Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,930,102 Method and system for using emotional state data to tailor the user experience of an interactive software system
Emotional state data is used to tailor the user experience of an interactive software system, by monitoring and obtaining data about a user's emotional state....
US-9,930,101 Receiving a communication event
Method, node and user terminal for receiving communication events over a communications network. The method comprising: executing a communication client at the...
US-9,930,100 Progressive background uploading
In one embodiment, a method includes accessing a first instance of content to be uploaded to a server, generating a second instance of the content from the...
US-9,930,099 Hybrid segment-oriented file server and WAN accelerator
In a network including WAN accelerators and segment-oriented file servers, a method comprises responding to a client request to manipulate a file via a network...
US-9,930,098 Method and system for ISP network performance monitoring and fault detection
A monitoring tool to facilitate real-time system performance monitoring, fault detection, fault isolation, and fault remediation verification, wherein the...
US-9,930,097 Transport accelerator systems and methods
According to some aspects, a transport accelerator of a client device may generate a chunk request that is derived from a fragment request and that has...
US-9,930,096 Recommending posts to non-subscribing users
In general, the subject matter described in this specification can be embodied in methods, systems and program products. A server system receives from a...
US-9,930,095 System for managing extension modifications to web pages
A method and system provide, using a microprocessor of computing device associated with a web publisher, content including a web page. The method includes...
US-9,930,094 Content complex providing server for a group of terminals
The present invention provides a content complex providing server capable of providing a content complex containing a plurality of different constituent content...
US-9,930,093 Dynamic web session clean-up
A "sign-off" cookie is generated and stored upon initiation of a web session between a client and a web application executing on a server. The sign-off cookie...
US-9,930,092 Editing an unhosted third party application
A document editing system using a third party application having an embedded document editing module is disclosed. The system include a client-side document...
US-9,930,091 Transport path-aware quality of service for mobile communications
Embodiments provide quality of service for media content delivery over capacity-constrained communications links to user devices by exploiting usage models and...
US-9,930,090 Optimizing transfer to a remote access client of a high definition (HD) host screen image
A host-client protocol facilitates delivery of screen images from a host to a remote access client when the host content is continuous or large (such as high...
US-9,930,089 Memory management of digital audio data
A system, method and computer-readable code for the management of digital media on a device with memory and storage restrictions. As with any device, memory and...
US-9,930,088 Utilizing VoIP codec negotiation during a controlled environment call
Controlled-environment communication systems are increasingly using voice over internet protocol (VoIP) to serve their users. VoIP allows voice to be sent in...
US-9,930,087 Scheduling downloads based on metadata in a client-server topology
A method, a computer program product, and a computer system for scheduling downloads based on metadata in a client-server topology. A server receives from a...
US-9,930,086 Content presentation for MPEG media transport
A method for simplified MPEG Media Transport (MMT) content presentation is provided. Two or more assets of an MMT package Processing Unit (MPU) are identified....
US-9,930,085 System and method for intelligent configuration of an audio channel with background analysis
Methods, systems and computer program products for configuring an audio channel are provided. Aspects include generating a confidence metric indicative of at...
US-9,930,083 Method and apparatus for an interchangeable wireless media streaming device
It is possible to capture video information using one or more body mounted cameras, to transmit that information over a wireless communication channel, and to...
US-9,930,082 Method and system for network driven automatic adaptive rendering impedance
A system and method for network driven automatic adaptive rendering impedance are presented. Embodiments of the present invention are operable to dynamically...
US-9,930,081 Streams optional execution paths depending upon data rates
Processing elements in a streaming application may contain one or more optional code modules--i.e., computer-executable code that is executed only if one or...
US-9,930,080 Method and apparatus for sharing presentation data and annotation
A method and apparatus for sharing presentation data, interactions, and annotation information between devices. The method includes: converting the presentation...
US-9,930,079 Device-driven social network
In one embodiment, a method includes receiving information from a network-enabled device, the network-enabled device being associated with a first user of a...
US-9,930,078 Third-party communications to social networking system users using user descriptors
Based on information used by the external system to identify a target user, the external system generates a target user hash identifier that is communicated to...
US-9,930,077 Informational enrichment for interactive systems
Interactive services are enhanced by intercepting, in a telecommunications network, a session initiation protocol message used to initiate a communication. The...
US-9,930,076 Central conferencing routing server
Aspects of the present disclosure involve systems, methods, computer program products, and the like, for collaboration conferencing with multiple participants...
