Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,516,089 Identifying and processing a number of features identified in a document to determine a type of the document
A system and method for document classification are presented. An input document is received (e.g., by at least one server communicatively coupled to a...
US-9,516,088 Systems and methods to consistently generate web content
Methods and systems to consistently generate web content are described. The system receives a request, at a server machine, for an interface, from a client...
US-9,516,087 Managing data transfer using streaming protocols
Techniques are described for managing data transmissions between computing systems based at least in part on using a streaming transport protocol. At least some...
US-9,516,086 Transmitting device, receiving device, and transceiving method thereof
A transmitting device which transmits a plurality of streams is provided. The transmitting device comprises: a first multimedia data consisting of multimedia...
US-9,516,085 Constrained fidelity Adaptive Bit Rate encoding systems and methods
This disclosure describes and adaptive bit rate encoding and distribution techniques for conserving bandwidth usage in a channel. The invention comprises, an...
US-9,516,084 System and method for pre-provisioning adaptive bitrate (ABR) assets in a content delivery network
A system and method for pre-provisioning ABR assets in a content delivery network (CDN). In an example, historical delivery patterns of one or more ABR assets...
US-9,516,083 Method and apparatus for providing enhanced streaming content delivery with multi-archive support using secure...
A system, apparatuses and methods are provided to download and process data and other content streamed over a wide area network using one or more dynamically...
US-9,516,082 System and method for advancing to a predefined portion of a decompressed media stream
A computer system generates a first decompressed media stream based on a first compressed media stream. While providing the first decompressed media stream to a...
US-9,516,081 Reduced latency electronic content system
An architecture for selecting and providing content items to a device includes cloud-based resources of a device management service and one or more content...
US-9,516,080 Methods and apparatuses for streaming content
Methods and apparatuses for streaming content including a base layer and an enhancement layer. According to one implementation, a first stream is fetched...
US-9,516,079 Media stream modification based on channel limitations
A system and method for modifying media stream based on a channel limitation are disclosed. In one embodiment, the system includes a channel analyzer, a...
US-9,516,078 System and method for providing intelligent chunk duration
A method is provided in one example embodiment and includes receiving analytics information for a video file at a transcoder, the analytics information includes...
US-9,516,077 Remote subscription management method and system
A method for enabling a consumer to remotely manage a media content subscription is described. The method includes transmitting, over a network from a computing...
US-9,516,076 Central conferencing routing server
Aspects of the present disclosure involve systems, methods, computer program products, and the like, for collaboration conferencing with multiple participants...
US-9,516,075 Apparatus, system, and method of managing data, and recording medium
A transmission terminal includes: a memory to store, for each one of a plurality of candidate counterpart terminals that the transmission terminal is capable of...
US-9,516,074 Transfer of items between social networking websites
A first website earns rewards, e.g. points and items, for carrying out activities. Those rewards can be transferred to a second website. For example, a parent's...
US-9,516,073 System, method and computer program product for asset sharing among hierarchically interconnected objects
In some embodiments, a parent object may share its assets with its descendent(s) in a hierarchical asset sharing model. The hierarchical asset sharing model may...
US-9,516,072 Device, system and method for generating application data
A device is described. The device comprises: a display configured to display first application data; a processor configured to communicate with a further...
US-9,516,071 Video conferencing system and associated interaction display method
A video conferencing system is provided. The video conferencing system includes a first video conferencing apparatus and a second video conferencing apparatus....
US-9,516,070 Method for establishing channel for managing IPV4 terminal and network gateway
A method can be used for establishing a channel for managing an IPv4 terminal. An identifier of a network port of an IPv4 terminal is sent by a home gateway. A...
US-9,516,069 Packet headers as a trigger for automatic activation of special-purpose softphone applications
Methods, devices, and systems for automatically controlling the activation and/or deactivation of communication applications are provided. More specifically,...
US-9,516,068 Seamless host migration based on NAT type
Systems and methods of the present invention for maintaining network data distribution are provided. Network data may be distributed in such as manner as to...
US-9,516,067 Method and systems for an outgoing unidirectional outage bypass for a voice over internet protocol private...
A system and method is disclosed herein for providing a unidirectional outage bypass for outgoing communications from a session initiation protocol (SIP) device...
US-9,516,066 Rights management services integration with mobile device management
Rights management services (RMS) integration with mobile device management (MDM) may be provided. A functionality associated with a document may be restricted...
