Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,350,778 Management and prioritization of media item downloading
The disclosed embodiments relate generally to the downloading of media items. The media items may include, for example, audio, video, image, or podcast data. In...
US-9,350,777 System and method for routing media
The system and method for streaming media to a viewer and managing the media comprises an enhanced service routing processor (ESRP), a real time switch...
US-9,350,776 System and method for listening to teams in a race event
A computer-implemented method and system allows a remote computer user to listen to teams in a race event. The method includes receiving audio signals from a...
US-9,350,775 Method to initiate server based collaboration on E-mail attachments
Server-based collaboration is initiated by an email. When the user creates the email message with attachments, a collaboration website is provisioned. The...
US-9,350,774 Automatic sharing of digital multimedia
Devices and methods for automatic sharing of digital multimedia include, in one embodiment, obtaining factor data affecting a decision on whether or not to...
US-9,350,773 Customizable action cards for networking systems
Networking systems and methods for efficiently facilitating interactions between subscribers using customized action cards are disclosed. A networking system...
US-9,350,772 Systems and methods for making common services available across network endpoints
Systems and methods are disclosed for providing access to common services in a communication session. According to certain embodiments, a request to initiate a...
US-9,350,771 Method and apparatus for inter-device transfer (handoff) between IMS and generic IP clients
A method of Inter-User Equipment (UE) Transfer (IUT) for use in a Home enhanced-Node B (H(e)NB), the method comprising receiving a transfer command from a first...
US-9,350,770 Redundant transmission channels for real-time applications on mobile devices
Performing a real-time application on a mobile device, involving communication of audio/video packets with a remote device. The mobile device may initially...
US-9,350,769 SIP device-level call/session/service management
Systems, methods, and computer readable media for session initiation protocol (SIP) device-level call/session/service management are disclosed. According to one...
US-9,350,768 Suppressing CAMEL service invocation for diverting users
A method is provided for establishing a new communication leg of a communication session in an IP Multimedia Subsystem, IMS, network architecture that includes...
US-9,350,767 Packet-switched telephony call server
A system and method for providing packet-switched telephony service. The system provides call control, signaling, and/or delivery of voice, video, and other...
US-9,350,766 Connecting a PBX to an IMS-network
A border gateway (2) and a SIP Application Server (8) in an IMS network (3), which both are configured to connect a private branch exchange (1) to the IMS...
US-9,350,765 Multi-session web acceleration
A method for speeding up data downloads across the Internet utilizing a proxy server to receive client requests for downloading remote data files and then...
US-9,350,764 Gateway apparatus and method and communication system
A gateway apparatus receives a call control signal and/or a packet with voice data stored therein in a predetermined protocol from a packet transfer apparatus...
US-9,350,763 HTTP tunnelling over websockets
Conventional messages sent by sources such as applications executing on a computing device can be intercepted by a message converter module, or other such...
US-9,350,762 Intelligent feedback loop to iteratively reduce incoming network data for analysis
A method, apparatus and system related to an intelligent feedback loop to iteratively reduce target packet analysis is disclosed. According to one embodiment, a...
US-9,350,761 System for the distribution and deployment of applications, with provisions for security and policy conformance
A system and method are disclosed for deploying applications to end point devices. The applications are obtained from a marketplace that checks the applications...
US-9,350,760 Method and system for implementing mandatory file access control in native discretionary access control...
A method is provided for implementing a mandatory access control model in operating systems which natively use a discretionary access control scheme. A method...
US-9,350,759 Network security appliance to imitate a wireless access point of a local area network through coordination of...
Disclosed are methods and systems of a network security appliance to imitate a wireless access point of a local area network through coordination of multiple...
US-9,350,758 Distributed denial of service (DDoS) honeypots
An improved system and method of measuring and evaluating a distributed denial of services (DDOS) attack includes arranging for a DDoS attack by engaging a...
US-9,350,757 Detecting computer security threats in electronic documents based on structure
In an embodiment, a method providing an improvement in remediating vulnerabilities in computer security comprising: receiving, using a network tap of a sensor...
US-9,350,756 System and method for correcting antivirus records using antivirus server
Disclose are system, method and computer program product for correcting antivirus records. In an example aspect, an antivirus application receives a software...
US-9,350,755 Method and apparatus for detecting malicious software transmission through a web portal
A method and apparatus for detecting malware transmission through a web portal is provided. In one embodiment, a method for detecting malicious software...
