Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0278674 MEDIA INFORMATION PRESENTATION METHOD, CLIENT, AND SERVER
A non-transitory computer-readable medium is provided. The medium stores a program executable by a processor of a client to receive an image file from a server...
2018/0278673 DESKTOP ASSISTANT FOR MULTIPLE INFORMATION TYPES
A method and system for providing an aggregate view of information that a user may need is provided. A desktop assistant system collects information items that...
2018/0278672 METHOD AND SYSTEM FOR REPLICATING A COMMUNICATION APPLICATION ON AN AUXILIARY COMPUTING DEVICE
According to embodiments described in the specification, a method and system for replicating an application on an auxiliary computing device are provided. The...
2018/0278671 PAGE JUMP METHOD AND APPARATUS
A request for a service is received. A page associated with the requested service is determined. The page is associated with a page identifier. In response to...
2018/0278670 METHOD FOR PREPARING AND USING MULTIMEDIA CONTENT BY MEANS OF AN INFORMATION TECHNOLOGY MEDIUM
A method for preparing and using multimedia content via an information technology medium includes preparation and utilization steps. The preparation step...
2018/0278668 VIDEO PLAYER WITH ENHANCED CONTENT ORDERING AND METHOD OF ACQUIRING CONTENT
A distributed multimedia player allows a user to purchase multimedia regardless of the website or environment upon which the multimedia is encountered. The...
2018/0278667 MULTIMEDIA DATA TRANSMISSION SYSTEM AND MULTIMEDIA DATA TRANSMISSION METHOD
A multimedia data transmission method includes the following procedures: outputting multimedia data; detecting a transmission bandwidth when transmitting the...
2018/0278666 SYSTEM AND METHOD FOR PROCESSING AUDIO DATA
A decoder operable to decode audio signals. The decoder operable to receive an encoded bitstream that includes bitstream synchronization command data and...
2018/0278665 SYSTEM AND METHOD FOR MANAGING CONTENT PRESENTATION ON CLIENT DEVICES
Implementations of the present disclosure are directed to a method, a system, and an article for managing the presentation of content on client devices. An...
2018/0278664 RATE CONTROL
There is provided a method of controlling a rate at which content data is received at a receiver over a network, wherein the receiver has caused a first strew...
2018/0278663 SYSTEM AND METHOD FOR DYNAMIC CLOUD FORMATIONS FOR STREAM COMPUTING
A method, computer program product, and computer system for identifying, in a dynamically formed cloud, a plurality of voluntary compute nodes, wherein the...
2018/0278662 SYSTEMS, APPARATUSES AND METHODS FOR PARTY LINE CALLS AMONG VOICE OVER INTERNET PROTOCOL (VoIP) TELEPHONES
Devices, systems and methods are provided to support a party call with auto joining function in a communication system for a distributed transport system that...
2018/0278661 Communication Method and Storage Medium Storing Communication Program
A communication method includes: executing a first conference process for performing a teleconference; connecting first and second clients with the first...
2018/0278660 VOICE TRACK EDITOR
Local stations can generate their station broadcast logs based on a master broadcast log. In some cases, local stations are allowed to edit some positions, or...
2018/0278659 METHOD AND SYSTEM FOR CALL SETUP
Aspects of the disclosure provide a method for setting up a call for a user equipment. The method includes receiving, by the user equipment, a measurement...
2018/0278658 DETERMINING FEATURE UNAVAILABILITY
Method and apparatus for determining feature unavailability are disclosed. In the method and apparatus a user device attempts to communicate with a second...
2018/0278657 Method For Determining Whether To Apply A Media Specific Action
A method of determining whether to apply a media specific action to communications in an Internet Protocol Multimedia Subsystem enabled network is disclosed,...
2018/0278656 Implementing Application Level Multimedia Services As A Switching Function
A network for delivering application level multimedia services includes simple, application-level switches and rules managers. Each application-level switch...
2018/0278655 METHOD AND ARRANGEMENT FOR MANAGING SECURITY RECONFIGURATION IN A CELLULAR COMMUNICATION SYSTEM
Methods are discussed of managing security reconfiguration and cell update procedures in a user equipment and in a node in a cellular communication system and...
2018/0278654 HTTP PASSWORD MEDIATOR
A method and system for password mediation including receiving, within an operating system network stack of a client device, a hypertext transfer protocol...
2018/0278653 Application Programming Interface (Api)-Based Security For Websites
A computer-implemented method for accessing a hosted service on client devices is described. The client devices include client software that uses a remotely...
2018/0278652 Context-Aware Data Loss Prevention (DLP) for Cloud Security
A computer-implemented method for accessing a hosted service on client devices is described. The client devices include client software that uses a remotely...
2018/0278651 Deep Application Programming Interface Inspection (DAPII) for Cloud Security
A computer-implemented method for accessing a hosted service on client devices is described. The client devices include client software that uses a remotely...
2018/0278650 NORMALIZED INDICATIONS OF COMPROMISE
Threat detection instrumentation is simplified by providing and updating labels for computing objects in a context-sensitive manner. This may include simple...
2018/0278649 LABELING COMPUTING OBJECTS FOR IMPROVED THREAT DETECTION
Threat detection instrumentation is simplified by providing and updating labels for computing objects in a context-sensitive manner. This may include simple...
2018/0278648 SYSTEMS AND METHODS FOR ENFORCING DYNAMIC NETWORK SECURITY POLICIES
A computer-implemented method for enforcing dynamic network security policies may include (i) monitoring, by a network traffic protection system, network...
