Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,578,089 Remote invocation mechanism for logging
One or more events occurring within a client-side web application are logged at a remote server using a script-based invocation mechanism. The mechanism...
US-9,578,088 Globally distributed utility computing cloud
Teachings of this application include a computing network that may include multiple different data centers and/or server grids which are deployed in different...
US-9,578,087 Methods and apparatuses for providing a desired portion of a data object document
A method for providing a desired portion of a data object document is disclosed. The method comprises receiving, from a client device, an Application Program...
US-9,578,086 Method and apparatus of setting data transmission and reception period
A method and an apparatus for setting a data transmission and reception period are provided. The method includes determining an average margin threshold for...
US-9,578,085 Mobile application system
A method includes accessing a webpage at a web server from a mobile application executing at a mobile device. A mobile application tag may be identified in the...
US-9,578,084 Information processing system for starting up a browser, user terminal, information processing device, and...
An information processing system comprises a user terminal and an information processing device. A remote operation screen image for remotely operating the...
US-9,578,083 Dynamically designing shared content
A system and method for dynamically designing shared content served via a content sharing source. The system includes a content size determination unit to...
US-9,578,082 Methods for dynamically generating an application interface for a modeled entity and devices thereof
This technology generates a plurality of instances of things each including a dynamically generated interface structure and services associated with and...
US-9,578,081 System and method for providing an actively invalidated client-side network resource cache
A system and method for providing an actively invalidated client-side network resource cache are disclosed. A particular embodiment includes: a client...
US-9,578,080 Resource allocation in distributed systems using grant messages
Resource management techniques for shared resources in a distributed system are described. Clients and servers may exchange messages according to an...
US-9,578,079 Distribution control system, distribution system, distribution control method, and computer-readable storage medium
A distribution control system that is connected to one or more communication terminals that output image (sound) data and transmits the image (sound) data to...
US-9,578,078 Systems and methods for encoding and decoding
Systems and methods for multimedia encoding and decoding are disclosed. The systems and methods include multimedia format detection systems, decoder...
US-9,578,077 Aggressive prefetching
A method is provided for distributing data content in a P2P live streaming network comprising a plurality of peers and a streaming source periodically producing...
US-9,578,076 Visual communication using a robotic device
Technology is described for visually communicating using a robotic device. An example of a method can include a video feed sent from the video camera of the...
US-9,578,075 Software streaming system and method
A method for streaming software may include downloading blocks associated with a software title until an executable threshold is reached, initiating execution...
US-9,578,074 Adaptive content transmission
Techniques for adaptive content transmission are described herein. During transmission of a content item, a network connection may be monitored to collect data...
US-9,578,073 System and method for decision support in a virtual conference
A virtual conferencing system is described which evaluates and selects participants for active participation based on one or more criteria. For example, one...
US-9,578,072 Method and system for synchronising content on a second screen
The present disclosure is directed towards a method and system for synching content on a second screen with content being displayed on a first or primary...
US-9,578,071 Context aware interaction
A network-connected server for meeting initiation has software executing on the server from a non-transitory physical medium, the software providing a function...
US-9,578,070 Method for inserting background audio into voice/video call
A background noise inserter server is described that includes a communication interface for communicating with a network, memory for storing background audio,...
US-9,578,069 Cooperative IMS access from a visited domain
Embodiments disclosed herein provide systems, methods, and computer readable media to provide roaming IP multimedia subsystem (IMS) access. In a particular...
US-9,578,068 Methods and apparatus for processing an IMS session
There is provided a method of processing an IMS session originated by a UE after restart of a S-CSCF that was previously assigned to a user of the UE during...
US-9,578,067 Intercepting user equipment and lawful interception method thereof for use in 3GPP direct mode communication
An intercepting user equipment and a lawful interception method thereof are provided. The intercepting user equipment registers to the administrating server for...
US-9,578,066 Systems and method for assuring security governance in managed computer systems
An agile governance system provides recommendations for infrastructure change requests concerning a cloud-based computer environment in accordance with security...
US-9,578,065 System and method for distributing antivirus records to user devices
Disclosed are system and method for distributing antivirus records to user devices. An exemplary method includes collecting, by a server, statistics on the use...
US-9,578,064 Automatic tuning of virtual data center resource utilization policies
A computer-implemented process receives a request to utilize one or more virtual data center (VDC) resources at a virtual data center and determines a...
