Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,503,491 Playback stall avoidance in adaptive media streaming
Methods, systems and devices are described to avoid stalling during playback of an adaptive media stream delivered to a media player device over a network. The...
US-9,503,490 Dash client and receiver with buffer water-level decision-making
A client/receiver downloads data over a network path between a source and the receiver coupled by the network path and stores the media data in a presentation...
US-9,503,489 Streaming data on data processes
A method, system and computer program product for servicing media content. In one embodiment, the media content is processed by having each of a group of...
US-9,503,488 System and method for virtual call hold
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for accomplishing a virtual call on hold. A client communication...
US-9,503,487 Call coupling
A method for establishing for a first smartphone a phone connection with a second smartphone, each smartphone comprising a phone and running a software...
US-9,503,486 Configuring, networking, and controlling a plurality of unique network-capable devices
Configuring a control session comprises receiving a request to execute an input/output application from a content control application executing on a mobile...
US-9,503,485 Connecting communicating devices in a multi-server communication system
A system and methods are provided for aggregating communication connections. Multiple users connect to a system (e.g., a web-based system) that hosts an...
US-9,503,484 Voice transmission technology selection
The present invention relates to a method of transmitting a signal by an MME (Mobility Management Entity) in a wireless network, the method comprising:...
US-9,503,483 Method and apparatuses for identifying and reporting quality of service rules applicable to a communication session
According to the present invention there is provided a method of facilitating a communication session between a user terminal and an Application Function over...
US-9,503,482 Providing a common security policy for a heterogeneous computer architecture environment
A common security policy for a heterogeneous computer architecture environment is provided. A configuration of a security policy of a heterogeneous computer...
US-9,503,481 System and method for a security asset manager
Implementations of the present disclosure involve a system and/or method of performing security asset management. The system and/or method may schedule...
US-9,503,480 Deploying policy configuration across multiple security devices through hierarchical configuration templates
Deploying policy configuration across multiple security devices through hierarchical configuration templates is disclosed. In some embodiments, deploying policy...
US-9,503,479 Assessment of network perimeter security
A method and system for assessing security of a network perimeter of a network. Security of an authentication computer from attack is reviewed. Users outside of...
US-9,503,478 Policy-based secure communication with automatic key management for industrial control and automation systems
A method includes generating at least one access vector associated with a specified device in an industrial process control and automation system. The specified...
US-9,503,477 Network policy assignment based on user reputation score
A network controller device, systems, and methods thereof are described herein for enabling a mechanism of assigning network policies to one or more users based...
US-9,503,476 Anti-takeover systems and methods for network attached peripherals
Methods, systems, and devices are described for the prevention of network peripheral takeover activity. Peripheral devices may implement an anti-takeover...
US-9,503,475 Self-adaptive and proactive virtual machine images adjustment to environmental security risks in a cloud...
A computer system includes a security coordinator configured to be communicatively coupled to a plurality of managed machines deployed in a same computing...
US-9,503,474 Identification of trusted websites
This document describes techniques for identifying trusted websites. In one embodiment, a computer system can receive a request from user to access a website...
US-9,503,473 Apparatus, system, and method for protecting against keylogging malware
An apparatus, system, and method is disclosed for protecting against key logger malware. The protection includes protection form grabbing keylogger malware. In...
US-9,503,472 Profiling cyber threats detected in a target environment and automatically generating one or more rule bases...
A computer implemented method of profiling cyber threats detected in a target environment, comprising: receiving, from a Security Information and Event Manager...
US-9,503,471 Pre-processing system for minimizing application-level denial-of-service in a multi-tenant system
Denial-of-service attacks are prevented or mitigated in a cloud compute environment, such as a multi-tenant, collaborative SaaS system. This is achieved by...
US-9,503,470 Distributed agent based model for security monitoring and response
An architecture is provided for a widely distributed security system (SDI-SCAM) that protects computers at individual client locations, but which constantly...
US-9,503,469 Anomaly detection system for enterprise network security
Anomaly detection is disclosed, including: determining a set of anomalous events associated with an enterprise network; and determining a path of interest based...
US-9,503,468 Detecting suspicious web traffic from an enterprise network
Methods, apparatus and articles of manufacture for detecting suspicious web traffic are provided herein. A method includes generating a database comprising...
