Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,609,040 Efficient bitrate adaptation in video communications over IP networks
Systems and methods of dynamically adapting multimedia data transmit rates of data senders to available bandwidths of data receivers, in which the available...
US-9,609,039 Splice signalling buffer characteristics
In one method embodiments, providing a transport stream to a client device, the transport stream comprising a head stream and a tail stream, the head stream and...
US-9,609,038 Scaling content communicated over a network
An architecture is provided that can scale content resolution in order to mitigate errors in a provisioned service of a communication network, such as a...
US-9,609,037 System and method for transferring playlists
A method, computer program product and computing device for selecting at least one playlist for transfer, the at least one playlist being stored on a first...
US-9,609,036 Method and apparatus for approving multimedia data
A method and apparatus for approving multimedia data, including: receiving second multimedia data of a second resolution; selecting a block of the second...
US-9,609,035 Compressed headers for encapsulated real-time communications
A system performs tunneling for real time communication ("RTC") between a source endpoint and a destination endpoint. The system receives, by a server, a...
US-9,609,034 Methods and apparatus for transcoding metadata
Methods and apparatus for transcoding metadata are disclosed. Example methods disclosed herein to meter media content presented by a media device includes...
US-9,609,033 Method and apparatus for sharing presentation data and annotation
A method and apparatus for sharing presentation data, interactions, and annotation information between devices. The method includes: converting the presentation...
US-9,609,032 Joint ownership of protected information
Disclosed herein is a system and method for managing a collaborative document that is owned by two different users who belong to different organizations. The...
US-9,609,031 Propagating state information to network nodes
Method and apparatus for propagating state information updates are disclosed. In the method and apparatus, a node establishes connections with one or more nodes...
US-9,609,030 Immersive and interactive videoconference room environment
An arrangement for a collaborative videoconferencing environment is disclosed. A display having a substantially "L-shaped" configuration allows for display of...
US-9,609,029 System, terminal device, computer readable medium and method
A service registration system includes a server that provides a service through a network, a peripheral device capable of communicating with the server and...
US-9,609,028 Method, apparatus and system for establishing session
Provided are a method, an apparatus and a system for establishing a session. In the method, a Visit Policy and Charging Rules Function (V-PCRF) receives an S9...
US-9,609,027 Communication system architecture
Disclosed herein is an instance of a media modality controller of a communication system which is assigned to convey media modality control signals of a...
US-9,609,026 Segmented networks that implement scanning
Systems for providing scanning within distributed services are provided herein. In some embodiments, a system includes a plurality of segmented environments...
US-9,609,025 Protection of sensitive data from unauthorized access
A method and associated computing system. Data received by a computing environment includes a mixture of non-sensitive data and sensitive data along with...
US-9,609,024 Method and system for policy based authentication
A mobile device capable of performing a plurality of functions. The mobile device includes a memory for storing a plurality of different security policies; an...
US-9,609,023 System and method for software defined deployment of security appliances using policy templates
A method includes retrieving, from a memory accessible by a computer, a document comprising a workload definition document that defines an intended virtual...
US-9,609,022 Context based dynamically switching device configuration
Various embodiments of systems and methods for dynamically switching device configuration based upon context are described herein. In an aspect, the method...
US-9,609,021 System and method for securing virtualized networks
A method and apparatus that secures a dynamic virtualized network is described. In an exemplary embodiment, a device receives a current network policy of the...
US-9,609,020 Systems and methods to enforce security policies on the loading, linking, and execution of native code by...
Methods and systems described herein relate to enhancing security on a device by enforcing one or more policies on the loading, linking, and/or executing of...
US-9,609,019 System and method for directing malicous activity to a monitoring system
A system of client devices and a server system implementing services makes use of credentials to facilitate authentication of the client devices with the server...
US-9,609,018 System and methods for reducing impact of malicious activity on operations of a wide area network
System architecture and methods for controlling improper network activity in a wide area network, where the system includes multiple service provider devices...
US-9,609,017 Methods for preventing a distributed denial service attack and devices thereof
A method, non-transitory computer readable medium and global traffic manager computing device for preventing distributed denial of service attack comprising...
US-9,609,016 Web redirection for content scanning
This specification generally relates to using redirect messages to implement content scanning. One example method includes receiving from a client a first...
