Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0270295 Distributed Transaction Management In A Network Service Layer
Distributed Service Layer Transactions (DSLTs) may be supported by a DSLT service at a service layer of a communications network to offload applications from...
2018/0270294 Backend Service Integration
A method for providing an integrated service includes assigning a digital credential to a user account; receiving a request to schedule an integrated service...
2018/0270293 INTELLIGENT ROUTING OF MEDIA ITEMS
In certain embodiments, automated routing of media items between user devices may be facilitated. In some embodiments, a routing computer system may...
2018/0270292 NETWORK TRANSFER OF LARGE FILES IN UNSTABLE NETWORK ENVIRONMENTS
A file with a unique filename is transferred from a client computer to a server computer in chunks, which can be packaged into packets including metadata. The...
2018/0270291 ADAPTIVE COMMUNICATION CONTROL DEVICE
Aspects control data transfers within group of networked devices. The devices are assigned a power values indicative of a relative quality of power supply,...
2018/0270290 REMOTE COMMANDS FRAMEWORK TO CONTROL CLIENTS
A method and system for remotely executing commands at a client computing device. The method comprises receiving a selection of commands to transmit to a group...
2018/0270289 ANALYTE DATA RETRIEVER
Methods and apparatus, including computer program products, are provided for processing analyte data. In some example implementations, a method may include...
2018/0270288 VOICE ENCODING AND SENDING METHOD AND APPARATUS
This application relates to a voice encoding and sending method performed at a computer implemented system. The method includes sending voice data from at...
2018/0270287 METHOD AND APPARATUS FOR ENCODING AND TRANSMITTING AT LEAST A SPATIAL PART OF A VIDEO SEQUENCE
When encoding and transmitting video data comprising regions of interest, different usages of the regions of interest implicate different kinds of combination...
2018/0270286 EVENT EXPERIENCE ENHANCEMENT THROUGH REMOTE AND LOCAL USER ENTANGLEMENT
Focus data of a remote user is analyzed to determine a focus shift from a first area to a second area at an event arena. A beacon density is computed at the...
2018/0270285 METHODS AND DEVICES FOR EFFICIENT ADAPTIVE BITRATE STREAMING
Methods and systems for a content server to select sets of video streams having different encoding parameters for transmitting the sets of video streams to a...
2018/0270284 HYBRID MEDIA STREAM DELIVERY USING MULTIPLE NETWORK CONNECTIONS
Example methods, systems, and machine-readable mediums to facilitate a hybrid media stream delivery using multiple network connections are disclosed. An...
2018/0270283 PERSONALIZED VIDEO PLAYBACK
Systems and methods for personalizing video playback are disclosed. In embodiments, a computer-implemented method, comprises: initiating, by a computing...
2018/0270282 SYSTEM AND METHOD FOR TEMPORARY AND LOCAL CONTENT RELEASE
A method for temporary and local content release of digital data stored on a personal electronic device including a first personal electronic device...
2018/0270280 CONTENT-SHARING APPLICATION COMBINED WITH SOCIAL MEDIA AND METHOD OF USE
A system and method for simultaneously sharing Internet-provided content among multiple users forming user groups. Individual users can select between...
2018/0270279 GROUP CURATED MEDIA CHANNELS
A system for collaboratively generating and/or managing a media channel is provided. The system includes an identification component, a generation component...
2018/0270278 DEVICE AND METHOD FOR PROVIDING MOBILE INTERNET CALL SERVICE
There are provided a device and method for providing a mobile Internet call service. In order to reduce a call waiting time for an mVoIP call, when a call is...
2018/0270277 AUTOMATIC AD-HOC MULTIMEDIA CONFERENCE GENERATOR
Aspects of the subject disclosure may include, for example, a method including steps of determining, by a processing system including a processor, a topic in a...
2018/0270276 NETWORK-ASSISTED FABRIC PAIRING
Systems and methods for joining a device to a fabric using an assisting device include an indication to add a joining device to a fabric. If the joining device...
2018/0270275 METHOD AND APPARATUS FOR MANAGING CALLS
A system that incorporates teachings of the present disclosure may include, for example, receiving a request for a voice call at a mobile switching center...
2018/0270274 SENSOR GATEWAY
A sensor gateway manages wireless communications to sensors and the exchange of data between the sensors and a connection to the Internet. A sensor gateway...
2018/0270273 APPARATUS AND METHOD FOR DYNAMIC CUSTOMIZATION OF CYBER-SECURITY RISK ITEM RULES
This disclosure provides an apparatus and method for dynamic customization of cyber-security risk item rules. A method includes interacting with a user, by a...
2018/0270272 METHOD FOR WEBSITE AUTHENTICATION AND FOR SECURING ACCESS TO A WEBSITE
The invention relates to a method for securing access to a website which includes, in series: a step (202) of a first user terminal accessing said site; a...
2018/0270271 REAL-TIME LINEAR IDENTIFICATION OF RESOURCE DISTRIBUTION BREACH
Systems, computer products, and methods are described herein for improvements for identifying if an interaction between a user and an entity have been...
2018/0270270 Method for Providing a Connection Between a Communications Service Provider and an Internet Protocol, IP,...
A method of providing at least one communications service provider a connection to an Internet Protocol, IP, server in a perimeter network, the IP server...
