Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0097870 METHOD AND SYSTEM FOR FILE TRANSFER OVER A MESSAGING INFRASTRUCTURE
A method and system for file transfer over a messaging infrastructure are provided. The method includes dividing a file into multiple portions. The method...
2018/0097869 RESOLVING CONFLICTS OF APPLICATION RUNTIME DEPENDENCIES
Described herein are systems, methods, and software to handle requests to an application file shared by a plurality of applications on a computing system. In...
2018/0097868 SYNCHRONIZATION OF A MEDIA CODEC BETWEEN NETWORK ELEMENTS OF A MEDIA COMMUNICATION SESSION
Embodiments disclosed herein provide systems, methods, and computer readable media for synchronizing a media codec between network elements of a media...
2018/0097867 VIDEO COMPRESSION WITH ADAPTIVE VIEW-DEPENDENT LIGHTING REMOVAL
A video stream of a scene for a virtual reality or augmented reality experience may be captured by one or more image capture devices. Data from the video...
2018/0097866 ARCHITECTURE FOR AUGMENTING VIDEO DATA OBTAINED BY A CLIENT DEVICE WITH ONE OR MORE EFFECTS DURING RENDERING
A video effects application executes on a client device having an image capture device and receives video data captured by the image capture device. The video...
2018/0097865 VIDEO PROCESSING APPARATUS AND METHOD
Provided is a video processing apparatus including a communication unit configured to receive a video file from a server, a data processor configured to divide...
2018/0097864 REQUEST-BASED ENCODING FOR STREAMING CONTENT PORTIONS
Systems and methods are described to enable request-driven encoding of content portions to be played back as part of a content stream. A content stream can...
2018/0097863 RAPID OPTIMIZATION OF MEDIA STREAM BITRATE
A data processing method comprises, using a media server during a first media session between a client device and the media server, determining a stable...
2018/0097862 STREAMING MEDIA DELIVERY SYSTEM
Streaming media, such as audio or video files, is sent via the Internet. The media are immediately played on a user's computer. Audio/video data is transmitted...
2018/0097861 STREAMING MEDIA DELIVERY SYSTEM
Streaming media, such as audio or video files, is sent via the Internet. The media are immediately played on a user's computer. Audio/video data is transmitted...
2018/0097860 WIRELESS CONTROL OF STREAMING COMPUTING DEVICE
The disclosed subject matter includes techniques for wireless control. A system includes a processor. The system also includes a computer-readable memory...
2018/0097859 Content Capture and Distribution System
Content capture and distribution systems and techniques are described. In an example, radio frequency signals that carry content are captured by one or more...
2018/0097858 EMBEDDED SIDE CALL SUB-CHANNEL USED IN A TELECOMMUNICATION SESSION
A computer-implemented method, system, and/or computer program product establishes an embedded side call telecommunication session via a sub-channel in a...
2018/0097857 WIRELESS CONFERENCING SYSTEM AND METHOD FOR CONFIGURING SAME
The invention pertains to a method for configuring a wireless conferencing system comprising conference terminals, each being equipped with a transceiver...
2018/0097856 Methods and Systems for Controlling Access to Presentation Devices Using Selection Criteria
Methods, systems, and/or devices for controlling access to and presenting content on presentation devices based on selection criteria are described herein. In...
2018/0097855 SYSTEM AND METHOD FOR MAINTAINING A COLLABORATIVE ENVIRONMENT
A method, computer program product, and computer system for identifying a plurality of participants in a multi-user collaboration session connected via at...
2018/0097854 DETECTION AND AUTO-CORRECTION OF TALK PATH PROBLEMS IN COMMUNICATION SESSIONS
Statistics of a media stream of a communication session are received from one or more communication devices involved in the communication session. The...
2018/0097853 Managing Voice over Internet Protocol (VoIP) Communications
The disclosed embodiments include a computer implemented method for managing network communications. In one embodiment, the method includes gathering, using...
2018/0097852 MULTIPLEXING SESSIONS IN TELECOMMUNICATIONS EQUIPMENT USING INTERACTIVE CONNECTIVITY ESTABLISHMENT
A data processing method comprising receiving, at a proxy associated with a plurality of ICE endpoint computers, a datagram from a client computer for a...
2018/0097851 SESSION INITIATION PROTOCOL (SIP) DIALOG RECONSTRUCTION THROUGH RECONSTRUCTION ANCHORS FOR USER AGENTS
Embodiments of the disclosure are directed to a call reconstruction server. This server can act as a signaling anchor for various SIP UAs involved in the...
2018/0097850 METHOD AND TERMINAL FOR PROVIDING MCPTT SERVICE
A method and an apparatus for providing a mission critical service are provided. The method includes transmitting, by the first terminal, a first discovery...
2018/0097849 COGNITIVE AUTHENTICATION WITH EMPLOYEE ONBOARDING
Embodiments include method, systems and computer program products for onboarding a new employee to an organization. Aspects include receiving, by a processor,...
2018/0097848 SECURITY COMPLIANCE FRAMEWORK USAGE
A method and system for improving usage of a security compliance framework is provided. The method includes authenticating a user for: access to the security...
2018/0097847 METHOD AND SYSTEM FOR AUTOMATED INCIDENT RESPONSE
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for implementing a response to one or more security incidents...
2018/0097846 SECURITY COMPLIANCE FRAMEWORK USAGE
A method and system for improving usage of a security compliance framework is provided. The method includes authenticating a user for: access to the security...
