Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,860,302 Method, control module, apparatus and system for transferring data
A method, control module and extracorporeal blood treatment apparatus are provided for transferring data from said extracorporeal blood treatment apparatus....
US-9,860,301 File transfer using XML
A tangible, machine readable storage medium stores instructions and implements a method when the instructions are executed by a processor. A source file is...
US-9,860,300 Fast file server methods and systems
The invention provides, in one aspect, an improved system for data access comprising a file server that is coupled to a client device or application executing...
US-9,860,299 Method and system for file transfer over a messaging infrastructure
A method and system for file transfer over a messaging infrastructure are provided. The method includes dividing a file into multiple portions. The method...
US-9,860,298 Providing access via hypertext transfer protocol (HTTP) request methods to services implemented by stateless...
An aspect of the present disclosure provides access via HTTP verbs to services implemented by stateless objects. In one embodiment, the list of services...
US-9,860,297 Method, apparatus, and computer program product for media selection for moving user
In an example embodiment, a method includes scanning, by an apparatus, for wireless messages associated with presence of a mobile wireless device, while the...
US-9,860,296 System and method for end-to-end call quality indication
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for generating an end-to-end quality indication associated with a...
US-9,860,295 Streaming the audio portion of a video ad to incompatible media players
Internet streaming from broadcast radio may carry replacement ads for those ads broadcast terrestrially. Video ads may replace audio ads. Some Internet media...
US-9,860,294 Media content streaming
Technology for receiving streaming media content is disclosed. A media presentation description (MPD) for the streaming media content can be received at a user...
US-9,860,293 Apparatus and method for providing streaming content using representations
A method and apparatus for an adaptive Hypertext Transfer Protocol (HTTP) streaming service using metadata of media content are provided. The media content may...
US-9,860,292 Method and system for delivering data to a batch consumer and a streaming consumer
A method and system delivers data to a batch consumer and a streaming consumer. The method and system include retrieving data from a plurality of data centers,...
US-9,860,290 System and method for adapting video communications
An apparatus may include one or more radio-frequency (RF) transceivers arranged to receive multimedia content during a session over a first link from a wireless...
US-9,860,289 Multimedia digital content retrieval, matching, and syncing systems and methods of using the same
The present invention relates to a multimedia digital content retrieval, matching, and syncing systems and methods of using the same. Specifically, the present...
US-9,860,288 Synchronization of preferred perishable content
A user can specify particular news, weather, traffic, or other perishable content received on a particular Internet radio station or other media channel. The...
US-9,860,287 Apparatus and method for supporting sharing of source code
In a shared change set server, a receiving section receives information on an undetermined change set and information on users sharing the undetermined change...
US-9,860,286 Associating a captured image with a media item
Examples disclosed herein include a computing system receiving a first data set representing (i) an image and (ii) an event associated with the image; receiving...
US-9,860,285 System, apparatus, and method for sharing a screen having multiple visual components
Embodiments of the invention provide a screen sharing technology including a local computing device and a remote computing device. The local computing device...
US-9,860,284 Parallel multimedia conferencing
A method, server, and media are provided for providing parallel multimedia conferences. A multimedia conference server enables a user to participate in several...
US-9,860,283 Agile network protocol for secure video communications with assured system availability
A system and method for video conferencing over a secure communication link is disclosed. In various implementations, the system is configured connect to a...
US-9,860,282 Real-time synchronous communication with persons appearing in image and video files
Systems and methods are provided for enabling real-time synchronous communication with persons appearing in image or video files. For example, an image or video...
US-9,860,281 Social-graph aware policy suggestion engine
Systems, devices and methods are disclosed to assist in configuring devices and policies to protect a regional network (e.g., home network) and its users. Users...
US-9,860,280 Cognitive authentication with employee onboarding
Embodiments include method, systems and computer program products for onboarding a new employee to an organization. Aspects include receiving, by a processor,...
US-9,860,279 Defining network rules based on remote device management attributes
Some embodiments provide novel methods for processing remote-device data messages in a network based on data-message attributes from a remote device management...
US-9,860,278 Log analyzing device, information processing method, and program
A log information collecting unit that collects log information and traffic information output from a plurality of communication devices included in a network;...
US-9,860,277 Normalized indications of compromise
Threat detection instrumentation is simplified by providing and updating labels for computing objects in a context-sensitive manner. This may include simple...
