Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,420,032 Remote data access permission using remote premises monitoring
One embodiment of a source device being able to monitor the premises of a target device before and after permission from the source device is granted to the...
US-9,420,031 Systems and methods for building and using hybrid mobile applications
Systems and techniques of building and presenting hybrid remote client applications for and to users of a mobile device are presented. Upon a user accessing a...
US-9,420,030 System and method for distributing web events via distribution channels
A system, method, and computer program for distributing web events via distribution channels are provided. A web event is established in an origination channel....
US-9,420,029 Mobile device application rating
A system includes a ratings server that receives the list of top applications from a source external to the ratings server and selects at least a subset of the...
US-9,420,028 Remote conference system and non-transitory computer readable medium storing program for remote conference
A communication device obtains video data. The video data includes a plurality of inter-frame coded image data and a plurality of intra-frame coded image data....
US-9,420,027 Systems and methods of communicating platform-independent representation of source code
A method includes receiving, at a media player software application at a computing device, a first portion of a media stream, and initiating playback of the...
US-9,420,026 Distributing communication of a data stream among multiple devices
Disclosed example methods to distribute communication of a data stream include, in response to a request received from a first device, assigning a number of...
US-9,420,025 Method and apparatus for reproducing content in multimedia data providing system
A content reproducing method is provided for continuously reproducing content being reproduced by a client device in another client device in a multimedia data...
US-9,420,024 Dynamic content delivery systems and methods for providing same
Content delivery systems and related methods can provide dynamic content across a network, based on detected network performance. An exemplary content delivery...
US-9,420,023 Managing adaptive streaming of data via a communication connection
An example method includes requesting a data stream using a buffer with an initial maximum window size for buffering received data associated with the requested...
US-9,420,022 Media requests to counter latency and minimize network bursts
A client media application sends a first request for a first chunk of a particular media stream. In response to the request, the client media application begins...
US-9,420,021 Media device and method of enhancing use of media device
A method of enhancing the use of a media device and a media device are provided. The media device receives a broadcast media stream transmitted by a broadcast...
US-9,420,020 Target content video delivery
A call manager is configured to establish an initial session between an agent and a user. A play request or a hold request from an agent device includes a video...
US-9,420,019 Method and system for securing content communication in chunks from a content delivery network to a user...
A user receiving device and method includes a content delivery network manager interaction module communicating a request for a content delivery network address...
US-9,420,018 End-to-end address transfer
According to a first aspect of the present invention there is provided a method of facilitating the end-to-end transfer of a URI between a plurality of SIP...
US-9,420,017 Information organization, management, and processing system and methods
A cloud-based system is disclosed including at least one local client device communicatively coupled, via an intermediate network, with a server device having...
US-9,420,016 Predicting viewing activity of a posting to an activity stream
A method, system and/or computer program product predicts viewing activity of a new posting to an activity stream. A first computer transmits a new posting to...
US-9,420,015 Automated deduction of user locations and activities in a mobile positional social media method and system
A method, system, and/or apparatus for automatically tracking a mobile user using the user's mobile device. This invention is particularly useful in the field...
US-9,420,014 Saving state of a collaborative session in an editable format
In some embodiments, a method includes receiving an input from a participant of a collaborative session among two or more devices, wherein the input is to cause...
US-9,420,013 Method, device and system for providing historical communication content
A communication server is disclosed. The communication server may receive, via at least one network interface, a request to add one or more new participants to...
US-9,420,012 Computer readable recording medium, communication terminal device and teleconferencing method
Image data corresponding to an image captured by a communication terminal device is transmitted from a communication unit of the communication terminal device...
US-9,420,011 Method and system for enabling a communication device to remotely execute an application
A communication system capable of enabling one or more communication devices to remotely execute one or more applications includes one or more communication...
US-9,420,010 Voice over IP call setup progress indicator
A method and apparatus for providing voice over internet protocol (VoIP) call setup progress status comprising creating an indication associated with a call...
US-9,420,009 Method and apparatus for S.I.P./H.323 interworking
An interworking function (IWF) for a first and second protocol based network, for example, an H.323 protocol based network and an SIP protocol based network...
US-9,420,008 Method for repurposing of communications cryptographic capabilities
A system and method for repurposing of cryptographic capabilities in an electronic warfare (EW) environment is presented. A method begins by determining in a...
