Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,756,110 Systems and methods for optimizing web page load time
The technology disclosed relates to systems and methods for using deduplication when rendering complex web pages with multiple iFrames, to improve performance...
US-9,756,109 Architecture, system and method for dynamically providing digital content via a reference image
Embodiments of associating a reference image with a URL/URI assigned or related to digital media content are disclosed and enabling a first user to view the...
US-9,756,108 Preloading resources of a web page
A computer-implemented method for preloading resources of a web page is provided. The method includes receiving a user request to navigate to a web page and...
US-9,756,107 Method and systems for optimizing bandwidth utilization in a multi-participant full mesh peer-to-peer video session
An endpoint optimizes bandwidth by initiating a peer-to-peer conference with a plurality of remote devices, generating a first quality list comprising a first...
US-9,756,106 Methods and systems for estimating quality of experience (QoE) parameters of secured transactions
An apparatus is provided for estimating one or more quality of experience (QoE) parameters associated with a specific terminal. The apparatus includes a traffic...
US-9,756,105 Method and arrangement for controlling sessions in a communication network
A method and an apparatus in a multimedia network node (312), for providing a relevant service level for a first subscriber (A) in a multimedia session with a...
US-9,756,104 Support for a new insert stream (ISTREAM) operation in complex event processing (CEP)
One embodiment of the invention includes a method of processing streaming data. The method includes initializing a stream of data and setting a time interval to...
US-9,756,103 Custom content insertion
Provided are methods and systems for inserting custom content. An example method can comprise receiving, at a first computing device, an insertion instruction...
US-9,756,102 Request cancellation method for media streaming
In overview, the various embodiments provide methods implemented by a processor executing a DASH client on a receiver device for determining when, in view of a...
US-9,756,101 Transition points in an image sequence
Techniques are proposed for embedding transition points in media content. A transition point system retrieves a time marker associated with a point of interest...
US-9,756,100 Placeshifting of adaptive media streams
Systems, devices and methods are provided to support placeshifting of adaptive media streams. A home device acts as an intermediary that passes requests for...
US-9,756,098 Multi-tenant over-the-top multicast
Some embodiments provide a multi-tenant over-the-top multicast solution that integrates the per user stream customizability of unicast with the large scale...
US-9,756,097 Non-DSG mechanisms for aligning client devices with their multicast data flows in a DOCSIS network environment
Video messaging may be provided. First, a bootstrap message including a system address may be transmitted by a high level device. A user device may receive the...
US-9,756,096 Methods for dynamically transmitting screen images to a remote device
A system and method are provided for conducting an electronic meeting by broadcasting a screen image to a third party computing device (desktop, laptop, tablet...
US-9,756,095 Mobile device for performing monitoring on cooperative situation, method of performing monitoring on...
A mobile apparatus includes a cooperator detector, a cooperation planner and a context processor. The cooperator detector selects a cooperating mobile apparatus...
US-9,756,094 Determining a referral source by a mobile application or operating system
Systems and methods are provided for associating a tag in a URL to facilitate identifying a source to which the URL was shared. In one or more aspects, a system...
US-9,756,093 Customized content delivery
Systems and methods are provided for creating a sample of electronic content for transmission to others. For example, a user may select a portion of an...
US-9,756,092 Distribution and synchronization of a social media environment
A system is configured to receive, from a first client device, a request to join a social media environment in which a second client device is participating;...
US-9,756,091 Providing selectable content items in communications
Implementations relate to providing selectable content items in communications. In some implementations, a method includes determining that a user is or will be...
US-9,756,090 Technique for providing services in a service provisioning network
The invention relates to techniques for providing services in a service provisioning network (100'), wherein a service-related message (118) is routed by a...
US-9,756,089 Maintain persistent connections between servers and mobile clients
In one embodiment, a method includes iteratively waiting for a time interval; sending a keep-alive message from a first computing device to a second computing...
US-9,756,088 IMS over soft AP admission control and resource management
In an aspect of the disclosure, a method, a computer-readable medium, and an apparatus are provided. The apparatus may be a first UE. The UE receives an IP...
US-9,756,087 Method, system and network nodes for performing a sip transaction in a session initiation protocol based...
Methods, systems and network nodes for performing a SIP transaction are provided. In one exemplary embodiment, a method, performed by a second node of sending a...
US-9,756,086 Distributed connection management
Persistent connections between multiple client devices and multiple back-end service components are managed using a consistent hashing-based approach to route...