US-9,860,276 Emergent network defense
A system and method are provided of a node for use in a network having a plurality of nodes. The node is configured to identify neighboring node(s) within a...
US-9,860,275 Systems and methods to rotate security assets used for secure communications
Systems and methods to rotate security assets used to for secure communications are disclosed. The system includes receiving a first certificate that includes a...
US-9,860,274 Policy management
In embodiments of the present invention improved capabilities are described for the operation of a threat management facility, wherein the threat management...
US-9,860,273 Logging encrypted data communications for QOE analysis
A device such as a smartphone may communicate with a server or other network entity using encrypted communications, making it difficult to examine such...
US-9,860,272 System and method for detection of targeted attack based on information from multiple sources
Disclosed are methods, systems, and computer programs for detecting targeted attacks on compromised computer from multiple sources. An example method includes...
US-9,860,271 Health monitor based distributed denial of service attack mitigation
Provided are methods and systems for mitigating a DDoS event. The method may comprise receiving an indication of a collapse of a collapsible virtual data...
US-9,860,270 System and method for determining web pages modified with malicious code
Disclosed are a system and method for determining web pages modified with malicious code. An example method includes: intercepting an attempt to access a...
US-9,860,269 Managing data traffic in the presence of a sensitive site
Website security may be managed based on known site attributes and placing limits on communication outside a site. One example may include at least one of...
US-9,860,268 Detecting and predicting cyber-attack phases in data processing environment regions
A set of collections of forecasted feature vectors is selected from a repository for a future time window after a present time, a cyber-attack being in progress...
US-9,860,267 Method and system of eliminating vulnerabilities of smart devices
Disclosed are systems and methods for eliminating vulnerabilities of smart devices connected to a data network. An example method includes: identifying a router...
US-9,860,266 Preventing messaging attacks
Systems, methods, and software can be used to prevent messaging attacks. In some aspects, a scanning short message is sent to a UICC associated with a mobile...
US-9,860,265 System and method for identifying exploitable weak points in a network
The system and method described herein may leverage passive and active vulnerability discovery to identify network addresses and open ports associated with...
US-9,860,264 Multi-dimensional geometry for enhancement of simulations of network devices
A computer-implemented method for using multi-dimensional geometry in simulations of packet flows through network devices, is provided. The computer-implemented...
US-9,860,263 System and method for assessing data objects on mobile communications devices
A server receives from a mobile communication device information about a data object (e.g., application) on the device when the device cannot assess the data...
US-9,860,262 Methods and systems for encoding computer processes for malware detection
A method for encoding computer processes for malicious program detection. The method includes the steps of (a) randomly sampling a trace of system calls...
US-9,860,261 System for analyzing and maintaining data security in backup data and method thereof
A computer-implemented method and system for analyzing and maintaining data security in backup data, comprising of: accessing backup data of file systems...
US-9,860,260 Monitoring the life cycle of a computer network connection
Monitoring of a life cycle of a connection of a network client device to a network via monitoring time synchronization traffic flowing between one or more...
US-9,860,259 Reassembly free deep packet inspection for peer to peer networks
The present disclosure relates to a system, a method, and a non-transitory computer readable storage medium for deep packet inspection scanning at an...
US-9,860,258 Host-based, network enabled, integrated remote interrogation system
An Enhanced Ethernet Network Interface Card (EENIC) interfaces with a host and a network. The EENIC includes an internal network interface controller (NIC), a...
US-9,860,257 Anomaly detection and threat prediction through combined power and network analytics
A network device communicates network traffic in one or more network flows via a plurality of ports. Each port is connected to a corresponding computing device....
US-9,860,256 Geofencing of data in a cloud-based environment
Disclosed is an approach to incorporate geographical access control features for a cloud-based storage platform. This allows, for example, enterprise...
US-9,860,255 Shareable content item links with use restrictions
Shareable content item links with use restrictions. In one embodiment, for example, a method comprises: receiving, from a client computing device used by an...
US-9,860,254 Method and apparatus for providing network security using role-based access control
A method and apparatus for providing network security using role-based access control is disclosed. A network device implementing such a method can include, for...
US-9,860,253 System and method for embedding first party widgets in third-party applications
Methods and systems provide embeddable user interface widgets to third-party applications so that the widgets can be securely embedded in, and securely used...
US-9,860,252 System and method for maintenance of transitive closure of a graph and user authentication
A user authorization system may include a database server maintaining, in a database, a cached user rights list specifying associations between users and...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.