Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0091572 Streaming Manifest Quality Control
In one embodiment, a method that receives a manifest for plural encoded representations of a single content stream, each representation fragmented into plural...
2018/0091571 Packet Placement for Scalable Video Coding Schemes
Methods and systems for pre-conditioning a video stream are provided herein. For example, an apparatus comprising a memory and one or more processors...
2018/0091570 PACKET PRIORITIZATION BASED ON PACKET TIME STAMP INFORMATION
Methods, systems, and computer readable media can be operable to facilitate dynamic packet prioritization for delivery of multiple media streams based upon...
2018/0091569 Streaming and Storing Video for Audio/Video Recording and Communication Devices
Streaming and storing video for audio/video (A/V) recording and communication devices in accordance with various embodiments of the present disclosure are...
2018/0091568 DIGITAL SIGNAGE AND DIGITAL SIGNAGE CONTENT MANAGER
In various implementations, a signage manager may manage digital sign content. The signage manager may transmit playlists and/or media to signage devices to be...
2018/0091567 Seamless Delivery of Real-Time Media Stream With Intermittent Signal Loss
A real-time media stream, multicast by a remote computing system, is received by an on-board system of a vehicle. While being received, the real-time media...
2018/0091566 APPARATUS, METHOD, AND PROGRAM PRODUCT FOR CONTENT NOTIFICATION
Apparatuses, methods, and program products are disclosed for content collaboration. One apparatus includes a processor, and a memory that stores code...
2018/0091565 CHALLENGE-RESPONSE PROXIMITY VERIFICATION OF USER DEVICES BASED ON TOKEN-TO-SYMBOL MAPPING DEFINITIONS
An access server communicates with a video conference device and a user device. The access server and the user device may access known mappings, including a...
2018/0091564 DYNAMIC ADAPTATION TO INCREASED SFU LOAD BY DISABLING VIDEO STREAMS
A method for dynamically adapting to increased system load at a selective forwarding unit (SFU) is disclosed. In an embodiment, an SFU sends a plurality of...
2018/0091563 STREAMED COMMUNICATION
Methods, apparatus and systems are disclosed for managing digitally-streamed audio communication sessions between user devices (7a, 7b, 7c). The user devices...
2018/0091562 METHOD, AND RELATED APPARATUS FOR RECOVERING CALLED SERVICE OF TERMINAL
Embodiments of the present invention disclose a method, a related apparatus, and a system for recovering a called service of a terminal. The method includes:...
2018/0091561 TELEPHONE NUMBER SIMPLIFICATION FOR VOIP NETWORKS
A telecommunications network includes a network service computing device and a host routing device. The host routing device includes a switch. The host routing...
2018/0091560 METHODS AND SYSTEMS FOR VIRTUAL CONFERENCE SYSTEM USING PERSONAL COMMUNICATION DEVICES
A method for managing jitter includes determining, by a processor of a master device, at least one of device capabilities of at least one satellite device,...
2018/0091559 MANAGING THE COLLECTION OF FORENSIC DATA FROM ENDPOINT DEVICES
Techniques and mechanisms are disclosed enabling efficient collection of forensic data from client devices, also referred to herein as endpoint devices, of a...
2018/0091558 Secure Configuration Evaluation, Remediation, and Reporting Tool (SCERRT)
Various embodiments and related methods are provided that can include or operate a variety of modular systems such as, a group of user interfaces and software...
2018/0091557 METHODS AND DEVICES FOR ACCESS CONTROL OF DATA FLOWS IN SOFTWARE DEFINED NETWORKING SYSTEM
The disclosure relates to a method for access control of a data flow in a software defined networking system. The method includes is performed in a controller...
2018/0091556 SYSTEM AND METHOD FOR PACKET CLASSIFICATION USING MULTIPLE SECURITY DATABASES
A packet classification system is provided, including a first security database and a second security database for use in connection with packet classification...
2018/0091555 METHOD OF MANAGING SYSTEM UTILITIES ACCESS CONTROL
An access control system includes a memory, a processor, a host operating system (OS) executing on the processor, a container on the host OS, and a security...
2018/0091553 METHODS AND DEVICES FOR PROTECTING NETWORK ENDPOINTS
Various embodiments provide methods, devices, and non-transitory processor-readable storage media enabling dynamically modifying the polling frequency of...
2018/0091552 SYSTEM AND METHOD FOR TRANSFORMING CHANNEL ID COMMUNICATIONS IN MAN-IN-THE-MIDDLE CONTEXT
Embodiments can provide a computer implemented method in a data processing system comprising a processor and a memory comprising instructions, which are...
2018/0091551 TECHNIQUES FOR TLS / IPSEC ACCELERATION IN DATA CENTERS
Techniques for establishing one or more end-to-end secure channels in a data center are provided. A method according to these techniques includes obtaining, at...
2018/0091550 SECURITY SYSTEM FOR ELECTRONIC EQUIPMENT
One embodiment provides an electronic control unit (ECU) for a vehicle. The ECU includes transceiver circuitry, voltage measurement circuitry and feature set...
2018/0091549 MITIGATION OF COMPUTER NETWORK ATTACKS
Various techniques for mitigating computer network attacks are disclosed herein. In one embodiment, a method includes receiving indications of denial of...
2018/0091548 SYSTEM AND METHOD FOR SOFTWARE DEFINED BEHAVIORAL DDOS ATTACK MITIGATION
Systems and methods for software defined behavioral DDoS attack mitigation are provided. According to one embodiment, a method is provided for mitigating DDoS...