US-9,609,015 Systems and methods for dynamic cloud-based malware behavior analysis
A cloud-based method, a behavioral analysis system, and a cloud-based security system can include a plurality of nodes communicatively coupled to one or more...
US-9,609,014 Method and apparatus for preventing insertion of malicious content at a named data network router
An object-forwarding device can block a malicious Content Object from being inserted into an Interest's reverse path over a named data network. During...
US-9,609,013 Detecting computer security threats in electronic documents based on structure
In an embodiment, a method providing an improvement in remediating vulnerabilities in computer security comprising: receiving, using a network tap of a sensor...
US-9,609,012 Detection of infected network devices and fast-flux networks by tracking URL and DNS resolution changes
A system and method for detecting Fast-Flux malware are presented. Domain name system (DNS) lookup requests to DNS servers from a local area network (LAN) to a...
US-9,609,011 Interface having selectable, interactive views for evaluating potential network compromise
A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security...
US-9,609,010 System and method for detecting insider threats
An approach for detecting an insider threat is described. Embodiments include determining one or more features from one or more network transfers among a...
US-9,609,009 Network security threat detection by user/user-entity behavioral analysis
A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security...
US-9,609,008 Method and system for detecting restricted content associated with retrieved content
In embodiments of the present invention improved capabilities are described for detecting restricted content associated with retrieved content. The method and...
US-9,609,007 System and method of detecting delivery of malware based on indicators of compromise from different sources
According to one embodiment, a computerized method comprises receiving a set of indicators of compromise (IOCs) associated with a known malware of a first...
US-9,609,006 Detecting the introduction of alien content
A computer-implemented method for identifying abnormal computer behavior includes receiving, at a computer server subsystem, data that characterizes subsets of...
US-9,609,005 Cross-view malware detection
In an example, a cross-view detection engine is disclosed for detecting malware behavior. Malware may attempt to avoid detection by remaining in volatile memory...
US-9,609,004 Process level locality and specialization for threat detection in the dendritic cell algorithm
Artificial Immune Systems (AIS) including the Dendritic Cell Algorithm (DCA) are an emerging method to detect malware in computer systems. An implementation of...
US-9,609,003 Generating risk profile using data of home monitoring and security system
Systems and methods are described comprising a touchscreen that includes a processor coupled to a security system at a premises. A plurality of user interfaces...
US-9,609,002 Media content system utilizing user sponsored data
A system may receive a request to access user sponsored media content ("media content"), the request including a digital token ("token"), the media content...
US-9,609,001 System and method for adding context to prevent data leakage over a computer network
Systems and methods for adding context to prevent data leakage over a computer network are disclosed. Data is classified and contextual information of the data...
US-9,609,000 Method and system for executing a secure application on an untrusted user equipment
A method for executing a secure application on an untrusted user equipment having storage means with at least one protected region includes establishing a...
US-9,608,999 Smart beacon data security
A secure beacon-based system includes beacons that may generate dynamic beacon identifiers. A mobile device application may send a request to an application...
US-9,608,998 Allowing guest of hospitality establishment to utilize multiple guest devices to access network service
Network traffic is received from a guest device on a computer network of a hospitality establishment, and a guest area of the hospitality establishment is...
US-9,608,997 Methods and systems for controlling access to computing resources based on known security vulnerabilities
Methods and systems are provided for fine tuning access control by remote, endpoint systems to host systems. Multiple conditions/states of one or both of the...
US-9,608,996 Automated credentialing of device newly added to a network
A device newly introduced to a network is automatically credentialed to be able to communicate over a network before the device first communicates with the...
US-9,608,995 Information processing system, access method, and terminal device
An system comprises: a first storage that stores access destination information, characteristic information, and first identification information in a manner...
US-9,608,994 Controlling administration rights
A computer in a network has an operating system. The operating system is configured to prevent running of software not identified in a list of approved software...
US-9,608,993 Credential abuse prevention and efficient revocation with oblivious third party
Aspects relate to a computer implemented anonymous credential method for credential abuse prevention and efficient revocation. The method includes acquiring a...
US-9,608,992 Mobile terminal device
A mobile terminal device includes a display control module 100 performing display control on display modules 11 and 21 and a setting module 100 setting an icon...
US-9,608,990 Authority management server and authority management method
An API counting process that sets a limit number for an API used by a client, and when an access token is issued in response to a request from an authority...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.