Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0167431 CLIENT-SIDE ACK REGULATION BASED ADAPTIVE STREAMING METHOD AND APPARATUS
Provided is a client-side ACK regulation based adaptive streaming method including changing a goal download time (GDT) of a video segment and regulating an app...
2018/0167430 SUPPRESSING BROADCASTS IN CLOUD ENVIRONMENTS
A method for suppressing broadcast messages includes receiving a broadcast message from a client that requests configuration information from a configuration...
2018/0167429 METHOD AND DEVICE WITH INTELLIGENT MEDIA MANAGEMENT
A method (300) and device (200) with intelligent media management is disclosed. The method (300) can include: streaming (310) media content in a wireless...
2018/0167428 NETWORK PROXY FOR ENERGY EFFICIENT VIDEO STREAMING ON MOBILE DEVICES
Examples of systems and methods for network proxy server for energy efficient video streaming on mobile devices are generally described herein. A proxy server...
2018/0167427 SYSTEMS AND METHODS FOR INTERACTIVE BROADCASTING
Systems, methods, and non-transitory computer-readable media can provide an interface through which a live content stream is presented, the live content stream...
2018/0167426 Multiplatform Screen Sharing Solution for Software Demonstration
A method of providing on-demand, live, presenter hosted, product or service demonstrations via the internet wherein a server connects a host device and viewer...
2018/0167425 SYSTEMS AND METHODS FOR MULTI-MODAL SYNCHRONIZATION AND INTERACTION
Embodiments relate to multi-modal synchronization and interaction systems and methods. In a system that includes a plurality of display devices, web...
2018/0167424 ONLINE CHARGING MECHANISMS DURING OCS NON-RESPONSIVENESS
A method of and system for accommodating non-responsiveness of an online charging node in a networked system. A request is received from a subscriber. An...
2018/0167423 OPERATING A NETWORK NODE
A network node, during setup of a communication session between a calling party and at least a called party, receives a first provisional response message from...
2018/0167422 LOAD DISTRIBUTION APPARATUS AND LOAD DISTRIBUTION METHOD
There is provided a load distribution apparatus configured to control a plurality of transmission devices to distribute loads of signals to be transmitted by...
2018/0167421 SYSTEM AND METHOD FOR THIRD PARTY MONITORING OF VOICE AND VIDEO CALLS
A system is described herein that facilitates the monitoring of inmate communications. The system provides a remotely-accessible means for a reviewer to...
2018/0167420 FAILOVER MANAGEMENT OF SIP BASED MULTIMEDIA COMMUNICATION SESSIONS
Systems and methods for failover recovery of multimedia communication sessions are disclosed. A system may store active session information received from a...
2018/0167419 SERVICE CHAINING FOR MULTIPLE UPLINK BRIDGES
A system and method for facilitating communication between one or more of a plurality of user virtual machines and external devices is disclosed. The system...
2018/0167418 APPARATUS AND METHOD FOR LAWFUL INTERCEPTION
Apparatus and method for lawful interception in accordance with an example embodiment of the present invention, a method is provided for receiving from a...
2018/0167417 AUTOMATED GENERATION OF ACCESS CONTROL RULES FOR USE IN A DISTRIBUTED NETWORK MANAGEMENT SYSTEM THAT USES A...
An access control rule authorizing communication between a plurality of managed servers within an administrative domain is determined. Communication...
2018/0167416 Simple Trusted Transfer to Internet of Things Devices
A system and method for updating multiple devices that are coupled to a network by a hub provides a trusted platform module in each of the devices, sends...
2018/0167415 System and Method for Simplifying Mandatory Access Control Policies
This invention relates to a system and method for simplifying mandatory access control policies. A central dashboard provides a single location for managing...
2018/0167414 SYSTEM AND METHOD FOR MONITORING AND GRADING A CYBERSECURITY FRAMEWORK
A cybersecurity system is provided that sums and scores one or more cybersecurity controls for different client computing systems that each have different...
2018/0167413 Wireless Network Service Interfaces
A uniform wireless network service selection information exchange interface system is provided to facilitate a consistent user experience across multiple...
2018/0167412 PREVENTION OF MALICIOUS AUTOMATION ATTACKS ON A WEB SERVICE
Techniques to facilitate prevention of malicious attacks on a web service are disclosed herein. In at least one implementation, a computing system intercepts a...
2018/0167411 PROTECTING AGAINST NOTIFICATION BASED PHISHING ATTACKS
A method, system and computer program product are disclosed for protecting against notification based phishing attacks on a computing device. In an embodiment,...
2018/0167410 ATTACK PROTECTION FOR WEBRTC PROVIDERS
WebRTC is vulnerable to malicious JavaScript, injected by cross-site scripting attacks or compromised or malicious script providers. Through these attacks,...
2018/0167409 SYSTEMS AND METHODS FOR PERFORMING OR CREATING SIMULATED PHISHING ATTACKS AND PHISHING ATTACK CAMPAIGNS
A method for establishing a campaign for a simulated phishing attack includes receiving, via a campaign manager, specification of a plurality of parameters for...
2018/0167408 METHOD AND SYSTEM TO PREVENT ULTRASOUND DATA LEAKS IN MOBILE DEVICES
A system, method and program product for implementing an ultrasound security system for a mobile device. A system is described that that integrates with an...
2018/0167407 INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, AND STORAGE MEDIUM
An information processing device according to the present invention includes: a cluster analyzer that determines a cluster identifier indicating a cluster that...
