system includes one or more network interfaces and one or more processors. The network interfaces are configured for...
2017/0339185 MASQUERADING AND MONITORING OF SHARED RESOURCES IN COMPUTER NETWORKS
An apparatus for computer-network security includes a network interface and a processor. The network interface is configured for communicating over a...
2017/0339184 SYSTEMS AND METHODS FOR MATCHING AND SCORING SAMENESS
Systems and methods for matching and scoring sameness. In some embodiments, a computer-implemented method is provided, comprising acts of: identifying a...
2017/0339183 OPTIMIZATION APPARATUS, OPTIMIZATION METHOD, AND OPTIMIZATION PROGRAM
An optimization apparatus collects cyber attack information that is information related to a cyber attack, and system information that is information related...
2017/0339182 DEVICE BLOCKING TOOL
A device blocking tool includes a user interface, a location engine, a retrieval engine, and an update engine. The user interface receives at least one of a...
2017/0339181 DEVICE BLOCKING TOOL
A wireless device blocking tool includes a user interface, a location engine, a retrieval engine, and an update engine. The user interface receives at least...
2017/0339180 NETWORK ASSESSMENT SYSTEMS AND METHODS THEREOF
A method for assessing a network environment includes obtaining, by the network assessment computing device, device information for one or more devices each...
2017/0339179 REMOTE WIPE OF AIRCRAFT DATA
In the selective wiping of data stored on an aircraft Inflight Entertainment and Communications (IFEC) computer system, a potential attack indicator generated...
2017/0339178 RESPONSE GENERATION AFTER DISTRIBUTED MONITORING AND EVALUATION OF MULTIPLE DEVICES
Data is collected from a set of devices according to a data collection policy. The data is associated with device configuration, device state, or device...
2017/0339177 SYSTEM, METHOD, AND APPARATUS FOR DATA LOSS PREVENTION
Disclosed is a computer security device configured to monitor data traffic between computing devices on a local area network and an external network in order...
2017/0339176 MODIFYING A USER SESSION LIFECYCLE IN A CLOUD BROKER ENVIRONMENT
A method for modifying a user session lifecycle is provided. The method may include verifying a user session on a cloud service provider is valid. The method...
2017/0339175 USING NATURAL LANGUAGE PROCESSING FOR DETECTION OF INTENDED OR UNEXPECTED APPLICATION BEHAVIOR
Detection of unintended application behaviors, where natural language processing (NLP) techniques are used to analyze the application, and specifically its...
2017/0339174 COMPUTER SECURITY APPARATUS
Aspects provide for an automated computer security apparatus. A first sequential action data set of different actions performed sequentially in engaging a...
2017/0339173 DATA TRANSFER FOR NETWORK INTERACTION FRAUDULENCE DETECTION
A method for analyzing network interaction data is disclosed. Initially, network interaction data is received from a network over time. A predetermined model...
2017/0339172 A METHOD AND SYSTEM FOR NETWORK ACCESS CONTROL BASED ON TRAFFIC MONITORING AND VULNERABILITY DETECTION USING...
Disclosed are various embodiments of method and system for network access control. The method may involve traffic monitoring and vulnerability detection using...
2017/0339171 MALWARE INFECTED TERMINAL DETECTING APPARATUS, MALWARE INFECTED TERMINAL DETECTING METHOD, AND MALWARE INFECTED...
A detecting apparatus generates a collection of events, the collection being formed based on a predetermined condition, from events obtained for each...
2017/0339170 Method for Securing a Network using Cyber Economic Network Transaction Security (CENTS)
A method and system for administering an interactive computer network and more particularly to performing security in a network of interactive electronic...
2017/0339169 COMPUTER-IMPLEMENTED METHODS AND SYSTEMS FOR IDENTIFYING VISUALLY SIMILAR TEXT CHARACTER STRINGS
Methods and systems are disclosed for selecting text character strings from a corpus of relevant strings that would commonly be considered to be visually...
2017/0339168 METHOD, APPARATUS, AND COMPUTER-READABLE MEDIUM FOR DETECTING ANOMALOUS USER BEHAVIOR
An apparatus, computer-readable medium, and computer-implemented method for detecting anomalous user behavior, including collecting user activity data over an...
2017/0339167 REMOTE MONITORING OF SOFTWARE
A software signature transceiver includes a signature receiver configured to couple to a programmable electronic device and sense a signature signal generated...
2017/0339166 REVERSE SHELL NETWORK INTRUSION DETECTION
A client system such as a database system may be vulnerable to intrusion by an unauthorized user or system through a reverse secure shell connection that...
2017/0339165 AUTOMATIC GENERATION OF ATTRIBUTE VALUES FOR RULES OF A WEB APPLICATION LAYER ATTACK DETECTOR
According to one embodiment, a web application layer attack detector (AD) is coupled between an HTTP client and a web application server. Responsive to receipt...
2017/0339164 SYSTEM AND METHOD FOR AN INTEGRITY FOCUSED AUTHENTICATION SERVICE
Systems and methods for authentication. At an authentication service, key synchronization information is stored for an enrolled authentication device for a...
2017/0339163 SYSTEM AND METHOD FOR REMOTE AUTHENTICATION WITH DYNAMIC USERNAMES
A method and apparatus for authenticating a user for access to a service provider over a network is disclosed. It includes a first device configured to receive...
2017/0339162 SYSTEM AND METHOD OF PROVIDING LOCATION-BASED PRIVACY ON SOCIAL MEDIA
Systems and methods are described that permit social media users to delay posting social media updates to various social media recipients based on location...
2017/0339160 THREAT-AWARE PROVISIONING AND GOVERNANCE
A management component of a computing system evaluates end-users, end-user devices, and user accounts for access to provisioned-resources of the computing...
2017/0339159 REGISTERING APPARATUS, TERMINAL APPARATUS, REGISTERING METHOD, AND NON-TRANSITORY COMPUTER READABLE STORAGE MEDIUM
A registering apparatus disclosed herein includes a receiving unit and a registering unit. The receiving unit receives a registration request that is...
2017/0339158 VERSATILE AUTOSCALING FOR CONTAINERS
A scaling policy associated with a notification received by one or more computer systems is obtained. A first request is submitted, to a software container...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.