Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,356,980 Distributing communication of a data stream among multiple devices
Methods, apparatus and articles of manufacture for distributing communication of a data stream among multiple devices are disclosed. Example methods disclosed...
US-9,356,979 Time and frequency synchronization for LTE-advanced new carrier type
A particular kind of component carrier that may be used as a secondary cell in an LTE system is a new type carrier that has reduced or eliminated legacy control...
US-9,356,978 Feed routing for object based collaboration
Systems and methods for routing activity information related to objects in an external application to activity feeds associated with users in a collaboration...
US-9,356,977 Acquiring online meeting data relating to an online meeting
A technique acquires online meeting data relating to an online meeting. The technique involves running, by processing circuitry, a set of programs (e.g., an...
US-9,356,976 Real-time communications methods providing pause and resume and related devices
Operating a receiver communication device during a real time communication session including a real time media content data stream provided by another...
US-9,356,975 Method and apparatuses for TDF session establishment
More than one TDF session for a user in a PCC architecture are coordinated. There are provided PCRF server, PCEF devices and TDF devices, and method of...
US-9,356,974 Systems and methods for establishing a Wi-Fi display (WFD) session
Systems, methods, apparatus, and techniques are provided for establishing an application layer communications session over a layer 2 (L2) communications...
US-9,356,973 Method for the transmission of signalling data in a network interface unit and in a control unit and...
The embodiments relate to, among other things, a network interface unit (IM-MGW) in which signaling data is separated from useful data by the values of received...
US-9,356,972 System and method for providing enterprise voice call continuity
An improved system and method are disclosed for providing voice call continuity in an enterprise network. For example, an enterprise public branch exchange...
US-9,356,971 Broadcast-based trust establishment
A method and apparatus for device authentication are provided. In the method and apparatus, authentication data for a first device is received. The first device...
US-9,356,970 Geo-mapping system security events
A source of the particular security event is identified that is associated with at least one second computing device, at least one of a geographic location, and...
US-9,356,969 Technologies for multi-factor security analysis and runtime control
Technologies for client-level web application runtime control and multi-factor security analysis by a computing device include receiving application code...
US-9,356,968 Managing authentication using common authentication framework circuitry
A technique manages user authentication via common authentication framework circuitry. The technique involves receiving, by the common authentication framework...
US-9,356,967 Secure on-demand supply method and system and traffic type acquisition method
A secure on-demand supply method is disclosed. The method includes: a configuration parameter of a security function module is determined according to a...
US-9,356,966 System and method to provide management of test data at various lifecycle stages
Disclosed is a method and system to provide management of test data, the management performed during at least one stage associated with lifecycle of the test...
US-9,356,965 Method and system for providing transparent trusted computing
A method performed at an electronic device with one or more processors and memory includes obtaining a public record including a plurality of commit nodes,...
US-9,356,964 Application based policy enforcement
One embodiment is directed to a system that comprises a network device, including at least a first port, which is configured to analyze information within one...
US-9,356,963 Detecting and applying different security policies to active client requests running within secure user web...
A method, apparatus and computer program product to detect and apply security policy to active client requests within a secure user session begins by applying a...
US-9,356,962 Extensible multi-tenant cloud-management system and methods for extending functionalities and services provided...
The current document is directed to an interface and authorization service that allows users of a cloud-director management subsystem of distributed,...
US-9,356,961 Privacy scoring for cloud services
Information processing techniques for generating privacy ratings for services that are available via a cloud infrastructure, e.g., cloud services. For example,...
US-9,356,960 Securing radio-frequency identification systems
In one embodiment, a method includes, by a base station, communicating a challenge to a transponder through a first communication link; and establishing a...
US-9,356,959 System and method for monitoring network traffic
Described is a method of assigning a network address to a trap, the network address being a dark address of a virtual private network. The network traffic...
US-9,356,958 Apparatus and method for protecting communication pattern of network traffic
An apparatus for protecting traffic trend in a network of a control system using artificial communication is provided. In accordance with an embodiment, the...
US-9,356,957 Systems, methods, and media for generating bait information for trap-based defenses
Systems, methods, and media for generating bait information for trap-based defenses are provided. In some embodiments, methods for generating bait information...
US-9,356,956 Preventing network tomography in software defined datacenter networks
Technologies are provided for preventing abuse of software-defined datacenter networks. In some examples, an SDN abuse prevention module within a control layer...
