Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0048700 DISTRIBUTION OF APPLICATION DATA BETWEEN MODEMS
A user equipment (UE) may include a plurality of modems available to transmit data using different radio access technologies (RATs). For example, a UE may...
2018/0048699 SCRIPTING SUPPORT FOR DATA IDENTIFIERS, VOICE RECOGNITION AND SPEECH IN A TELNET SESSION
Methods of adding data identifiers and speech/voice recognition functionality are disclosed. A telnet client runs one or more scripts that add data identifiers...
2018/0048698 File Sharing Via Link Generation
Users specify that a file set comprising their files, folders, or other content owned by the users should be made accessible via a link, such as a uniform...
2018/0048697 METHOD AND APPARATUS FOR DETECTING ACCESS PATH
The present disclosure discloses a method and an apparatus for detecting an access path. A specific implementation of the method includes: in response to...
2018/0048696 Methods and Systems for Accessing Third-Party Services within Applications
A client device provides to a user, in an application associated with a social-networking service provided by a server system, a link to a page associated with...
2018/0048695 APPARATUS AND METHOD FOR TRANSCEIVING BROADCAST SIGNAL
A method for transmitting a broadcast signal according to an embodiment of the present invention comprises generating service layer signaling information for...
2018/0048694 FAST ENCODING OF LIVE STREAMING MEDIA CONTENT
Techniques and mechanisms described herein facilitate the management of virtual encoding format converters for live media content streams. A media content...
2018/0048693 TECHNIQUES FOR SECURE DATA MANAGEMENT
Some disclosed embodiments include a platform for secure data management and, in particular, for secure data management of smart city data. A method includes...
2018/0048692 Client, a Content Creator Entity and Methods Thereof for Media Streaming
The embodiments of the present invention relate to methods and arrangements for accomplishing trick modes. This is achieved by assigning samples within a track...
2018/0048691 Targeted Buffer Priority Management
In accordance with one or more embodiments, aspects of the disclosure may provide efficient, effective, and convenient ways of managing the transmission of...
2018/0048690 METHOD AND TERMINAL FOR SHARING CONTENT
A content sharing method includes: selecting, by a content sharing terminal, content; transmitting, by the content sharing terminal, identification information...
2018/0048689 NETWORK STREAM PROCESSING TO ENSURING A GUARANTEE THAT EACH RECORD IS ACCOUNTED FOR EXACTLY ONCE
A method, computer-readable medium, and device for processing a stream of records with a guarantee that each record is accounted for exactly once are...
2018/0048688 Sharing Video Footage from Audio/Video Recording and Communication Devices
Sharing video footage recorded by audio/video (A/V) recording and communication devices, such as video doorbells and security cameras. When an A/V recording...
2018/0048687 SYSTEM, METHOD AND NETWORK DEVICE FOR STREAMING DATA FROM A NETWORK
A system, method and a network device for streaming data from a network are provided. A network device includes a software application for streaming network...
2018/0048686 METHOD AND SYSTEM FOR DOWNLOADING RESOURCE IN MOBILE ENVIRONMENT
A method of downloading a resource in a mobile environment includes detecting an attempt to access at least one server from a mobile terminal, executing a...
2018/0048685 GOAL-BASED CONNECTION MANAGEMENT BETWEEN PARTIES
A monitoring computer system receives a message, from a first party, which identifies a goal of the first party. The monitoring computer system receives an...
2018/0048684 MANAGING ACCESS TO A CONFERENCE CALL
Managing access to a conference call includes obtaining, via a calendar application, a list of participants, the list of participants includes a number of...
2018/0048683 PRIVATE COMMUNICATIONS IN VIRTUAL MEETINGS
Apparatus comprising an interface for receiving a respective uplink data stream from each of three or more further apparatuses, and for transmitting a...
2018/0048682 NOTIFICATION BOT FOR TOPICS OF INTEREST ON VOICE COMMUNICATION DEVICES
A method and system are provided. The method includes transcribing into text, by a processor-based voice-to-text transcriber, voices uttered by two or more...
2018/0048681 SIP SERVER WITH MULTIPLE IDENTIFIERS
A Session Initiation Protocol (SIP) server within an Internet Protocol Multimedia Subsystem (IMS) network may be associated with multiple, different...
2018/0048680 Session Initiation Protocol (SIP) notifications for Internet of Things (IoT)
Examples described relate to using Session Initiation Protocol (SIP) notifications for Internet of Things (IoT). In an example, in response to an event on a...
2018/0048679 USER INPUT BACK CHANNEL FOR WIRELESS DISPLAYS
As part of a communication session, a wireless source device can transmit audio and video data to a wireless sink device, and the wireless sink device can...
2018/0048678 LAWFUL INTERCEPT PROVISIONING SYSTEM AND METHOD FOR A NETWORK DOMAIN
A network provisioning system includes a computer-based set of instructions that receive, from a third party network provisioning system managed by a third...
2018/0048677 Inmate Correspondence Systems and Methods
In some embodiments, a system may be configured to receive correspondence data including an address associated with an inmate. The system may determine...
2018/0048676 DETECTING AND MANAGING ABNORMAL DATA BEHAVIOR
Methods and systems for providing destination-specific network management are described. One example method includes determining a normal data movement profile...
