Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,398,084 Information processing system
An information processing system includes multiple network segments to which one or more information processors are connectable. The network segments includes a...
US-9,398,083 Method, apparatus and computer program product for invoking local communication application services
It is presented a method for invoking an application service in response to a tag reading by a mobile terminal. The method comprises the steps of: receiving an...
US-9,398,082 Software appliance management using broadcast technique
Broadcasts identifying executed execution states and configurations of a plurality of virtual machines may be received. Each of the broadcasts may be received...
US-9,398,081 Automating client development for network APIs
System and method of automating client development for an application programming interface (API). An embodiment includes an apparatus capable of receiving...
US-9,398,080 Control device, image processing device, control method, computer-readable recording medium, and program
Provided is an information processing device constituting at least a part of a communication system. The information processing device includes a master unit...
US-9,398,079 Optimization of a software application implemented on a client-server system
In at least one embodiment, data relating to the usage and the operating status of a frontend module of a software application implemented on the client side is...
US-9,398,078 Annotations of objects in multi-dimensional virtual environments
A computer-implemented method of enabling participation by a first client and a second client in a communication session in a multi-dimensional virtual...
US-9,398,077 Mobile applications
Providing a framework for developing, deploying and managing sophisticated mobile solutions, with a simple Web-like programming model that integrates with...
US-9,398,076 Control of data presentation in multiple zones using a wireless home entertainment hub
Sink devices may automatically be partitioned into zones based on location in a home entertainment system. A message may be transmitted to a source device to...
US-9,398,075 Communication system, communication apparatus, communication method, and storage medium
The data server stores, data and user identification information, and transmits to the analysis server the data and first identification information associated...
US-9,398,074 Network system, device server, and network system control method
A network system enables controlling an image input device without requiring a driver that depends on the computer environment. A client terminal has a...
US-9,398,073 Methods and apparatus for providing content
One embodiment of the invention relates to the transfer of content between a host computer that issues OAS access requests and a block I/O storage system....
US-9,398,072 Virtual media systems, methods and devices
In a KVM system, a system provides for USB devices to be accessed by target computers. A KVM switch connects a client with a target server via a network, the...
US-9,398,071 Managing page-level usage data
Systems and methods are disclosed which facilitate management and monitoring of page-level usage data. Specifically, a client computing device may retrieve...
US-9,398,070 Information processing system, computer-readable non-transitory storage medium, information processing method...
Each information processor executes a mission which allows participation of users of a plurality of information processors using wireless communication. While...
US-9,398,069 Stateless microkernel web server architecture
A method for serving enterprise commerce between a stateless microkernel architecture HTTP server program executed on a server device and an HTTP client program...
US-9,398,068 Bulk uploading of multiple self-referencing objects
A computer implemented method, computer program product, and system for performing create, read, update, or delete operations on a plurality of resources in a...
US-9,398,067 Web-based sharing of documents
A technique is disclosed that enables telecommunications endpoints to conveniently share the addressing information--that is, the Uniform Resource Identifiers...
US-9,398,066 Server defenses against use of tainted cache
Systems, methods, and computer readable media are described for validating objects stored in a web cache. In one embodiment, a computing device caches objects...
US-9,398,065 Audio/video streaming in a topology of devices with native WiGig sink
A method and system may include a source station to provide wireless multicast transmission to a plurality of destination stations according to a protocol...
US-9,398,064 Method of streaming media to heterogeneous client devices
A method of dynamically preparing a media clip for delivery from a server to a client is provided. Media attributes comprising media playback formats compatible...
US-9,398,063 Customizing distribution of an operating system based on detected network carrier by retrieving differences...
Technology disclosed herein includes a method for loading a carrier specific OS onto a computing device depending on what network the computing device is...
US-9,398,062 Timing synchronization in discovery signals
Embodiments described herein relate generally to a device that is to transmit signals using a control channel. The device may be, for example, a user equipment...
US-9,398,061 Simulating broadcast television channel surfing for on-demand content
Described are systems and methods for simulating a traditional television experience with streamed on-demand content. Streamed content may be buffered to allow...
US-9,398,060 System and method for remote home monitoring utilizing a VoIP phone
A system and method for remote monitoring through a voice over Internet Protocol phone. An indicator configured to activate a video interface of the VoIP phone...
US-9,398,059 Managing information and content sharing in a virtual collaboration session
Systems and methods for managing information and content sharing in a virtual collaboration session. In some embodiments, a method may include creating a...
