Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0332097 METHOD FOR PREDICTING CALL QUALITY AND CALL QUALITY PREDICTION SERVICE APPARATUS FOR PERFORMING THE SAME
Disclosed herein is a method for predicting a call quality with respect to the other side by one side of the first and second Internet communication...
2018/0332096 ENCODING AND TRANSMITTING STREAM DATA WITHOUT PRIOR KNOWLEDGE OF DATA SIZE
Implementations are provided herein for encoding and transmitting streaming data from a client application to a server for storage without prior knowledge of...
2018/0332095 DE-MULTIPLEXING STREAMING DATA FROM A FAST WRITE AHEAD DURABLE LOG INTO SEGMENTS
Implementations are provided herein for managing streaming data that appended and multiplexed into a durable write ahead replicated log. By writing data in the...
2018/0332094 Systems, Methods, and Media for Streaming Media Content
Methods, systems, and computer readable media for streaming media content are provided. In some embodiments, the methods comprise: receiving top level index...
2018/0332093 Detecting Upscaled Source Video
Techniques are disclosed for estimating a source resolution of image data presented to a system. According to these techniques, input image data may be...
2018/0332092 PREDICTIVE MANAGEMENT OF OFFLINE STORAGE CONTENT FOR MOBILE APPLICATIONS AND OPTIMIZED NETWORK USAGE FOR MOBILE...
There are provided a system, a method and a computer program product for controlling one or more media files in a mobile device. The system predicts a future...
2018/0332091 SYSTEM TO DYNAMICALLY ADJUST REQUEST VALUES AT A BACK-END APPLICATION SERVER
According to some embodiments, systems, methods, apparatus, computer program code and means may receive data streams from remote third-party administrator...
2018/0332090 CONTENT SERVER MEDIA STREAM MANAGEMENT
Mechanisms are provided to manage media stream transmissions at a content server. A content server detects that a user on a device such as a mobile device has...
2018/0332089 Handling Of Content Delivery In A Client Node
There is provided mechanisms for handling content delivery in a client node. A method being performed by the client node. The method comprises registering, by...
2018/0332088 ATOMICALLY COMMITTING RELATED STREAMING DATA ACROSS MULTIPLE DISTRIBUTED RESOURCES
Implementations are provided herein for atomically committing related stream data across multiple, distributed resources. Transactions can be established that...
2018/0332087 EFFICIENTLY EXECUTING CONCURRENT OPERATIONS THAT DEPEND ON EACH OTHER IN A STREAMING DATA ENVIRONMENT
Implementations are provided herein for accepting operations asynchronously in a particular order and efficiently committing them into an append-only log while...
2018/0332086 Methods and Systems for Accessing Relevant Content
A server system sends links to content categories for display on a user device associated with a user. Each content category corresponds to a subset of content...
2018/0332085 APPLICATION EXECUTION METHOD AND APPARATUS
A method and an apparatus for executing an application are provided. The application execution method of the present disclosure includes connecting a first...
2018/0332084 AUTOMATIC FORWARDING OF INCOMING CALLS BASED ON USER INTERACTION WITH DEVICES
An automated registration service supported on an application server that interoperates with an IMS (IP Multimedia Subsystem) core network is configured to...
2018/0332083 MEDIA USER AGENT AND MEDIA BACK-TO-BACK USER AGENT LAYERS
A method of processing session initiation protocol (SIP) call flows, the method comprising, at a back-to-back user agent (B2BUA) configuring a media user agent...
2018/0332082 POSITIONALLY-ENCODED STRING REPRESENTATIONS, INCLUDING THEIR USE IN MACHINE LEARNING AND IN SECURITY APPLICATIONS
String comparison, including comparing strings with a rule, can be time consuming, and strings may not be suitable for analysis using machine learning...
2018/0332081 POLICY BASED ON A REQUESTED BEHAVIOR
In some examples, a system receives a context of an application to request a set of network traffic, the context including a requested behavior of a service...
2018/0332080 Secure Web Container for a Secure Online User Environment
Disclosed herein are systems and methods that allow for secure access to websites and web-based applications and other resources available through the browser....
2018/0332079 EFFICIENT AND SECURE USER CREDENTIAL STORE FOR CREDENTIALS ENFORCEMENT USING A FIREWALL
Techniques for an efficient and secure store for credentials enforcement using a firewall are disclosed. In some embodiments, a system, process, and/or...
2018/0332078 THIN AGENT-BASED SSL OFFLOADING
Exemplary methods, apparatuses, and systems perform a secure socket layer (SSL) protocol initialization and maintenance on behalf of a virtual machine (VM)....
2018/0332077 ANTI-PHISHING PROTECTION
Anti-Phishing protection assists in protecting against phishing attacks. Any links that are contained within a message that has been identified as a phishing...
2018/0332076 DETECTING AND ATTRIBUTING UNDESIRABLE AUTOMATIC REDIRECTS
Techniques are described for detecting and attributing automatic unauthorized redirects originating from executable code contained within an advertisement...
2018/0332075 Secure Wireless Ranging
Embodiments for securely determining a separation distance between wireless communication devices is provided. These embodiments include receiving a...
2018/0332074 MANAGEMENT OF ACTIONS IN A COMPUTING ENVIRONMENT BASED ON ASSET CLASSIFICATION
Systems, methods, and software described herein provide for responding to security threats in a computing environment based on the classification of computing...
2018/0332073 Moving Target Defense for Distributed Systems
An apparatus and method defends against computer attacks by destroying virtual machines on a schedule of destruction in which virtual machines are destroyed in...
