Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,596,292 Client-side scripts in a service-oriented API environment
Use of client-side scripts in a service-oriented API environment is disclosed. A communication that includes a script sent by a service in response to a service...
US-9,596,291 Migration of data storage
An operable mechanism implements a stub utility to facilitate the migration of stub files, where the stub utility is integrated with a data storage product and...
US-9,596,290 System and method for providing caching and pre-fetch of assets/media
A system and method for routing and delivering pre-fetched assets/media, such as a digital image, is provided. The present invention is directed to a system...
US-9,596,289 Method and system for compression for ACARS and related transmissions
A method of a method of communicating a data file over a radio frequency data link includes steps of determining a type of data represented in the data file;...
US-9,596,288 Method and system of requesting information from a server computer
A method and system for requesting information by a client computer system from a server computer system are provided. The method includes sending a request for...
US-9,596,287 Systems and methods for extraction of vehicle operational data and sharing data with authorized computer networks
Systems and methods for the generation and sharing of vehicle operation are provided. The system includes: a data harvesting device connected to a vehicle, the...
US-9,596,286 Method to process HTTP header with hardware assistance
In processing Hypertext Transfer Protocol (HTTP) headers, a packet pre-processor is configured with at least one predetermined header field identifier. The...
US-9,596,285 Methods and systems for AVB networks
Embodiments are disclosed for a device for determining which packets of an audio/video stream include a valid presentation time. In some embodiments, a device...
US-9,596,284 Content distribution via a distribution network and an access network
A method and apparatus for streaming content to an access network in an interactive information distribution system. The method encapsulates the content in...
US-9,596,283 Delivering content in multiple formats
Content may be received at an edge location in one format, but delivered to a terminal on an access network in another format. The received content may be...
US-9,596,282 Delivery managing device, terminal, and delivery managing method
A delivery managing device to which a plurality of terminals are connected through a network includes a creating unit that creates display information based on...
US-9,596,281 Transport accelerator implementing request manager and connection manager functionality
Transport accelerator (TA) systems and methods for delivery of content to a user agent (UA) of the client device from a content server are provided according to...
US-9,596,280 Multiple stream content presentation
A client may, for example, initiate presentation of the content item in a hybrid stream mode in which both a client stream and a content provider stream are...
US-9,596,279 Cloud-based streaming data receiver and persister
The present system receives streaming raw data and inserts context into the raw data. The context raw data may be partitioned into sub-batches and transmitted...
US-9,596,278 Extending caching network functionality to an existing streaming media server
A content delivery network (CDN) includes multiple cluster sites, including sites with streaming media servers, caching servers and storage devices accessible...
US-9,596,277 Establishing a social application layer
A virtual space may be presented within a plurality of virtual environments provided by different platforms without requiring idiosyncratic APIs associated with...
US-9,596,276 User notifications for interaction information
A content management system creates and modifies user notification queues for shared content items synchronized between a content management system and multiple...
US-9,596,275 Method for registering multi-contact devices
A technique is described allowing an IMS enabled network to terminate a communication request directed towards a user device in a well-defined way, even for...
US-9,596,274 System and method for processing telephony sessions
In one embodiment, the method of processing telephony sessions includes: communicating with an application server using an application layer protocol;...
US-9,596,273 Systems and methods for sharing of media sessions within a social network
In one embodiment, a computing device identifies a set of second users to participate in an ongoing media session which was initiated by a first user. Each of...
US-9,596,272 Media session between network endpoints
A media session between an initiating endpoint and a responding endpoint is established via a communication network. A set of candidate pairs is generated, each...
US-9,596,271 Dynamic virtual private network
Various embodiments establish a virtual private network (VPN) between a remote network and a private network. In one embodiment, a first system in the remote...
US-9,596,270 Secure XDM communication between IMS networks
Requests between first and second IMS network domains are communicated by receiving an XDM request in the first domain. The XDM request relates to an XML...
US-9,596,269 User-directed privacy control in a user-centric identity management system
An identity management system incorporates privacy management processes that enable the user to exercise privacy controls over the disclosure of user identity...
US-9,596,268 Security enforcement in virtualized systems
A system includes a virtual machine (VM) server and a policy engine server. The VM server includes two or more guest operating systems and an agent. The agent...
