Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0316756 CROSS-PLATFORM REPLICATION OF LOGICAL UNITS
To replicate a source LUN to a different storage system platform, a first storage system transmits a request to replicate a LUN along with attributes for the...
2018/0316755 METHOD AND APPARATUS FOR INTERWORKING BETWEEN HETEROGENEOUS SYSTEMS
The present disclosure relates to a technology for a sensor network, machine to machine (M2M) communication, machine type communication (MTC), and the Internet...
2018/0316754 DEPLOYMENT OF A NETWORK RESOURCE BASED ON A CONTAINMENT STRUCTURE
A system for provisioning resources within a computer network includes a processor and a memory. The memory stores instructions executable by the processor to...
2018/0316753 HASH DATA STRUCTURE BIASING
One embodiment of the present invention sets forth a technique for generating one or more hash data structures. The technique includes generating a hash data...
2018/0316752 SENDER SYSTEM STATUS-AWARE LOAD BALANCING
Workload processing is facilitated in a data processing environment including a sender system, a load balancer and a plurality of target resources. The sender...
2018/0316751 ANTI-FLAPPING SYSTEM FOR AUTOSCALING RESOURCES IN CLOUD NETWORKS
An autoscaling system for scaling resource instances in a cloud network includes an autoscaling application is stored in memory and executed by a processor....
2018/0316750 DEPLOYMENT OF MULTI-TASK ANALYTICS APPLICATIONS IN MULTI-CLOUDS
An information processing system, a computer readable storage medium, and a method for distributing an application among computing nodes in a distributed...
2018/0316749 CLUSTER RESOURCE MANAGEMENT IN DISTRIBUTED COMPUTING SYSTEMS
Techniques for managing resources among clusters of computing devices in a computing system are described herein. In one embodiment, a method includes...
2018/0316748 CONTEXT-AWARE PEER-TO-PEER COMMUNICATION
Methods and systems are disclosed for determining context information for one or more peers to be used in a peer discovery and/or peer association process(es)...
2018/0316747 MANAGING CONTENT DOWNLOADS
Content downloads can be managed. For example, intermediary software can receive a first request to download content from a remote server. The intermediary...
2018/0316746 Edge Server Selection for Device-Specific Network Topologies
A server selects edge-server sets to deliver data to client devices. To rapidly find an optimal or near-optimal edge-server set, the server constructs a...
2018/0316745 TERMINAL APPARATUS AND SERVER AND METHOD OF CONTROLLING THE SAME
A terminal apparatus provides shared profile information that is selectively received from a server based on a relationship between a first user and a second...
2018/0316744 Application Recommendation Method, Device, and System
Embodiments of the present invention disclose an application recommendation method, device, and system, which relate to the field of network technologies, and...
2018/0316743 INTELLIGENT DATA TRANSMISSION BY NETWORK DEVICE AGENT
In one aspect, a system for intelligent monitoring of a network device in a monitored environment includes a processor; a memory; and one or more modules...
2018/0316742 ADAPTIVE MULTI-CONTROL UNIT LOAD BALANCING IN A VOICE-OVER-IP SYSTEM
A Voice-over-IP (VOIP) system includes a plurality of multi control units (MCUs), in which a first MCU hosts a VOIP session. A method for recommending an MCU...
2018/0316741 Synthetic Transaction based on Network Condition
Techniques for a synthetic transaction based on a network condition are described. According to various implementations, a synthetic transaction represents a...
2018/0316740 DEADLINE SIGNALING FOR STREAMING OF MEDIA DATA
A client device includes a memory comprising a buffer for buffering data having real-time constraints and a hardware-based processor comprising digital logic...
2018/0316739 METHOD AND DEVICE FOR REALIZING COMPATIBILITY OF SECONDARY VIDEO
A method and a device for realizing compatibility of secondary videos. The method comprises: connecting a first terminal to a second terminal through a hub,...
2018/0316738 METHOD OF CONTROLLING A REAL-TIME CONFERENCE SESSION
In a method of controlling a real-time conference session there is a first user and a second user connected to a media processing unit. The first user has a...
2018/0316737 PLAYING PROCESSING METHOD, TERMINAL DEVICE, AND COMPUTER STORAGE MEDIUM
The present disclosure discloses a media playing method, a terminal device, and a computer storage medium. The method includes dividing content of a target...
2018/0316736 MULTI-HYPOTHESIS RATE ADAPTATION FOR HTTP STREAMING
A multi-hypothesis rate adaptation technique may be performed for one or more wireless multimedia streaming scenarios. Managing a multimedia streaming session...
2018/0316735 SYSTEMS AND METHODS OF STREAMING DATA
Systems and methods of stream technologies are disclosed. In some example embodiments, a method and system for a database stream switchover from one data...
2018/0316734 METHOD EXECUTED ON COMPUTER FOR COMMUNICATING VIA VIRTUAL SPACE, PROGRAM FOR EXECUTING THE METHOD ON COMPUTER,...
A method to be executed by a first computer includes receiving at every first time interval a first signal output by a first sensor. The method further...
2018/0316733 COMMUNICATION SYSTEM WITH COMMUNICATION MECHANISM AND METHOD OF OPERATION THEREOF
A communication system includes: a control unit configured to: connect a system user with channel participant in an anonymous voice chat session; determine a...
2018/0316732 ENHANCED MEDIA PLANE OPTIMIZATION IN WEB REAL TIME COMMUNICATION SCENARIOS
Enhanced media plane optimization in web real time communication scenarios There are provided measures for enhanced media plane optimization in web real time...
2018/0316731 MULTI-AREA GROUPING
A first media device, method, and non-transitory computer readable medium for multi-area grouping of devices. The first media device includes a transceiver and...
