Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0124184 COMPREHENSIVE URBAN COMMUNICATIONS, DATA GATHERING AND AGGREGATION ARRAY
A system comprising of aggregated public safety devices, where each device may contain sensors and communication platforms used to collect data of entities...
2018/0124183 Method and Apparatus for Stateful Control of Forwarding Elements
A method for controlling a network element by a remote controller comprising a processor coupled to a transmitter comprises modeling, by the processor, a state...
2018/0124182 CONTROLLING AN APPLICATION DEPENDENCY IDENTIFIER
An application identifier control system controls an application dependency identification system to access request logs in one or more front end server...
2018/0124181 SYSTEM AND METHOD FOR SERVER BASED CONTROL
A system and method in a building or vehicle for an actuator operation in response to a sensor according to a control logic, the system comprising a router or...
2018/0124178 THERMOSTAT WITH DIRECTION DISPLAY
A thermostat in a building includes a user interface, a communications interface, and a processing circuit. The user interface is configured to present...
2018/0124177 METHOD AND APPARATUS FOR ADVANCED VEHICLE DATA DELIVERY USING SECONDARY DEVICE
A system includes a processor configured to receive sensor data from a vehicle sensor. The processor is also configured to determine an existence of a...
2018/0124176 FINDING ALTERNATE STORAGE LOCATIONS TO SUPPORT FAILING DISK MIGRATION
A computing device includes an interface configured to interface and communicate with a dispersed storage network (DSN), a memory that stores operational...
2018/0124174 MULTI-THREADED SCANNING OF DISTRIBUTED FILE SYSTEMS
Embodiments disclosed herein address the need to more efficiently backup a network-based storage environment that may be remote from a primary storage...
2018/0124172 GRANULAR SYNC/SEMI-SYNC ARCHITECTURE
Data consistency and availability can be provided at the granularity of logical storage objects in storage solutions that use storage virtualization in...
2018/0124171 ADAPTIVE DATA MIRRORING IN VIRTUAL NETWORKS
Some embodiments provide a method for providing a continuous mirroring session between a monitored data compute node (DCN) and a monitoring DCN. The method...
2018/0124169 COMBINING STATELESS AND STATEFUL SERVER LOAD BALANCING
The processing of data packets sent over a communication session between a host and a server by a service gateway includes processing a data packet using a...
2018/0124168 LOAD BALANCING SERVER FOR FORWARDING PRIORITIZED TRAFFIC FROM AND TO ONE OR MORE PRIORITIZED AUTO-CONFIGURATION...
According to an embodiment, the disclosure relates to a load balancing server for forwarding traffic from and to multiple ACS servers. The server is configured...
2018/0124167 Combining application and data tiers on different platforms to create workload distribution recommendations
A method, apparatus and computer program product for improved load balancing provides for the grouping under a same workload of both application instances in...
2018/0124166 Opportunistic Crowd-Based Service Platform
A method and apparatus for providing an opportunistic crowd based service platform is disclosed. A mobile sensor device is identified based on a current...
2018/0124162 TELEVISION KEY PHRASE DETECTION
Images of key phrases or hashtags appear on televised feeds. Image processing techniques, such as feature locating algorithms or character recognition...
2018/0124160 DOMAIN-SPECIFIC PATTERN DESIGN
A method is provided for building patterns with high level pattern topology requirements for deployment across multiple systems. The patterns are built based...
2018/0124159 PRE- AND POST-SHARING INSIGHTS FOR SHARED CONTENT
This disclosure provides a system, method, and machine-readable memory for determining various pre-sharing insights and post-sharing insights. The system is...
2018/0124156 LOADER AND METHOD FOR PROCESSING A RESOURCE BUNDLE
In accordance with some embodiments, a loader is operable to download a resource bundle from a server to a user device and process/load at least one resource...
2018/0124151 COMPUTER-IMPLEMENTED METHOD FOR CONTROLLING A REMOTE DEVICE WITH A LOCAL DEVICE
A computer-implemented method is presented for controlling a remote device with a local device which may have a smaller screen than the remote device. At least...
2018/0124149 PLACEHOLDERS FOR DYNAMIC COMPONENTS IN HTML STREAMING
A method of speeding up the delivery of a dynamic webpage is disclosed. A request for a webpage is received, the webpage including one or more dynamic...
2018/0124147 METHOD AND APPARATUS FOR STREAMING MEDIA CONTENT TO CLIENT DEVICES
A method includes providing a variant playlist file that identifies a plurality of variant streams each corresponding to a different encoding of a same media...
2018/0124143 VIDEO DELIVERY EXPEDITION APPARATUSES, METHODS AND SYSTEMS
The VIDEO DELIVERY EXPEDITION APPARATUSES, METHODS AND SYSTEMS ("VDE") transform Internet content data access request via VDE components into media content...
2018/0124139 PORT MIRRORING IN OVERLAY NETWORKS
A method of mirroring packets in a network. The method assigns an Internet protocol (IP) multicast address to an overlay network for transmitting mirrored...
2018/0124134 DISPLAY CONTROL APPARATUS, DISPLAY CONTROL METHOD, PROGRAM, AND COMMUNICATION SYSTEM
There is provided a display control apparatus including an acquisition section configured to acquire display information for displaying a state of...
2018/0124132 CONDUCTING A CONFERENCE CALL OVER A COMPUTER NETWORK
A computer-implemented method, system and computer program product for a conference call moderator to conduct a conference call between a plurality of...