US-9,596,267 Multi cloud policy enactment via organizations to cloud-provider partnerships
A method includes acts for establishing a subscription for an entity. The method includes receiving, at a cloud service provider, a request from an entity to...
US-9,596,266 Apparatuses, methods and systems for a real-time cyber threat indicator verification mechanism
The real-time cyber threat indicator verification mechanism technology (hereinafter "TIVM") instantiates one or more virtual client emulators to access a source...
US-9,596,265 Identifying phishing communications using templates
Methods, apparatus, systems, and computer-readable media are provided for determining whether communications are attempts at phishing. In various ...
US-9,596,264 Targeted attack protection using predictive sandboxing
Provided herein are systems and methods for targeted attack protection using predictive sandboxing. In exemplary embodiments, a method includes retrieving a URL...
US-9,596,263 Obfuscation and de-obfuscation of identifiers
A service allowing for obfuscation of identifiers such that the obfuscated identifier values are within a set of valid identifier values. The service allows for...
US-9,596,262 Determination of adaptive idle timeout
In various embodiments, a method may be provided comprising: determining an adaptive idle timeout value based on the relationship between the number of...
US-9,596,261 Systems and methods for delivering context-specific introspection notifications
Described systems and methods enable a computer security module to protect a set of guest virtual machines against computer security threats. In some...
US-9,596,260 Method and apparatus for uploading files
A method and apparatus for uploading files are disclosed. The method includes: upon receiving a scanning instruction, obtaining unknown files on a client and...
US-9,596,259 Method for combining multiple signal values in the dendritic cell algorithm
Artificial Immune Systems (AIS) including the Dendritic Cell Algorithm (DCA) are an emerging method to detect malware in computer systems. A DCA module may...
US-9,596,258 System, apparatus and method for using malware analysis results to drive adaptive instrumentation of virtual...
According to one embodiment, an electronic device comprises a memory to store information and a processor. The processor is adapted to receive information...
US-9,596,257 Detection and prevention of installation of malicious mobile applications
A combination of shim and back-end server applications may be used to identify and block the installation of malicious applications on mobile devices. In...
US-9,596,256 Apparatuses, methods and systems for a cyber threat confidence rating visualization and editing user interface
The cyber threat intelligence confidence rating visualization and editing user interface technology (hereinafter "TIC") provides a user interface that allows a...
US-9,596,255 Honey monkey network exploration
A network can be explored to investigate exploitive behavior. For example, network sites may be actively explored by a honey monkey system to detect if they are...
US-9,596,254 Event mini-graphs in data intake stage of machine data processing platform
A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security...
US-9,596,253 Capture triggers for capturing network data
The disclosed embodiments provide a system that facilitates the processing of network data. During operation, the system provides a risk-identification...
US-9,596,252 Identifying possible security threats using event group summaries
A disclosed computer-implemented method includes receiving and indexing the raw data. Indexing includes dividing the raw data into time stamped searchable...
US-9,596,251 Method and system for providing security aware applications
Instructions for monitoring and detecting one or more trigger events in assets used to implement an application are generated. Instructions for implementing at...
US-9,596,250 System and method for protecting against point of sale malware using memory scraping
A software, system and methodology for protecting against malware Point-of-Sale attacks that utilize, for example, memory scraping techniques. The application...
US-9,596,249 Detecting shared or compromised credentials through analysis of simultaneous actions
A privileged account management system can detect when credentials used to access one or more servers have been shared or otherwise compromised. This detection...
US-9,596,248 Trojan detection method and device
A trojan detection method and device, used to solve the problem in the prior art of being unable to effectively detect a trojan in a network, the method...
US-9,596,247 Inmate information center for correctional facility processing
Systems, methods, and machine-readable media are provided for correctional facility content management. An inmate computing device provides user interfaces and...
US-9,596,246 Provisioning access to customer organization data in a multi-tenant system
Methods and systems are described for providing support representative access to applications deployed in an enterprise network environment. An access...
US-9,596,245 Secure one-way interface for a network device
A one-way interface for a network device which secures status registers therein from unauthorized changes. The interface includes a first server, a one-way data...
US-9,596,244 Securing services and intra-service communications
A security service enables service providers to register available services. Prospective service consumers may register with the security service to access a...
US-9,596,243 Method and system for restoring domain management
A method and a system for restoring domain management for a domain in which content access rights are shared between one or more devices, where the domain...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.