Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,762,648 Patient monitoring over heterogeneous networks
A patient monitor includes least one monitoring device which collects patient data about a patient. A packet generator generates data packets from the patient...
US-9,762,647 System and method for using image data in connection with configuring a universal controlling device
Data indicative of an object of interest is received at a recognition system having an associated database in which is stored data for a plurality of reference...
US-9,762,646 Presentation remote control
In general, the subject matter described in this specification can be embodied in methods for accessing a presentation stored on a remote server with a first...
US-9,762,645 Modifying data collection systems responsive to changes to data providing systems
Modifying data collection systems responsive to changes to data providing systems. When a data collection system receives a failure message from a data...
US-9,762,644 Sending and requesting feed
A server or other computing device can receive a request for a feed (e.g., Really Simple Syndication, Atom, or other Extensible Markup Language format feed)...
US-9,762,643 Providing hosted virtual desktop infrastructure services
In an example embodiment, a device provides a connection to an endpoint coupled with a first network to a virtual desktop client coupled with a second network....
US-9,762,642 Storing and transmitting content for downloading and streaming
A method implemented by a first client device, the method comprising receiving a media presentation description (MPD) for a media content from a streaming...
US-9,762,641 Automated real-time data stream switching in a shared virtual area communication environment
Switching real-time data stream connections between network nodes sharing a virtual area is described. In one aspect, the switching involves storing a virtual...
US-9,762,640 Locating points of interest using references to media frames within a packet flow
In one embodiment, a method comprises receiving a stream of transport packets encapsulating media packets, and generating a reference to the point-of-interest...
US-9,762,639 Dynamic manifest generation based on client identity
Timestamps for streams of media that transition from one media source to another (such as from live content to on-demand content, and vice versa) can be...
US-9,762,638 Image processing apparatus, information processing method, and storage medium
A facsimile apparatus includes a determination unit configured to determine whether a transmission destination is a gateway that uses a protocol for performing...
US-9,762,637 System and method of using binary dynamic rest messages
A system and method thereof of a communication device. The device includes a port configured to receive a plurality of binary data streams having a binary...
US-9,762,636 Streaming media delivery system
Streaming media, such as audio or video files, is sent via the Internet. The media are immediately played on a user's computer. Audio/video data is transmitted...
US-9,762,635 Content set based pre-positioning
Methods, apparatuses, and systems are provided for improving utilization of the communications system through various "deltacasting" techniques for handling...
US-9,762,634 System and method to transmit digital broadcast grade video via a cellular data network
A particular method includes receiving a media stream that includes digital broadcast grade video. The method further includes compressing the media stream to...
US-9,762,633 Systems and methods for distributed conferencing
Distributed conferencing systems and methods provide local meeting contents to remote participants. In accordance with various example embodiments, a plurality...
US-9,762,632 Systems and methods for establishing and controlling conference call bridges
Systems and methods allow an administrator of a conference call bridge to control who is admitted to the conference call bridge. The systems and methods also...
US-9,762,631 Managing participants in an online session
The present invention relates to an application that is configured to be operated in a multi-participant environment on a computer network. The application...
US-9,762,630 Systems and methods for parents' connection and communication platform
A method implemented by a server in communication with a client for supporting an online communication platform for parents of children enrolled at a school....
US-9,762,629 Customizing content in a social stream
The disclosure includes a system and method for providing a customized stream of content to a user. The system includes: an item sourcer for gathering one or...
US-9,762,628 Implementation of the semi-attended transfer in SIP for IP-multimedia subsystem environments
A communication system, method, and components are described. Specifically, a communication system having the ability to facilitate a semi-attended transfer in...
US-9,762,627 Method of searching for and registering network device using HTTP and network registration service apparatus
A method of searching for a network device and registering the network device to a network using HTTP and a network registration service apparatus are provided....
US-9,762,626 System and method for as needed connection escalation
A method includes selecting a first connection between a connection manager and a managed system, the first connection being associated with a first privilege...
US-9,762,625 Device and method for virtual private network connection establishment
A method, client device and non-transitory computer readable storage medium for connecting to a virtual private network (VPN). A request to connect to a...
US-9,762,624 Method and system for establishing a group messaging session in a communication system
A system and a method for establishing a group messaging session in consideration of a group policy in a communication system. A transmitter-side terminal...
