Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,432,429 Playing of media content among multiple devices using a temporal progress
In a playing of media content among multiple devices, a first device creates a first progress information associated with a media content and the first device....
US-9,432,428 Methods and systems for dynamic creation of hotspots for media control
Methods, systems, and/or devices for controlling media presentation at a shared media presentation system are described herein. In one aspect, a first...
US-9,432,427 System and method for effectively controlling client behavior in adaptive streaming
The present invention teaches new solutions based on an alternative approach to controlling client behavior in adaptive streaming applications, namely, server...
US-9,432,426 Determining available media data for network streaming
A client device includes one or more processors configured to send a plurality of probe requests for segments of media data to a server device, wherein the...
US-9,432,425 Method and system for downloading content
The present document discloses a method and system for realizing content download, including: after a portal site receives a request for triggering download,...
US-9,432,424 User-selected media content blocking
Presented herein is a method of blocking user-selected media content, such as, for example, audio and/or video content. In the method, at least one media...
US-9,432,423 Skip feature for a broadcast or multicast media station
A skip function for broadcast or multicast media content is disclosed. In general, a receiving device simultaneously receives two or more content streams...
US-9,432,422 Method and apparatus for voice and/or video communication
A method and apparatus for voice and/or video communication are disclosed. The method includes: a primary terminal device searching for one or more secondary...
US-9,432,421 Sharing links in an augmented reality environment
Various embodiments provide methods and systems for users and business owners to share content and/or links to visual elements of a place at a physical...
US-9,432,420 Communication system, non-transitory computer-readable medium storing communication program and communication...
A communication system includes a first communication device and a second communication device connecting to a LAN. Using a first proxy setting for a specific...
US-9,432,419 Facilitating user communication about a common topic
Among other things, we describe identifying, in first data available to a first user and not available to a second user, and in second data available to the...
US-9,432,418 Presenting an event-related post in a stream
Systems and methods for presenting an event-related post in a stream are provided. In some aspects, a plurality of event-related posts are received. Each of the...
US-9,432,417 Embeddable media upload object
A user device's browser receives a page from a publishing system and presents content of the page within a window. Instructions from a media hosting system...
US-9,432,416 Apparatus, system, and method of managing communication, and recording medium storing communication management...
A communication management system that manages a plurality of communication terminals transmits, to a request communication terminal, one of operation state...
US-9,432,415 Processing data
Measures for processing data in a telecommunications network. At a first network node in a cluster of network nodes, a communication session setup request...
US-9,432,414 Control of codec negotiation for communication connection
The invention relates to a session control entity, method and a computer program product for receiving a request for a session, deciding on removal of a user...
US-9,432,413 User equipment and method for executing a service
User equipment and method for executing an application, which uses application data, and which is executed in an Application Server in a VoIP based...
US-9,432,412 System and method for routing and communicating in a heterogeneous network environment
An improved system and method are disclosed for peer-to-peer communications. In one example, the method is for connecting an endpoint that is separated from...
US-9,432,411 Residential gateway
A method includes receiving power via a communication line at a power coupling device of a removable module coupled to a connector of a network interface...
US-9,432,410 System and method for extending SCIM / service broker processing IMS initial filter criteria (IFC) for pipeline...
In accordance with various embodiments, systems and methods that integrate pipeline processing into a SCIM are provided. Such a system can include a plurality...
US-9,432,409 Apparatus and method for managing emergency calls
A system that incorporates teachings of the present disclosure may include, for example, a network element operably couplable to an Internet Protocol Multimedia...
US-9,432,408 Signalling gateway, method, computer program and computer program product for communication between HTTP and SIP
A signalling gateway is arranged to allow a first client using hypertext transfer protocol, HTTP, to initiate a real-time connection to a SIP, session...
US-9,432,407 Providing and accessing data in a standard-compliant manner
In certain embodiments, a computer-implemented method includes receiving intercepted data associated with a first entity. The intercepted data may be...
US-9,432,406 System and method for resolving conflicts between application control rules
Disclosed are systems, methods and computer program products for configuring application control rules. An example method includes, in response to testing a new...
US-9,432,405 Communicating status regarding application of compliance policy updates
A set of compliance policy updates are received. The compliance policy updates are sent to workloads for application. A status of the application of the...