2018/0316730 SECURITY MECHANISM FOR COMMUNICATION NETWORK INCLUDING VIRTUAL NETWORK FUNCTIONS
An apparatus comprising at least one processing circuitry, and at least one memory for storing instructions to be executed by the processing circuitry, wherein...
2018/0316729 CENTRALIZED MANAGEMENT OF A SOFTWARE DEFINED AUTOMATION SYSTEM
Embodiments of system and methods for providing centralized management of a software defined automation ("SDA") system are disclosed. The SDA system comprises...
2018/0316728 METHOD AND APPARATUS FOR DETECTING SECURITY USING AN INDUSTRY INTERNET OPERATING SYSTEM
Disclosed area method and apparatus for detecting security using an industry internet operating system so as to address problems in the prior art of poor...
2018/0316727 ENABLING USER DEFINITION OF ANOMALY ACTION RULES IN A NETWORK SECURITY SYSTEM
The disclosed embodiments include a method performed by a computer system. The method includes receiving first user input defining a filter of an anomaly...
2018/0316726 REPLICATION OF IDENTITY-DERIVED PRIMARY KEYS WITHOUT RANGE RESTRICTIONS
This disclosure provides an apparatus and method for replication of identity-derived primary keys without range restrictions, including but not limited to in...
2018/0316725 SECURE AND POLICY-DRIVEN COMPUTING FOR FOG NODE APPLICATIONS
In one embodiment, a device in a network gathers characteristics of a container application on the device. The device provides the gathered characteristics of...
2018/0316724 SECURE COMMUNICATION SESSION RESUMPTION IN A SERVICE FUNCTION CHAIN
A method for resuming a Transport Layer Security (TLS) session in a Service Function Chain comprising a plurality of Service Function nodes coupled to a...
2018/0316723 EFFICIENT USE OF IPSEC TUNNELS IN MULTI-PATH ENVIRONMENT
A system and method is provided for securing network traffic across a plurality of connections to a computing device without requiring each connection to have...
2018/0316722 SYSTEMS AND METHODS FOR IDENTIFYING ILLEGITIMATE ACTIVITIES BASED ON GRAPH-BASED DISTANCE METRICS
Systems, methods, and non-transitory computer-readable media can generate a node graph comprising a plurality of user account nodes and a plurality of edge...
2018/0316721 INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, AND INFORMATION...
An information processing device is provided. A first communication unit transmits and receives communication data through a network. The network is connected...
2018/0316720 System and Method for Process Hollowing Detection
A method and system for remediating a process hollowing intrusion on a user device comprising detecting a process starting on the user device, preparing the...
2018/0316719 METHOD FOR MITIGATION OF CYBER ATTACKS ON INDUSTRIAL CONTROL SYSTEMS
Methods and systems for detecting a potential compromise of cyber security in an industrial network are disclosed. These methods and systems comprise elements...
2018/0316718 SECURITY ACTIONS FOR COMPUTING ASSETS BASED ON ENRICHMENT INFORMATION
Systems, methods, and software described herein provide enhancements for implementing security actions in a computing environment. In one example, a method of...
2018/0316717 BLOCKCHAIN TRACKING OF VIRTUAL UNIVERSE TRAVERSAL RESULTS
An exemplary computer-implemented method includes obtaining at least one teleportation invite block that records a virtual universe teleportation invite marked...
2018/0316716 BLOCKCHAIN TRACKING OF VIRTUAL UNIVERSE TRAVERSAL RESULTS
An exemplary computer-implemented method includes obtaining at least one teleportation invite block that records a virtual universe teleportation invite marked...
2018/0316715 METHOD, SYSTEM, AND COMPUTER PROGRAM PRODUCT FOR AUTOMATICALLY MITIGATING VULNERABILITIES IN SOURCE CODE
A method for automatically mitigating vulnerabilities in a source code of an application is provided in the present invention. The method includes the...
2018/0316714 SYSTEM AND METHOD OF TRAFFIC FILTERING UPON DETECTION OF A DDOS ATTACK
Disclosed are a system, a method, and computer readable storage medium having instructions for filtering network traffic to protect a server from a distributed...
2018/0316713 USER INTERFACE FOR DEFINING CUSTOM THREAT RULES IN A NETWORK SECURITY SYSTEM
The disclosed embodiments include a method performed by a computer system. The method includes causing display of one or more graphical controls enabling a...
2018/0316712 APPARATUS AND METHODS FOR SHORTENING USER EXPOSURE TO MALICIOUS WEBSITES
A method for enhancing computer security is provided. The method may include receiving a first dataset including a first plurality of web sites and a second...
2018/0316711 PERSONALIZED THREAT PROTECTION
Implementations described herein disclose a system for providing personalized threat protection for users of computer applications. An implementation of a...
2018/0316710 FRAUDULENT MESSAGE DETECTION DEVICE, ELECTRONIC CONTROL APPARATUS EQUIPPED WITH FRAUDULENT MESSAGE DETECTION...
Provided is a fraudulent message detection device that detects a fraudulent message in a bus network and includes: a resynchronization detector that detects an...
2018/0316709 SYSTEM AND METHOD FOR DETECTING REGULATORY ANOMALIES WITHIN ELECTRONIC COMMUNICATION
A system and method for detecting a regulatory anomaly within electronic communication between end-point devices over a network. The method includes:...
2018/0316708 Endpoint Detection and Response System with Endpoint-based Artifact Storage
Each of a plurality of endpoint computer systems monitors data relating to a plurality of events occurring within an operating environment of the corresponding...
2018/0316707 Clustering and Outlier Detection in Anomaly and Causation Detection for Computing Environments
Clustering and outlier detection in anomaly and causation detection for computing environments is disclosed. An example method includes receiving an input...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.