Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,571,543 Using quality information for adaptive streaming of media content
Different representations are associated with an instance of media content, and a representation can include multiple portions of media content. A respective...
US-9,571,542 Content providing system, device, and control method for providing different increments based on selected...
In a content providing system, in a case where the display of an advertisement is instructed during the playback of content data, a client device pauses the...
US-9,571,541 Network device architecture using cache for multicast packets
A packet received via a network is stored in a packet memory. Information in a header of the packet is analyzed to determine one or more ports to which the...
US-9,571,540 Broadcast/multicast offloading and recommending of infrastructural changes based on usage tracking
A method, a device, and a storage medium having instructions stored thereon to obtain usage data that indicates a usage of a downloading service and a streaming...
US-9,571,539 Method and electronic device for performing exchange of messages
An electronic device is provided that, while traveling, easily performs message exchange exploiting unit information. An electronic device includes: a display...
US-9,571,538 Quality of experience for communication sessions
A computer-implemented method, computer program product, and computing system is provided for managing quality of experience for communication sessions. In an...
US-9,571,537 Content acquisition device and method
A content acquisition device includes a processor that executes a procedure. The procedure includes: acquiring group data to identify a group that a user...
US-9,571,536 Cross device task continuity
Systems and methods for cross device and/or cross operating system task continuity between devices for frictionless task engagement and reengagement. Task...
US-9,571,535 Quality of experience for communication sessions
A computer-implemented method, computer program product, and computing system is provided for managing quality of experience for communication sessions. In an...
US-9,571,534 Virtual meeting video sharing
A method is provided in one particular example that includes identifying an attempt by a first communications device to play video data within a virtual meeting...
US-9,571,533 Graphical environment for adding liaison agents to a communication session
A communication session is established between users of communication devices. A representation of the users is displayed as part of the communication session....
US-9,571,532 Techniques for integrating voice control into an active telephony call
Examples are disclosed for responding to voice commands within an existing telephony call between two or more end user communication devices mediated by an IP...
US-9,571,531 Methods and systems for selecting media content based on technical environment information
The present disclosure includes a method to provide rich media content over a computer network. The system determines a user's ability to playback said rich...
US-9,571,530 Internet based telephone line
In one embodiment, a telephone service method that provides subscribers with the functionality of an extra telephone line during data/Internet sessions is...
US-9,571,529 Browser-based communications enhanced with enterprise communication features
Systems and methods are described for enabling browser-to-phone and browser-to-browser communications to be enhanced with enterprise communication features....
US-9,571,528 Method and apparatus for providing network based services to non-registering endpoints
Many of the current IMS standards and enriched services were originally designed for the individual subscribers that are serviced by the wireless network....
US-9,571,527 System and method for interactive session provision
Systems and methods applicable, for instance, in interactive session provision. One or more nodes and/or other computers might, for example, provide to one or...
US-9,571,526 Methods and devices for analyzing user privacy based on a user's online presence
A method, non-transitory computer readable medium, and policy rating server device that receives a request from a client computing device for one or more...
US-9,571,525 Policy management system, id provider system, and policy evaluation device
According to one embodiment, a policy management system includes a user terminal, an ID provider system which manages an identity of a user, and a service...
US-9,571,524 Creation of security policy templates and security policies based on the templates
A management entity generates selectable security policy classifications each identifying security policies that share common security rules. Each of the...
US-9,571,523 Security actuator for a dynamically programmable computer network
A network security policy may be implemented at network switches as a set of active packet disposition directives. In a dynamically programmable network, the...
US-9,571,522 Method for applying location-based control policy of mobile device
A method for applying a control policy of a mobile device is provided. The method includes determining whether a current location of the mobile device satisfies...
US-9,571,521 Method for processing data and electronic device therefor
A method for preventing a message from being modified or deleted by a malicious application when the message is received by an electronic device based on a...
US-9,571,520 Preventing execution of task scheduled malware
A method for preventing malware attacks includes the steps of detecting an attempt on an electronic device to access a task scheduler, determining an entity...
US-9,571,519 Targeted attack discovery
A device may receive usage information, associated with a group of client networks, including particular usage information associated with a particular client...