2018/0167406 ANALYSIS METHOD, ANALYSIS DEVICE AND ANALYSIS PROGRAM
In order to detect an attack to a web application accurately by accurately correlating different types of events having occurred in the same server, an event...
2018/0167405 NAME TRANSLATION MONITORING
Systems, methods, and related technologies for analyzing traffic based on naming information are described. In certain aspects, name information and address...
2018/0167404 FILTERING ONION ROUTING TRAFFIC FROM MALICIOUS DOMAIN GENERATION ALGORITHM (DGA)-BASED TRAFFIC CLASSIFICATION
In one embodiment, a device in a network receives domain information from a plurality of traffic flows in the network. The device identifies a particular...
2018/0167403 MALWARE ANALYSIS AND RECOVERY
A system and method detects malware by processing notifications from an intrusion detection system and baseline snapshots from an image capture utility. The...
2018/0167402 COMPUTER-IMPLEMENTED METHOD FOR DETERMINING COMPUTER SYSTEM SECURITY THREATS, SECURITY OPERATIONS CENTER SYSTEM...
A computer-implemented method for determining computer system security threats, the computer system including user accounts established on the computer system,...
2018/0167401 Streaming Non-Repudiation for Data Access and Data Transaction
A system and method that generate digests for data transactions provide non-repudiation of collected data. Meta data based on the Data DNA modeling are...
2018/0167400 SECURED ATTACHMENT MANAGEMENT
The secure management of attachments is described. In one example, a message is received by a device management computing environment from a client computing...
2018/0167399 SECURED ATTACHMENT MANAGEMENT
The secure management of attachments is described. In one example, files are identified for attachment to a message through a secure content application...
2018/0167398 ACCESS CONTROL FOR OBJECTS HAVING ATTRIBUTES DEFINED AGAINST HIERARCHICALLY ORGANIZED DOMAINS CONTAINING FIXED...
An aspect of the present disclosure facilitates controlling access to objects having attributes defined against hierarchically organized domains, with each...
2018/0167397 Authorization Processing Method and Device
The present invention relates to an authorization processing method and a device. An authorization server receives an authorization update request including a...
2018/0167396 Control of Internet Browsing in a Secure Environment
A system and method are disclosed for providing internet access to residents of a controlled-environment facility. There are significant dangers associated...
2018/0167395 CONTROLLED ENVIRONMENT SECURE MEDIA STREAMING SYSTEM
A Controlled Environment Secure Media Streaming System manages the delivery of content to Secured Devices. Cloud Services provide content to Integration Hub....
2018/0167394 CONTROLLING ACCESS TO A LOCKED SPACE USING CRYPTOGRAPHIC KEYS STORED ON A BLOCKCHAIN
A method for controlling access to a locked space, including generating an access code and a private key associated with the access code, hashing the access...
2018/0167393 LEGITIMACY VERIFICATION OF A NODE IN A DISTRIBUTED NETWORK
According to an example, a method and a secure element legitimacy verification of a node in a distributed network is provided. The distributed network...
2018/0167392 SYSTEM AND METHOD FOR AUTOMATIC WIRELESS NETWORK AUTHENTICATION
A system and method are described for connecting an IoT device to a wireless router and/or access point. For example, one embodiment of a system comprises: an...
2018/0167391 AUTHENTICATING AN AIRCRAFT DATA EXCHANGE USING DETECTED DIFFERENCES OF ONBOARD ELECTRONICS
Systems and methods are provided for authenticating aircraft communications using detected difference of on board electronics. One embodiment is a method that...
2018/0167390 Multicomputer Processing of an Event Authentication Request with Centralized Event Orchestration
Aspects of the disclosure relate to multicomputer processing of an event authentication request with centralized event orchestration. A computing platform may...
2018/0167389 DYNAMICALLY GENERATED SSID
A plurality of beacons that do not include any service set identifiers may be broadcast from an access point. A request concerning association with the access...
2018/0167387 SYSTEMS AND METHODS FOR BIOMETRIC AUTHENTICATION USING EXISTING DATABASES
Systems, methods, and non-transitory computer readable medium use external databases for biometric authentication. A server receives a request for...
2018/0167386 SYSTEMS AND METHODS FOR DECENTRALIZED BIOMETRIC ENROLLMENT
Systems, methods, and non-transitory computer readable media decentralizes biometric enrollment. A server receives a request to enroll a user for biometric...
2018/0167385 METHOD AND APPARATUS TO IDENTIFY AND AUTHORIZE CALLER VIA ULTRASOUND
A system for authenticating an identity of an end-user on an electronic device associated with a subscriber is provided. The system includes: a processor in...
2018/0167384 AUTHORIZATION CODE FLOW FOR IN-BROWSER APPLICATIONS
A system receives a request from an in-browser application for an authorization code, creates a session that re-directs the in-browser application to an...
2018/0167383 INTEGRATION OF PASSWORD-LESS AUTHENTICATION SYSTEMS WITH LEGACY IDENTITY FEDERATION
Authentication techniques are provided that integrate platform-specific authentication and federated identity authentication. An example method for...
2018/0167382 METHOD FOR PROVIDING A PERSONAL IDENTIFICATION CODE OF A SECURITY MODULE
A method for providing a personal identification code of a security module, includes a personal identification code assigned to the security module and a...
2018/0167381 REVOCABLE SHREDDING OF SECURITY CREDENTIALS
Customers accessing resources and/or data in a multi-tenant environment can obtain assurance that a provider of that environment will honor only requests...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.