US-9,930,075 Radio access network control of media session
A method for controlling media communication session between a user and a receiving equipment via a core network is disclosed. The method includes checking a...
US-9,930,074 Method and apparatus for controlling power output from an electronic device to an external electronic device
A mobile terminal for supporting Rich Communication Suite (RCS) and Voice Over Long Term Evolution (VoLTE) based services is provided. The mobile terminal...
US-9,930,073 Radio communication system, radio apparatus, radio communication method, packet generation method, and method...
When operating the radio communication system in a mode for transmitting data for data communication instead of audio signal data, a transmission unit of a...
US-9,930,072 Providing SIP signaling data for third party surveillance
A method for facilitating surveillance of a targeted user participating in communication sessions conducted over a communications network, such as a voice over...
US-9,930,071 System and methods for secure utilization of attestation in policy-based decision making for mobile device...
Policy-based client-server systems and methods for attestation in managing and securing mobile computing devices. Attestation provides the means to make...
US-9,930,070 Modifying security policies of related resources
A method for a managing security in a networked computing environment. The method included a processor detecting an unauthorized activity that is targeting a...
US-9,930,069 Operation of a security element with the set of operating parameters matched to the selected use profile
A method for operating a security element which is part of a mobile end device, and a security element, have functionality depending on a set of operating...
US-9,930,068 Image forming apparatus, method of controlling the same, and storage medium storing program
An image forming apparatus and a method of controlling the same, when it is instructed that the security policy be enabled, changes a setting item corresponding...
US-9,930,067 Techniques for secure session reestablishment
A client establishes a network session with a server. The network session is used to establish an encrypted communications session. The client establishes...
US-9,930,066 Infrastructure level LAN security
Techniques are disclosed for securing traffic flowing across multi-tenant virtualized infrastructures using group key-based encryption. In one embodiment, an...
US-9,930,065 Measuring, categorizing, and/or mitigating malware distribution paths
Systems and methods for event path traceback may utilize a processor and a path traceback and categorization (ATC) module in communication with the processor....
US-9,930,064 Network management security and protection system
A system for the monitoring, management, and protection of networks and network-connected devices is described. The system employs an agent configured to run on...
US-9,930,063 Random identifier generation for offline database
Various embodiments of the present technology involve creating a secure unique identifier for a content item to be used in a synchronized content management...
US-9,930,062 Systems and methods for cyber security risk assessment
The present invention is directed to methods, systems, and non-transitory computer readable mediums which can evaluate cyber readiness of an organization. The...
US-9,930,061 System and method for cyber attacks analysis and decision support
A method for cyber attack risk assessment is disclosed. The method uses at least one hardware processor for: continuously collecting, from a networked resource,...
US-9,930,060 Method for enforcing endpoint health standards
An approach for enforcing standards regarding security vulnerabilities for an endpoint user device associated with a user includes collecting, at an inline...
US-9,930,059 Methods and apparatus for analyzing asynchronous cyber-threat event data using discrete time intervals
Apparatus and methods described herein relate to a global workspace manager that can dynamically update historical cyber-threat data for a network. The global...
US-9,930,058 Analyzing cyber-security risks in an industrial control environment
A method of analyzing cyber-security risks in an industrial control system (ICS) including a plurality of networked devices includes providing a processor and a...
US-9,930,057 Dynamic deep packet inspection for anomaly detection
In one embodiment, a device in a network captures a first set of packets based on first packet capture criterion. The captured first set of packets is provided...
US-9,930,056 Systems and methods of viral enablement of features by peer-to-peer connection
The technology disclosed relates to identifying and notifying a user of nearby attendees at a mega attendance event who are in user's social graph by comparing...
US-9,930,055 Unwanted tunneling alert system
Various systems and methods are provided that detect malicious network tunneling. For example, VPN logs and data connection logs may be accessed. The VPN logs...
US-9,930,054 Detecting network traffic content
A device for detecting network traffic content is provided. The device includes a memory configured for storing one or more signatures, each of the one or more...
US-9,930,053 Method and system for detecting bot behavior
A bot detection engine to determine whether hosts in an organization's network are performing bot-related activities is disclosed. A bot detection engine can...
US-9,930,052 Pre-processing before precise pattern matching
A method for pattern matching finds a target pattern from a stream of patterns, both of the stream of patterns and the target pattern being comprised of...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.