Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0131753 Content Management System using Sources of Experience Data and Modules for Quantification and Visualization
A semantic note taking system and method for collecting information, enriching the information, and binding the information to services is provided....
2018/0131752 SECURING CONTENT USING PIPELINES
A transcoding service is described that is capable of transcoding or otherwise processing content, such as video, audio or multimedia content, by utilizing one...
2018/0131751 DISTRIBUTED NETWORK DIAGNOSTICS OF ENTERPRISE DEVICES UTILIZING DEVICE MANAGEMENT
In response to receiving an indication from a client device experiencing a network connectivity error, a grouping of target client devices is identified for...
2018/0131750 INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, AND INFORMATION PROCESSING SYSTEM
An information processing device includes a memory and a processor coupled to the memory. The processor is configured to receive terminal information of each...
2018/0131749 System and Method for Optimizing Data Transfer using Selective Compression
A system and method for optimizing transfer of data using selective compression, the system comprising an analyzer at a source system, the method comprising...
2018/0131748 MECHANISM FOR DISTINGUISHING BETWEEN CONTENT TO BE SERVED THROUGH FIRST OR SECOND DELIVERY CHANNELS
Described herein are methods, apparatus and systems for selectively delivering content through one of two communication channels, one being origin to client...
2018/0131747 SYSTEMS AND METHODS FOR TAG INSPECTION
Technologies for identifying and inspecting web page tags include a tag inspection system. The tag inspection system receives configuration information, which...
2018/0131745 Network Management Interface
A method for communicating over a specified protocol enabling bi-directional streaming between a network manager and a network device is provided. The method...
2018/0131744 METHODS AND APPARATUS FOR REDUCING LATENCY SHIFT IN SWITCHING BETWEEN DISTINCT CONTENT STREAMS
A method comprises receiving content from a source, and generating multiple content streams each comprising the received content. Each content stream includes...
2018/0131743 SYSTEMS AND METHODS FOR ENCODING AND DECODING
Systems and methods for multimedia encoding and decoding are disclosed. The systems and methods include multimedia format detection systems, decoder...
2018/0131742 MPEG-DASH DELIVERY OVER MULTICAST
A method, a system, and a non-transitory storage medium provides to receive a program including audio and video data; generate Moving Picture Experts Group...
2018/0131741 ADAPTIVE MEDIA STREAMING METHOD AND APPARATUS ACCORDING TO DECODING PERFORMANCE
A method and apparatus for streaming media without installing a plug-in in a web browser are provided. When a JavaScript decoder is used to stream media...
2018/0131740 ANONYMIZING STREAMING DATA
A system and method of anonymizing streaming data sets includes: processing one or more data sets into one or more anonymous vector representations of those...
2018/0131739 START-OVER IN ADAPTIVE STREAMING
In an example, a processing device is provided. The processing device may be configured to determine whether to send a first version of a stream manifest...
2018/0131738 CLOUD-BASED VIDEO DELIVERY
Techniques described herein provide for cloud-based media delivery that accepts or ingests media content, transcodes it according to various media profiles to...
2018/0131737 TRANSFERRING PLAYBACK OF MEDIA CONTENT BETWEEN MOBILE DEVICE AND VEHICLE
The disclosure provides a method in a vehicle and an apparatus for a vehicle for transferring playback of media content between a mobile device and the...
2018/0131736 STREAMING SERVICE METHOD AND DEVICE
A method and an electronic device for providing a streaming service are provided. The electronic device includes a communication interface, a display, and a...
2018/0131735 Systems and Methods for Content Capture, Distribution, and Management
The invention includes a system and method for broadcasting concerts, sporting events, and other entertainment content directly from a cellular phone, smart...
2018/0131734 METHOD OF DISPLAYING USER INFORMATION OF MISSION CRITICAL PUSH TO TALK (MCPTT) GROUP PERFORMING OFF-NETWORK...
A method of displaying user information of a group including a plurality of terminals, the plurality of terminals including a first terminal manager a floor...
2018/0131733 ONLINE SOCIAL INTERACTION, EDUCATION, AND HEALTH CARE BY ANALYSING AFFECT AND COGNITIVE FEATURES
A method of establishing a collaborative platform comprising performing a collaborative interactive session for a plurality of members, and analysing affect...
2018/0131732 Methods and Systems for Transmitting a Video as an Asynchronous Artifact
Exemplary embodiments relate to techniques for sharing live video while maintaining an asynchronous copy of the video. According to some embodiments, a user...
2018/0131731 SYSTEMS, METHODS, AND COMPUTER PROGRAMS FOR ESTABLISHING A SCREEN SHARE SESSION FOR A REMOTE VOICE CALL
Systems, methods, and computer systems are disclosed for establishing a screen share session. One such method comprises a collaboration server receiving a...
2018/0131730 USER IDENTITIES FOR PTT AND MCPTT
It is provided a method, comprising supervising if an information in a registration request is received from a registrar of a network domain, wherein the...
2018/0131729 SYNCHRONIZATION BASED ON DEVICE PRESENCE
An architecture that can facilitate initiation of an automatic synchronization operation based upon presence information in connection with a wireless...
2018/0131728 SECURITY ENHANCEMENT TOOL
A method comprises receiving a notification of a new system violation and determining whether the new system violation in combination with one or more of a...
