Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2019/0007478 DELAYING PUBLICIZING, AT A SECOND SOURCE, UPLOAD OF A CONTENT ITEM TO A FIRST SOURCE UNTIL CONFIRMATION OF...
Systems and methods are provided for delaying publicizing, at a second source, upload of a content item to a first source, until confirmation of availability...
2019/0007477 SYSTEMS AND METHODS FOR WEB API COMMUNICATION
A method of communication between devices is provided. The method comprises receiving a connection request, establishing a connection in response to the...
2019/0007476 MAPPING A LOW QUALITY MEDIA FILE TO A SEGMENT OF A HIGH QUALITY MEDIA FILE
In a computer-implemented method for mapping a low quality media file to a segment of a high quality media file, the low quality media file and the high...
2019/0007475 Transport Layer Network Service for Live Content Broadcasting
Aspects of the subject disclosure may include, for example, a virtual processing system initiating a first streaming session with a content streaming server to...
2019/0007474 METHODS AND APPARATUS FOR PROACTIVE MULTI-PATH ROUTING
Methods, systems, and devices are described to proactively adapt media streaming by a number of media player clients over a network. Each media player requests...
2019/0007473 PEER-TO-PEER NETWORK LIVE STREAMING SYSTEM AND NODE MANAGEMENT METHOD
The present disclosure provides a peer-to-peer network live streaming system, comprising at least two nodes and a first server. The first server is used to...
2019/0007472 VEHICLE ENTERTAINMENT SYSTEM
A vehicle entertainment system including a server storing media files, and smart monitors. The system includes a server disposed in the vehicle to store media...
2019/0007471 RECEPTION DEVICE, RECEPTION METHOD, TRANSMISSION DEVICE, AND TRANSMISSION METHOD
The present technology relates to a reception device, a reception method, a transmission device, and a transmission method in which a convergence service of...
2019/0007470 COMMUNICATING MEDIA DATA
Communicating media data over a communication system in which a first communication instance for a user of the communication system is implemented at a first...
2019/0007469 COPY AND PASTE FOR WEB CONFERENCE CONTENT
Techniques are disclosed for providing copy/paste support for web conference content. Methods and systems allow copy/paste operations in web conference...
2019/0007468 APPARATUS FOR CALL MANAGEMENT AND METHOD THEREOF
An apparatus for extending during a conference call the number of telephone connections being utilized beyond strict numerical capacity is disclosed, together...
2019/0007467 FILES AUTOMATICALLY SHARED AT CONFERENCE INITIATION
The present technology automatically shares materials at the start of a videoconference without requiring a participant to find the materials or instruct the...
2019/0007466 DYNAMIC ADAPTATION TO INCREASED SFU LOAD BY DISABLING VIDEO STREAMS
A method for dynamically adapting to increased system load at a selective forwarding unit (SFU) is disclosed. In an embodiment, an SFU sends a plurality of...
2019/0007465 REAL-TIME PLACESHIFTING OF MEDIA CONTENT TO PAIRED DEVICES
Methods, devices, and systems are provided for placeshifting a media program. An exemplary method involves a media device storing identification information...
2019/0007464 TERMINAL, BASE STATION, AND CODEC MODE SWITCHING METHOD
A UE includes an EUTRA-CMR reception unit that receives a codec mode request (EUTRA-CMR) including a codec mode that is determined by an eNB in accordance with...
2019/0007463 MULTIMEDIA COMPOSITION IN MEETING SPACES
Functions and controls for multimedia sessions are shared amongst pluralities of electronic components, rather than run by a single control unit. A...
2019/0007462 MULTI-PLATFORM DIGITAL RIGHTS MANAGEMENT FOR PLACESHIFTING OF MULTIMEDIA CONTENT
Devices, methods, and program products are provided, which support multiple Digital Rights Management (DRM) schemes or platforms during the placeshifting of...
2019/0007461 PROVIDING SIP SIGNALING DATA FOR THIRD PARTY SURVEILLANCE
Facilitating surveillance of a targeted user participating in communication sessions over a network, such as a VoIP network, that employs SIP. The method...
2019/0007460 SYSTEM AND METHOD FOR SECURE SYNCHRONIZATION OF DATA ACROSS MULTIPLE COMPUTING DEVICES
A computer implemented method and apparatus comprises detecting a file content update on a first client computer system, the file to be synchronized on a...
2019/0007459 LOCATION BASED SHARING OF A NETWORK ACCESS CREDENTIAL
A network access credential can be shared among devices based on location information for a device. Location information can include timed fingerprint location...
2019/0007458 METHODS FOR SECURING SERVERLESS FUNCTIONS
A system and methods for protecting a serverless function including analyzing the serverless function to identify vulnerabilities or insecure configurations...
2019/0007457 Access Policies Based on HDFS Extended Attributes
Systems, computer program products and methods implementing access control on a distributed file system are described. A policy engine enforces one or more...
2019/0007456 ENFORCING MICRO-SEGMENTATION POLICIES FOR PHYSICAL AND VIRTUAL APPLICATION COMPONENTS IN DATA CENTERS
A device may receive policy information associated with a first application group and a second application group. The device may receive network topology...
2019/0007455 MANAGEMENT OF A HOSTS FILE BY A CLIENT SECURITY APPLICATION
Systems and methods for managing a host name resolution file by a client security manager are provided. In one embodiment, a client security manager acquires a...
2019/0007454 DYNAMIC IMPLEMENTATION OF A SECURITY RULE
A device may receive information identifying a set of conditions related to controlling implementation of a set of security rules. The set of conditions may be...
