Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,407,678 System and method for locating a boundary point within adaptive bitrate conditioned content
A method is provided in one example and includes determining an occurrence of an exception to a predetermined cadence associated with an input stream of a...
US-9,407,677 High performance data streaming
Methods, systems and computer program products for high performance data streaming are provided. A computer-implemented method may include receiving a data...
US-9,407,676 Method and apparatus for distributing media content
A system that incorporates teachings of the present disclosure may include, for example, initializing a boundary estimate for an optimization of a linear...
US-9,407,675 Room cloud environment for conferencing
A room conferencing system includes a hub with a plurality of sensor nodes, each sensor node including a sensor node camera and a sensor node processor. A...
US-9,407,674 Method and device for removing objects from a video feed in real-time
According to embodiments of the invention, systems, methods and devices are directed to removal of objects in a video feed that are captured continuously...
US-9,407,673 Apparatus, system and method for maintaining a persistent data state on a communications network
The present invention is an apparatus, system, and method for the improved tracking of a data state. The present invention allows session states to be...
US-9,407,672 Systems and methods for reducing signalling in an internet protocol telephony system
A telephony communication setup request sent from a telephony device to an element of an IP telephony system includes a first encrypted code that is generated...
US-9,407,671 Acknowledgement message monitoring
The invention relates to a system and method for monitoring a handshaking exchange between a call initiator and a call recipient to determine if handshaking has...
US-9,407,670 Broadcasting media from a stationary source to multiple mobile devices over Wi-Fi
A system for synchronized broadcast of media content across large networks, comprising a media source stored and operating on a network-connected electronic...
US-9,407,669 Communications pacing
Pacing communications between a message sending computer and a message receiving computer that are both members of a message group of a sysplex includes...
US-9,407,668 Protection against unsolicited communication for internet protocol multimedia subsystem
A protection against an unsolicited communication for an IMS (PUCI) system includes a call session control function (CSCF), and a plurality of PUCE application...
US-9,407,667 Communication device, router, communication system, and controlling methods for communication device and router
In order to facilitate connecting to a SIP network, a router (20) forming a communication system (1) acquires information from a carrier network (30) by using...
US-9,407,666 Preference editor to facilitate privacy controls over user identities
A privacy preference editor enables a user to institute privacy preferences relative to user identity information on a card-based and category-based basis. An...
US-9,407,665 Contract broker for secure ad-hoc personal data sharing
The present disclosure is directed to a system and method for sharing sensitive personal data such as personally identifying data and financial data of a user....
US-9,407,664 Systems and methods for enforcing enterprise data access control policies in cloud computing environments
A computer-implemented method for enforcing enterprise data access control policies in cloud computing environments may include (1) intercepting, at a proxy, an...
US-9,407,663 Method and apparatus for man-in-the-middle agent-assisted client filtering
Example embodiments of the present invention relate to a method, an apparatus and a computer-program product for man-in-the-middle agent-assisted client...
US-9,407,662 Analyzing activity data of an information management system
In an information management system, activity data is collected and analyzed for patterns. The information management system may be policy based. Activity data...
US-9,407,661 Blocking via an unsolvable CAPTCHA
A security device may receive a request from an attacker device and intended for a server device. The security device may identify the request as being...
US-9,407,660 Malicious request attribution
Methods, apparatuses, and computer readable media for malicious request attribution are presented. For example, according to one aspect, requests for one or...
US-9,407,659 Protecting computing assets from resource intensive querying attacks
A method and system for managing data traffic and protecting computing assets. The method and system includes intercepting queries and messages, such as EDNS0...
US-9,407,658 System and method for determining modified web pages
Disclosed is a system and method for determining modified web pages. An example method includes: extracting a plurality of malware trigger code fragments from a...
US-9,407,657 User terminal, unauthorized site information management server, and method and program for blocking...
The transmission of an unauthorized request from a terminal is blocked. It is possible to provide a user terminal which blocks an unauthorized request made by...
US-9,407,656 Determining a risk level for server health check processing
Approaches are provided for determining a risk level for server health check processing. An approach includes creating statistical process control analyzes for...
US-9,407,655 Monitoring security risks to enterprise corresponding to access rights and access risk calculation
A system comprising an interface and a memory communicatively coupled to a processor retrieves access information corresponding to an asset. The system stores...
