Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,936,005 Systems and methods for distributed API gateways
Disclosed embodiments are directed at systems, methods, and architecture for providing microservices and a plurality of APIs to requesting clients. The...
US-9,936,004 Network interface for transmitting protection data of a power network
A network interface is disclosed for redundant coupling of a substation communication network and a packet-switched WAN of a power network. The interface device...
US-9,936,003 Method and system for transmitting information in a network
Methods and systems for transmitting information are provided. A threshold message size is configured to determine when an application executed by a computing...
US-9,936,002 Video compose function
In particular embodiments, a method includes receiving from an application a first graphics device interface (GDI) call and adding the first GDI call to a list...
US-9,936,001 Geographic placement of application components by a multi-tenant platform-as-a-service (PaaS) system
Implementations for geographic placement of application components by a multi-tenant Platform-as-a-Service (PaaS) system are disclosed. A method of the...
US-9,936,000 Systems and methods for transmitting data
A server is in communication with a plurality of clients being executed by a host. The server is configured to receive a message from a first client of the...
US-9,935,999 File download manager
A download module accesses a download queue including at least two file download requests from an application running on a client device of a server. The...
US-9,935,998 Digital message processing system
A wireless apparatus and system automatically processes digital "messages" to a remote system at a predefined destination address. Initial transmission occurs...
US-9,935,997 System for transforming mobile app into addressable network for stateless access
A computer system includes a master controller that receives an HTTP request for a first URL. The URL indicates a first state of a first mobile application. A...
US-9,935,996 Systems, methods and computer program products for dynamic user profile enrichment and data integration
A system is disclosed for delivering dynamically-rendered web experiences enriched with external user profile data. The system establishes a provider connection...
US-9,935,995 Embedded script security using script signature validation
A technique allows a client computer with a web browser to receive a web page having active content in response to transmitting a request for content. The...
US-9,935,994 Method and apparatus for capacity dimensioning in a communication network
A method, computer readable medium and apparatus for calculating a capacity for high speed packet access data in a link in a communications network are...
US-9,935,993 Streaming video over a hybrid network
Systems and methods to deliver streaming video over a hybrid network are provided herein. An adjusted bitrate to transmit video from a server to a client is...
US-9,935,992 Method and system for generating personalized views of live video feeds
The present disclosure discloses a method and a system for generating personalized views of live video feeds of an event. The method comprises determining one...
US-9,935,991 Pipelining get requests in adaptive streaming
In one embodiment, a client device includes a processor to send a first GET request to a server for a first data chunk of a data item, a communication interface...
US-9,935,990 Systems and methods for multicast streaming analysis
A computer-implemented method for anonymously selecting streams for analysis is described. In one embodiment, control information that associates one or more...
US-9,935,989 System and apparatus for user communications
Embodiments of the present disclosure provide a method for communication program association. The method includes acquiring a communication program account...
US-9,935,988 Information processing device and information processing method
To provide an information processing device that facilitates an audience to transmit information thereto. This information processing device is configured to...
US-9,935,987 Participation queue system and method for online video conferencing
A virtual conferencing system is described for implementing a speaker queue. For example, one embodiment of the virtual conferencing system comprises: a...
US-9,935,986 Spatial security in a session initiation protocol (SIP) conference
In a method for securing a session initiation protocol (SIP) conference session, first location information of a SIP conference session invitee attempting to...
US-9,935,985 Apparatus and method for directing a communication session to a communication device of a group of devices...
An apparatus, and an associated method, for directing communications of a communication session to a selected communication device, or devices, of a group of...
US-9,935,984 Scalable cloud-based endpoint security system
A scalable cloud-based endpoint security system facilitates a security policy on a plurality of endpoints. Configuration data or commands for implementing a...
US-9,935,983 System and architecture for electronic permissions and security policies for resources in a data system
An electronic permissions and security system are disclosed which may be used to determine permissions and policies for resources in a complex multi-dimensional...
US-9,935,981 Dynamic tuple for intrusion prevention systems
Embodiments of the present invention provide systems and methods for exchanging information. Communications between an intrusion prevention system (IPS) and at...
US-9,935,980 Adding firewall security policy dynamically to support group VPN
A server device receives, from a member device, a registration request for a group virtual private network (VPN) and provides an initial firewall security...