US-9,432,404 System for managing access to protected resources
A rules evaluation engine that controls user's security access to enterprise resources that have policies created for them. This engine allows real time...
US-9,432,403 Method, system and computer program product for tagging content on uncontrolled web application
Communications by a device in a private network to a site operating outside of the network can be programmatically inspected. Unstructured data, including...
US-9,432,402 System and method for uploading files to servers utilizing GPS routing
This invention provides a system and a method to manage the uploading of data files from multiple wireless field devices in multiple locations to multiple data...
US-9,432,401 Providing consistent security information
A method for providing consistent security information between multiple applications is described herein. The method includes detecting potentially deceptive...
US-9,432,400 Method and system for protecting against unknown malicious activities by detecting a heap spray attack on an...
A method and system for protecting against unknown malicious activities by detecting a heap spray attack on a electronic device are disclosed. A script is...
US-9,432,399 Systems and methods for HTTP-body DoS attack prevention with adaptive timeout
The present disclosure is directed generally to systems and methods for changing an application layer transaction timeout to prevent Denial of Service attacks....
US-9,432,398 Securing cloud computing environments
Some examples of security cloud computing environments can be implemented as methods. A processor of a first computer system that lacks permission to store data...
US-9,432,397 Preboot environment with system security check
Booting an operating system that includes a secure preboot environment that performs integrity checks against security threats. A computer system boots to a...
US-9,432,396 Security threat detection using domain name registrations
Domain names are determined for each computational event in a set, each event detailing requests or posts of webpages. A number of events or accesses associated...
US-9,432,395 Application spam detector
A method for performing an application search. The method includes receiving a search query from a remote device and determining a consideration set of...
US-9,432,394 Methods, systems, and computer readable media for converging on network protocol stack vulnerabilities using...
A method for progressive convergence on network protocol stack vulnerabilities includes defining an initial protocol field and field value space for fuzz...
US-9,432,393 Global clustering of incidents based on malware similarity and online trustfulness
In an embodiment, a method, performed by processors of a computing device for creating and storing clusters of incident data records based on behavioral...
US-9,432,392 System and method for performing remote security assessment of firewalled computer
Methods and systems for scanning an endpoint terminal across an open computer network are disclosed. An exemplary method includes providing a scanner engine in...
US-9,432,391 Method, device and apparatus for acquiring security state of mobile terminal
Disclosed are a method, device and apparatus for acquiring the security state of a mobile terminal, which belong to the field of computers. The method includes:...
US-9,432,390 Scene identification system and methods
Certain embodiments are directed to a system for high security delivery of real time video containing an authentication signature or unique identifier.
US-9,432,389 System, apparatus and method for detecting a malicious attack based on static analysis of a multi-flow object
In an embodiment, a threat detection and prevention system comprises a network-traffic static analysis logic and a classification engine. The network-traffic...
US-9,432,388 System and method for recording and monitoring communications using a media server
A communication system including a media server through which communication packets are exchanged for recording and monitoring purposes is disclosed. A tap is...
US-9,432,387 Detecting network attacks
This disclosure generally relates to the generation of a packet signature for packets determined to correspond to a network attack, such as a denial of service...
US-9,432,386 Mobile point-of-presence for on demand network client services and security
Devices, systems and methods are disclosed which relate to implementing a point-of-presence system on a mobile service network. Such a point-of-presence system...
US-9,432,385 System and method for denial of service attack mitigation using cloud services
A method to mitigate attack by an upstream service provider using cloud mitigation services. An edge detection device, which located at the subscriber's network...
US-9,432,384 Methods and nodes for verification of data
A first data handling node (304) is configured to verify data received in a data distribution network with multiple data handling nodes forming a distribution...
US-9,432,383 Web page integrity validation
An aspect identifier of an integrity validation script may be provided to a browser application, that, during execution thereof by the browser application when...
US-9,432,382 Transmitting and receiving self-destructing messages
A device may receive, from a first user device, a request to transmit a message to a user of a second user device. The request may include particular...
US-9,432,381 Managed dissemination of location data
A location provider manages dissemination of location data of a user to one or more third-party services, so that the user can take advantage of services...
US-9,432,380 Network control security
Technologies are generally described for systems, devices and methods effective to allow a network element to retrieve a control command. In some examples, a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.