Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,462,027 Performing an action on a social networking system based on a content identifier embedded in provided content
A content source provides metadata associated with content, such as an audio signal or video data, to a social networking system. The metadata identifies...
US-9,462,026 Communicating multimedia data
A method of communicating multimedia data includes establishing a first connection between a transmitter unit and an administration server, establishing a...
US-9,462,025 Increasing link throughput to enable admission without exceeding latency variation limits
Methods and systems for admitting streaming sessions while controlling links capacities, including the steps of: receiving a request to establish a new...
US-9,462,024 System and method of media content streaming with a multiplexed representation
In accordance with an embodiment, a method of operating a streaming media client includes electronically receiving, from a network, information regarding...
US-9,462,023 Delivery of enhanced content related to a broadcast work
A preference related to the broadcast of a work, for example a song, advertisement, or enhanced content associated with the work can be obtained from an end...
US-9,462,022 Mobile application migration to cloud computing platform
Technology is disclosed herein for migrating at least portions of computer applications to a server. According to at least one embodiment, a computing device...
US-9,462,021 Methods and devices for efficient adaptive bitrate streaming
Methods and systems for a content server to select sets of video streams having different encoding parameters for transmitting the sets of video streams to a...
US-9,462,020 Intelligent client: multiple channel switching over a digital broadcast network
A digital broadcast network is disclosed that can divide an application into multiple channels to be distributed to receiving devices. A receiving device can...
US-9,462,019 Adjusting network operations based on user feedback
A system comprising a broadcast facility, one or more players, and an analytic service center. The broadcast facility may be configured to provide a plurality...
US-9,462,018 Multiway peer-to-peer media streaming
Multiway peer-to-peer media streaming is disclosed. In one embodiment, a method comprises defining a first portion of a peer-to-peer network. The method then...
US-9,462,017 Meeting collaboration systems, devices, and methods
A method for conducting a communications session (e.g., a teleconference) may include: displaying, by a client device, a communications interface that may...
US-9,462,016 Viewing shared documents in a sharing session
In a sharing session between a presenter and several attendees, the presenter can share any type of document quickly and without substantial prior preparation....
US-9,462,015 Distributed association engine
A computer-implemented method for a distributed association engine, comprising searching, by a processor, for one or more objects of interest within a spatial...
US-9,462,014 System and method for tracking and auditing data access in a network environment
A system and method that correlate business transaction in a system and traffic generated from this business transaction in a network back to a user identity...
US-9,462,013 Managing security breaches in a networked computing environment
Approaches for managing security breaches in a networked computing environment are provided. A method includes detecting, by at least one computer device, a...
US-9,462,012 Notification for reassembly-free file scanning
Techniques for notification of reassembly-free file scanning are described herein. According to one embodiment, a first request for accessing a document...
US-9,462,011 Determining trustworthiness of API requests based on source computer applications' responses to attack messages
A method includes receiving an application programming interface (API) request from a source computer application that is directed to a destination computer...
US-9,462,010 Threat assessment level determination and remediation for a cloud-based multi-layer security architecture
A device may obtain information regarding a security situation of a set of computing resources associated with a cloud-based platform. The information may be...
US-9,462,009 Detecting risky domains
There is disclosed a technique for detecting risky domains. The technique comprises collecting information in connection with a domain. The technique also...
US-9,462,008 Identifying threats based on hierarchical classification
A system and a method are disclosed for identifying network threats based on hierarchical classification. The system receives packet flows from a data network...
US-9,462,007 Human user verification of high-risk network access
Systems and methods for performing a human user test when a high-risk network access is captured by an intermediary security device are provided. According to...
US-9,462,006 Network-layer application-specific trust model
A data verification system facilitates verifying whether a CCN Content Object is authentic or trustworthy on behalf of an application. During operation, the...
US-9,462,005 Systems and methods for broadcast WLAN messages with message authentication
Systems, methods, and devices for multicast wireless local area network messages with message authentication are contained herein. The method includes...
US-9,462,004 Automatic group assignment of users in a social network
Methods, systems, and computer programs are presented for managing electronic messages of users in a social network. One method includes an operation for...
US-9,462,003 Bidirectional authorization system, client and method
Disclosed is a bidirectional authorization system, including a first service provision subsystem configured to acquire a first temporary credential of the first...