US-9,571,518 Identifying malicious web infrastructures
Identifying malicious servers is provided. Malicious edges between server vertices corresponding to visible servers and invisible servers involved in network...
US-9,571,517 Synthetic cyber-risk model for vulnerability determination
A system, method, and device are presented for assessing a target network's vulnerability to a real cyberthreat based on determining policy-based synthetic...
US-9,571,516 Cloud service usage monitoring system
A cloud service usage assessment system analyzes network traffic from an enterprise data network and generates cloud service usage analytics for the enterprise....
US-9,571,515 Notification of security question compromise level based on social network interactions
An approach is provided to improve security of security questions. In the approach, the system prompts a user for a security question. The security question and...
US-9,571,514 Notification of security question compromise level based on social network interactions
An approach is provided to improve security of security questions. In the approach, the system prompts a user for a security question. The security question and...
US-9,571,513 Monitoring device monitoring network
A monitoring device configured to monitor a network to which plural controllers are connected which includes a decoder configured to extract target data...
US-9,571,512 Threat detection using endpoint variance
Threat detection is improved by monitoring variations in observable events and correlating these variations to malicious activity. The disclosed techniques can...
US-9,571,511 Systems and methods for traffic classification
Systems and methods of classifying network traffic may monitor network traffic. Monitored traffic may be compared with a control protocol template (CPT). When a...
US-9,571,510 Systems and methods for identifying security threat sources responsible for security events
The disclosed computer-implemented method for identifying security threat sources responsible for security events may include (1) identifying security-event...
US-9,571,509 Systems and methods for identifying variants of samples based on similarity analysis
A computer-implemented method for identifying variants of samples based on similarity analysis may include (1) collecting, from security agents on endpoint...
US-9,571,508 Systems and methods for distributed rule-based correlation of events
Systems and methods for distributed rule-based correlation of events are provided. A notification of a partial match of a distributed rule by an event of a...
US-9,571,507 Providing a virtual security appliance architecture to a virtual cloud infrastructure
A method in an embodiment includes detecting a change for a virtual machine in a virtual server of a virtual network infrastructure, determining whether a...
US-9,571,506 Dynamic enterprise security control based on user risk factors
Aspects dynamically set enterprise-level security rules. Risk values representing likelihoods of loss of enterprise secure data are determined for different...
US-9,571,505 Trustworthiness of processed data
A method and/or computer program product indicates a trustworthiness of data processed in accordance with a processing rule. A first trust weight is assigned to...
US-9,571,504 Authorizing content viewing based on content ratings
Apparatuses, methods, and computer program products are included that receive a content rating for content presented to an individual, determine a content...
US-9,571,503 Method for connecting to network and electronic device thereof
A method and electronic device for network connection and authentication is disclosed herein. A control unit is configured to detect authentication information...
US-9,571,502 Priority resolution for access control list policies in a networking device
Access control lists (ACLs) permit network administrators to manage network traffic flowing through a networking element to optimize network security,...
US-9,571,501 Rule-based application access management
A container that manages access to protected resources using rules to intelligently manage them includes an environment having a set of software and...
US-9,571,500 Context sensitive security help
Embodiments of the present invention provide systems and methods for providing security in a computing environment. These systems and methods can be applied to...
US-9,571,499 Apparatus and method of providing security to cloud data to prevent unauthorized access
A method and apparatus for providing security of an electronic apparatus are provided. The method includes identifying an environment of a client to be provided...
US-9,571,498 Systems and methods for protecting purpose-built appliances on local networks
The disclosed computer-implemented method for protecting purpose-built appliances on local networks may include (1) identifying a purpose-built appliance that...
US-9,571,497 Systems and methods for blocking push authentication spam
The disclosed computer-implemented method for blocking push authentication spam may include (1) detecting an attempt by an unauthenticated source to gain access...
US-9,571,496 Central account manager
A system and computer-implemented method including receiving a request from a service provider, at a central account manager, to provide a user account for a...
US-9,571,495 Methods and systems for authorizing web service requests
Systems and methods for authorizing web service requests. In some embodiments, a computer-implemented method includes receiving a web service request having an...
US-9,571,494 Authorization server and client apparatus, server cooperative system, and token management method
There is a method of generating a token required to transfer an access authority to a cooperating system to a cooperation asking system. In this method, a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.