2018/0278647 COMPUTER SECURITY ATTACK DETECTION USING DISTRIBUTION DEPARTURE
Described technologies automatically detect computing system security attacks. Departure of occurrence distributions, which are based on leading digit(s) of...
2018/0278646 Early-Warning Decision Method, Node and Sub-System
Early-warning decision method, node and system are provided in the present disclosure. The method includes obtaining a flow analysis result of a portion of...
2018/0278645 SOFTWARE EVALUATION METHOD AND SOFTWARE EVALUATION DEVICE
A software evaluation method includes obtaining a number of requests from a transmission source other than a transmission source registered in advance from...
2018/0278644 INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, AND COMPUTER-READABLE RECORDING MEDIUM
An operation information specification unit 82, with use of terminal-specific countermeasure information indicating an applicable countermeasure for each...
2018/0278643 ANONYMIZED NETWORK DATA COLLECTION AND NETWORK THREAT ASSESSMENT AND MONITORING SYSTEMS AND METHODS
Systems and methods for data collection and processing in a network, including one or more sensors disposed in a network interface and configured to collect...
2018/0278642 ROUTING BASED ON A VULNERABILITY IN A PROCESSING NODE
Techniques for routing a request based on a vulnerability in a processing node are disclosed. A vulnerability analyzer determines a set of detected ...
2018/0278641 USING NEW EDGES FOR ANOMALY DETECTION IN COMPUTER NETWORKS
Creation of new edges in a network may be used as an indication of a potential attack on the network. Historical data of a frequency with which nodes in a...
2018/0278640 SELECTING REPRESENTATIVE METRICS DATASETS FOR EFFICIENT DETECTION OF ANOMALOUS DATA
Certain embodiments involve selecting metrics that are representative of large metrics datasets and that are usable for efficiently performing anomaly...
2018/0278639 DYNAMICALLY ADAPTED TRAFFIC INSPECTION AND FILTERING IN CONTAINERIZED ENVIRONMENTS
A system and method for dynamically adapting traffic inspection and filtering in containerized environments. The method includes monitoring the containerized...
2018/0278638 METHOD AND APPARATUS FOR IDENTIFYING NETWORK ATTACKS
Embodiments of the present disclose provide a method and apparatus for identifying network attacks. The method can include: acquiring access data within at...
2018/0278637 SECURING PORT FORWARDING THROUGH A NETWORK TRAFFIC HUB
A network traffic hub is configured to receive a request for a port service (i.e., port forwarding or port triggering) from a smart appliance in a local...
2018/0278636 SYSTEM AND METHOD FOR MALWARE DETECTION LEARNING
Malware detection techniques that detect malware by identifying the C&C communication between the malware and the remote host, and distinguish between...
2018/0278635 APPARATUS, METHOD, AND COMPUTER PROGRAM FOR DETECTING MALWARE IN SOFTWARE DEFINED NETWORK
Disclosed are an apparatus, a method, and a computer program by which it is determined whether a target network program generated in a software defined network...
2018/0278634 Cyber Security Event Detection
A system for detecting cyber security events can include a processor to generate a first set of a plurality of time series and aggregate statistics based on a...
2018/0278633 DETECTING DOMAIN NAME SYSTEM (DNS) TUNNELING BASED ON DNS LOGS AND NETWORK DATA
A system to detect domain name server tunneling includes a processor and machine readable instructions stored on a tangible machine readable medium, which when...
2018/0278632 METHOD AND DEVICE FOR DETECTING NETWORK ATTACK
This application relates to the field of network security technologies, and provides a method and a device for detecting a network attack. The method includes:...
2018/0278631 THREAT DETECTION USING A TIME-BASED CACHE OF REPUTATION INFORMATION ON AN ENTERPRISE ENDPOINT
Threat detection instrumentation is simplified by providing and updating labels for computing objects in a context-sensitive manner. This may include simple...
2018/0278630 UNAUTHORIZED DATA ACCESS DETECTION BASED ON CYBER SECURITY IMAGES
In some examples, a system for detecting unauthorized data access can include a processor to detect a suspicious operation to be executed by the system and...
2018/0278629 MACHINE LEARNING-BASED TRAFFIC CLASSIFICATION USING COMPRESSED NETWORK TELEMETRY DATA
In one embodiment, a device in a network receives telemetry data regarding a traffic flow in the network. One or more features in the telemetry data are...
2018/0278628 NON-CONTACT CYBERSECURITY MONITORING DEVICE
A cybersecurity monitoring device includes an electromagnetic (EM) field sensor for sensing a modulated signal transmitted on an electrical cable which encodes...
2018/0278627 DETECTION OF EMAIL SPOOFING AND SPEAR PHISHING ATTACKS
A computer-implemented method of detecting an email spoofing and spear phishing attack may comprise generating a contact model of a sender of emails;...
2018/0278626 DISTRIBUTED SCANNING
A system for scanning a network includes an interface and a processor. The interface is configured to receive an indication to scan a set of network addresses....
2018/0278625 EXCHANGING MESSAGE AUTHENTICATION CODES FOR ADDITIONAL SECURITY IN A COMMUNICATION SYSTEM
In an aspect of the disclosure, a method, a computer-readable medium, and an apparatus are provided. The apparatus may establish a communication link based on...
2018/0278624 Protection Configuration for Application Programming Interfaces
A system is configured to authorize client access to an application programming interface (API) of a host device. A proxy is configured to handle network...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.