US-9,420,007 Access control using impersonization
A first service submits a request to a second service on behalf of a customer of a service provider. The request may have been triggered by a request of the...
US-9,420,006 Method and system for managing security policies
A system and method of managing security policies in an information technologies (IT) system are provided. In an example, the method includes receiving an input...
US-9,420,005 Configuring policy settings on client computing devices
Systems and methods for installing policy settings on a client computing device are provided. In some aspects, the client computing device receives policy data...
US-9,420,004 Dynamic expression evaluation based grouping of VM objects for networking and security services in a...
Techniques for grouping virtual machine (VM) objects for networking and security services in a virtualized computing system are described. In one example...
US-9,420,003 Dynamic communication between secure endpoints
In one implementation, a hub and spoke network is made up of hub network devices and spoke network devices. A security protocol channel is established between...
US-9,420,002 Authorization server access system
Systems and techniques are provided for authorizing restricted action (e.g., data access) requests using a tiered arrangement. A rule set is generated based on...
US-9,420,001 Securing data communications in a communications network
A method of securing communications between first node attached to first network and second node attached to second network. At the second node, first and...
US-9,420,000 NAT traversal for local IP access
The invention relates to a method for traversing a NAT device residing in a backhaul IP network. A home cellular base station (HeNB) and a collocated local...
US-9,419,999 Method and device for preventing domain name system spoofing
A method for preventing Domain Name System (DNS) spoofing includes: performing uppercase/lowercase conversion for letters of a DNS question field in a DNS...
US-9,419,998 Filtering hidden data embedded in media files
Systems and methods for filtering unsafe content at a network security appliance are provided. According to one embodiment, a network security appliance...
US-9,419,997 System and method for controlling applications to mitigate the effects of malicious software
Methods and systems for mitigating the effects of a malicious software application are disclosed. A dedicated module on the computing device receives from a...
US-9,419,996 Detection and prevention for malicious threats
A method of identifying one or more malicious threats in a computing device. The device comprises monitoring a plurality of events occurring on a computing...
US-9,419,995 Malware detection system and method
Methods and systems are presented for detection of malware such as worms in which a network switch entices the malware into sending scan packets by allocating...
US-9,419,994 Method for identifying potentially malicious network elements within a network using cross-domain collaborative...
A method for identifying potentially malicious network elements within a network is useable in a network which includes a plurality of domains administrated by...
US-9,419,993 Randomization of processor subunit timing to enhance security
Technologies are generally provided for a system to enhance security and prevent side channel attacks of targeted functions. Side channel attacks assume that...
US-9,419,992 Unwanted tunneling alert system
Various systems and methods are provided that detect malicious network tunneling. For example, VPN logs and data connection logs may be accessed. The VPN logs...
US-9,419,991 De-obfuscating scripted language for network intrusion detection using a regular expression signature
A device receives data, identifies a context associated with the data, and identifies a script, within the data, associated with the context. The device parses...
US-9,419,990 Apparatus and method for characterizing the risk of a user contracting malicious software
A non-transitory computer readable storage medium includes executable instructions to identify specified network interactions initiated by a client machine. The...
US-9,419,989 Threat detection using URL cache hits
Threat detection is improved by monitoring variations in observable events and correlating these variations to malicious activity. The disclosed techniques can...
US-9,419,988 System and method for non-disruptive mitigation of messaging fraud
A system and method are disclosed herein for providing mitigation of fraud in a hosted messaging service while having minimal impact on authorized messaging...
US-9,419,987 Method and device for prompting information about e-mail
The present invention discloses a method and a device for prompting information about an e-mail. The method comprises: extracting information from a currently...
US-9,419,986 System to identify machines infected by malware applying linguistic analysis to network requests from endpoints
A method to identify machines infected by malware is provided. The method includes determining whether a universal resource locator in a network request is...
US-9,419,985 Interrogating malware
Identifying a behavior of a service is disclosed. A predetermined interrogation packet that corresponds to a hypothesis is sent to a network communication port...
US-9,419,984 Secure port forwarding to access data between public processing locations and on-premise components
A method for transmitting data from an on-premise component to an off-premise computer image includes: sending a message from the off-premise computer image to...
US-9,419,983 Method and apparatus for providing an adaptable security level in an electronic communication
A method of communicating in a secure communication system, comprises the steps of assembling a message at a sender, then determining a security level, and...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.