Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,344,483 System and method for facilitating remote downloading
A method for facilitating remote downloading, in accordance with particular embodiments, includes receiving, at a proxy server maintained by a wireless service...
US-9,344,482 Local agent for remote file access system
Systems and methods for remote file access are disclosed. According to an embodiment, a local agent polls a server for a task request at a polling interval...
US-9,344,481 System and method for adapting information content according to the capability of the access bearer
A communication system is adapted to provide access to application information on an application server utilizing a specific one of multiple radio access types....
US-9,344,480 Method of providing wireless data communication service using IP and apparatus thereof
Disclosed is an apparatus for providing a wireless data communication service using Internet protocol. The apparatus includes a connection manager (CM) which...
US-9,344,479 Real-time, customized embedding of specific content into local webserver pages
In a particular embodiment, a method includes receiving, at a server from a computing device coupled to a first network, a request to access a first web page...
US-9,344,478 Method and apparatus for managing content distribution over multiple terminal devices in collaborative media system
A method and an apparatus for managing content distribution over multiple terminal devices in collaborative media system are provided. In the collaborative...
US-9,344,477 Apparatus and method for providing streaming content
A method and apparatus for an adaptive Hypertext Transfer Protocol (HTTP) streaming service using metadata of media content are provided. The media content may...
US-9,344,476 Technique for controlling data packet transmission of variable bit rate data
A technique is disclosed for controlling data packet transmissions from a server to a client having a client buffer in accordance with a waiting mode and a...
US-9,344,475 Media transmission method and system based on telepresence
A media transmission method based on telepresence is disclosed, comprising: during connection establishment, a master telepresence terminal of a local media...
US-9,344,474 Method and system for supplying media over communication networks
Methods and systems for supplying media over communication networks are described. In one embodiment, a media supplier determines whether a media object hosted...
US-9,344,473 Methods, systems, and apparatus for fragmented file sharing
Systems, methods, software, and apparatus are described for facilitating the distribution and management of fragmented content. In one embodiment, a packager...
US-9,344,472 Seamlessly playing a composite media presentation
A computer-implemented method for seamlessly playing a composite media presentation, includes receiving, by a sequencer, a sequential playlist provided by a...
US-9,344,471 Method and apparatus for managing and processing information of an object for multi-source-streaming
Preparing of information about a content source is disclosed. One method in accordance with the information preparing creates item information on a first...
US-9,344,470 Methods and systems for data transmission
Example methods and systems for transmitting data are presented. In one example, a plurality of streams of video data may be received from at least one data...
US-9,344,469 Techniques for event based queuing, ordering and time slot computation of multi-modal meeting presentations
A scheduling request to schedule an online meeting is received. The online meeting involves a plurality of participants during which multiple participants may...
US-9,344,468 Method and apparatus for controlling information in virtual world
Provided is a method for controlling information shared in a virtual world by a server and a plurality of users' client terminals connected to each other...
US-9,344,467 Sensor data acquisition system and method based on integration of terminal and cloud
A cloud-based sensor data acquisition system includes one or more sensors configured to acquire sensor data; a first terminal configured to transmit sensor data...
US-9,344,466 Methods and systems for facilitating online collaboration and distribution of geospatial data
Improved methods, systems, and software for facilitating online collaboration and distribution of geospatial data are provided. Geospatial data available over a...
US-9,344,465 Correlating computing network events
According to one aspect of the present disclosure a system and technique for correlating computing network events is disclosed. The system includes a processor,...
US-9,344,464 Provisioning of player for content
An aspect provides a method, including: responsive to receiving a content request of a user device, determining if the user device has access to one or more...
US-9,344,463 Method and apparatus for service control
A method and apparatus for service control in which a service centralization and continuity application server (SCC AS): receives a first SIP message for...
US-9,344,462 Switching between connectivity types to maintain connectivity
Techniques are provided for leveraging narrowband connectivity (such as dial-up communications or other types of low bandwidth communications) to provision or...
US-9,344,461 Seamless session handover
Method, user device and computer program product communicating data between a first endpoint and a second endpoint. A plurality of logical communications...
US-9,344,460 High availability session reconstruction
A first message is received at a primary container that is replicated by a secondary container. The first message is an initial message to initiate a first...
US-9,344,459 Telecommunication system and method of communicating protocol information
The present invention applies to telecommunication networks, such as wireless mobile networks. In particular, the present invention deals with providing more...