US-9,578,063 Application self-service for assured log management in cloud environments
A log management service provides automated log management for any applications deployed on a cloud. A security profile defining the logging requirements for...
US-9,578,062 Portable proxy for security management and privacy protection and method of use
A portable proxy for security management and privacy protection and methods of use are provided. The proxy establishes a connection to a user device. The proxy...
US-9,578,061 System and method for modeling a networking device policy
Implementations of the present disclosure involve a system and/or method for modeling a networking device policy or set of rules and/or transforming a...
US-9,578,060 System and method for data loss prevention across heterogeneous communications platforms
In one embodiment, a method includes activating a cross-platform DLP policy for enforcement against a plurality of users on each of a plurality of heterogeneous...
US-9,578,059 Policy enforcement in a secure data file delivery system
A server interacts with a sender to form a package which can include one or more attached data files to be sent to one or more recipients, and the server...
US-9,578,058 Method and internet terminal for remotely performing operations on a secure element connected to a...
The invention relates to a method for remotely performing operations determined by a service provider on a secure element connected to a communication device...
US-9,578,057 Techniques for detecting an intranet spoofing attack
Techniques for detecting an intranet spoofing attack are disclosed. In one embodiment, the techniques may be realized as a system and method for detecting an...
US-9,578,056 Preventing spoofing attacks for bone conduction applications
Concepts and technologies are disclosed herein for preventing spoofing attacks for bone conduction applications. According to one aspect, a device can receive...
US-9,578,055 Thwarting drone-waged denial of service attacks on a network
Embodiments are directed towards detecting and thwarting incoming network requests by either throttling and/or redirecting the attack requests towards a...
US-9,578,054 Hacking-resistant computer design
A computer architecture is disclosed for implementing a hacking-resistant computing device. The computing device, which could be a mainframe computer, personal...
US-9,578,053 Systems and methods for using cognitive fingerprints
A system and method for creating a core cognitive fingerprint. A core cognitive fingerprint can be used to capture the evolution of a system state and...
US-9,578,052 Agent assisted malicious application blocking in a network environment
Embodiments are configured to receive metadata of a process intercepted on an end host when attempting to access a network. The metadata includes a hash of an...
US-9,578,051 Method and system for identifying a threatening network
A method for identifying a threatening network comprises an asymmetric threat signature (AT-SIG) algorithm comprising a network movement before/after algorithm...
US-9,578,050 Service delivery controller for learning network security services
A learning-based computer network security system may include a service delivery controller executing on one or more of hardware processors that receives...
US-9,578,049 Methods and systems for using causal analysis for boosted decision stumps to identify and respond to non-benign...
A computing device processor may be configured with processor-executable instructions to implement methods of detecting and responding non-benign behaviors of...
US-9,578,048 Identifying phishing websites using DOM characteristics
Embodiments of the present invention are directed to identifying phishing websites by rendering and analyzing document object model (DOM) objects associated...
US-9,578,047 Method and system for reflectometry based communication network monitoring, intrusion detection, and message...
Systems and methods are provided for monitoring and detecting intrusions and authenticating messages on a communication network of a vehicle. A plurality of...
US-9,578,046 Analysis of time series data
The systems and methods described herein relate to storing values, such as sketches, that represent time indexed data related to network traffic. The model may...
US-9,578,045 Method and apparatus for providing forensic visibility into systems and networks
Methods and systems for providing forensic visibility into systems and networks are provided. More particularly, a sensor agent may receive events defining an...
US-9,578,044 Detection of anomalous advertising content
Systems, methods, and computer-readable media are disclosed for detecting anomalous advertising content and taking or directing one or more actions to be taken...
US-9,578,043 Calculating a trust score
Systems, devices, and methods are described herein for calculating a trust score. The trust score may be calculated between entities including, but not limited...
US-9,578,042 Identifying malicious web infrastructures
Identifying malicious servers is provided. Malicious edges between server vertices corresponding to visible servers and invisible servers involved in network...
US-9,578,041 Verification of peer-to-peer multimedia content
A method includes receiving, at a first wireless device, from a second wireless device, content and an identification of the second wireless device, over a...
US-9,578,040 Packet receiving method, deep packet inspection device and system
Embodiments of the present invention provide a packet receiving method, a deep packet inspection device and system, which relates to the field of ...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.