Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,591,039 Region based image sharing
Some embodiments provide a region-based method for sharing photos between devices. The method establishes an image-sharing event for a particular region, which...
US-9,591,038 Feature set differentiation by tenant and user
A system for online collaboration includes an application for online collaboration, the application including an application feature set, a control module...
US-9,591,037 Distributed audio mixing and forwarding
A scalable media conferencing system minimizes delay while maintaining a consistent session across all of the distributed media servers handling the conference...
US-9,591,036 Method and apparatus for dynamic device pairing
A communication system, method, and components are described. Specifically, a communication system that supports dynamic device pairing of communication devices...
US-9,591,035 Method and apparatus for authorizing a user or a user device based on location information
A method comprises receiving a request for generating a challenge for a device or a user of the device. The method also comprises determining location...
US-9,591,034 Method and gateway device for managing address resource
Embodiments of the present invention disclose a method and a gateway device for managing an address resource, which relate to the field of Internet technologies...
US-9,591,033 System and method for processing media requests during telephony sessions
In a preferred embodiment, the method of caching media used in a telephony application includes: receiving a media request; sending the media request to a media...
US-9,591,032 System and method for broadcasting captions
There is disclosed one or more methods, systems and components therefor for broadcasting captions of a presenter's speech to audience members to accompany the...
US-9,591,031 Lawful interception for local selected IP traffic offload and local IP access performed at a non-core gateway
Systems, methods, and instrumentalities are described to implement reporting of surveillance information associated with a device. A gateway device may...
US-9,591,030 Lock-free updates to a domain name blacklist
A computer-implemented method updates a domain name system blacklist in a lock-free manner is disclosed. In the method, an entry of the domain name blacklist is...
US-9,591,029 Management of privacy policies
Master privacy policies for different users are stored to a cloud-based central server. When a user interacts with a third-party service (such as FACEBOOK.RTM....
US-9,591,028 Visualization and analysis of complex security information
In one example, a visualization data engine may be responsible for rendering the visualization data obtained from the backend data server and providing the user...
US-9,591,027 Advanced asset tracking and correlation
A security management system may be remotely deployed (e.g., using a cloud-based architecture) to add security to an enterprise network. For example, the...
US-9,591,026 Checking for permission to record VoIP messages
Methods and arrangements to check for permission to record Voice over Internet Protocol (VoIP) messages and to respond to requests for permission are...
US-9,591,025 IP-free end-point management appliance
An aspect includes a method of receiving a management command in an appliance to configure a network security policy, where the appliance is connected to a...
US-9,591,024 Data selection method for reducing the decoding computational complexity of a vehicle-to-X communication...
A data selection method for reducing the decoding computational complexity of a vehicle-to-X communication system. The communication unit is used to transmit...
US-9,591,023 Breach detection-based data inflation
A method and apparatus for deterring exfiltration of data from are provided. In the method and apparatus, it is determined that data is to be inflated. A...
US-9,591,022 Computer defenses and counterattacks
A method includes instantiating a first detection agent based on detection criteria, where the first detection agent includes first program code executable by a...
US-9,591,021 Zero day threat detection using host application/program to user agent mapping
A technique allows associating host applications and user agents in network traffic and detecting possible malware without relying on signatures of the user...
US-9,591,020 System and method for signature generation
According to one embodiment, a method comprises receiving a first portion of network traffic by a virtual machine that is configured to simulate operations of a...
US-9,591,019 Malicious object detection
Malicious object detection is disclosed. An apparatus includes one or more processors, and one or more memories including computer program code. The one or more...
US-9,591,018 Aggregation of network traffic source behavior data across network-based endpoints
Aggregation of network traffic source behavior data across network endpoints may be implemented. Indications of endpoint-specific network traffic directed to...
US-9,591,017 Collaborative phishing attack detection
Described herein are methods, network devices and machine-readable storage media for detecting whether a message is a phishing attack based on the collective...
US-9,591,016 Assessing security risks associated with connected application clients
A method for assessing security risks associated with a cloud application to which one or more connected applications are coupled begins by configuring a...
US-9,591,015 System and method for offloading packet processing and static analysis operations
According to one embodiment, a network security device configured to detect malicious content within received network traffic comprises a traffic analysis...