2018/0097845 Self-Managed Intelligent Network Devices that Protect and Monitor a Distributed Network
A method of managing devices that monitor and protect a distributed network includes obtaining a peer topology and master-selection rules at each of a...
2018/0097844 SELECTIVE ENFORCEMENT OF EVENT RECORD PURGING IN A HIGH VOLUME LOG SYSTEM
Event record purging is selectively enforced in a high volume log system. A plurality of data retention policies is received for one or more data types. Each...
2018/0097843 NETWORKED PEER DEVICE ROUND-ROBIN SECURITY CONTROLLER
A round-robin network security system implemented by a number of peer devices included in a plurality of networked peer devices. The round-robin security...
2018/0097842 IDENTITY THEFT COUNTERMEASURES
In some embodiments, techniques for computer security comprise preventing and/or mitigating identity theft such as phishing.
2018/0097841 SYSTEM AND METHOD FOR OMNICHANNEL SOCIAL ENGINEERING ATTACK AVOIDANCE
A method, computer program product, and computer system for identifying social engineering activity associated with at least one of a first communication and a...
2018/0097840 DETECTION OF COMPROMISED CREDENTIALS AS A NETWORK SERVICE
Techniques for detection of compromised credentials as a network service are disclosed. In some embodiments, a system, process, and/or computer program product...
2018/0097839 SYSTEMS, APPARATUSES, AND METHODS FOR PLATFORM SECURITY
Embodiments detailed herein describe a system comprising a manageability server to generate an encrypted sideband message having at least one command; a server...
2018/0097838 SYSTEM AND METHOD FOR AUDIO FINGERPRINTING FOR ATTACK DETECTION
A method, computer program product, and computer system directed toward identification of potential social engineering activity associated with at least a...
2018/0097837 SYSTEM AND METHOD FOR SOCIAL ENGINEERING IDENTIFICATION AND ALERTING
A method, computer program product, and computer system for identifying potential social engineering activity associated with one or more communications on a...
2018/0097836 SYSTEM AND METHOD FOR ENTERPRISE AUTHORIZATION FOR SOCIAL PARTITIONS
A method, computer program product, and computer system for identifying a characteristic of a communication of one or more communications on one or more...
2018/0097835 IDENTIFYING AND USING DNS CONTEXTUAL FLOWS
In one embodiment, a device in a network captures domain name system (DNS) response data from a DNS response sent by a DNS service to a client in the network....
2018/0097834 Security Related Data For A Risk Variable
An adaptable network security system includes trust mediator agents that are coupled to each network component. Trust mediator agents continuously detect...
2018/0097833 METHOD OF NETWORK MONITORING AND DEVICE
A method of network monitoring includes, acquiring a log including site information for identifying a web site that is previously accessed by an access source...
2018/0097832 Protection from Malicious and/or Harmful Content in Cloud-Based Service Scenarios
There are provided measures for protection from malicious and/or harmful content in cloud-based service scenarios. Such measures exemplarily include detecting...
2018/0097831 NETWORK ADDRESSES WITH ENCODED DNS-LEVEL INFORMATION
Systems and methods are described to enable a DNS service to encode information into a network address to be advertised by the DNS service. Information encoded...
2018/0097830 WIRELESS SENSOR NETWORK SECURITY
In some examples, a computing device may receive sensed data of a first sensor sent in a first transmission. The computing device may associate a first...
2018/0097829 SAFE SHARING OF SENSITIVE DATA
In an example, there is disclosed a computing apparatus having: a processor; a memory; a data interface; and one or more logic elements providing a...
2018/0097828 COMPUTERIZED SYSTEM AND METHOD FOR AUTOMATICALLY DETERMINING MALICIOUS IP CLUSTERS USING NETWORK ACTIVITY DATA
Disclosed are systems and methods for improving interactions with and between computers in content searching, generating, hosting and/or providing systems...
2018/0097827 SYSTEM AND METHOD FOR DEEP LEARNING ON ATTACK ENERGY VECTORS
A method, computer program product, and computer system for identifying potential social engineering activity associated with two or more communications on two...
2018/0097826 Machine Learning Classification Using Markov Modeling
Systems, methods, and articles of manufacture, including computer program products, are provided for classification systems and methods using modeling. In some...
2018/0097825 SYSTEM MONITOR
One embodiment provides an apparatus. The apparatus includes detector circuitry and monitor logic local to a computing device. The detector circuitry is to...
2018/0097824 PRE-PROCESSING BEFORE PRECISE PATTERN MATCHING
Pre-processing before precise pattern matching of a target pattern from a stream of patterns. Including acquiring occurrence numbers of target elements in the...
2018/0097823 PRE-PROCESSING BEFORE PRECISE PATTERN MATCHING
Pre-processing before precise pattern matching of a target pattern from a stream of patterns. Including acquiring occurrence numbers of target elements in the...
2018/0097822 TECHNOLOGIES FOR ANALYZING UNIFORM RESOURCE LOCATORS
Technologies for analyzing a Uniform Resource Locator (URL) include a multi-stage URL analysis system. The multi-stage URL analysis system analyzes the URL...
2018/0097821 WIRELESS PORTABLE PERSONAL CYBER-PROTECTION DEVICE
A wireless, portable, personal, cyber-protection external device is used to protect other mobile user devices from cyber-attacks. The invention described...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.