US-9,762,623 Automatic call initiation in response to selecting tags in electronic documents and applications
The present invention provides a telecom control function in a communication terminal. The telecom control function is configured to receive call indicia when a...
US-9,762,622 Flow control scheme for parallel flows
A method includes a proxy device receiving from a source device a request to establish a flow to a destination device; generating, based on the request, a...
US-9,762,621 Call routing for IP multimedia subsystem users
A method of routing an IP Multimedia Subsystem, IMS, connection request sent by a user of a third party service, User A, towards a peer third party service...
US-9,762,620 Lawful interception for 2G/3G equipment interworking with evolved packet system
A method, system, and a computer program product for reducing consumption of resources for lawful interception or retention data related to traffic concerning a...
US-9,762,619 Multi-layer policy definition and enforcement framework for network virtualization
A multi-layer policy framework for monitoring and enforcing policy is provided. The multi-layer policy framework receives the desired state of the policy at...
US-9,762,618 Centralized validation of email senders via EHLO name and IP address targeting
A DNS server receives from a receiving email system, a DNS query for an email domain stored at the DNS server, the DNS query including identifying information...
US-9,762,617 Security threat information analysis
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for analyzing data that includes security threat information....
US-9,762,616 Application-based security rights in cloud environments
This disclosure provides the ability for a cloud application to specify its security requirements, the ability to have those requirements evaluated, e.g.,...
US-9,762,615 Management apparatus and method for controlling management apparatus
A device management apparatus sets a first password required to reflect a security policy managed by the device management apparatus on a device or change the...
US-9,762,614 Systems and methods for providing network security using a secure digital device
A system may include a traffic interception module configured to intercept network traffic of a host device. A traffic virtualization module may be configured...
US-9,762,613 Method and apparatus for providing extended availability of representatives for remote support and management
A network appliance is configured to determine a security policy controlled by a system of an organization. The network appliance creates an association between...
US-9,762,612 System and method for near real time detection of domain name impersonation
Systems and methods are described for detecting domain name impersonation in the domain name system (DNS). A nefarious party may register a domain name in the...
US-9,762,611 Endpoint-based man in the middle attack detection using machine learning models
A first node of a networked computing environment initiates each of a plurality of different types of man-in-the middle (MITM) detection tests to determine...
US-9,762,610 Latency-based policy activation
Techniques for latency-based policy activation are disclosed. In some embodiments, a system for latency-based policy activation includes collecting a plurality...
US-9,762,609 Targeted attack protection using predictive sandboxing
Provided herein are systems and methods for targeted attack protection using predictive sandboxing. In exemplary embodiments, a method includes retrieving a URL...
US-9,762,608 Detecting malware
A candidate malware that potentially includes at least one malicious element is received. The candidate malware is executed using a virtualized environment. A...
US-9,762,607 Incident response automation engine
Systems, methods, and software described herein enhances how security actions are implemented within a computing environment. In one example, a method of...
US-9,762,606 Image vulnerability repair in a networked computing environment
Embodiments of the present invention provide an approach to repair vulnerabilities (e.g., security vulnerabilities) in images (e.g., application images) in a...
US-9,762,605 Apparatus and method for assessing financial loss from cyber threats capable of affecting at least one computer...
Apparatus and method for assessing financial loss posed by cyber threats capable of affecting at least one computer network in which a plurality of systems...
US-9,762,604 Automatically detecting and correcting missing and misconfigured security attributes
Some embodiments provide automated and intelligent security configuration at the network edge. A server tasked with distributing content provider content...
US-9,762,603 Assessment type-variable enterprise security impact analysis
A data management service identifies sensitive data stored on enterprise databases according to record classification rules that classify a data record as...
US-9,762,602 Generating row-based and column-based chunks
In some examples, a set of events is received. A row-based chunk includes the set of events and metadata about the set of events is generated, and a...
US-9,762,601 Trip anomaly detection system
An anomaly detection system is provided in connection with a transport service. The anomaly detection system can construct routine route profiles for individual...
US-9,762,600 Mobile router with vehicle intrusion detection
An embodiment is provided of a mobile router for installation in a vehicle comprising a vehicle network bus coupled to a plurality of electronic control units....
US-9,762,599 Multi-node affinity-based examination for computer network security remediation
Multi-node affinity-based examination for computer network security remediation is provided herein. Exemplary methods may include receiving a query that...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.