US-9,407,654 Providing multi-level password and phishing protection
Embodiments described herein are directed to preventing development of insecure web pages, preventing deployment of insecure web pages and to preventing access...
US-9,407,653 Unified scan management
A particular scan set to be performed on at least a portion of a computing environment is identified. A particular scan engine, in a plurality of scan engines,...
US-9,407,652 Network anomaly detection
A security system detects anomalous activity in a network. The system logs user activity, which can include ports used, compares users to find similar users,...
US-9,407,651 Anomaly detection in network-site metrics using predictive modeling
Methods and apparatus for anomaly detection in network-site metrics using predictive modeling are described. A method comprises obtaining time-series data for a...
US-9,407,650 Unauthorised/malicious redirection
Method(s) and apparatus are described for use in preventing unauthorized redirection and/or routing of packets transmitted in a communication network. Packets...
US-9,407,649 Log analysis device and method
A log analysis device that classifies, based on a log collected from a network device, a plurality of attack target communication devices receiving attacks from...
US-9,407,648 System and method for detecting malicious code in random access memory
Disclosed are system and method for detecting malicious code in random access memory. An exemplary method comprises: detecting, by a hardware processor, a...
US-9,407,647 Method and system for detecting external control of compromised hosts
A detection engine may be implemented by receiving network traffic and processing the traffic into one or more session datasets. Sessions not initiated by an...
US-9,407,646 Applying a mitigation specific attack detector using machine learning
In one embodiment, a device in a network detects a network attack using aggregated metrics for a set of traffic data. In response to detecting the network...
US-9,407,645 Security threat information analysis
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for analyzing data that includes security threat information....
US-9,407,644 Systems and methods for detecting malicious use of digital certificates
A computer-implemented method for detecting malicious use of digital certificates may include determining that a digital certificate is invalid. The method may...
US-9,407,643 System and method for consolidating network streams for network analysis
A system for consolidating network streams includes a consolidator in communication with each of a plurality of network streams. Each network stream is...
US-9,407,642 Application access control method and electronic apparatus implementing the same
A method and apparatus of access control in an electronic apparatus implementing the method are provided. The method of operating an electronic apparatus...
US-9,407,641 Service access control
Embodiments of the present invention provide a service access control system having a service object for providing services, a messaging service facility and...
US-9,407,640 Assessing a security state of a mobile communications device to determine access to specific tasks
Methods for assessing the current security state of a mobile communications device to determine access to specific tasks is presented. A security component on a...
US-9,407,639 Validation of a location resource based on recipient access
Aspects of the present disclosure relate to a method, a system, and a computer program product for validating a location resource, e.g., a hyperlink, embedded...
US-9,407,638 System and method for trusted mobile communications
Systems and methods for trusted mobile communications are described. A network system provisions a mobile client system with a collection of security parameters...
US-9,407,637 Method for managing and checking data from different identity domains organized into a structured set
The invention relates to a method and system for managing and checking different identity data relating to a person. According to the invention, a...
US-9,407,636 Method and apparatus for securely saving and restoring the state of a computing platform
An apparatus and method for securely suspending and resuming the state of a processor. For example, one embodiment of a method comprises: generating a data...
US-9,407,635 Vehicle data delivery
A system and method of delivering vehicle data. Reference data is received by a data processing system. The reference data comprises a reference identifying the...
US-9,407,634 Cryptographic protocol for portable devices
Embodiments are directed towards communicating using a mobile device that performs actions including. A mobile device may be provisioned with an access point...
US-9,407,633 System and method for cross-channel authentication
A system includes a memory and processor. The memory stores a user account identifier associated with a user account. The processor receives at least one user...
US-9,407,632 Transformation rules for one-time passwords
A one-time password may be used and generated using transformation rules. A one-time password transformation rule is received. The one-time password is sent to...
US-9,407,631 Multi-server passcode verification for one-time authentication tokens with auxiliary channel compatibility
Multi-server passcode verification is provided for one-time authentication tokens with auxiliary channel compatibility. An exemplary method comprises receiving...
US-9,407,630 Methods of resetting passwords in network service systems including user redirection and related systems and...
Resetting a password for a network service account may include redirecting the user to a password reset tool, wherein the user is blocked from network access...
US-9,407,629 Method for assembling authorization certificate chains
A method for assembling authorization certificate chains among an authorizer, a client, and a third party allows the client to retain control over third party...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.