US-9,350,754 Mitigating a cyber-security attack by changing a network address of a system under attack
In response to determining that a computer is undergoing a cyber attack, a newly assigned IP address is received for the computer. A currently assigned IP...
US-9,350,753 Computer system for distributed discovery of vulnerabilities in applications
In one aspect, the disclosure provides: A method comprising: inviting a distributed plurality of researchers to participate in one or more computer...
US-9,350,752 Anti-vulnerability system, method, and computer program product
A system, method, and computer program product are provided for receiving actual vulnerability information from at least one first data storage that is...
US-9,350,751 Network infrastructure obfuscation
A shadow network, which can be a virtual reproduction of a real, physical, base computer network, is described. Shadow networks duplicate the topology,...
US-9,350,750 Distribution of security rules among sensor computers
Systems and methods for generating rules in a networking environment having one or more sensor computers logically connected to compromised computers are...
US-9,350,749 Application attack monitoring
Implementations of the present disclosure include methods, systems, and computer-readable storage mediums for providing application attack monitoring. Actions...
US-9,350,748 Countering service enumeration through optimistic response
Techniques for improving computer system security by detecting and responding to attacks on computer systems are described herein. A computer system monitors...
US-9,350,747 Methods and systems for malware analysis
Methods, system, and media for analyzing a potential malware sample are disclosed. A sample for malware analysis may be received. The sample may be received...
US-9,350,746 Transmission network system, transmission method, and authentication information device
A transmission network system includes a network terminating device connected to a user terminal and an authentication information device connected to the...
US-9,350,745 Method and system for managing user security permissions for access to resources
Disclosed is a method and system of managing user security permissions for access to resources accessible over a communications network, to participate in a...
US-9,350,744 Applying forwarding policy to an application session
A method for applying a security policy to an application session, includes recognizing the application session between a network and an application via a...
US-9,350,743 Controlling operation of a machine and describing actions performed by the machine through a social networking...
A social networking system includes information identifying a machine (e.g., a robot, a drone, a computer, a thermostat, etc.) and a connection between the...
US-9,350,742 Using connections between users in a social networking system to regulate operation of a machine associated...
A social networking system includes information identifying a machine (e.g., a robot, a drone, a computer, a thermostat, etc.) and a connection between the...
US-9,350,741 Application platform with flexible permissioning
Systems and methods are provided for an application platform with flexible permissioning according to one or more embodiments. In one embodiment, an application...
US-9,350,740 Method, system and apparatus for network management based on business relationship information
A method for providing a dynamic business network and data management service system includes defining an account for a co-operation organization for accessing...
US-9,350,739 Recovery from rolling security token loss
An aspect of recovery from rolling security token loss includes storing, in a memory device accessible by a server computer, a token pair (B) transmitted to a...
US-9,350,738 Template representation of security resources
Systems and methods are described for enabling users to model security resources and user access keys as resources in a template language. The template can be...
US-9,350,737 Handling of authorization requests for a packet-based service in a mobile network
A policy controller (30) of a mobile network receives an authorization request (302) for a packet-based service from a node (80). In response to receiving the...
US-9,350,736 System and method for isolating mobile data
Disclosed is a system for mobile data isolation, comprising of a tag control management module and a mobile data management module. The tag control management...
US-9,350,735 Context-based dynamic information rights management
Disclosed are systems and methods for context-based dynamic information rights management (IRM) in a cloud-based document management environment. A system may...
US-9,350,734 Method and system for managing a flood of data-connection requests
A gateway may respond to a data-connection request, relating to a request to establish a packet data connection for a requesting wireless communication device...
US-9,350,733 Emergency server access for offline users
A method and system for emergency server access to offline users may include one or more computing devices receiving a request for offline access of data. The...
US-9,350,732 Integrity protection for data storage
A system for protecting the integrity of a memory system maintains an age counter and an opportunity counter for each of multiple memory blocks; maintains an...
US-9,350,731 Secure method of processing data
The invention relates to a secure method of processing data in which method is implemented the evaluation of a function that may be written as a linear...
US-9,350,730 Biometric-based wireless device association
According to one aspect of the present disclosure, a method and technique for automatically associating a wireless device to a data processing system using...
US-9,350,729 Bifurcated authentication token techniques
Bifurcated authentication token techniques are described in which sign-on credentials are separated from corresponding privilege data for resources. During...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.