US-9,462,002 System, method, and computer program product for sharing files based on user profile visibility
In accordance with embodiments, there are provided mechanisms and methods for sharing files based on user profile visibility. These mechanisms and methods for...
US-9,462,001 Computer network access control
Receive, at an access control node (ACN) of a first network enclave, a plurality of data packets inbound to the enclave. The characteristics of each received...
US-9,462,000 Off-site user access control
Systems and methods are described for off-site user access control to communications services via a site-based communications network. Embodiments operate in...
US-9,461,999 Relay device
A connector 1 includes a connection request information reception processing unit 12 that obtains first connection request information transmitted by the first...
US-9,461,998 Techniques for call-based user verification
Techniques for call-based user verification are described. In one embodiment, for example, an apparatus may comprise a processor circuit and a storage...
US-9,461,997 Secure authorization of modules running on virtualized hardware
A method is described that includes securing authorization for a control module to conduct a test using a plurality of test modules running on a plurality of...
US-9,461,996 Systems and methods for providing a single click access to enterprise, SAAS and cloud hosted application
The present disclosure is directed to methods and systems of providing a user-selectable list of disparately hosted applications. A device intermediary to a...
US-9,461,995 Terminal, network locking and network unlocking method for same, and storage medium
The present invention discloses a terminal, a network locking and network unlocking method for same, and a storage medium, said network locking method...
US-9,461,994 Trusted computing base evidence binding for a migratable virtual machine
In an embodiment, at least one computer readable medium has instructions stored thereon for causing a system to cryptographically sign, at a secure platform...
US-9,461,993 System and methods for UICC-based secure communication
A system that incorporates the subject disclosure may include, for example, instructions which when executed cause a device processor to perform operations...
US-9,461,992 Smartphone based identification, access control, testing, and evaluation
A suite of testing and evaluation tools that run in conjunction with a smartphone that can be used to both enroll, and for subsequent enrollees, to gain secure...
US-9,461,991 Virtual smartcard authentication
The invention provides a system and method for signing a user workstation onto an access restricted network utilizing a mobile communication device. The method...
US-9,461,990 Method for reading attributes from an ID token
A method for reading at least one attribute stored in an ID token assigned to a user involving: authenticating the user to the ID token, authenticating a first...
US-9,461,989 Integrating operating systems with content offered by web based entities
Example embodiments are provided for integrating operating systems with content offered by internet based entities.
US-9,461,988 Image forming apparatus capable of executing authentication processing, method of controlling the same, and...
An image forming apparatus that is capable of executing authentication processing improved in security of a command including authentication information, which...
US-9,461,987 Audio authentication system
According to one embodiment, an apparatus is provided that comprises a memory, an interface, and a processor communicatively coupled to the memory and to the...
US-9,461,986 Single sign-on for disparate servers
A system includes authentication of a user with a first server, reception of a request from the user to authenticate the user with a second server, requesting,...
US-9,461,985 Device authentication within deployable computing environment
A deployable computing environment may facilitate interaction and data sharing between users and devices. Users, devices, and relationships between the users...
US-9,461,984 Systems and methods for blocking flanking attacks on computing systems
A computer-implemented method for blocking flanking attacks on computing systems may include (1) detecting a denial-of-service attack targeting a computing...
US-9,461,983 Multi-dimensional framework for defining criteria that indicate when authentication should be revoked
Methods and systems are presented for defining criteria that indicate when authentication for an identified client device should be revoked based on rules...
US-9,461,982 Disposable browsers and authentication techniques for a secure online user environment
Disclosed herein are systems and methods that allow for secure access to websites and web-based applications and other resources available through the browser....
US-9,461,981 Leveraging a persistent connection to access a secured service
Leveraging a persistent connection to provide a client access to a secured service may include establishing a persistent connection with a client in response to...
US-9,461,980 Predictive prefetching of attribute information
In one example, a method includes predicting, by a network access control (NAC) device based on a device identifier in a request from a client device and a...
US-9,461,979 Method and system for including network security information in a frame
A method and apparatus for including network security information in a frame is disclosed. Network security information is included in a secure portion of...
US-9,461,978 System and method for managing role based access controls of users
A method and system for role based access control for a plurality of users in a heterogeneous enterprise environment, comprising: establishing a functional...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.