2018/0124130 SYNTHETIC TRANSACTION TO DETERMINE CENTROID FOR CLOUD HOSTING
One or more data centers are selected to host an online conference. The selection of the data center is based on a set of metrics that are measured from...
2018/0124124 NETWORK ROUTING BASED ON TERMINAL'S MEDIA PATH
A routing device of a telecommunications network can receive an initiation request of a communication session. The initiation request can include a destination...
2018/0124123 Media Session
A media session between a first device and a second device is established. The following candidate pairs are determined at the first device, by exchanging...
2018/0124122 SYSTEM AND METHODS FOR IMPROVING INTERACTION ROUTING PERFORMANCE
An interaction router includes a computerized server executing a routing engine stored on a machine-readable medium, an interface at the server receiving...
2018/0124120 Control of Internet Browsing in a Secure Environment
A system and method are disclosed for providing internet access to residents of a controlled-environment facility. There are significant dangers associated...
2018/0124118 Flow Control Method and Device
A flow control method and apparatus are provided. The flow control apparatus groups stored multiple pieces of address information into at least two security...
2018/0124117 NETWORK ENTITY, USER DEVICE, AND METHOD FOR SETTING UP DEVICE TO DEVICE COMMUNICATIONS
A communications system is provided. A network device controls the setting up of a device to device communication link, as sent between a device in the core...
2018/0124115 SYSTEM AND METHOD FOR PROVIDING NETWORK SUPPORT SERVICES AND PREMISES GATEWAY SUPPORT INFRASTRUCTURE
A service management system communicates via wide area network with gateway devices located at respective user premises. The service management system remotely...
2018/0124113 Enforcing Application Security Requirement Rules Using Security Annotations
Systems and methods are provided for enforcing security requirement rules of an application. A security guard retrieves security annotations associated with an...
2018/0124111 SYSTEM AND METHOD FOR NETWORK ENTITY ASSISTED HONEYPOT ACCESS POINT DETECTION
Embodiments of the present invention relate to system and method for one of authenticating an authorized AP [106A] and barring a honeypot AP [106C]. More...
2018/0124110 TECHNIQUES FOR DETECTING MALICIOUS BEHAVIOR USING AN ACCOMPLICE MODEL
The present disclosure generally relates to web page analysis, and more particularly to detecting malicious behavior using an accomplice model. In certain...
2018/0124109 TECHNIQUES FOR CLASSIFYING A WEB PAGE BASED UPON FUNCTIONS USED TO RENDER THE WEB PAGE
The present disclosure generally relates to web page analysis, and more particularly to a classification system for web pages. The classification system may...
2018/0124108 SYSTEMS AND METHODS FOR AN ARTIFICIAL INTELLIGENCE DRIVEN AGENT
A system and method is described that sends multiple simulated phishing emails, text messages, and/or phone calls (e.g., via VoIP) varying the quantity,...
2018/0124107 IDENTIFYING AN IMPOSTER ACCOUNT IN A SOCIAL NETWORK
A method for identifying an imposter account in a social network includes a monitoring engine to monitor user accounts of a social network, an identifying...
2018/0124106 DETECTING "MAN-IN-THE-MIDDLE' ATTACKS
A method for detecting a man-in-the-middle attack against communications between a client device and a specific remote end point over a network, the method...
2018/0124105 DETECTION OF FRAUDULENT ACCOUNT USAGE IN DISTRIBUTED COMPUTING SYSTEMS
Techniques for detecting fraudulent account usage without accessing user content associated with user accounts are disclosed herein. In one embodiment, a...
2018/0124104 HEALTH MONITOR BASED DISTRIBUTED DENIAL OF SERVICE ATTACK MITIGATION
Provided are methods and systems for mitigating a DDoS event. The method may comprise receiving an indication of a collapse of a collapsible virtual data...
2018/0124103 CLOUD CHECKING AND KILLING METHOD, DEVICE AND SYSTEM FOR COMBATING ANTI-ANTIVIRUS TEST
A cloud checking and killing method for combating an anti-antivirus test includes receiving, by a cloud sever, a cloud checking and killing request for...
2018/0124102 METHOD AND SYSTEM FOR SECURE DELIVERY OF INFORMATION TO COMPUTING ENVIRONMENTS
A method and system for protecting and repairing a current virtual asset from damage by potential security threats, according to one embodiment. The method and...
2018/0124101 Combination of Remote Triggered Source and Destination Blackhole Filtering
A method for remote triggered black hole filtering can include advertising a first modified next hop address for a destination address of network traffic, and...
2018/0124100 MANAGING WORKFLOWS UPON A SECURITY INCIDENT
Systems, methods, and software described herein provide for managing service level agreements (SLAs) for security incidents in a computing environment. In one...
2018/0124099 SYSTEM AND METHOD FOR SCALED MANAGEMENT OF THREAT DATA
A method, system, and computer-implemented method to manage threats to a network is provided. The method includes receiving volume threat data that indicates a...
2018/0124097 NETWORK DEVICE VULNERABILITY PREDICTION
The vulnerability of network devices may be predicted by performing a survival analysis on big data. A prediction algorithm may be built by considering...
2018/0124096 DETECTION OF VULNERABLE DEVICES IN WIRELESS NETWORKS
A method and system for detecting vulnerable wireless devices operating in a wireless environment of an organization are provided. The method includes...
2018/0124095 SYSTEMS AND METHODS FOR MULTI-TIER CACHE VISUAL SYSTEM AND VISUAL MODES
Systems and methods for displaying computer environment monitoring data can include a multi-tier cache memory associated with a processor of a first device....
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.