2018/0131727 POLICY ENFORCEMENT SYSTEM
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for storing, by a policy enforcement system, a plurality of...
2018/0131726 POLICY ENFORCEMENT FOR COMPUTE NODES
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for maintaining, by a policy enforcement system in a first...
2018/0131725 METHOD AND APPARATUS FOR MOBILE TERMINAL MANAGEMENT SUPPORTING SECURITY POLICY
Disclosed is a method and apparatus for mobile terminal management supporting security policy. An exemplary embodiment of the present invention provides a...
2018/0131724 SYSTEM AND METHOD FOR A CLOUD COMPUTING ABSTRACTION LAYER WITH SECURITY ZONE FACILITIES
In embodiments of the present invention improved capabilities are described for a virtualization environment adapted for development and deployment of at least...
2018/0131723 Security Policy Inclusion with Container Deployment
An approach is provided in which an information handling system creates a container that includes security information. The information handling system deploys...
2018/0131722 SYSTEM AND METHOD FOR DETERMINING A POLICY IN VIRTUAL DESKTOP INFRASTRUCTURE (VDI)
Systems and methods for determination of a policy in a virtual desktop infrastructure (VDI) system. The system includes a virtual machine (VM) server providing...
2018/0131721 ENFORCING ENTERPRISE REQUIREMENTS FOR DEVICES REGISTERED WITH A REGISTRATION SERVICE
Disclosed are various examples for enforcing enterprise requirements for client device deployment. One example includes receiving a device enrollment request...
2018/0131720 DYNAMIC FLOW SYSTEM
System and methods for communicating across a network comprise: a database containing high level security rules for the network; computing devices...
2018/0131719 Selective Traffic Blockage
Method, product and device for selective traffic blockage. In one embodiment, in response to a detection that a computing device cannot connect to a...
2018/0131718 SYSTEMS AND METHODS FOR SUPPRESSING DENIAL OF SERVICE ATTACKS
Techniques for network traffic filtering and flow control are disclosed. Some implementations provide a network communication evaluation module ("NCEM") that...
2018/0131717 APPARATUS AND METHOD FOR DETECTING DISTRIBUTED REFLECTION DENIAL OF SERVICE ATTACK
Disclosed herein are an apparatus and method for detecting a Distributed Reflection Denial of Service (DRDoS) attack. The DRDoS attack detection apparatus...
2018/0131716 Biology Based Techniques with Cognitive System Analysis for Handling Information Security and Privacy
Mechanisms are provided in which an electronic corpus of content specific to a domain of computer system attacks is ingested and cognitively analyzed to...
2018/0131715 METHODS AND SYSTEMS FOR RANKING, FILTERING AND PATCHING DETECTED VULNERABILITIES IN A NETWORKED SYSTEM
Systems and methods for determining priority levels to process vulnerabilities associated with a networked computer system can include a data collection engine...
2018/0131714 STRUCTURING DATA AND PRE-COMPILED EXCEPTION LIST ENGINES AND INTERNET PROTOCOL THREAT PREVENTION
Blocking high-risk IP connections in real-time while allowing tailoring of an acceptable risk profile to match the security requirements of network resources....
2018/0131713 SITE SECURITY MONITOR
Techniques for monitoring site security are disclosed herein. Sites are scanned for security metric values associated with one or more security metrics....
2018/0131712 METHOD FOR MONITORING DATA TRAFFIC IN A MOTOR-VEHICLE NETWORK
A method for monitoring the data traffic over a CAN bus of a CAN-type communication network of a motor vehicle. The network includes a plurality of nodes...
2018/0131711 Protecting Computing Devices From Malicious Activity
Embodiments provide methods of protecting computing devices from malicious activity. A processor of a networking device may monitor network traffic flows of...
2018/0131710 NETWORK TELEPHONY ANOMALY DETECTION IMAGES
Network telephony anomaly detection systems are provided herein. In one example, a method of operating a network telephony anomaly service includes monitoring...
2018/0131709 SECURITY VIOLATION ASSESSMENT TOOL
A method comprises receiving a notification of a new system violation and classifying, based on characteristics of the new system violation, the new system...
2018/0131708 Identifying Fraudulent and Malicious Websites, Domain and Sub-domain Names
A method of identifying fraudulent and/or malicious Internet domain and sub-domain names includes: crawling the web to identify in-use domain and/or sub-domain...
2018/0131707 Method and Product for Providing a Predictive Security Product and Evaluating Existing Security Products
A method, product and computer program product for building a malware detector, the method including the steps of: receiving at least one characteristic for...
2018/0131706 FILTERING AND REDACTING BLOCKCHAIN TRANSACTIONS
A blockchain may store transactions which should were not intended to be recorded due to inappropriate content or unwanted subject matter submitted by...
2018/0131705 Visibility of Non-Benign Network Traffic
Embodiments provide methods of protecting computing devices from malicious activity. A processor of a network device may receive a first network traffic flow...
2018/0131704 SYSTEMS AND METHODS FOR THREAT ANALYSIS OF COMPUTER DATA
Various embodiments of the present disclosure can include systems, methods, and non-transitory computer readable media configured to aggregate a plurality of...
2018/0131703 SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR MANAGING ACCESS TO SYSTEMS, PRODUCTS, AND DATA BASED ON...
In accordance with embodiments, there are provided mechanisms and methods for managing access to data based on information associated with a physical location...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.