US-9,503,467 Network anomaly detection
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for determining network related anomaly scores. One of the...
US-9,503,466 Cross-validation of a learning machine model across network devices
In one embodiment, a first network device receives a notification that the first network device has been selected to validate a machine learning model for a...
US-9,503,465 Methods and apparatus to identify malicious activity in a network
Methods, apparatus, systems and articles of manufacture are disclosed to learn malicious activity. An example method includes assigning weights of a distance...
US-9,503,464 Providing alerts based on unstructured information methods and apparatus
A system, method, and apparatus for providing alerts based on unstructured information are disclosed. An example apparatus includes an interface configured to...
US-9,503,463 Detection of threats to networks, based on geographic location
A method for a wireless network. The network includes at least a server and a plurality of computer devices wirelessly connected to the server. At least one of...
US-9,503,462 Authenticating security parameters
A method for authenticating communicating parties is disclosed. In the method biometric information associated with a first party is generated based on a...
US-9,503,461 Authentication based on proximate devices
In one embodiment, a computer-implemented method includes, in response to an attempt by a user to perform a transaction using a computing device, accessing a...
US-9,503,460 System and method for managing access for trusted and untrusted applications
A method is provided in one example embodiment and includes identifying a network location of an endpoint, which is attempting to initiate an application;...
US-9,503,459 Establishing access controls in a premise-based environment
Establishing access controls includes establishing a communication session between an unrecognized user identity of a user device and a destination system...
US-9,503,458 Retrospective policy safety net
These and other objectives are attained with a method and system for evaluating an access policy change. The method comprises the step of providing an access...
US-9,503,457 Administration of access lists for femtocell service
A subscriber account associated with a femtocell can be managed and access can be provided thereto. The account service management can be accessed through a...
US-9,503,456 Video chat abuse detection based on external context
A server-implemented technique can include obtaining external context parameters indicative of an external context of a video chat session, calculating an abuse...
US-9,503,455 Controlling access to storage devices shared by host systems
To control access to a source storage device shared by a plurality of host systems, methods and systems include confirming a presence of an application on each...
US-9,503,454 Smart card service method and apparatus for performing the same
Provided are a smart card service method and an apparatus for performing the same. The smart card service method includes receiving a certificate generation...
US-9,503,453 OTP-based authentication system and method
Disclosed is an authentication system and method. The authentication system according to one embodiment of the present disclosure comprises a transceiver for...
US-9,503,452 System and method for identity recognition and affiliation of a user in a service transaction
The method integrates the dynamic and authoritative posture of an authenticated user, a registered device, and a registered service provider as a conclusive...
US-9,503,451 Compromised authentication information clearing house
Techniques for maintaining potentially compromised authentication information for a plurality of accounts may be provided. An individual piece of authentication...
US-9,503,450 Login security with short messaging
Additional security is provided for on-line account users beyond that which is otherwise conventionally provided by, e.g., longer passwords, passwords that...
US-9,503,449 Application centric centralized certificate management system for managing certificates across data centers
A system for managing one or more certificates on granular object level in one or more datacenters is provided. The system includes a discover module, an...
US-9,503,448 Authenticated session establishment
Methods, devices, and machine-readable media are provided to provide secure communications between entities. As provided in this disclosure, this may include...
US-9,503,447 Secure communication between processes in cloud
Secure communication between processes in cloud platform may be performed by receiving a request from a client application process hosted in an application...
US-9,503,446 Authentication within openflow network
An OpenFlow network controller controls an OpenFlow network. A networking connection is established between the OpenFlow network controller and an OpenFlow...
US-9,503,445 Pre-delivery authentication
Pre-delivery authentication may be required prior to routing and delivery of electronic content. A sender of the electronic content, for example, may require...
US-9,503,444 System and method for sharing access to a service within a home network
A home network router and method of operation are provided for seamlessly sharing access to a network service by multiple devices in a home network by...
US-9,503,443 Secure access systems and methods to network elements operating in a network
A network element, configured to operate in a network to provide various network functions therein, includes a main processor communicatively coupled to a main...
US-9,503,442 Credential-based application programming interface keys
A processing device comprises a processor coupled to a memory and is configured to obtain a credential associated with a particular access control interval, to...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.