Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,497,245 Apparatus and method for live streaming between mobile communication terminals
An apparatus and method support live streaming between mobile communication terminals. A server Mobile Station (MS) Transport Stream (TS)-multiplexes...
US-9,497,244 Mission tuples in a streaming application environment
Tuple communication and decision determination is provided in a streaming environment. A processor: generates mission tuples wrapped in a computing object or...
US-9,497,243 Content delivery
A technology for content delivery is provided. In one example, performance of a caching network, performance of a delivery network, and customer demand are...
US-9,497,242 Adaptation, shunt transmission and stream switching method and system for coordinated service
The present disclosure provides an adaptation, shunt transmission and stream switching method and system for a coordinated service, and the method includes: a...
US-9,497,241 Content adaptive high precision macroblock rate control
Methods and systems may include an apparatus having hardware logic to allocate a set of macroblock bit budgets for a bitstream associated with a video signal....
US-9,497,240 Reassigning streaming content to distribution servers
Example systems and methods of distributing content in computer networks are provided. Content received at a first distribution server is transmitted to a...
US-9,497,239 Rapidly initializing and dynamically adjusting media streams
A device may generate a media stream to be shared with other users by building a media graph, comprising a series of interconnected processing units that...
US-9,497,238 Application control translation
Disclosed are various embodiments that facilitate translation of application controls. An application is executed in a hosted environment that virtualizes a...
US-9,497,237 Digital signage playback system, monitoring system, and monitoring method thereof
A digital signage playback system, a monitoring system, and a monitoring method thereof are disclosed. The digital signage playback system is used for providing...
US-9,497,236 System and method for integrating VoIp client for audio conferencing
Aspects of the present disclosure disclose system, apparatus and methods for providing an integrated web conferencing. In various aspects, the disclosure is...
US-9,497,235 Determining capacity of virtual devices in a voice over internet protocol system
A method for determining a capacity of a virtual machine configured as a telephony device in a VoIP system includes determining a resource configuration of the...
US-9,497,234 Implicit social graph connections
A method includes: determining a first user interaction on a social network system; identifying a social network object in the social network system associated...
US-9,497,233 Application of a non-secure warning tone to a packetised voice signal
A method is disclosed of applying a non-secure warning tone to a packetized voice signal which includes receiving a voice signal containing a sequence of voice...
US-9,497,232 Method for establishing an IP-based communications connection between an electric vehicle and a charging...
A method establishes an IP-based communications connection between an electric vehicle and a charge control unit associated with a charging station assigned an...
US-9,497,231 Real-time placeshifting of media content to paired devices
Methods, devices, and systems are provided for placeshifting a media program. An exemplary method involves a media device storing identification information for...
US-9,497,230 Apparatus and method for computer controlled call processing applications in packet switched telephone networks
A method is presented comprising transmitting, from an application computer communicably connected to a call controller which is connected to a data network,...
US-9,497,229 Methods and apparatus to manage internet protocol (IP) multimedia subsystem (IMS) network capacity
Methods and apparatus to manage Internet Protocol (IP) Multimedia Subsystem (IMS) network capacity are disclosed. An example method comprises identifying a...
US-9,497,228 Class 4 long distance softswitch network with integrated class 5 application services
A telecommunication system including a class 4 long distance softswitch network with one or more a core routing engines and one or more class 5 application...
US-9,497,227 Method of conveying a location information representing a physical location of a first communication device, a...
A method of conveying a location information (2) representing a physical location of a first communication device (D) from the first communication device (D) to...
US-9,497,226 Tracking the progression of a communication session
A global identifier is generated based on the initiation of a communication session in a network. The global identifier is sent during the initiation of the...
US-9,497,225 Service based consolidation of applications across networks
Embodiments of the invention provide systems and methods for consolidating applications or services across networks to allow the applications or services to be...
US-9,497,224 Systems and methods for implementing computer security
A security server transmits a specification of a first set of files and directories to a computing device for monitoring according to a security policy. Each of...
US-9,497,223 System and method for configuring a computer system according to security policies
Method and system for configuration of a computer system according to security policies. The configuration of an employee's personal computer system according...
US-9,497,222 Identification of web form parameters for an authorization engine
A method, system and computer-usable medium are disclosed for automating the identification of web form parameters for an authorization engine. A web page...
