Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,560,091 Action oriented social collaboration system
An action oriented social collaboration system monitors users' interactions with computer software applications. The system provides the interactions to a...
US-9,560,090 Methods, systems, and media for providing content
Methods, systems, and media for providing content are provided. In some implementations, methods for providing content are provided, the methods comprising:...
US-9,560,089 Systems and methods for providing input to virtual agent
Systems, methods, and apparatus for use in connection with at least one virtual agent. In some embodiments, at least one processor is programmed to use a record...
US-9,560,088 Method and apparatus for inter-user equipment transfer of streaming media
Techniques for inter-user equipment (UE) transfer (IUT) are disclosed. An application server may receive an IUT request for transfer of a media session toward...
US-9,560,087 Providing machine-to-machine service
The disclosure is related to providing a machine to machine (M2M0 service. A user interface (UI) template associated with a M2M device may be retrieved when a...
US-9,560,086 Sustaining session connections
In an embodiment, techniques for sustaining session connections are provided. The techniques send heartbeat messages when not sending a message may cause the...
US-9,560,085 Systems and methods for communicating a stream of data packets via multiple communications channels
Systems and methods of preventing an Internet service provider from identifying a stream of data packets as carrying a voice over Internet protocol telephony...
US-9,560,084 Reallocation of serving proxy function in IMS
The invention relates to a method of changing allocation of Serving-Call Session Control Functions (S-CSCFs) to a user of an IMS network. The user is being...
US-9,560,083 Service denial and termination on a wireless network
A method and system are provided for denying an application service request, such as a Multimedia Messaging Service (MMS) request, on wireless and wireline...
US-9,560,082 Method and network device establishing a binding between a plurality of separate sessions in a network
The present invention relates to networks, in particular to communication networks. Moreover, the present invention relates to a method, to network devices, to...
US-9,560,081 Data network microsegmentation
Methods and systems for microsegmentation of data networks are provided herein. Exemplary methods include: receiving a high-level declarative policy; getting...
US-9,560,080 Extending organizational boundaries throughout a cloud architecture
An information sharing paradigm for a cloud computing solution enables flexible organizational boundaries with respect to cloud resources. Cloud service...
US-9,560,079 Policy engine for cloud platform
A policy engine is situated within the communications path of a cloud computing environment and a user of the cloud computing environment to comply with an...
US-9,560,078 Technologies for scalable security architecture of virtualized networks
Technologies for performing security monitoring services of a network functions virtualization (NFV) security architecture that includes an NVF security...
US-9,560,077 Methods and systems for protecting a secured network
Methods and systems for protecting a secured network are presented. For example, one or more packet security gateways may be associated with a security policy...
US-9,560,076 Secure trust-scored distributed multimedia collaboration session
A device may receive a request for a collaboration session. The device may authenticate a user for the collaboration session. The device may generate a...
US-9,560,075 Cognitive honeypot
An electronic communication evaluating device determines a suspicion level for an initial electronic communication. The initial electronic communication is...
US-9,560,074 Systems and methods of identifying suspicious hostnames
A method includes receiving a set of strings and applying one or more filters to generate a subset of strings that are determined to correspond to strings of...
US-9,560,073 Reconfigurable antenna based solutions for device authentication and intrusion detection in wireless networks
Channel based authentication schemes for intrusion detection that operates at the physical layer are described that apply the capabilities of a pattern...
US-9,560,072 Discovering and selecting candidates for sinkholing of network domains
Techniques for discovering and selecting candidates for sinkholing of network domains are provided. In some embodiments, a process for discovering and selecting...
US-9,560,071 Device for detection and prevention of an attack on a vehicle
A new device for detection and prevention of an attack on a vehicle via its communication channels, having: an input-unit configured to collect real-time and/or...
US-9,560,070 Distribution of security rules among sensor computers
Systems and methods for generating rules in a networking environment having one or more sensor computers logically connected to compromised computers are...
US-9,560,069 Method and system for protection of messages in an electronic messaging system
Methods, computer program products, computer systems, and the like, which protect messages in an electronic messaging system, are disclosed. The methods,...
US-9,560,068 Network intrusion detection with distributed correlation
A network security system employing multiple levels of processing to identify security threats. Multiple host machines may each contain an agent that detects...
US-9,560,067 Correlation based security risk identification
Methods and systems are disclosed for identifying security risks, arising from credentials existing on machines in the networks that enable access to other...