US-9,344,458 Providing unified communications services
Methods and apparatuses, including computer program products, are described for providing unified communication services for communication sessions between...
US-9,344,457 Automated feedback for proposed security rules
A computer determines a number of matches returned by a proposed security rule that result from application of the proposed security-rule to historical logged...
US-9,344,456 Distributed multi-processing security gateway
A system and method for a distributed multi-processing security gateway establishes a host side session, selects a proxy network address for a server, uses the...
US-9,344,455 Apparatus and method for sharing a hardware security module interface in a collaborative network
A first communication device having a secure access to a security module establishes a collaborative network by forming a collaborative security association...
US-9,344,454 Domain policy specification and enforcement
Determining that a domain is a candidate for processing by a domain policy enforcement system is disclosed herein. A DNS request is received. A domain included...
US-9,344,453 Secure protocol execution in a network
For secure configuration of network nodes from a backend with low connectivity requirements and workload at the backend and reduced communication overhead, a...
US-9,344,452 User control over WiFi network access
A server system transfers display data for presentation to a user who selects multiple geographically-distributed WiFi access systems and a password. The server...
US-9,344,451 Enhanced thread handling in security handshaking
Disclosed herein are methods, systems, and software for handling threaded processes in security handshaking between end users and content delivery nodes are...
US-9,344,450 Detecting phishing of a matrix barcode
A method and a system for detecting phishing of a matrix barcode is provided. The matrix barcode comprises colored and white squares in rows and columns. The...
US-9,344,449 Risk ranking referential links in electronic messages
A computer system enables a business to reduce risks from phishing electronic messages. One or more original web links embedded in the electronic message may be...
US-9,344,448 Method and system for detecting and mitigating attacks performed using cryptographic protocols
A method and system for detecting and mitigating attacks performed using a cryptographic protocol are provided. The method comprises establishing an encrypted...
US-9,344,447 Internal malware data item clustering and analysis
Embodiments of the present disclosure relate to a data analysis system that may automatically generate memory-efficient clustered data structures, automatically...
US-9,344,446 Systems and methods for malware detection and scanning
Systems and methods are provided for malware scanning and detection in a computing system. In one exemplary embodiment, the method includes launching, in a...
US-9,344,445 Detecting malicious network software agents
This disclosure describes techniques for determining whether a network session originates from an automated software agent. In one example, a network device,...
US-9,344,444 Generating a multiple-prerequisite attack graph
In one aspect, a method to generate an attack graph includes determining if a potential node provides a first precondition equivalent to one of preconditions...
US-9,344,443 Finding command and control center computers by communication link tracking
Methods, systems, and apparatus, including computer programs encoded on computer storage media for identifying malware attacks collects data traffic...
US-9,344,442 Finding command and control center computers by communication link tracking
Methods, systems, and apparatus, including computer programs encoded on computer storage media for identifying malware attacks collects data traffic...
US-9,344,441 Detection of malicious network connections
In one embodiment a method, system and apparatus is described for detecting a malicious network connection, the method system and apparatus including...
US-9,344,440 Forced alert thresholds for profiled detection
A node in a communication network determines a data rate capacity of one or more nodes of the communication network and creates a single managed object grouping...
US-9,344,439 Executing unprotected mode services in a protected mode environment
Disclosed herein is a method for executing unprotected mode services in a protected mode computing environment includes initiating a protected mode service that...
US-9,344,438 Secure node identifier assignment in a distributed hash table for peer-to-peer networks
A multi-party commitment method is provided whereby a joining node uses contributions provided by contributor nodes in a peer-to-peer overlay network to...
US-9,344,437 Internet of things security
Apparati, methods, and computer-readable media for improving the security of communications networks. An embodiment of the present invention is a system for...
US-9,344,436 Proximity-based and user-based access control using wearable devices
Methods and apparatuses are described for proximity-based and user-based access control using wearable devices. A short-range frequency reader coupled to a...
US-9,344,435 Using a local authorization extension to provide access authorization for a module to access a computing system
Provided are a method, system, and computer program product for a local authorization extension to provide access authorization for a module to access a...
US-9,344,434 GET VPN group member registration
An example of the present disclosure includes a Group Member (GM) registering on a Key Server (KS) in a Group Encrypted Transport Virtual Private Network (GET...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.