Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0109566 Universal Casting Service
A method for operating a universal casting service is described. The method receives a casting request from a first client; initiates a first casting session...
2018/0109565 METHODS AND SYSTEMS FOR ANALYZING STREAMING MEDIA SESSIONS
method for analyzing a streaming media session between at least two communicating entities includes at least one media stream having at least two packets...
2018/0109564 TIMER MANAGEMENT FOR SESSION INITIATION PROTOCOL
Systems and methods for managing timers for Session Initiation Protocol (SIP) that facilitates network communications in an IP Multimedia Subsystem (IMS) are...
2018/0109563 Hub and Agent Communication Through a Firewall
Hub and agent techniques allow safe command execution and data retrieval through firewall(s). In an example, cloud-based server of a company communicates with...
2018/0109562 SYSTEMS AND METHODS FOR NETWORK SECURITY MEMORY REDUCTION VIA DISTRIBUTED RULESETS
The present disclosure describes systems and methods for reducing rule set sizes via statistical redistribution throughout a plurality of network security...
2018/0109561 SYSTEMS AND METHODS FOR TRUSTED CLUSTER ATTESTATION
Systems, apparatuses, and methods for implementing trusted cluster attestation techniques are disclosed. A cluster includes multiple computing devices...
2018/0109560 ANTI-SPOOFING PROTECTION IN AN AUTOMOTIVE ENVIRONMENT
To automatically identify an attempt at presenting falsified vehicle identifiers to portable devices, (i) a vehicle identifier reported by a vehicle with which...
2018/0109559 Detecting device masquerading in application programming interface (API) transactions
This disclosure describes a technique to determine whether a client computing device accessing an API is masquerading its device type (i.e., pretending to be a...
2018/0109558 SYSTEMS AND METHODS FOR DETECTING AND PREVENTING CYBER-THREATS
A system (100) for detecting and preventing cyber-threats is disclosed. The system (100) can include an online-analytical-processing (OLAP) resource (102)...
2018/0109557 SOFTWARE DEFINED NETWORK CAPABLE OF DETECTING DDoS ATTACKS USING ARTIFICIAL INTELLIGENCE AND CONTROLLER...
Software defined network for detecting a DDoS attack using artificial intelligence and a controller included in the same are disclosed. The software defined...
2018/0109556 SOFTWARE DEFINED NETWORK CAPABLE OF DETECTING DDoS ATTACKS AND SWITCH INCLUDED IN THE SAME
Software defined network capable of detecting a DDoS attack and a switch included in the same are disclosed. The software defined network comprises a...
2018/0109555 INTER-DOMAIN DISTRIBUTED DENIAL OF SERVICE THREAT SIGNALING
In one embodiment, a primary server receives, from a client device, a first request to mitigate an external attack on the client device. The primary server...
2018/0109554 DISTRIBUTED DENIAL OF SERVICE ATTACK PROTECTION FOR INTERNET OF THINGS DEVICES
Presented herein are techniques for remediating a distributed denial of service attack. A methodology includes, at a network device, such as a constrained...
2018/0109553 MITIGATING NETWORK ATTACKS
Systems and methods are described that enable the mitigation of network attacks directed to specific sets of content on a content delivery system. A set of...
2018/0109552 TECHNIQUES FOR MITIGATING NON-CROSS DOMAIN CODE EXECUTION VULNERABILITIES IN CELLULAR BASEBAND
Techniques for mitigating an attack on baseband on a mobile wireless device are provided. An example method according to these techniques includes detecting a...
2018/0109551 DEVICE PROFILING FOR ISOLATION NETWORKS
In one embodiment, a server instructs one or more networking devices in a local area network (LAN) to form virtual network overlay in the LAN that redirects...
2018/0109550 UNIVERSAL LINK TO EXTRACT AND CLASSIFY LOG DATA
A universal link to extract and classify log data is disclosed. In various embodiments, a set of candidate data values that match a top level pattern that is...
2018/0109549 SECURING SERVICES IN A NETWORKED COMPUTING ENVIRONMENT
A computer-implemented method includes: detecting, by a user device, an event that indicates a potential security compromise of the user device; determining,...
2018/0109548 DATA PROTECTION IN A NETWORKED COMPUTING ENVIRONMENT
Approaches for providing data protection in a networked computing environment are provided. A method includes detecting, by at least one computer device, a...
2018/0109547 DATA PROTECTION IN A NETWORKED COMPUTING ENVIRONMENT
Approaches for providing data protection in a networked computing environment are provided. A method includes detecting, by at least one computer device, a...
2018/0109546 Distributed Network Security Using a Logical Multi-Dimensional Label-Based Policy Model
A managed server (MS) within an administrative domain is quarantined. The administrative domain includes multiple MSs that use management instructions to...
2018/0109545 SYSTEMS AND METHODS FOR AUTOMATED RETRIEVAL, PROCESSING, AND DISTRIBUTION OF CYBER-THREAT INFORMATION
Systems and methods are provided for automated retrieval, processing, and/or distribution of cyber-threat information using a cyber-threat device. Consistent...
2018/0109544 PATH SCANNING FOR THE DETECTION OF ANOMALOUS SUBGRAPHS AND USE OF DNS REQUESTS AND HOST AGENTS FOR...
A system, apparatus, computer-readable medium, and computer-implemented method are provided for detecting anomalous behavior in a network. Historical...
2018/0109543 MONITORING USE OF A SENSOR OF A COMPUTING DEVICE
Monitoring use of a sensor of a computing device. A sensor obtains information from an environment of the computing device. A co-processor provides...