US-9,935,979 System and method for assigning security levels for instant messaging contacts across device partitions
A method, communication device and computer program product communicate between the communication device and a second communication device using an instant...
US-9,935,978 Policy application for multi-identity apps
Controlling application behavior in the context of managed accounts. A device includes one or more applications. At least one of the applications is configured...
US-9,935,977 Content delivery employing multiple security levels
Techniques are described for delivering one or more first resources of a page using a first security level, and delivering one or more second resources of a...
US-9,935,976 Cloud-based surveillance with intelligent tamper protection
In one embodiment, a security system includes a central communication unit and a first surveillance device. The central communication unit is communicatively...
US-9,935,975 Hard object: lightweight hardware enforcement of encapsulation, unforgeability, and transactionality
A hardware-implemented method to support three desirable software properties: encapsulation, referential integrity/capabilities, and transactions. These...
US-9,935,974 Hardware-logic based flow collector for distributed denial of service (DDoS) attack mitigation
Methods and systems for an integrated solution to flow collection for determination of rate-based DoS attacks targeting ISP infrastructure are provided....
US-9,935,973 Systems and methods for automatic detection of malicious activity via common files
The present disclosure describes systems and methods for detection and mitigation of malicious activity regarding user data by a network backup system. In a...
US-9,935,972 Emulator-based malware learning and detection
Methods and systems are described for malware learning and detection. According to one embodiment, an antivirus (AV) engine includes a training mode for...
US-9,935,971 Mitigation of virtual machine security breaches
An approach provides solutions for responding to threats to virtual machines (VMs) and mitigating the risks of potential breaches to VMs that reside in the same...
US-9,935,970 Methods and systems for implementing a phishing assessment
A system, method, and computer program product for implementing a phishing assessment that includes a phishing server that implements one or more phishing...
US-9,935,969 Domain classification based on client request behavior
Systems and methods for domain classification using the network request behavior of clients are provided. The network requests of a plurality of clients are...
US-9,935,968 Selective traffic analysis at a communication network edge
Embodiments disclosed herein provide systems and methods for recording for analyzing traffic at an edge of a communication network. In a particular embodiment,...
US-9,935,967 Method and device for detecting malicious URL
Examples of the present disclosure provide a method and device for detecting a malicious URL, the method includes: a URL detection request is received, contents...
US-9,935,966 Method and system for message delivery security validation
A method, a system, and computer readable medium comprising instructions for message delivery security validation are provided. At least one authentication...
US-9,935,965 Establishing and using a trust level in mobile phones
Automatically establishing and/or modifying a trust relationship between devices, including mobile devices, in communication, and customizing a user interface...
US-9,935,964 Access control for objects having attributes defined against hierarchically organized domains containing fixed...
An aspect of the present disclosure facilitates controlling access to objects having attributes defined against hierarchically organized domains, with each...
US-9,935,963 Shared item account selection
Techniques for sharing of items from online storage (e.g., cloud storage) are described herein. In at least some embodiments, sharing links can be configured as...
US-9,935,962 Method and system for onboarding wireless-enabled products in a network
Various embodiments provide systems and methods for connecting wireless-enabled products to wireless networks. Customer network credentials may be stored in a...
US-9,935,961 Controlling access to data
A system for controlling access to data, includes: one or more interfaces operable to receive an access point deauthorization message, the access point...
US-9,935,960 Cross-enterprise workflow
Example systems, methods and storage media to provide a cross-enterprise workflow among clinical systems are disclosed. An example cross-enterprise enabled...
US-9,935,959 Cloud service custom execution environment
Techniques are described for implementing a cloud computer system to provide access to a custom execution environment for execution of custom executable...
US-9,935,958 Reverse access method for securing front-end applications and others
A System that provides a secured connection between servers on the LAN and clients on the WAN comprises the LAN (which includes LAN Server and LAN Controller)...
US-9,935,957 Transaction security systems and methods
Outbound traffic of a host application may be received from a host device having a host processor. The secure resource may be configured to provide a secure...
US-9,935,956 Devices and methods configured to control network access time
A computer-implemented method of limiting access time to a computer network for client computing devices may comprise disposing an access controlling device...
US-9,935,955 Systems and methods for cloud based unified service discovery and secure availability
Systems and methods implemented by a unified agent application executed on a mobile device, for unified service discovery and secure availability include...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.