At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Patent # | Description |
---|---|
US-9,628,564 |
Hierarchical information modification and use Example systems and methods of using and modifying hierarchical information are presented. In one example, a request for information associated with a topic is... |
US-9,628,555 |
Enhanced load processing using linked hierarchical data structures The present disclosure relates to enhancing load processing for facilitated assignment or modification of access-right data. More specifically, the present... |
US-9,628,550 |
Lightweight software management shell A lightweight software management shell that intelligently and autonomously provides a suitable execution environment for software agents by creating new... |
US-9,628,549 |
Method and system for controlling and accessing content servers A method and system for controlling provisioning and access to cache servers with an application programming interface (API). The API includes components for... |
US-9,628,543 |
Initially establishing and periodically prefetching digital content Content playback that includes maintaining a connection between an electronic device and a content source. Content is prefetched prior to attempting to play one... |
US-9,628,542 |
Hybrid HTTP and UDP content delivery A hybrid HTTP/UDP delivery protocol provides significant improvements for delivery of video and other content over a network, such as an overlay. The approach... |
US-9,628,540 |
Systems and methods for handling multiple concurrent session initiation
protocol transactions Systems and methods for handling the processing of multiple SIP transactions that have been requested at substantially the same time can involve establishing a... |
US-9,628,538 |
Synchronous communication A method and computing system for receiving, using one or more computing devices, a discrete video stream from each of a plurality of users of a social network,... |
US-9,628,533 |
Method and device for generating a description file, and corresponding
streaming method The present invention relates to a method and device for generating a description file about a video sequence at a server device for a client device, to... |
US-9,628,527 |
System and method for delivering content in a unicast/multicast manner The present invention is a system and method for enabling multicast synchronization of initially unicasted content. Multiple unicast streams are synchronized in... |
US-9,628,522 |
Enhanced content consumption Enhanced content consumption is provided by establishing a pairing between two computing devices, wherein at least one of the two computing devices provides a... |
US-9,628,521 |
Hybrid location A location application can be configured to detect a call to a particular telephone number. The location application can also be configured to receive a... |
US-9,628,519 |
Call processing method and control apparatus, automatic call distribution
apparatus, and agent terminal Embodiments of the present invention provide a call processing method and control apparatus, an automatic call distribution apparatus, and an agent terminal.... |
US-9,628,518 |
Linking a collaboration session with an independent telepresence or
telephony session An independent collaboration session is established through an existing media session. A computing device identifies a request for a collaboration session from... |
US-9,628,517 |
Noise reduction during voice over IP sessions An approach is provided that, upon receiving a keyboard event, reduces a volume of an audio input channel from a first volume level to a lower volume level.... |
US-9,628,510 |
System and method for providing data storage redundancy for a protected
network A system and method for providing redundancy with remote scrubbing center devices. The system includes an edge detection device and a plurality of scrubbing... |
US-9,628,506 |
Systems and methods for detecting security events A computer-implemented method for detecting security events may include (1) identifying facets of candidate security events detected by a network security... |
US-9,628,498 |
System and method for bot detection Exemplary systems and methods for detecting a communication channel of a bot. In exemplary embodiments, presence of a communication channel between a first... |
US-9,628,490 |
Trusted contact name validation Embodiments of the present invention address deficiencies of the art in respect to validating a specified identity for a participant to a chat session and... |
US-9,628,488 |
Method and system for sensitive data abstraction According to an embodiment of the present invention, a system and method for transmitting sensitive data in a contact center environment comprising a transient... |
US-9,628,484 |
Leveraging online identities to grant access to private networks An authentication service running on a processing device receives a request from a local area network (LAN) to authenticate a computing device (and/or a user of... |
US-9,628,482 |
Mobile based login via wireless credential transfer Systems and methods for mobile-based login via wireless credential transfer are disclosed. In some implementations, a proxy server receives a registration... |
US-9,628,480 |
Device blocking tool Automated locating and disconnection of undesired devices may include receiving a request to reroute the traffic associated with a device, receiving switch... |
US-9,628,478 |
Technologies for secure storage and use of biometric authentication
information Generally, this disclosure describes technologies for securely storing and using biometric authentication information, such as biometric reference templates. In... |
US-9,628,476 |
Source device and systems and methods of verifying an authentication using
dynamic scoring A source device for systems and methods of verifying an authentication based on dynamic scoring is disclosed, wherein the source device is configured to receive... |