2018/0332072 User Behavior Profile Including Temporal Detail Corresponding to User Interaction
A system, method, and computer-usable medium are disclosed for generating a cyber behavior profile comprising monitoring user interactions between a user and...
2018/0332071 MULTI-FACTOR AUTHENTICATION USING A USER BEHAVIOR PROFILE AS A FACTOR
A system, method, and computer-usable medium are disclosed for performing a multi-factor authentication operation, comprising: monitoring ...
2018/0332070 User Behavior Profile Environment
A method, system and computer-usable medium are disclosed for generating a cyber behavior profile comprising monitoring user interactions between a user and an...
2018/0332069 ELASTIC ASSET-BASED LICENSING MODEL FOR USE IN A VULNERABILITY MANAGEMENT SYSTEM
The disclosure generally relates to a vulnerability management system configured to implement an asset-based identification algorithm to identify, update, and...
2018/0332068 User Behavior Profile
A method, system and computer-usable medium are disclosed for generating a cyber behavior profile comprising monitoring user interactions between a user and an...
2018/0332067 METHOD AND APPARATUS FOR PROTECTING CONSUMERS AND RESOURCES IN A COMMUNICATION NETWORK
Aspects of the subject disclosure may include, for example, a method including comparing call volume of call sessions associated with a wireless network node...
2018/0332066 User Behavior Profile
A method, system and computer-usable medium are disclosed for generating a cyber behavior profile comprising monitoring user interactions between a user and an...
2018/0332065 AUTHENTICATING AN UNKNOWN DEVICE BASED ON RELATIONSHIPS WITH OTHER DEVICES IN A GROUP OF DEVICES
Provided are techniques for authenticating an unknown device. For a first device in an internet of things network that includes a second device and forms a...
2018/0332064 CYBERSECURITY SYSTEM
A computing device computes a risk score for a user using a device based on a peer group identifier. Network activity measures characterize use of the device...
2018/0332063 User Profile Definition and Management
A method, system and computer-usable medium for performing a security analysis operation within a security environment, comprising: monitoring ...
2018/0332062 Discerning Psychological State From Correlated User Behavior and Contextual Information
A method, system and computer-usable medium for performing a psychological profile operation. The psychological profile operation includes: monitoring user...
2018/0332061 INFORMATION PROCESSING APPARATUS, METHOD AND MEDIUM FOR CLASSIFYING UNAUTHORIZED ACTIVITY
An information processing apparatus specifies the phase of activity of a terminal connected to a network by comparing a communication by the terminal with a...
2018/0332060 MALWARE DETECTION IN DISTRIBUTED COMPUTER SYSTEMS
Methods and systems of malware detection in distributed computer systems. An example method includes: receiving, by a network router, a network packet...
2018/0332059 SYSTEM AND METHOD FOR INTERCEPTION OF MALICIOUS FILES
A system and method for interception of malicious files, the system comprising an agent component planted in a mail server; a protection server configured to...
2018/0332058 SYSTEMS AND METHODS FOR NETWORK TRAFFIC ANALYSIS
Systems and methods are disclosed for identifying malicious traffic associated with a website. One method includes receiving website traffic metadata...
2018/0332057 CYBERATTACK BEHAVIOR DETECTION METHOD AND APPARATUS
A cyberattack behavior detection method and related apparatus are provided. The method includes receiving user upload information in a multilayer architecture,...
2018/0332056 IDENTIFICATION OF A DNS PACKET AS MALICIOUS BASED ON A VALUE
Examples classify a payload field within a domain name system (DNS) packet according to a level of risk associated with the payload field. Based on the...
2018/0332055 INTEGRATED SECURITY SYSTEM HAVING RULE OPTIMIZATION
Techniques are described for optimizing the placement of automatically generated rules within security policies. An administrator may, for example, interact...
2018/0332054 Managing Blockchain Access to User Profile Information
A method, system and computer-usable medium for generating a user behavior profile, comprising: monitoring user interactions between a user and an information...
2018/0332053 VALIDATING A DEVICE CLASS CLAIM USING MACHINE LEARNING
In one embodiment, a device in a network receives an access policy and a class behavioral model for a node in the network that are associated with a class...
2018/0332052 VIRTUAL NETWORK FUNCTION (VNF) HARDWARE TRUST IN A NETWORK FUNCTION VIRTUALIZATION (NFV) SOFTWARE DEFINED...
A Network Function Virtualization Infrastructure (NFVI) maintains hardware-trusted communications. In the NFVI, a hardware-trust controller executes at a Ring...
2018/0332051 MANAGEMENT OF INTEGRITY PROTECTION OF A LOGICAL LINK CONTROL PACKET DATA UNIT
A first node (800; 120; 130) for managing integrity protection of a Logical Link Control, "LLC", Packet Data Unit, "PDU", is configured to communicate in a...
2018/0332050 PROVISIONING WORK ENVIRONMENTS USING VIRTUAL PHONE IMAGES
In some aspects, a mobile application package is bound to a privileged component of a mobile device operating system. The mobile application package includes a...
2018/0332049 USER LOCATION CHECK METHOD, CONTROLLED DEVICE ACCESS METHOD, CONTROLLED DEVICE, AND USER TERMINAL
A controlled device dynamically generates a first security code and broadcasts the first security code repeatedly within a predefined time window. A mobile...
2018/0332048 SECURITY DETERMINATION
A method and system for determining user security is provided. The method includes registering a first user associated with a service provider system by...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.