2018/0091547 DDOS MITIGATION BLACK/WHITE LISTING BASED ON TARGET FEEDBACK
A system for mitigating network attacks is provided. The system includes a protected network including a plurality of devices. The system further includes one...
2018/0091546 Browser Extension for Contemporaneous in-Browser Tagging and Harvesting of Internet Content
Exemplary embodiments of the present disclosure relate to systems, methods, and non-transitory computer-readable media for contemporaneous in-browser...
2018/0091545 SYSTEM AND METHOD FOR A SECURITY ASSET MANAGER
Implementations of the present disclosure involve a system and/or method of performing security asset management. The system and/or method may schedule...
2018/0091544 Solution-centric reporting of security warnings
A new paradigm for security analysis is provided by transitioning code analysis reporting from the problem space (the warnings themselves), to a solution space...
2018/0091543 COMPUTER SECURITY VULNERABILITY ASSESSMENT
Computer security vulnerability assessment is performed with product binary data and product vulnerability data that correspond with product identification...
2018/0091542 SECURITY INDICATOR SCORES
Examples disclosed herein relate to security indicator scores. The examples enable obtaining a security indicator created by a first user where the security...
2018/0091541 PROVIDING EFFICIENT INFORMATION TRACKING WITH DYNAMICALLY SELECTED PRECISION
An improved information tracking procedure is provided. A precise information tracking procedure is performed for a sensitive value when an application is...
2018/0091540 SECURITY POSTURE SCORING
In one embodiment, a method for assessing security posture for entities in a computing, network is implemented On a computing device and includes: receiving...
2018/0091539 Network Security Analysis System
A network security analysis system performs anomaly detection with low false positives by implementing a multiple perspective analysis of network data. The...
2018/0091538 MANAGING CREDENTIALS OF MULTIPLE USERS ON AN ELECTRONIC DEVICE
Systems, methods, and computer-readable media for managing credentials of multiple users on an electronic device are provided.
2018/0091537 Trigger-Based Harvesting of Data Associated with Malignant Content in a Networked Environment
Exemplary embodiments of the present disclosure relate to systems, methods, and non-transitory computer-readable media for searching content in a networked...
2018/0091536 REAL-TIME PUSH API FOR LOG EVENTS IN ENTERPRISE THREAT DETECTION
A log entry is received at a streaming component of an enterprise threat detection (ETD) system from a real-time push application programming interface (API)...
2018/0091535 SNAPSHOT OF A FORENSIC INVESTIGATION FOR ENTERPRISE THREAT DETECTION
An enterprise threat detection (ETD) forensic workspace is established according to a particular timeframe and permitting defining a selection of data types...
2018/0091534 METHOD AND AN APPARATUS TO PERFORM MULTI-CONNECTION TRAFFIC ANALYSIS AND MANAGEMENT
A method and an apparatus to perform multi-connection traffic analysis and management are described. In one embodiment, the method includes analyzing data...
2018/0091533 ATTACK DETECTION DEVICE, ATTACK DETECTION METHOD, AND NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM
An attack detection device executes a process that includes receiving a message periodically transmitted from a communication device in a network, calculating...
2018/0091532 SECURITY MEASURE PROGRAM, FILE TRACKING METHOD, INFORMATION PROCESSING DEVICE, DISTRIBUTION DEVICE, AND...
A collection and assignment unit collects attribute information for each file and assigns attribute information to a file to which attribute information is not...
2018/0091531 CONFIGURATION PARAMETERS FOR VIRTUAL MACHINES
A computer implemented method to generate a classification scheme for configuration parameters of virtual machines (VMs) in a virtualized computing environment...
2018/0091530 ADDRESSING INSIDE-ENTERPRISE HACK ATTEMPTS
An enterprise computer network is monitored to detect and neutralize security breaches. In a first case failed login attempts to multiple target machines are...
2018/0091529 CORRELATING FORENSIC DATA COLLECTED FROM ENDPOINT DEVICES WITH OTHER NON-FORENSIC DATA
Techniques and mechanisms are disclosed enabling efficient collection of forensic data from client devices, also referred to herein as endpoint devices, of a...
2018/0091528 CONFIGURING MODULAR ALERT ACTIONS AND REPORTING ACTION PERFORMANCE INFORMATION
Techniques and mechanisms are disclosed for configuring actions to be performed by a network security application in response to the detection of potential...
2018/0091527 EMULATING NETWORK TRAFFIC
Examples relate to emulating network traffic. In one example, a computing device may receive malware data specifying a malware feature; emulate a plurality of...
2018/0091526 MITIGATING AN INTERNET OF THINGS (IoT) WORM
This disclosure provides systems, methods and apparatus, including computer programs encoded on computer storage media for mitigating an Internet of things...
2018/0091525 ON-VEHICLE COMMUNICATION SYSTEM
An Electric Control Unit (ECU) device connected to an on-vehicle network and a network outside a vehicle. The ECU generating an ECU receiver code using an...
2018/0091524 VERIFIABLE OUTSOURCED LEDGERS
A digital ledger built upon a blockchain to provide users with the ability to securely, accurately, and verifiably share state information between distrustful...
2018/0091523 SYSTEM AND METHOD FOR DETERMINING DEVICE PROXIMITY
A computing device can initiate a pairing operation with mobile computing device. The computing device encodes a pairing secret into a displayable code for...
2018/0091522 System and Method for Validating Users Using Social Network Information
A system and method uses any or all of information of a user and/or user's activity at a second web site, information of the user's friends or other...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.