2018/0270269 DETECTING AND PREDICTING CYBER-ATTACK PHASES IN ADJACENT DATA PROCESSING ENVIRONMENT REGIONS
A set and a second set of collections of forecasted feature vectors are selected from a repository for a future time window, a cyber-attack being in progress...
2018/0270268 VERIFYING SUCCESS OF COMPROMISING A NETWORK NODE DURING PENETRATION TESTING OF A NETWORKED SYSTEM
A method of carrying out a penetration testing campaign of a networked system by a penetration testing system comprising (A) a penetration testing software...
2018/0270267 Systems and Methods for Detecting and Locating Unsecured Sensors in a Network
A system, method and non-transitory computer readable medium for detecting unsecured sensors in a network. A computing system can find an IP address associated...
2018/0270266 System and Method for Empirical Organizational Cybersecurity Risk Assessment Using Externally-Visible Data
A system and method for assessing the cybersecurity breach risk associated with a given organization is disclosed. The system and method assume no internal...
2018/0270265 System and Method For Assessing Network Security Risks
A method for the assessment of an entities vulnerability to a cyber attack is disclosed that includes the steps of creating a current profile for the entity...
2018/0270264 EXTERNAL MALWARE DATA ITEM CLUSTERING AND ANALYSIS
Embodiments of the present disclosure relate to a data analysis system that may automatically generate memory-efficient clustered data structures,...
2018/0270263 SECURITY SYSTEM USING AUTOMATIC AND SCALABLE LOG PATTERN LEARNING IN SECURITY LOG ANALYSIS
A security system using automatic and scalable log pattern learning in security log analysis is provided. The security system includes one or more management...
2018/0270262 AUTOMATIC AND SCALABLE LOG PATTERN LEARNING IN SECURITY LOG ANALYSIS
A method for implementing automatic and scalable log pattern learning in security log analysis is provided. The method includes collecting security logs...
2018/0270261 WORD EMBEDDINGS FOR ANOMALY CLASSIFICATION FROM EVENT LOGS
Aspects of the present disclosure describe systems and methods for rapidly detecting threats or other security breaches in enterprise networks. In particular,...
2018/0270260 Method and a System for Facilitating Network Security
The method and system of present disclosure relate to facilitating network security. The method includes configuring a network comprising plurality of devices...
2018/0270259 QUANTIFYING ROBUSTNESS OF A SYSTEM ARCHITECTURE BY ANALYZING A PROPERTY GRAPH DATA MODEL REPRESENTING THE...
A system and method generates a plurality of weighted property graph data models to represent a system architecture. The models each include a plurality of...
2018/0270258 Systems and Methods for Targeted Attack Protection Using Predictive Sandboxing
Provided herein are systems and methods for targeted attack protection using predictive sandboxing. In exemplary embodiments, a method includes retrieving a...
2018/0270257 Dectection of invalid port accesses in port-scrambling-based networks
Method, system and product for detection of invalid port accesses in port-scrambling-based networks. The network may comprise a plurality of computers, each of...
2018/0270256 DETECTING THE EXECUTION OF ALIEN CONTENT ON A CLIENT COMPUTING DEVICE
Techniques detecting the execution of alien content on a client computing device are provided. A set of web code is supplemented with a set of instrumentation...
2018/0270255 Processor Comprising Three-Dimensional Vertical One-Time-Programmable Memory for Enhancing Network Security
A preferred processor for enhancing network security comprises a plurality of storage-processing units (SPU), with each SPU comprising at least a...
2018/0270254 COMMUNICATION PARTNER MALIGNANCY CALCULATION DEVICE, COMMUNICATION PARTNER MALIGNANCY CALCULATION METHOD, AND...
Communication partners known to be malignant or benign are input to a known communication partner input unit, a subject communication partner whose malignancy...
2018/0270253 METHOD AND SYSTEM FOR IDENTIFYING A HUMAN OR MACHINE
Identifying a human or machine is disclosed including sending a currently-triggered human or machine identification request to a server, receiving a first...
2018/0270252 Data Storage System File Integrity Check
An integrity check for a first file is initiated. In response, a first key corresponding to the first file is obtained. The first file is hashed to determine...
2018/0270251 MANAGEMENT OF SECRETS USING STOCHASTIC PROCESSES
A secret is stored in a computing device. The device generates a value determined based at least in part on a substantially random process. As a result of the...
2018/0270250 SECURE RESOURCE ACCESS BASED ON PSYCHOMETRICS
Access to a secure resource is controlled. Data relating to social media history information, demographic information, and psychometric information regarding a...
2018/0270249 ENABLING USERS TO PERFORM OPERATIONS THAT REQUIRE ELEVATED PRIVILEGES
Users can be enabled to perform operations that require elevated privileges in a controlled manner. An agent can be executed on a user's computing device with...
2018/0270248 SECURE RESOURCE ACCESS BASED ON PSYCHOMETRICS
Controlling access to a secure resource. Data relating to social media history information, demographic information, and psychometric information regarding a...
2018/0270247 Information Sharing Program, Information Processing Device, And Information Sharing Method
The present invention provides an information sharing program, an information processing device, and an information sharing method which enable selection of...
2018/0270246 INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING APPARATUS, AND INFORMATION PROCESSING METHOD
An information processing system includes at least one information processing apparatus that includes: a first memory configured to store toggle information...
2018/0270245 DIGITAL CREDENTIAL TIERS
A method for selecting an alternative digital content item can include assigning a digital content license to access a first digital content item to a user...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.