Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,866,605 Streaming manifest quality control
In one embodiment, a method that receives a manifest for plural encoded representations of a single content stream, each representation fragmented into plural...
US-9,866,604 Progressive download playback
The present invention provides methods and systems for enabling content streaming on mobile devices. The methods and systems may include encoding a content...
US-9,866,603 Enabling start-over TV in adaptive bitrate delivery
In an example, a processing device is provided. The processing device may be configured to determine whether to send a first version of a stream manifest...
US-9,866,602 Adaptive bit rates during broadcast transmission in distributed content delivery networks
The disclosed embodiments provide a system that facilitates broadcast transmission in a distributed content delivery network. The system includes a node in the...
US-9,866,601 Communication system, communication apparatus, and method of program update
A communication system is provided that includes a communication terminal that stores at least one program and a plurality of update apparatuses that provide...
US-9,866,600 Method and apparatus for joining electronic conference
According to the present invention, even while a chat opening process is in progress, users can join chats by means of a simple procedure from a video game...
US-9,866,599 Integration of scheduled meetings with audio-video solutions
An intermediary server allows endpoints connected to two different types of conferencing systems to participate in an integrated conference without requiring...
US-9,866,598 Methods and systems to assess an ability to playback media content
The present disclosure includes methods and systems to assess an ability to playback media content. The system progresses through media content playback...
US-9,866,597 Ambient communication session
In general, this disclosure describes techniques for initiating a communication session when a user indicates she or he is available to participate in the...
US-9,866,596 Methods and systems for virtual conference system using personal communication devices
A method for managing jitter includes determining, by a processor of a master device, at least one of device capabilities of at least one satellite device,...
US-9,866,595 Policy based slice deletion in a dispersed storage network
A method for execution in a dispersed storage network operates to determine one or more slice names of one or more slices to consider for deletion; determine an...
US-9,866,594 Enforcing policy-based application and access control in an information management system
A method and apparatus for controlling document access and application usage using centrally managed rules. The rules are stored and manipulated in a central...
US-9,866,593 Inter-domain replication of service information
An automated conversion of service information that includes endpoint addresses of service providers and security policies between independent enterprise...
US-9,866,592 Policy enforcement system
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for storing, by a policy enforcement system, a plurality of...
US-9,866,591 Enterprise messaging platform
A secure messaging platform for an enterprise environment is disclosed. The secure messaging platform enables users to exchange encrypted communications....
US-9,866,590 Processing information based on policy information of a target user
An information processing apparatus includes a policy acquisition unit configured to acquire a policy on disclosure of information on a target user; a...
US-9,866,589 Management of actions initiated by applications in client devices
A client device identifies an action being performed using a first application in the client device. The client device identifies that the first application is...
US-9,866,588 Method and apparatus for a dual radio user equipment
A method at a user equipment capable of supporting at least two radio connections, the method including requesting from a remote server, using a first radio...
US-9,866,587 Identifying suspicious activity in a load test
Identifying suspicious activity in utilizing a load testing service can include establishing an amount of domain calls to a domain, modifying the amount, and...
US-9,866,586 Facilitating cross-platform content access
A messaging system includes features of gathering information regarding content accessed across multiple applications and/or devices and making that information...
US-9,866,585 Scanning computer files for specified content
Scanning for computer viruses or E-mail and data content filtering is performed using a distributed programming approach. A master computer 4 serves to divide...
US-9,866,584 System and method for analyzing unauthorized intrusion into a computer network
The method analyzes unauthorized intrusion into a computer network. Access is allowed to a virtualized operating system running on a hypervisor operating system...
US-9,866,583 Fuzzing server responses to malicious client devices
A security device may receive a request, from a client device and intended for a server device, to provide a resource. The resource may be associated with...
US-9,866,582 Detection of scripted activity
Methods, systems, and computer program products for online content referral are provided. A computer-implemented method may include receiving a request from an...
US-9,866,581 Method and system for secure delivery of information to computing environments
A method and system for protecting and repairing a current virtual asset from damage by potential security threats, according to one embodiment. The method and...
US-9,866,580 Forecasting and classifying cyber-attacks using neural embeddings
A first collection including a first feature vector and a Q&A feature vector is constructed. A second collection is constructed from the first collection by...