US-9,560,066 System and method for evaluating network threats and usage
Systems and methods are presented for generating a threat score and a usage score of each of a plurality of IP addresses. The threat score may be determined...
US-9,560,065 Path scanning for the detection of anomalous subgraphs and use of DNS requests and host agents for...
A system, apparatus, computer-readable medium, and computer-implemented method are provided for detecting anomalous behavior in a network. Historical parameters...
US-9,560,064 Stopping and remediating outbound messaging abuse
Systems and methods are provided for allowing subscriber message sending profiles to be maintained and used in conjunction with behavior-based anomaly detection...
US-9,560,063 Apparatus and method for detecting malicious domain cluster
An apparatus and method for detecting a malicious domain cluster. The apparatus for detecting a malicious domain cluster includes a domain name server (DNS)...
US-9,560,062 System and method for tamper resistant reliable logging of network traffic
A network interface device includes a memory and a processor operable to receive a malicious packet marker, store the malicious packet marker to the memory,...
US-9,560,061 Motor vehicle with a driving behavior which can be modified at a later stage using an application program
A motor vehicle has a processor device to run application programs in a first communication zone and a storage device for vehicle control data, by which a...
US-9,560,060 Cross-modality electromagnetic signature analysis for radio frequency persona identification
Systems and methods can support identifying multiple radio transmitters as being integrated within a single communications device. Radio frequency signals may...
US-9,560,059 System, apparatus and method for conducting on-the-fly decryption of encrypted objects for malware detection
A decryption scheme for recover of a decrypted object without a cryptographic key is described. First, logical operation(s) are conducted on data associated...
US-9,560,058 Monitoring device and monitoring method
A monitoring device to operate as a first monitoring device in a network including communication devices and monitoring devices, the monitoring device includes:...
US-9,560,056 Cloud-based gateway security scanning
Some embodiments of cloud-based gateway security scanning have been presented. In one embodiment, some data packets are received sequentially at a gateway...
US-9,560,055 Client-side integration framework of services
Systems and methods for providing client-side integration of apps and services is provided. An integration framework execution upon a computing device provides...
US-9,560,054 Incoming and outgoing privacy settings in social networks
Methods, systems, and apparatus, including computer programs for defining a first group of contacts, the first group of contacts having been specified by a...
US-9,560,053 Parental control management and enforcement based on hardware identifiers
A device may receive a first indication that a user device connected to a first network device associated with a first network, the first indication including a...
US-9,560,052 Installing virtual machines within different communication pathways to access protected resources
A computer-implemented method, system, and/or computer program product controls access to computer resources used by a computer application. One or more...
US-9,560,051 System and method for secure machine-to-machine communications
Embodiments of the present invention include a method for providing a secure domain name system (DNS) for machine to machine communications. In one embodiment,...
US-9,560,050 System and method to share a resource or a capability of a device
A method includes transmitting, from a first device, a message indicating that the first device is available to share a resource. The method includes receiving,...
US-9,560,049 Method and system for optimizing network access control
A method and system for optimizing network access control are disclosed. For example, the method includes receiving an access request to a network from a...
US-9,560,048 Method for updating identity information about packet gateway, AAA server and packet gateway
A method for updating identity information of a packet gateway, an authentication, authorization, and accounting (AAA) server and a packet gateway. The method...
US-9,560,047 Multi-device authorization to access wireless network communications based on shared event times
In a wireless communication system, a first wireless device transfers an authorization request to an authorization server, and the authorization server...
US-9,560,046 Device notarization
Methods and systems for device notarization and verification are provided. In one implementation, various integrity values are concatenated to generate a...
US-9,560,045 Securing content using a wireless authentication factor
A mobile device is described that stores and renders content. Access to certain content is predicated at least upon receiving a particular wireless signal from...
US-9,560,044 Gesture-based signature authentication
Embodiments of the invention are generally directed to systems, methods, devices, and machine-readable mediums for implementing gesture-based signature...
US-9,560,043 Biometric-based wireless device association
According to one aspect of the present disclosure, a method and technique for automatically associating a wireless device to a data processing system using...
US-9,560,042 Information processing apparatus and control method
An information processing apparatus includes, a processor configured to execute a process including, determining whether a relationship between biometric...
US-9,560,041 Authenticated remote pin unblock
This invention provides a simple and secure PIN unblock mechanism for use with a security token. A set of one or more passphrases are stored on a remote server...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.