Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0288118 DEVICE AND METHOD FOR TRANSMITTING OR RECEIVING MEDIA RESOURCE IDENTIFICATION INFORMATION IN COMMUNICATION SYSTEM
The present invention relates to a device and method for transmitting or receiving media resource identification (MRI) information for managing traffic of a...
2018/0288117 SECURE MEDIA CASTING BYPASSING MOBILE DEVICES
A method is provided for secure and direct delivery of digital media content directly from a content server to a casting digital media player. In the method,...
2018/0288116 Interaction-Based User Identification
Disclosed herein are system, method, and computer program product embodiments for interaction-based user identification. An embodiment operates by receiving an...
2018/0288115 Time and Content Restrictions Based on User-Identification
Disclosed herein are system, method, and computer program product embodiments for determining time and content restrictions based user identification. An...
2018/0288114 APPARATUS AND METHOD OF MANAGING RESOURCES FOR VIDEO SERVICES
Aspects of the subject disclosure may include, for example, a system that provides for obtaining network parameter data from an eNodeB and a content delivery...
2018/0288113 INTERACTIVE SYSTEM FOR VIRTUAL CINEMA AND METHOD
A virtual cinema interactive system includes a server and at least two user terminals. The user terminals communicate with the server. An inviter can invite...
2018/0288112 CONTROL SYSTEM, COMMUNICATION CONTROL METHOD, AND PROGRAM PRODUCT
A disclosed control system configured to control transmission of content data between communication terminals includes one or more processors, and a memory...
2018/0288111 REVERSE CALL FORKING
A technique for merging conference session dialogs allows presenting content and media streams from a non-Skype endpoint to a Skype multipoint control unit...
2018/0288110 CONFERENCE SUPPORT SYSTEM, CONFERENCE SUPPORT METHOD, PROGRAM FOR CONFERENCE SUPPORT DEVICE, AND PROGRAM FOR...
A conference support system includes a plurality of terminals which are respectively used by a plurality of participants in a conference, and a conference...
2018/0288109 CONFERENCE SUPPORT SYSTEM, CONFERENCE SUPPORT METHOD, PROGRAM FOR CONFERENCE SUPPORT APPARATUS, AND PROGRAM FOR...
A conference support system has a terminal used by participants in a conference and a conference support apparatus. The conference support apparatus includes...
2018/0288108 MANAGING CONFERENCE-CALLS
A conference call management method, system, and computer program product include inferring an Internet Protocol (IP) address of a new user requesting to join...
2018/0288106 TRANSMITTING COMMON MODE CONTROL DATA OVER AUDIO RETURN CHANNEL
A source device and a sink device may be connected using an interface cable comprising at least first and second physical channels. The first physical channel...
2018/0288105 Terminal Interoperation Using Called-Terminal Functional Characteristics
Example techniques described herein can permit interoperation between network terminals that have different performance characteristics, or that are connected...
2018/0288104 METHODS, SYSTEMS AND APPARATUS TO ENABLE VOICE ASSISTANT DEVICE COMMUNICATION
Methods, apparatus, systems and articles of manufacture are disclosed to enable voice assistant device communication. An example apparatus includes an...
2018/0288103 Internet Connection Load Balancing with Direct Access to Balanced Devices
SIP INVITE messages received at a load balancer are returned as SIP Redirect messages which are addressed to an access director and include additional...
2018/0288102 SYSTEMS AND METHODS FOR MINIMIZING PRIVACY INTRUSION DURING INTERNET OF THINGS LAWFUL INTERCEPTION
This disclosure relates generally to methods and systems for minimizing privacy intrusion during internet of things lawful interception. In one embodiment, a...
2018/0288101 VERIFYING THAT USAGE OF VIRTUAL NETWORK FUNCTION (VNF) BY A PLURALITY OF COMPUTE NODES COMPLY WITH ALLOWED...
In some examples, a method includes establishing, by a network device acting as an orchestrator host for a virtual network function (VNF), a trust relationship...