2018/0109542 SYSTEM AND METHOD FOR GENERATING DATA SETS FOR LEARNING TO IDENTIFY USER ACTIONS
Embodiments for generating appropriate data sets for learning to identify user actions. A user uses one or more applications over a suitable period of time. As...
2018/0109541 BLOCKCHAIN MINING USING TRUSTED NODES
Briefly, example methods, apparatuses, and/or articles of manufacture are disclosed that may be implemented, in whole or in part, using one or more mobile...
2018/0109540 SECURING ORDERED RESOURCE ACCESS
Ordered access to resources is controlled by restricting access to additional resources that are accessible when a client device provides an authentication...
2018/0109539 INVALIDATION OF AN ACCESS TOKEN
A computer-implemented method for invalidating an access token includes generating an access token and an HTML file in response to receipt of a request for...
2018/0109538 SYSTEM AND METHOD FOR POLICY BASED ADAPTIVE APPLICATION CAPABILITY MANAGEMENT AND DEVICE ATTESTATION
A method provides policy based adaptive application capability management and device attestation for dynamic control of remote device operations. The method...
2018/0109537 ASSIGNING A LEVEL OF TRUST BETWEEN ENTITIES IN AN ONLINE SYSTEM FOR DETERMING WHETHER TO PERMIT AN ACTION...
An online system assigns a level of trust between a requesting entity and a target entity based on connections between users of the online system associated...
2018/0109536 MAINTAINING A LIMITED USER PROFILE FOR SOCIAL NETWORKING SYSTEM USERS UNABLE TO ESTABLISH A USER PROFILE
A social networking system maintains a limited user profile associated with a user of the social networking system who does not satisfy one or more criteria...
2018/0109535 DETERMINING VIRTUAL ADAPTER ACCESS CONTROLS IN A COMPUTING ENVIRONMENT
A control component of a computing environment initiates sending of request(s) over a network of the computing environment by an activated virtual adapter. The...
2018/0109534 DETERMINING VIRTUAL ADAPTER ACCESS CONTROLS IN A COMPUTING ENVIRONMENT
A control component of a computing environment initiates sending of request(s) over a network of the computing environment by an activated virtual adapter. The...
2018/0109533 DEVICE MANAGEMENT FOR ISOLATION NETWORKS
In one embodiment, a server instructs one or more networking devices in a local area network (LAN) to form a virtual network overlay in the LAN that redirects...
2018/0109531 ANOMALY DETECTION USING TRIPOINT ARBITRATION
Systems, methods, and other embodiments associated with anomaly detection using tripoint arbitration are described. In one embodiment, a method includes...
2018/0109530 PEER TO PEER ENTERPRISE FILE SHARING
Disclosed are various embodiments for facilitating the distribution of files from a file repository. Files from a file repository can be distributed via peer...
2018/0109529 PEER TO PEER ENTERPRISE FILE SHARING
Disclosed are various embodiments for facilitating the distribution of files from a file repository. Files from a file repository can be distributed via peer...
2018/0109528 PEER TO PEER ENTERPRISE FILE SHARING
Disclosed are various embodiments for facilitating the distribution of files from a file repository. Files from a file repository can be distributed via peer...
2018/0109527 DOMAIN NAME SYSTEM AND METHOD OF OPERATING USING RESTRICTED CHANNELS
A server system for a domain name system (DNS) which operates to concurrently provide both public-facing and restricted channels for receiving and handling...
2018/0109526 BOT PERMISSIONS
Permission control and management for messaging application bots is described. A method can include providing a messaging application, on a first computing...
2018/0109525 ELECTRONIC COMPUTING DEVICE INCLUDING ONLINE CONNECTIVITY AND PERMANENTLY OFFLINE COMPUTING
A computing system includes two separate computer modules within the same computing housing. The computing system protects data from one computer from online...
2018/0109524 CROSS SECURITY LAYER SECURE COMMUNICATION
A security layer in an industrial control and automation system includes a user database, a web server, a secure token server (STS), and an application server....
2018/0109523 SYSTEM AND METHOD OF FACILITATING THE IDENTIFICATION OF A COMPUTER ON A NETWORK
A system and method for facilitating identification of an attacking computer in a network is provided. A user attempting to login to a network application may...
2018/0109522 RFID AUTHENTICATION ARCHITECTURE AND METHODS FOR RFID AUTHENTICATION
A method for mutual authentication in an RFID system comprising an RFID reader and an RFID tag, the method comprising requesting an identification from the...
2018/0109521 METHOD OF MUTUAL AUTHENTICATION BETWEEN AGENT AND DATA MANAGER IN U-HEALTH ENVIRONMENT
Disclosed is a method of mutual authentication between an agent and a data manager in a u-health environment, in which the agent performs identification...
2018/0109520 Automatic Association of Authentication Credentials with Biometrics
A computing device may receive authentication information. Within a time-out period, a fingerprint may also be received. The computing device may assign one or...
2018/0109519 Method for Generating An Authenticating Document
A method for generating an authenticating document for verifying whether a password is inputted by a genuine holder of the password is to be implemented by a...
2018/0109518 Data Processing Based on Two-Dimensional Code
The present disclosure provides example methods and apparatuses of data processing based on a two-dimensional code. The two-dimensional code is generated upon...
2018/0109517 A METHOD FOR AUTHENTICATING A USER WHEN LOGGING IN AT AN ONLINE SERVICE
Provided is a method for authenticating a user when logging in at an online service, where the online service is provided by a server arrangement and the...
2018/0109516 METHOD FOR PROVIDING CERTIFICATE SERVICE BASED ON SMART CONTRACT AND SERVER USING THE SAME
A method for providing a certificate registration service based on a smart contract, wherein the smart contract is source code compilable into executable byte...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.