US-9,628,475 |
User authentication of applications on third-party devices via user
devices In one embodiment, a first computing device receives an access token from a second computing device, the access token being generated by the second computing... |
US-9,628,469 |
Single sign on for a remote user session A user accesses a remote session, the connection to which is managed by a connection broker, according to a single sign-on (SSO) process. The SSO process... |
US-9,628,466 |
Systems and methods for performing secure financial transactions An RFID system includes an RFID tag, an RFID reader, and a server. The RFID tag communicates to the server via encrypted information. The information may be... |
US-9,628,463 |
Trust-interactive communication applications A communication software module executing on a computerized appliance from a machine-readable medium includes functionality enabling a user to direct a... |
US-9,628,457 |
System and method for authenticating local CPE Systems, methods, apparatus and other mechanisms for authenticating wireless customer premises equipment (CPE) at a service location by transmitting an... |
US-9,628,454 |
Signalling delegation in a moving network In order to delegate location update signaling responsibility from a Mobile Node to a Mobile Router, the Mobile Router is provided with a second symmetric key... |
US-9,628,451 |
Power and cost efficient peripheral input Systems and methods may provide for receiving, at a controller of a first device having a host processor, user input data and converting the user input data... |
US-9,628,447 |
Methods and apparatus for protected distribution of applications and media
content Methods, devices, apparatus, computer-readable media and processors are provided that protect the distribution of media content. Media content is encrypted and... |
US-9,628,443 |
Low latency server-side redirection of UDP-based transport protocols
traversing a client-side NAT firewall Systems, methods, and machine-readable media for low latency server-side redirection of User Datagram Protocol (UDP)-based transport protocols traversing a... |
US-9,628,435 |
Duplicate address detection based on distributed bloom filter In one embodiment, a method comprises: generating, by a first network device in a network, a Bloom filter bit vector representing device addresses of devices... |
US-9,628,432 |
Messaging system and method A method of cross-platform messaging including receiving, by a messaging system, at least one initial message having a message format, an initial message layout... |
US-9,628,430 |
Notifications based on social network service activity and profile
triggers An embodiment searches a social network for at least one trigger event, detects one or more trigger events, and communicates the detected one or more trigger... |
US-9,628,428 |
Virtual emails for IMAP commands Some embodiments provide a method to extract metadata of MIME attachments or other distinguishable MIME parts of MIME emails into virtual emails. The virtual... |
US-9,628,426 |
Instant messaging system An instant messaging system is disclosed that provides a means for presenting information to a user about current conversants and for managing the handling of... |
US-9,628,425 |
Redirecting notifications to an alternative computing device and allowing
subsequent SMS interactions to... A method, system and computer program product for handling notifications. An instruction from the user is received to redirect notifications to alternative... |
US-9,628,421 |
System and method for breaking up a message thread when replying or
forwarding a message Disclosed is a method of communicating a message thread, comprising: receiving a message thread at a first device, the message thread comprising existing... |
US-9,628,419 |
System for annotation of electronic messages with contextual information A system that transforms electronic messages into annotated messages that include contextual information to aid a recipient in utilizing the electronic message,... |
US-9,628,417 |
Time conversion in an instant message Embodiments of the present invention provide methods, program products and systems for displaying a corrected time included in the text of an instant message.... |
US-9,628,416 |
Photo avatars In one implementation, endpoint computing devices communicate using one or more instant messages. A user interface of an endpoint receives text input from a... |
US-9,628,415 |
Destination-configured topic information updates A target travel destination is configured with a topic of conversation planned by a user to occur with at least one person at the target travel destination. A... |
US-9,628,412 |
System and method for generic loop detection A system and method for detecting generic loops is described. In one example, an inbound email is inspected for a loop token. If a loop token is found, then an... |
US-9,628,407 |
Multiple software versions in a switch group One embodiment of the present invention provides a switch. The switch includes one or more ports, a switch group module, a persistent storage module, and a... |
US-9,628,400 |
Interest forwarding for interactive client anonymity In one embodiment, an intermediate node in a communication network receives a client interest with an indication of a client-requested reverse private path. The... |
US-9,628,396 |
Network device and method for outputting data to bus with data bus width
at each cycle by generating end of... A method used in a network device for outputting data to a bus with a data bus width at each cycle includes: using a packet generator for generating idle data... |
US-9,628,395 |
Interfaces for service requests in a balloon network Example embodiments may relate to web interfaces for a balloon-network. For example, a computing device may display a graphical interface that that includes one... |