US-9,756,085 Peer-to-peer internet protocol telephone system with system-wide configuration data
Various embodiments of the invention provide a Peer-to-Peer (P2P, Internet Protocol (IP) telephone system. The telephone system includes a plurality of...
US-9,756,084 Communication system architecture
Disclosed is a communication system for effecting communication events between endpoints connected via a communication network. The communication system...
US-9,756,083 System and method for context-aware participant management
System and method to manage an electronic conference hosted by a conference server coupled to a processor and a memory, the method including: receiving, by a...
US-9,756,082 Scalable network security with fast response protocol
This disclosure provides a network security architecture that permits installation of different software security products as virtual machines (VMs). By relying...
US-9,756,081 Context-aware pattern matching accelerator
Methods and systems for improving accuracy, speed, and efficiency of context-aware pattern matching are provided. According to one embodiment, a packet stream...
US-9,756,080 Protecting content from third party using client-side security protection
Architecture that employs encryption and storage of encryption keys to protect trusted client message content from an untrusted third-party hosted service. Each...
US-9,756,079 System and method for providing network and computer firewall protection with dynamic address isolation to a device
A computer performs dynamic address isolation. The computer comprises an application associated with an application address, a network interface coupled to...
US-9,756,078 Proactive internet connectivity probe generator
Described herein are reception of first processor-executable program code and a configuration file specifying a target internet protocol address, an...
US-9,756,077 Implementing security in a social application
Implementing security in social applications includes inferring a closeness level of a connection to a user's profile of a social application based on a...
US-9,756,076 Dynamically reacting policies and protections for securing mobile financial transactions
A secure mobile financial transaction is provided by receiving a list of protection methods from an external terminal over a communication network. A matrix of...
US-9,756,075 Dynamic hiding of deception mechanism
Provided are methods, devices, and computer-program products for hiding one or more deception mechanisms. In some examples, the one or more deception mechanisms...
US-9,756,074 System and method for IPS and VM-based detection of suspicious objects
A threat detection system is integrated with intrusion protection system (IPS) logic and virtual execution logic is shown. The IPS logic is configured to...
US-9,756,073 Identifying phishing communications using templates
Methods, apparatus, systems, and computer-readable media are provided for determining whether communications are attempts at phishing. In various ...
US-9,756,072 Employing physical location geo-spatial co-ordinate of communication device as part of internet protocol
A current physical location value associated is incorporated with a communication device as part of internet protocol (IP). An IP management component obtains...
US-9,756,071 DNS denial of service attack protection
Exemplary embodiments for protecting a data network from a DNS denial of service attack are disclosed. The systems and methods provide for the use of a shared...
US-9,756,070 Scanning machine images to identify potential risks
Technologies are described herein for scanning machine images using a scanning service to identify potential risks. The scanning service may be associated with...
US-9,756,069 Instant raw scan on host PC with virtualization technology
A virtual machine is used to perform a raw scan for evasive malware on a host computer without requiring an interrupt or restart of a host operating system. An...
US-9,756,068 Blocking domain name access using access patterns and domain name registrations
Domain names are determined for each computational event in a set, each event detailing requests or posts of webpages. A number of events or accesses associated...
US-9,756,067 Network security
A network security system detects anomalous network device behavior associated with a network device in a group of similar network devices based on baseline...
US-9,756,066 Secure behavior analysis over trusted execution environment
Systems and methods for recognizing and reacting to malicious or performance-degrading behaviors in a mobile computing device include observing mobile device...
US-9,756,065 Sequencing virtual machines
A method for sequencing virtual machines in a shared pool of configurable network computing resources comprises sequencing at least one computing element for...
US-9,756,064 Apparatus and method for collecting harmful website information
Provided are a harmful site collection device and method for determining a harmful site by analyzing a connection between harmful sites. The harmful site...
US-9,756,063 Identification of host names generated by a domain generation algorithm
Host name raw data from access logs of computers is grouped into distinct groups. At least one feature, an alphanumeric or alphabetic-only digest, is extracted...
US-9,756,062 Collaborative infrastructure supporting cyber-security analytics in industrial networks
A system comprising a computer-readable storage medium storing at least one program, and a method for reducing cyber-security related false positive alerts is...
US-9,756,061 Detecting attacks using passive network monitoring
Embodiments are directed to detecting one or more attacks in a network. One or more network flows may be monitored using one or more network monitoring...
US-9,756,060 Security management in a networked computing environment
An approach for addressing (e.g., preventing) detected network intrusions in a virtualized/networked (e.g., cloud) computing environment is provided. In a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.