US-9,516,065 Secure communication device and method
A security enhancement to IPSec processing is achieved by changing the algorithms used at each re-key after expiration or termination of a Security Association...
US-9,516,064 Method and system for dynamic and comprehensive vulnerability management
One or more relevant scanners used to identify asset vulnerabilities are identified, obtained, and logically arranged for deployment on an asset in accordance...
US-9,516,063 System, method, and computer-readable medium for performing automated security validation on a virtual machine
An automated build server communicates with an automated build client to build virtual clients hosted by a virtual server. The automated build client...
US-9,516,062 System and method for determining and using local reputations of users and hosts to protect information in a...
A method in an example embodiment includes correlating a first set of event data from a private network and determining a local reputation score of a host in...
US-9,516,061 Smart virtual private network
In one implementation, a policy server establishes a smart virtual private network between two client devices. The smart virtual private network includes a...
US-9,516,060 Malware analysis methods and systems
Methods of analyzing malware and other suspicious files are presented, where some embodiments include analyzing the behavior of a first malware sample on both a...
US-9,516,059 Using mock tokens to protect against malicious activity
A technique provides protection against malicious activity. The technique involves providing a mock token to fraudster equipment. The mock token appears to be a...
US-9,516,058 Method and system for determining whether domain names are legitimate or malicious
A system and method for determining whether at least one domain is legitimate or malicious by obtaining passive DNS query information, using the passive DNS...
US-9,516,057 Systems and methods for computer worm defense
A computer worm defense system comprises multiple containment systems tied together by a management system. Each containment system is deployed on a separate...
US-9,516,056 Detecting a malware process
Detecting a malware process is disclosed, including: monitoring a launch of a process; in response to a completion of the launch of the process, determining a...
US-9,516,055 Automatic malware signature extraction from runtime information
A computer system receives a file and instruments an original code of the file in memory. The resulting instrumented code allows for collection of runtime...
US-9,516,054 System and method for cyber threats detection
A system and method for detecting a cyber-threat according to embodiments of the present invention comprise automatically discovering resources on a network, by...
US-9,516,053 Network security threat detection by user/user-entity behavioral analysis
A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security...
US-9,516,052 Timeline displays of network security investigation events
Techniques and mechanisms are disclosed that enable network security analysts and other users to efficiently conduct network security investigations and to...
US-9,516,051 Detecting web exploit kits by tree-based structural similarity search
A method of detecting exploit kits includes receiving, at an input port of a computer, indication of HTTP (Hypertext Transfer Protocol) traffic. The HTTP...
US-9,516,050 Monitoring propagation in a network
A non-transitory computer-readable recording medium stores therein a program for causing a computer to execute a process. The process includes obtaining, for...
US-9,516,049 Packet capture and network traffic replay
Implementations disclosed herein provide a network agent embodied in firmware and/or software that replays network traffic of an enterprise network to an entity...
US-9,516,048 Contagion isolation and inoculation via quarantine
In some embodiments, techniques for protecting a network may include detecting an insecure condition on a first host that has connected or is attempting to...
US-9,516,047 Time zero classification of messages
Detecting infectious messages comprises performing an individual characteristic analysis of a message to determine whether the message is suspicious,...
US-9,516,046 Analyzing a group of values extracted from events of machine data relative to a population statistic for those...
A metric value is determined for each event in a set of events that characterizes a computational communication or object. For example, a metric value could...
US-9,516,045 Resisting the spread of unwanted code and data
A method or system of receiving an electronic file containing content data in a predetermined data format, the method comprising the steps of: receiving the...
US-9,516,044 Method and system for correlating self-reporting virtual asset data with external events to generate an...
A method and system for correlating patterns of operating virtual assets with external events includes receiving an identification of one of the external...
US-9,516,043 Auditor system
An auditing system and method for analyzing email, including capturing email transferred over a network and transferring the email to a data analyzer. The email...
US-9,516,042 Apparatus for switching between multiple servers in a web-based system
A main server and a mirror server hold the same content. A server switching apparatus sets only one of the web servers to be active. In the case where the...
US-9,516,041 Cyber security analytics architecture
Systems and methods are disclosed for responding to security events in real time. The disclosed systems and methods utilize the vast amount of risk and asset...
US-9,516,040 Systems and methods for providing security services during power management mode
Systems and methods for providing security services during a power management mode are disclosed. In some embodiments, a method comprises detecting with a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.