Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,456,030 Methods of operating load balancing switches and controllers using modified flow entries
A method of operating a load balancing switch may include providing a flow entry in a flow table, the flow entry may include a match pattern that is satisfied...
US-9,456,029 Command process load balancing system
A command process load balancing system performs load balancing of received commands among a number of server processes to resolve access contention for virtual...
US-9,456,028 Terminal and controlling method thereof
A method of controlling a first device and a second device, and which includes transmitting first data from the first device to the second device, receiving the...
US-9,456,027 Methods, secure element, server, computer programs and computer program products for improved application...
It presented a method, performed in a secure element, the secure element being arranged to enable user applications of the secure element to verify authenticity...
US-9,456,026 File change notifications in a scale-out NAS system
A method for file change notifications includes creating, on a first local node, a file change notification message in response to a client creating, deleting,...
US-9,456,025 Method and system for determining identity/presence of a mobile device user for control and interaction in...
A method and system for using a media access control (MAC) address of a mobile device for communication in a content distribution environment includes detecting...
US-9,456,024 Content sharing in mobile ad hoc networks
A method for sharing a plurality of content in a mobile ad hoc network is provided. The method may include registering the plurality of content for sharing on a...
US-9,456,023 Camera data management and user interface apparatuses, systems, and methods
In certain embodiments, a camera image stored locally by a device is published by the device, over a network, to a content distribution subsystem configured to...
US-9,456,022 Automatic access of internet content with a camera-enabled cell phone
A camera-enabled cell phone that is adapted to image a machine readable code such as a bar code, decode the bar code, send the bar code data over the Internet...
US-9,456,021 Loading pegged page objects based on predefined preferences
Methods and systems may provide for receiving a set of attributes that identify a pegged area of a page delivered to a user interface during a first browsing...
US-9,456,020 Methods and systems for transmitting synchronized visual and audio media
Systems and methods according to the present invention provide methods, devices and systems for delivering media content to users. Broadcast audio and video...
US-9,456,019 Web page load time prediction and simulation
Embodiments of automated cloud service performance prediction are disclosed. The automated cloud service performance prediction includes extracting one or more...
US-9,456,018 HTTP proxy based captive portal
HTTP-Based Captive Portal. Client requests through a device such as an access point or wired connection are routed through a captive portal switch (CPS). If the...
US-9,456,017 System and method for a connector being able to adapt to newer features introduced to a messaging provider with...
A computer-controlled method can include providing a resource adapter with an object wrapper having a plurality of features, a wrapper generation tool receiving...
US-9,456,016 Method and apparatus for providing streaming data encoding
A method for encoding streaming data according to one embodiment of the present invention comprises: a step of dividing a forward error correction (FEC) source...
US-9,456,015 Representation groups for network streaming of coded multimedia data
In one example, a device for receiving information for multimedia data, the device comprising one or more processors configured to analyze at least a portion of...
US-9,456,014 Dynamic workload balancing for real-time stream data analytics
Router threads read real-time stream data as that data is received at processing nodes along a processing path for the data. The data is initially parsed into...
US-9,456,013 Mobile device streaming media application
A system and process for coordinating streaming content or messages is provided. A network-connected server maintains a database containing media...
US-9,456,012 Inline user addressing in chat and document editing sessions
A computer-implemented method is executed on a server having one or more processors and memory storing one or more programs to be executed by the one or more...
US-9,456,011 Dynamic service and registry for management infrastructure
Information processing techniques for managing data center configurations. In one example, a method comprises the following steps. A registry is maintained...
US-9,456,010 Convergence of social enterprise and digital telephony
Integrating digital telephony information with a social platform may include using a processor to create multiple virtual groups for multiple parties connected...
US-9,456,009 Method and apparatus for securely transmitting lawfully intercepted VOIP data
A method, apparatus, and computer usable program product for transmitting intercepted VOIP data are provided in the illustrative embodiments. A VOIP call is...
US-9,456,008 System and method for processing telephony sessions
In one embodiment, the method of processing telephony sessions includes: communicating with an application server using an application layer protocol;...
US-9,456,007 Session aware notifications
User device information, identifying a first plurality of devices associated with a first user, is stored. A first device of the first plurality of devices is...
US-9,456,006 Method, device and system for session binding
Disclosed are a method, device and system for session binding. The method includes: a PCRF or BPCF receives a first session from a fixed network, wherein the...