2018/0288100 Systems and Methods for Security Configuration
A method of configuring a network security device includes receiving a changed set of network rules to replace a current set of network rules; using a...
2018/0288099 SECURE SOFTWARE DEFINED STORAGE
Providing secure software defined storage includes identifying data directed to be stored in a software defined storage location, intercepting the data,...
2018/0288098 ACCESS CONTROL POLICY SYNCHRONIZATION FOR SERVICE LAYER
Methods, systems, and apparatus in a service layer environment may create, update, or delete access control policy triples whenever an access control policy...
2018/0288097 SECURITY MONITORING AGENT FOR FIELD PROGRAMMABLE GATE ARRAY (FPGA) IN-MEMORY CONTROLLER
Techniques related to preventing unauthorized access to a computing device are disclosed. The techniques include a machine-readable medium, on which are stored...
2018/0288096 DECENTRALIZED MULTI-CHANNEL DISCOVERY SYSTEM THROUGH A PLURALITY OF DATA STRUCTURES
Described herein are technologies related to an implementation of a decentralized discovery system that utilizes a plurality of fuse--nodes to facilitate...
2018/0288095 METHOD AND SYSTEM TO SECURE AND DYNAMICALLY SHARE IOT INFORMATION CROSS MULTIPLE PLATFORMS IN 5G NETWORK
A device includes a processor having a trusted security zone and trusted memory communicatively coupled to the trusted security zone to form a trusted...
2018/0288094 INSERTION AND CONFIGURATION OF INTERFACE MICROSERVICES BASED ON SECURITY POLICY CHANGES
Systems, methods, and apparatuses enable to enable the insertion and configuration of interface microservices at servers or other types of computing devices in...
2018/0288093 SENSOR MANAGEMENT SYSTEM, SENSOR MANAGEMENT METHOD, RECORDING MEDIUM STORING SENSOR MANAGEMENT PROGRAM, AND...
A sensor management system includes: a sensor management device including predetermined security functionality, wherein the sensor management device receives...
2018/0288092 PROTECTION FROM RELAY ATTACKS IN WIRELESS COMMUNICATION SYSTEMS
Systems and methods related to a wireless communication system include detection of and protection from relay-in-the-middle attacks. A first wireless device...
2018/0288091 TECHNIQUES FOR PROTECTING AGAINST EXCESSIVE UTILIZATION OF CLOUD SERVICES
A method, system and a platform for protecting against excessive utilization of at least one cloud service for operation of a cloud-hosted application. The...
2018/0288090 SYSTEM AND METHOD OF DETECTING AND COUNTERING DENIAL-OF-SERVICE (DOS) ATTACKS ON AN NVME-OF-BASED COMPUTER...
Disclosed herein is computer storage array that detects and counters denial of service (DoS) attacks, the computer storage array providing one or more remote...
2018/0288089 CONTENT-BASED OPTIMIZATION AND PRE-FETCHING MECHANISM FOR SECURITY ANALYSIS ON A NETWORK DEVICE
A first device may receive content from a second device based on a request for the content. The first device may be located between the second device and a...
2018/0288088 SYSTEM AND METHOD FOR EVALUATING AND ENHANCING THE SECURITY LEVEL OF A NETWORK SYSTEM
Examples described herein provide for a system that evaluates a security level of a network system. Additionally, examples described herein evaluate a security...
2018/0288087 SIMULATION AND VISUALIZATION OF MALWARE SPREAD IN A CLOUD-BASED COLLABORATION ENVIRONMENT
The technology disclosed simulates and analyzes spread of malware through an organization as a result of sharing files using cloud-based services. This...
2018/0288086 SYSTEMS AND METHODS FOR CYBERBOT NETWORK DETECTION
There is provided a neural network system for detection of domain generation algorithm generated domain names, the neural network system comprising: an input...
2018/0288085 PERFORMANCE TRACKING IN A SECURITY INFORMATION SHARING PLATFORM
Example implementations relate to performance tracking in a security information sharing platform. For example, the security information sharing platform may...