US-9,497,221 Mobile communication device and method of operating thereof
A mobile communication device is provided. The mobile communication device includes a first trusted platform module, a second trusted platform module, a...
US-9,497,220 Dynamically generating perimeters
Systems and techniques relating to securely managing electronic resources are described. A described technique includes receiving a request to add to a mobile...
US-9,497,219 Enforcing control policies in an information management system with two or more interactive enforcement points
A method and apparatus for controlling document access and application usage using centrally managed rules. The rules are stored and manipulated in a central...
US-9,497,218 System and method for detection of phishing scripts
Disclosed are exemplary aspects of systems and methods for detection of phishing scripts. An exemplary method comprises: generating a bytecode of a script;...
US-9,497,217 Endpoint traffic profiling for early detection of malware spread
According to one exemplary embodiment, a method for detecting malware in a network stream to at least one host computer is provided. The method may include...
US-9,497,216 Detecting fraudulent activity by analysis of information requests
Techniques are described for use in inhibiting attempts to fraudulently obtain access to confidential information about users. In some situations, the...
US-9,497,215 Stealth mitigation for simulating the success of an attack
In one embodiment, attack traffic corresponding to a detected DoS attack from one or more attacker nodes is received at a denial of service (DoS) attack...
US-9,497,214 System and method for uploading and verifying a document
A computer implemented method may allow for the upload and verification of a document. In one aspect, the method may receive a file associated with an insurance...
US-9,497,213 System and method to manage sinkholes
A system and method operable to manage and/or distribute sinkholes.
US-9,497,212 Detecting malicious resources in a network based upon active client reputation monitoring
Systems and methods for detecting malicious resources by analyzing communication between multiple resources coupled to a network are provided. According to one...
US-9,497,211 Systems, methods, and devices for defending a network
Certain exemplary embodiments comprise a method comprising: within a backbone network: for backbone network traffic addressed to a particular target and...
US-9,497,210 Stateless attestation system
A method includes assessing a trustworthiness level of a user computer by communication between the user computer and a first server. A record indicating the...
US-9,497,209 Image vulnerability repair in a networked computing environment
Embodiments of the present invention provide an approach to repair vulnerabilities (e.g., security vulnerabilities) in images (e.g., application images) in a...
US-9,497,208 Distributed network protection
A method and system for processing frames transmitted in a network including nodes and network segments connecting the nodes. Frames transmitted over network...
US-9,497,207 Securing of software defined network controllers
Methods and arrangements for securing a software defined network. One or more control messages are intercepted. Information is extracted from the one or more...
US-9,497,206 Anomaly detection in groups of network addresses
A method for identifying anomalies in a group of network addresses includes building a model of the group of network addresses and identifying a network address...
US-9,497,205 Global commonality and network logging
Data is divided into blocks, a signature is derived for a block, and the signature is stored in a storage device without retaining the block. The signature may...
US-9,497,204 In-situ trainable intrusion detection system
A computer implemented method detects intrusions using a computer by analyzing network traffic. The method includes a semi-supervised learning module connected...
US-9,497,203 System and methods for adaptive model generation for detecting intrusion in computer systems
A system and methods for detecting intrusions in the operation of a computer system comprises a sensor configured to gather information regarding the operation...
US-9,497,202 Controlling privacy in a face recognition application
Embodiments of the present invention may involve a method, system, and computer program product for controlling privacy in a face recognition application. A...
US-9,497,201 Applying security policy to an application session
Applying a security policy to an application session, includes: recognizing the application session between a network and an application via a security gateway;...
US-9,497,200 Managing limited network access configuration
A system, a method, and a computer program product for managing network configuration by a controller. A request to connect a device to a network is received....
US-9,497,199 Access control for event data stored in cloud-based data stores
Embodiments are directed towards a system and method for a cloud-based front end that may abstract and enable access to the underlying cloud-hosted elements and...
US-9,497,198 Systems and methods for application based interception of SSL/VPN traffic
A method for allowing or denying, by an appliance, access to a resource by an application on a client via a virtual private network connection includes basing...
US-9,497,197 Systems and methods for secure resource access and network communication
Systems and methods for secure resource access and network communication are provided. A plurality of policies are received on a client device, each policy...
US-9,497,196 IOT device environment detection, identification and caching
A method and apparatus for controlling latency within a wireless system, and more specifically sharing, updating and storing status information between devices...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.