US-9,456,005 Ensuring health and compliance of devices
A compliance method and associated system is provided. The method includes generating backup devices for devices of a list of devices associated with a data...
US-9,456,004 Optimizing risk-based compliance of an information technology (IT) system
For each of a plurality of endpoints of an information technology system having a plurality of security policies, a probability of being safe of each of said...
US-9,456,003 Decoupling hardware and software components of network security devices to provide security software as a...
Concepts and technologies are disclosed herein for decoupling hardware and software components of network security devices to provide security software as a...
US-9,456,002 Selective modification of encrypted application layer data in a transparent security gateway
According to one embodiment, a transparent security gateway is coupled between a client end station (CES) and a web application server (WAS). The security...
US-9,456,001 Attack notification
Systems, methods, and machine-readable and executable instructions are provided for attack notification. Attack notification can include receiving...
US-9,456,000 Systems, methods, user interfaces, and computer-readable media for investigating potential malicious communications
A data analysis system receives potentially undesirable electronic communications and automatically groups them in computationally-efficient data clusters,...
US-9,455,999 Method and system for protective distribution system (PDS) and infrastructure protection and management
A method and system for managing a protective distribution system is disclosed. In some embodiments, an information transmission line may be monitored. A...
US-9,455,998 Systems, methods and apparatuses for prevention of relay attacks
The systems, methods and apparatuses described herein provide an apparatus configured for preventing relay attacks on a communication link between the apparatus...
US-9,455,997 System and method for preventing web frauds committed using client-scripting attacks
A method for detecting and blocking Javascript hijacking attacks, comprising checking if an incoming request belongs to a valid session established between a...
US-9,455,996 Generating progressively a perfect hash data structure, such as a multi-dimensional perfect hash data...
A multi-dimensional perfect hash table construction technique is based on which the well-known AC automaton, and can be implemented by very compact perfect hash...
US-9,455,995 Identifying source of malicious network messages
System, method and program for identifying a subset of a multiplicity of source networks. The subset including one or more source networks which have sent...
US-9,455,994 Techniques for intelligently executing a digital signature
Techniques for intelligently executing a digital signature are disclosed. In one embodiment, the techniques may be realized as a method for intelligently...
US-9,455,993 Computer network attribute bilateral inheritance
Current approaches to managing security intelligence data often address both threat and malicious behavior at the individual computer level, tracked by the...
US-9,455,992 Trusted hardware component for distributed systems
Techniques for utilizing trusted hardware components for mitigating the effects of equivocation amongst participant computing devices of a distributed system...
US-9,455,991 Method and apparatus for providing reactive authorization
An approach is provided for providing reactive authorization for accessing a semantic network resource. An access application of a resource owner entity detects...
US-9,455,990 System and method for role based access control in a content management system
Embodiments of the present invention provide an efficient and scalable scheme for role-based access control to resources. The resources are assigned a...
US-9,455,989 Automatic isolation and detection of outbound spam
Embodiments provide IP address partitioning features that can be used to source outbound email communications, but the embodiments are not so limited. In an...
US-9,455,988 System and method for verifying status of an authentication device
A system and method that includes receiving a first device profile and associating the first device profile with a first application instance that is assigned...
US-9,455,987 Method, system and apparatus for geo-verification
A method, system and apparatus are provided for geo-verification for access to data stored in a memory of a server having a processor and a network interface...
US-9,455,986 Method of authenticating a device to access a service
The invention relates to a method of authenticating a user of a first device while accessing a service offered by a service provider, the first device forming...
US-9,455,985 Method for secure key injection with biometric sensors
Systems and methods are disclosed for securely injecting one or more key values into an electronic device by reading with a fingerprint sensor a manufactured...
US-9,455,984 Secret data matching device, secret data matching method, and recording medium
A secret data matching device includes: a memory; and a processor coupled to the memory. The processor executes a process including: storing a first secret...
US-9,455,983 Digital signatures for communications using text-independent speaker verification
A speaker-verification digital signature system is disclosed that provides greater confidence in communications having digital signatures because a signing...
US-9,455,982 Identification authentication in a communications network
Systems and methods for an identification capable communication device are provided. The communication device or line is registered or associated with a primary...
US-9,455,981 Method and system for protection against information stealing software
A system and method for identifying infection of unwanted software on an electronic device is disclosed. A software agent configured to generate a bait and is...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.