US-9,356,955 Methods for determining cross-site scripting and related vulnerabilities in applications
The invention provides computer-implemented methods and computer systems for testing applications such as web-based (HTTP) applications for cross-site scripting...
US-9,356,954 Intercepting and supervising calls to transformed operations and objects
In an embodiment, a method comprises intercepting a first set of instructions from a server computer that define one or more objects and one or more original...
US-9,356,953 System and method to prevent spoofed communication through out-of-band verification
The disclosed subject matter addresses the problem of spoofing by directly and transparently communicating with the apparent sender of the potentially spoofed...
US-9,356,952 Packet redirection in a communication network
A method of controlling the re-direction of IP packets to an IP host having two or more different IP addresses comprises generating a first of said IP addresses...
US-9,356,951 Responses to server challenges included in a hypertext transfer protocol header
Example embodiments relate to verification of client requests based on a response to a challenge (135; 235) included in an HTTP Header. In some embodiments, a...
US-9,356,950 Evaluating URLS for malicious content
A system includes one or more "BotMagnet" modules that are exposed to infection by malicious code. The BotMagnets may include one or more virtual machines...
US-9,356,949 Network service interface analysis
In one implementation, a service interface analysis system defines a plurality of service templates based on a plurality of Uniform Resource Identifiers...
US-9,356,948 Collaborative phishing attack detection
Described herein are methods, network devices and machine-readable storage media for detecting whether a message is a phishing attack based on the collective...
US-9,356,947 Methods and systems for analyzing data related to possible online fraud
Various embodiments of the invention provide methods, systems and software for analyzing data. In particular embodiments, for example, a set of data about a web...
US-9,356,946 Detecting malware in mobile sites
Behavioral analysis of a mobile webpage is performed to determine whether the webpage is malicious. During analysis, the webpage is visited by an emulated...
US-9,356,945 Automatic content inspection system for exploit detection
A method of inspecting content intended for a workstation to detect content that performs malicious exploits, including receiving the content for inspection at...
US-9,356,944 System and method for detecting malicious traffic using a virtual machine configured with a select software...
The system comprises a traffic analysis device in communication with a network device. The traffic analysis device can analyze network traffic received over a...
US-9,356,943 Systems and methods for performing security analyses on network traffic in cloud-based environments
The disclosed computer-implemented method for performing security analyzes on network traffic in cloud-based environments may include (1) collecting network...
US-9,356,942 Method and system for detecting network compromise
A method and system are described for detecting unauthorized access to one or more of a plurality of networked victim computers in a victim cloud. The networked...
US-9,356,941 Systems and methods for detecting suspicious web pages
A computer-implemented method for detecting suspicious web pages. The method may include 1) identifying a plurality of malicious web pages; 2) establishing a...
US-9,356,940 Security and access system based on multi-dimensional location characteristics
An invention is provided for system security and access based on multi-dimensional location characteristics. The invention includes collecting contextual...
US-9,356,939 System and method for dynamic access control based on individual and community usage patterns
Systems and methods include receiving data corresponding to a request to access a resource by an identity provided with authority to access the resource....
US-9,356,938 Method, device, system, token creating authorized domains
This invention relates to a method (100) for creating, on a device (200), an authorized domain (102) for sharing a (103) of a content item (104) between a first...
US-9,356,937 Disambiguating conflicting content filter rules
A content filtering mechanism is enhanced to resolve conflicts in filtering rules (e.g., those created by a whitelist, on the one hand, and a blacklist, on the...
US-9,356,936 Method and apparatus for managing access to electronic content
According to at least one example embodiment, a method and corresponding content protection server for managing access to electronic content comprise retrieving...
US-9,356,935 Selective access to portions of digital content
A method includes receiving a request to access a digital content item, the digital content item including multiple portions. Responsive to the request,...
US-9,356,934 Data volume scaling for storing indexed data
Embodiments are directed towards a system and method for a cloud-based front end that may abstract and enable access to the underlying cloud-hosted elements and...
US-9,356,933 Implementing policies for an enterprise network using policy instructions that are executed through a local...
A policy framework is maintained on the computing device, and the computing device communicates with a policy server of an enterprise network over a network to...
US-9,356,932 Dynamically applying a control policy to a network
A method of dynamically applying a control policy to a network is described. A network layer of a plurality of network layers associated with user traffic is...
US-9,356,931 Methods and apparatuses for secure end to end communication
The present invention relates to application-level secure end-to-end communication. Specifically it relates to methods apparatuses and computer program products...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.