2018/0048675 MANAGING COMMUNICATIONS BETWEEN COMPUTING NODES
Techniques are described for managing communications between multiple intercommunicating computing nodes, such as multiple virtual machine nodes hosted on one...
2018/0048674 Routing Systems and Methods
Example routing systems and methods are disclosed. In one realization, a first routing system and a second routing system are disposed within a vehicle. A...
2018/0048673 TECHNIQUES FOR DETERMINING THREAT INTELLIGENCE FOR NETWORK INFRASTRUCTURE ANALYSIS
Embodiments of the present disclosure are directed to a network analytic system for tracking and analysis of network infrastructure for network-based digital...
2018/0048672 Method for Avoiding Attribution While Tracking Criminals
A method for performing attribution on an adversary engaged in attacking a computer system while preventing the adversary from performing attribution includes...
2018/0048671 SECURING WEB PAGE CONTENT
Methods and apparatus are described for automatically modifying web page source code to address a variety of security vulnerabilities such as, for example,...
2018/0048670 EVALUATION NODE FOR REPORTING STATUS VIA A SECURE LINK
An evaluator node may obtain an IP address within a network to be tested, the network having multiple testable addresses other than the IP address. The...
2018/0048669 COMPREHENSIVE RISK ASSESSMENT IN A HETEROGENEOUS DYNAMIC NETWORK
Systems and methods of the present disclosure provide comprehensive risk assessment in a heterogeneous dynamic network. The framework enables `view` and...
2018/0048668 RISK MODELING
Approaches for modeling a risk of security breaches to a network. Agents gather, from multiple sources across the network, analysis data that identifies...
2018/0048667 CONSTRUCTING GRAPH MODELS OF EVENT CORRELATION IN ENTERPRISE SECURITY SYSTEMS
Methods and systems for detecting anomalous events include detecting anomalous events in monitored system data. An event correlation graph is generated by...
2018/0048666 Method and System for Limiting the Range of Data Transmissions
A system and method for analyzing and resetting Time-to-Live or HOP count on a device to limit communications within a designated HOP limit sphere to protect...
2018/0048665 TECHNIQUES FOR DETECTING ENTERPRISE INTRUSIONS UTILIZING ACTIVE TOKENS
A Token Transmission Server transmits active tokens within an enterprise network. The active tokens include either active data tokens or active request tokens,...
2018/0048664 Reparsing Unsuccessfully Parsed Event Data in a Security Information and Event Management System
A mechanism is provided for reparsing unsuccessfully parsed event data. Responsive to determining that one or more unsuccessfully parsed event data items exist...
2018/0048663 NETWORK MONITORING DEVICE AND COMPUTER PROGRAM PRODUCT
A network monitoring device according to an embodiment monitors a message that is periodically transmitted in a network in which a message identified by an...
2018/0048662 Cognitive offense analysis using enriched graphs
An automated method for processing security events begins upon receipt of information representing an offense. Based in part on context data extracted from the...
2018/0048661 Cognitive offense analysis using contextual data and knowledge graphs
An automated method for processing security events in association with a cybersecurity knowledge graph. The method begins upon receipt of information from a...
2018/0048660 LAUNCHER FOR SETTING ANALYSIS ENVIRONMENT VARIATIONS FOR MALWARE DETECTION
A system and method for automatically analyzing an object for malware is described. Operating one or more virtual machines, the system and method provide an...
2018/0048659 AUTOMATIC REPAIR OF CORRUPT FILES FOR A DETONATION ENGINE
Techniques for automatic repair of corrupt files (e.g., malware sample files) for a detonation engine are disclosed. In some embodiments, a system, process,...
2018/0048658 SYSTEMS AND METHODS OF DETECTING AND RESPONDING TO MALWARE ON A FILE SYSTEM
The technology disclosed relates to detecting a data attack on a local file system. The detecting includes scanning a list to identify files of the local file...
2018/0048657 SYSTEMS AND METHODS OF DETECTING AND RESPONDING TO A DATA ATTACK ON A FILE SYSTEM
The technology disclosed relates to detecting a data attack on a file system stored on an independent data store. The detecting includes scanning a list to...
2018/0048656 MALWARE DETECTION AND PREVENTION SYSTEM
Aspects of the present disclosure involve systems and methods computing devices to access a public network posing as a user to the network to detect one or...
2018/0048655 Access Network Determination
The invention relates to a method, by a subscriber database entity (200), to handle a request for subscriber information for a data packet session of one of...
2018/0048654 Differentially Private Processing and Database Storage
A hardware database privacy device is communicatively coupled to a private database system. The hardware database privacy device receives a request from a...
2018/0048653 Differentially Private Processing and Database Storage
A hardware database privacy device is communicatively coupled to a private database system. The hardware database privacy device receives a request from a...
2018/0048652 GENERATING AND UTILIZING DIGITAL VISUAL CODES TO GRANT PRIVILEGES VIA A NETWORKING SYSTEM
One or more embodiments of the disclosure include systems and methods that generate and utilize digital visual codes. In particular, in one or more...
2018/0048651 WIFI ACCESS MANAGEMENT SYSTEM AND METHODS OF OPERATION THEREOF
A WiFi access management system and methods of operation are disclosed. In one embodiment, a method comprises receiving, at a server, a wireless access profile...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.