US-9,866,579 Adaptive risk mitigation engine to facilitate safe interactions between entities
A non-transitory machine-readable media embodying instructions executable by one or more processors to perform a method is provided. In one aspect, the method...
US-9,866,578 System and method for network intrusion detection anomaly risk scoring
Systems, methods, and computer-readable storage media for scoring network anomaly risk. A system identifies a baseline usage for a facet of a server and...
US-9,866,577 Method for detecting intrusions on a set of virtual resources
A method for detecting intrusions on a set of virtual resources in a computer system including at least one physical machine hosting the set of virtual...
US-9,866,576 Rule-based network-threat detection
A packet-filtering device may receive packet-filtering rules configured to cause the packet-filtering device to identify packets corresponding to network-threat...
US-9,866,575 Management and distribution of virtual cyber sensors
A system includes reception of data at a computing network, generation of alerts at the computing network based on received data and on cyber sensor data, the...
US-9,866,574 Protected data type handling awareness
Protected data type classes are provided for performing operations on protected data types. A fact manifest is generated for a software package that utilizes...
US-9,866,573 Dynamic malicious application detection in storage systems
Improved techniques involve comparing access patterns in a storage system to expected access patterns under similar circumstances. An intrusion detection...
US-9,866,572 Monitoring use of a sensor of a computing device
Monitoring use of a sensor of a computing device. A sensor obtains information from an environment of the computing device. A co-processor provides...
US-9,866,571 Securing execution of customer-supplied network page generation code
Disclosed are various embodiments for securing execution of page generation code. The page generation code may be instrumented with code that facilitates...
US-9,866,570 On-vehicle communication system
An on-vehicle communication system, performing message authentication using transmitter and receiver codes that are message authentication codes respectively...
US-9,866,569 Individual-specific content management
A method, system, apparatus, and computer program product are provided for facilitating individual-specific content management. For example, a method is...
US-9,866,568 Systems and methods for detecting and reacting to malicious activity in computer networks
Described herein are systems and methods for performing detection operations on secure ticket data to detect potentially malicious activity. Embodiments may...
US-9,866,567 Systems and methods for detecting and reacting to malicious activity in computer networks
Described herein are systems and methods for performing operations responsive to potentially malicious activity. Embodiments may include receiving an indication...
US-9,866,566 Systems and methods for detecting and reacting to malicious activity in computer networks
Described herein are systems and methods for performing potentially malicious activity detection operations. Embodiments may include receiving data associated...
US-9,866,565 Method and apparatus for controlling data permissions
Methods and apparatus for controlling data permission are disclosed herein, and embodiments include generating a relational database that includes entity...
US-9,866,564 System, method and computer program product for gathering and delivering personalized user information
A system, method and computer program product for providing a secure data channel between a user and associates. The method may receive pushed information from...
US-9,866,563 Specially programmed computing systems with associated devices configured to implement secure communication...
In some embodiments, the present invention provides for an exemplary inventive device which includes at least the following components: a secure lockdown...
US-9,866,562 File and bit location authentication
An approach for authentication is provided. The approach performs identifying, by one or more computer processors, an account attempting to access content. The...
US-9,866,561 Enhanced user interface and data handling in business intelligence software
A business intelligence and reporting solution can include a databook interface that acts as both as a reporting mechanism and an interface for providing data...
US-9,866,560 Secure data access
Technologies are generally disclosed for methods and systems for providing secure document storage and retrieval services. In an example embodiment, a method...
US-9,866,559 Method for opening a session of a machine belonging to a machine set
A method for opening a session of a first machine using a session checking service for the first machine and a second machine, including a security service,...
US-9,866,558 Device, method and system for enabling multiple wireless communication devices to communicate with a trusted...
The present disclosure provides a device, method, and system for enabling multiple wireless communication devices to communicate with a trusted network over a...
US-9,866,557 Method and nodes for authorizing network access
The embodiments herein relate to a method performed by an AAA server (103) for enabling authorization of a wireless device (101) to access a first network...
US-9,866,556 Common internet file system proxy authentication of multiple servers
Techniques are described for a proxy system to provide a client device with transparent access to multiple network file servers. The proxy system may appear to...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.