2019/0007453 INTENT-BASED NETWORK SECURITY POLICY MODIFICATION
A device may receive first information associated with a set of security rules. The first information may identify a set of security actions a device is to...
2019/0007452 SYSTEM AND METHOD FOR INTERCEPTING ENCRYPTED TRAFFIC AND INDICATING NETWORK STATUS
A computer-implemented method for notifying a client application of an event by preventing the setup of a TLS (Transport Layer Security) secure connection...
2019/0007451 SYSTEM AND METHOD OF AUTOMATICALLY COLLECTING AND RAPIDLY AGGREGATING GLOBAL SECURITY THREAT INDICATORS TO...
A method of providing internet security is provided that includes accessing and monitoring a list of online threat exchanges or indexes, wherein accessing the...
2019/0007450 DETECTION OF NETWORK SNIFFING ACTIVITY
Methods and systems for detecting passive malicious network-mapping software on a computer network are disclosed. An expected location within a computer system...
2019/0007449 METHOD OF BLOCKING DISTRIBUTED DENIAL OF SERVICE ATTACKS AND CORRESPONDING APPARATUS
Gateways monitor communications between their LAN devices and the WAN and count the number of requests per LAN device to target IP addresses. If the number of...
2019/0007448 INCIDENT RESPONSE AUTOMATION ENGINE
Systems, methods, and software described herein enhances how security actions are implemented within a computing environment. In one example, a method of...
2019/0007447 Peer Device Protection
Examples of the present disclosure describe systems and methods for peer device protection. Peer device protection enables a first device comprising a digital...
2019/0007446 PROGRAM GENERATION METHOD AND ELECTRONIC CONTROL UNIT
A program generation method includes extracting a control flow that represents a call/return relationship between functions as well as extracting the functions...
2019/0007445 SYSTEM AND METHOD FOR REPAIRING VULNERABILITIES OF OBJECTS CONNECTED TO A DATA NETWORK
Disclosed are systems and methods for repairing vulnerabilities of objects connected to a data network. An example method includes transmitting a request...
2019/0007444 MITIGATING SECURITY VULNERABILITIES IN WEB CONTENT
Methods and apparatus are described for automatically modifying web page source code to address a variety of security vulnerabilities such as, for example,...
2019/0007443 SECURITY POLICY ANALYZER SERVICE AND SATISFAIBILITY ENGINE
Security policies may be utilized to grant or deny permissions related to the access of computing resources. Two or more security policies may be compared to...
2019/0007442 SYSTEM AND USER CONTEXT IN ENTERPRISE THREAT DETECTION
A transfer of master data is executed in a backend computing system. The master data includes user data and system data. The transfer of master data includes...
2019/0007441 NETWORK ANOMALY DETECTION
A security system detects anomalous activity in a network. The system logs user activity, which can include ports used, compares users to find similar users,...
2019/0007440 DARK WEB MONITORING, ANALYSIS AND ALERT SYSTEM AND METHOD
A dark web monitoring, analysis and alert system comprising a data receiving module configured to receive data collected from the dark web and structured; a...
2019/0007439 ANALYSIS METHOD, ANALYSIS DEVICE, AND ANALYSIS PROGRAM
A network standpoint feature value creating unit classifies access data collected at observation points into each detection target access source and creates...
2019/0007438 Protection from Malicious and/or Harmful Content in Cloud-Based Service Scenarios
There are provided measures for protection from malicious and/or harmful content in cloud-based service scenarios. Such measures exemplarily include detecting...
2019/0007437 Security Breach Reporting and Incident Management System
A breach reporting and incident management (BRIM) system and method are disclosed. The system and method include a network hardware and software platform...
2019/0007436 MALWARE IDENTIFICATION VIA SECONDARY FILE ANALYSIS
A device may include one or more processors to receive a file that may be analyzed for malware; open the received file in a secure environment; determine that...
2019/0007435 PATTERN CREATION IN ENTERPRISE THREAT DETECTION
Search results are received from an initiated free text search of log data from one or more logs, where the free text is performed using search terms entered...
2019/0007434 AUTOMATED DETECTION OF MALWARE USING TRAINED NEURAL NETWORK-BASED FILE CLASSIFIERS AND MACHINE LEARNING
Automated malware detection for application file packages using machine learning (e.g., trained neural network-based classifiers) is described. A particular...
2019/0007433 SERVER-SUPPORTED MALWARE DETECTION AND PROTECTION
A method includes receiving, at a server, a first file attribute from a computing device, the first file attribute associated with a file. The method also...
2019/0007431 INSIDER ATTACK RESISTANT SYSTEM AND METHOD FOR CLOUD SERVICES INTEGRITY CHECKING
An insider attack resistant system for providing cloud services integrity checking is disclosed. In particular, the system utilizes an automated integrity...
2019/0007430 SYSTEM AND METHOD FOR PROVIDING DATA AND DEVICE SECURITY BETWEEN EXTERNAL AND HOST DEVICES
A secure data exchange system comprising a security device including a first external device plug, and a security engine operative to enforce a security policy...
2019/0007429 Home-Based Physical and Cyber Integrated Security-Intrusion Detection System (PCIS-IDS)
Provided is an integrated physical security and cyber security intrusion and anomaly detection method for determining physical or electronic ingress/egress of...
2019/0007428 Detecting Compromised Credentials in a Credential Stuffing Attack
Techniques are provided for detecting compromised credentials in a credential stuffing attack. A set model is trained based on a first set of spilled...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.