2018/0288084 METHOD AND DEVICE FOR AUTOMATICALLY ESTABLISHING INTRUSION DETECTION MODEL BASED ON INDUSTRIAL CONTROL NETWORK
The present application discloses a method for automatically establishing an intrusion detection model based on an industrial control network, including:...
2018/0288083 Comparing Metrics From Different Data Flows to Detect Flaws in Network Data Collection for Anomaly Detection
In an embodiment, a computer-implemented method compares metrics from different data flows to detect flaws in collection of data describing operation of a...
2018/0288082 CAPTURING DATA
A data analytical engine receives packets from a number of different network interface devices. The data is a replica of part or all of transmit or receive...
2018/0288081 Creating Aggregate Network Flow Time Series in Network Anomaly Detection Systems
In an embodiment, a computer implemented method receives flow data for one or more flows that correspond to a device-circuit pair. The method calculates a time...
2018/0288080 ON-BOARD NETWORKED ANOMALY DETECTION (ONAD) MODULES
Method and apparatus for detecting anomalous flights. Embodiments collect sensor data from a plurality of sensor devices onboard an aircraft during a flight. A...
2018/0288079 LATERAL MOVEMENT DETECTION FOR NETWORK SECURITY ANALYSIS
A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The...
2018/0288078 TRACKING AND MITIGATION OF AN INFECTED HOST DEVICE
A security platform may determine mapped attribute information associated with a plurality of host identifiers. The mapped attribute information may include...
2018/0288077 ATTRIBUTE-CONTROLLED MALWARE DETECTION
A computerized method for authenticating access to a subscription-based service to detect an attempted cyber-attack. The method features operations by the...
2018/0288076 MALWARE ANALYSIS METHOD, MALWARE ANALYSIS DEVICE, AND MALWARE ANALYSIS SYSTEM
A malware analysis device 10 includes: a dynamic analysis unit 11 which performs dynamic analysis of malware; a communication determination unit 12 which...
2018/0288075 COMMUNICATION DESTINATION DETERMINATION DEVICE, COMMUNICATION DESTINATION DETERMINATION METHOD, AND RECORDING...
Provided are a communication destination determination device and the like in which a communication destination that is highly likely to pose a threat can be...
2018/0288074 IDENTIFYING MALWARE-SUSPECT END POINTS THROUGH ENTROPY CHANGES IN CONSOLIDATED LOGS
Detecting a malware attack includes monitoring an event log of a first device, wherein the event log identifies events indicating that the first device is...
2018/0288073 ENHANCED AUTHENTICATION WITH DARK WEB ANALYTICS
Objects in a website of a dark web, which is accessible over an anonymous network, are searched for information associated with an entity. A threat level is...
2018/0288072 FRAGMENTED MALWARE HASH LOOKUP IN CLOUD REPOSITORY
A server communicates over a network with a data inspection device (DID) having access to at least portions of a data file, and assists the DID with matching...
2018/0288071 NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUM, DATA FILE TRANSMISSION METHOD, AND INFORMATION PROCESSING...
A non-transitory computer-readable storage medium storing a program that causes a computer to execute a process, the process including transmitting to a source...
2018/0288070 SOCIAL MEDIA RULE ENGINE
A computer implemented method includes receiving instructions from a user for identifying data on one or more social networks, wherein the instructions...
2018/0288069 INTELLIGENT TRANSPORTATION SYSTEM STATION, HOST PROCESSOR, AND METHOD THEREFOR
An intelligent transportation system, ITS, station (600) comprising: a host processor (640); and a memory (664) operably coupled to the host processor (640)....
2018/0288068 METHODS AND APPARATUSES FOR IMPROVED NETWORK COMMUNICATION USING A MESSAGE INTEGRITY SECURE TOKEN
Embodiments are disclosed for limiting an attack surface of a server application by enforcing integrity of a message transmitted to the server application. An...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.