US-9,591,014 Capturing correlations between activity and non-activity attributes using N-grams
Identifying correlations between events recorded in a computer system log, the recorded events are generated by a plurality of processes executing on the...
US-9,591,013 Radio frequency fingerprint detection
Electromagnetic (EM)/radio frequency (RF) emissions may be detected and corresponding EM personas may be created. One or more EM personas may be associated with...
US-9,591,012 Systems and methods for detecing fraudulent electronic communication
Systems and methods are presented for receiving, at a server computer, a plurality of request messages to analyze potentially fraudulent electronic...
US-9,591,011 Techniques for separating the processing of clients' traffic to different zones in software defined networks
A central controller and a method for separation of traffic processing in a software defined network (SDN). The method comprises: identifying, based on at least...
US-9,591,010 Dual-path distributed architecture for network security analysis
A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security...
US-9,591,009 Air-based and ground-based security information and event management system
A system, method, and computer readable media for detecting and mitigating the effects of a cyber event on an aircraft's network including an air-based security...
US-9,591,008 Data access verification for enterprise resources
According to one embodiment, a method in a computing device for responding to a determination that a verification with a user is desired responsive to detection...
US-9,591,007 Detection of beaconing behavior in network traffic
A method for detecting beaconing behavior includes preprocessing network records to identify candidate source and destination pairs for detecting beaconing...
US-9,591,006 Lateral movement detection
Lateral movement detection may be performed by employing different detection models to score logon sessions. The different detection models may be implemented...
US-9,591,005 Avionics intrusion detection system and method of determining intrusion of an avionics component or system
A system for an aircraft and method of determining intrusion of an avionics component or system in an aircraft having multiple avionics components and systems...
US-9,591,004 Geographical intrusion response prioritization mapping through authentication and flight data correlation
Preferred systems and methods for geographically mapping intrusions through network or authentication data and flight data correlation are described. In one...
US-9,591,003 Dynamic application security verification
Disclosed are various embodiments for performing security verifications for dynamic applications. An instance of an application is executed. During runtime, it...
US-9,591,002 Method and system for providing trustworthiness of communication
A method and system of providing trustworthiness of communication among a plurality of communication nodes is described. This comprises arranging each of said...
US-9,591,001 Remote processing of mobile applications
In an example implementation of the disclosed technology, a method includes accessing, by a management agent associated with a client device, a profile...
US-9,591,000 Methods, systems, and computer readable media for authorization frameworks for web-based applications
Methods, systems, and computer readable media for authorization frameworks for web-based applications. In one example, a server executes an application tier of...
US-9,590,999 Preview serving from an external preview service
Embodiments relate to preview serving of content previews from a preview service for a component having associated content. A filter of a layered preview...
US-9,590,998 Network switch with hierarchical security
Network switches and methods are disclosed. A network switch may include multiple input ports and multiple output ports, a switch fabric, and switch controller....
US-9,590,997 System and method for accessing a service
A method of accessing a service includes receiving, from a requesting user, a request for a number of accessing users to have access to the service; generating...
US-9,590,996 Multi-network seamless roaming mobile router with auto-discovery and migration of downstream devices on the...
A mobile router offers seamless roaming services to one or more locally connected mobile hosts over one or more simultaneously connected networks. The mobile...
US-9,590,995 Method and system for utilizing a location-based internetwork gateway
A system for utilizing a location-based application across a plurality of networks. A target mobile device operates within a target network of the plurality of...
US-9,590,994 Request-specific authentication for accessing web service resources
Requests for access to Web service resources are evaluated based on the type of request that is received. Requests are not granted unless sufficient proof of...
US-9,590,993 Filtering kernel-mode network communications
Some embodiments of the invention are directed to techniques for determining whether a process on a computer system that is sending or receiving data, or is...
US-9,590,992 Systems and methods of precision sharing of big data
An ecosystem that allows fine-grained multi-party control over access to information stored in one or more data sources of a data provider. A requesting party...
US-9,590,991 Service processing method, device, and system
Embodiments of the present invention relate to the field of communications technologies and provide a service processing method, device, and system, where...
US-9,590,990 Assigning user requests of different types or protocols to a user by trust association interceptors
A Universal TAI handles multiple identifications by means of an internal lookup table. When authenticating and authorizing requests, from a pre-registered...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.