US-9,398,058 Systems and methods for video-conference network system suitable for scalable, private tele-consultation
A scalable social network consultation communication system for teleconsultation private practice includes a social network, a social network processing system,...
US-9,398,057 System and method for group participation in a digital media presentation
System and method for group participation in a digital media presentation are provided that are capable of selecting digital media items for inclusion in the...
US-9,398,056 Systems and methods for room system pairing in video conferencing
Systems and methods for the pairing of room systems, and other systems that lack portability and a convenient user interface, to videoconferences are disclosed...
US-9,398,055 Secure call indicator mechanism for enterprise networks
The concept of a secure call indicator is introduced. In general, the secure call indicator is capable of inspecting the security of signaling associated with...
US-9,398,054 Optimized user re-distribution over S-CSCF entities
Embodiments of the present invention provide a network entity of an IMS network, in which a registered user is being served by an assigned Serving-Call Session...
US-9,398,053 Efficient data transmission between computing devices
The subject disclosure is directed towards technology by which data transmission sizes are reduced when uploading files over a network. By processing hash...
US-9,398,052 Detection of potentially copyrighted content in user-initiated live streams
Systems and methods modifying a presentation of media content in response to a detected violation are provided. In particular, media content such as a media...
US-9,398,051 Enforcing policy-based application and access control in an information management system
A method and apparatus for controlling document access and application usage using centrally managed rules. The rules are stored and manipulated in a central...
US-9,398,050 Dynamically configured connection to a trust broker
A method for connecting to a trust broker system is disclosed. The method is performed on a client device having one or more processors and memory storing one...
US-9,398,049 Method and device for securely transmitting data
Cryptographic methods are used at the application level, unlike known methods using point-to-point connections that can only be sufficiently secured at the...
US-9,398,048 Authenticating an application to access a communication system
Embodiments describe transmitting authentication data from an application to a communication system. The communication system verifies the authentication data...
US-9,398,047 Methods and systems for phishing detection
A method of determining a probability that a received email comprises a phishing attempt may comprise analyzing a link therein to determine whether the link...
US-9,398,046 Image-based man-in-the-middle protection in numeric comparison association models
An authentication scheme is provided for securely establishing an association with a second device over a wireless communication link. A cryptographic key...
US-9,398,045 Network device and method for avoiding address resolution protocol attack
A network device records IP addresses and MAC addresses of a plurality of CPEs to form an address mapping table, sends first ARP request packets to the...
US-9,398,044 Method and apparatus for detecting attack on server
The present invention discloses a method and apparatus for detecting an attack on a server. The method comprises: calculating interval time after a current...
US-9,398,043 Applying fine-grain policy action to encapsulated network attacks
An intrusion detection system inspects encapsulated packet flows and, upon detecting a malicious encapsulated packet flow, may close an encapsulated network...
US-9,398,042 Systems and methods for capturing input from users to prevent data loss
The disclosed computer-implemented method for capturing input from users to prevent data loss may include (1) intercepting, as part of a data-loss-prevention...
US-9,398,041 Identifying stored vulnerabilities in a web service
A computer identifies each web method, of a web service, declared in a web services description language (WSDL) file. The computer adds a node within a directed...
US-9,398,040 Intrusion detection system false positive detection apparatus and method
Disclosed herein is an Intrusion Detection System (IDS) false positive detection apparatus and method. An IDS false positive detection apparatus includes a...
US-9,398,039 Apparatus, system and method for suppressing erroneous reporting of attacks on a wireless network
According to one embodiment, a method for suppressing erroneous alert messages for suspected network attacks comprises a first operation of determining an...
US-9,398,038 Collaborative phishing attack detection
Described herein are methods, network devices and machine-readable storage media for detecting whether a message is a phishing attack based on the collective...
US-9,398,037 Detecting and processing suspicious network communications
Analyzing routing information to identify and intercept unauthorized, unwanted, and/or otherwise malicious communications is disclosed. In some embodiments,...
US-9,398,036 Chunk-based file acquisition and file reputation evaluation
One or more techniques and/or systems are provided for file acquisition for reputation evaluation. A reputation service may be configured to evaluate files and...
US-9,398,035 Attack mitigation using learning machines
In one embodiment, techniques are shown and described relating to attack mitigation using learning machines. A node may receive network traffic data for a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.