Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,942,299 System and method for managing multiple variants of an HTTP object
This disclosure is directed to methods and systems for managing variants of a Hypertext Transfer Protocol (HTTP) object. An intermediary, between at least one...
US-9,942,298 Dynamic help pages using linked data
Help page techniques including: (i) sending, by a customer computer, heterogeneous software context data to a central registry over a communication network;...
US-9,942,297 System and methods for facilitating the development and management of creative assets
A system and methods for facilitating the sourcing of content and its management by one or more contributors or collaborators in order to assist in the...
US-9,942,296 Optimizing progressive downloading in WLANs (wireless local access networks)
An access point provisions of network resources at a data plane to optimize progressive downloads in WLANs. To do so, link information concerning at least one...
US-9,942,295 Live crowdsourced media streaming
Technologies for crowdsourced media streaming include a number of mobile computing devices configured to capture media streams and transmit the media streams to...
US-9,942,294 Symmetric and continuous media stream from multiple sources
A data storage device may comprise a network interface configured to couple to a computer network; a memory configured to store at least one of a first, second...
US-9,942,293 Communication system
Methods and systems for integrated communications are pro-vided. In one embodiment, a user input is received via a user interface. Media data is received in...
US-9,942,292 Transmission apparatus, transmitting method, reception apparatus, and reception method
In a broadcast scheme of transportation in an IP scheme, clock synchronization and presentation synchronization are well implemented. A clock synchronizing with...
US-9,942,291 Seamless switching between multicast video streams
A packet-based video network including: two or more video data sources, each configured to launch video data packets onto the network as multicast data packets...
US-9,942,290 Fast channel change in a multicast adaptive bitrate (MABR) streaming network using HTTP download segment...
A system and method for effectuating channel changes in a multicast adaptive bitrate (MABR) streaming network using temporarily borrowed bandwidth from a shared...
US-9,942,289 Smoothing peak system load via behavior prediction in collaborative systems with temporal data access patterns
Techniques are described above for smoothing peak load in collaborative systems. One embodiment includes, prior to a predicted peak load period, pre-staging...
US-9,942,288 Device setting apparatus, storage storing device setting program, and method for sharing information among a...
A device setting apparatus according to one aspect of the present invention includes a data transmission processor configured to automatically and collectively...
US-9,942,287 Information processing system, terminal device, and method
An information processing system includes one or more terminal devices; and an information processing apparatus connected to the one or more terminal devices...
US-9,942,286 Collaboration platform
One or more embodiments of the invention provide a collaboration platform that permits multiple users to collaborate on multiple copies of a model ...
US-9,942,285 Transferring from user devices with IMS-enabled connections to user devices with non-IMS-enabled connections
Techniques described herein may be used to enable a user to have a call transferred between user devices regardless of how the user devices are connected to a...
US-9,942,284 WebRTC call recording at the edge of an enterprise network
Embodiments disclosed herein provide systems and methods for recording WebRTC communications at a network edge. In a particular embodiment a method provides, in...
US-9,942,283 Systems and methods for multi-context media control and playback
In response to a request for a media-control operation to be implemented at a second electronic device distinct from a first electronic device, the first...
US-9,942,282 Voice over LTE support for non-UICC devices attached to an LTE mobile router
In one embodiment a router connects to a cellular network using at least one authentication credential stored on a smart card of the router. The router...
US-9,942,281 Group communication in communication system
In a communication system providing a group communication service and advertisement of an existing and newly created group, information on usable media types in...
US-9,942,280 Data exchange sessions using groups of terminals of a first user and at least one terminal of a second user
A method, device, program, server and terminal are provided for monitoring a data-exchange session between first terminals belonging to a first user and at...
US-9,942,279 Systems and methods for implementing network gateway in catastrophe context or the like
A system has a plurality of communications devices within a geographic area. Each device is capable of communicating from within the geographic area with any...
US-9,942,278 Controlling communication based on relationship between a plurality of devices
An information processing apparatus includes a communication unit, a storage unit, and a controller. The communication unit communicates with a service on a...
US-9,942,277 Policy engine for cloud platform
A policy engine is situated within the communications path of a cloud computing environment and a user of the cloud computing environment to comply with an...
US-9,942,276 Generating a privacy rating for an application or website
A method, non-transitory computer readable medium, and policy rating server device that receives a request from a client computing device for one or more...
US-9,942,275 Method and system for automatically managing secure communications and distribution of secrets in multiple...
Communications and security policy data for two or more zones is obtained that includes data indicating allowed protocols for the respective communications...
US-9,942,274 Securing communication over a network using client integrity verification
A method for protecting application servers from network-based attacks and verifying the security posture of end client systems is disclosed. A trust broker...
US-9,942,273 Dynamic detection and reconfiguration of a multi-tenant service
A method, apparatus and computer program product for automatically reconfiguring a policy of a multi-tenant service is disclosed. A first tenant specific policy...
US-9,942,272 Handling out of order events
Processing streaming data in accordance with policies that group data by source, enforce a maximum permissible late arrival value for streaming data, a maximum...
US-9,942,271 Information management system with two or more interactive enforcement points
A method and apparatus for controlling document access and application usage using centrally managed rules. The rules are stored and manipulated in a central...
US-9,942,270 Database deception in directory services
A system includes one or more "BotMagnet" modules that are exposed to infection by malicious code. The BotMagnets may include one or more virtual machines...
US-9,942,269 Effectively preventing data leakage, spying and eavesdropping through a networked computing device by...
A computer implemented method for detecting, alerting and blocking data leakage, eavesdropping and spyware in one or more networked computing devices includes...
US-9,942,268 Systems and methods for thwarting unauthorized attempts to disable security managers within runtime environments
The disclosed computer-implemented method for thwarting unauthorized attempts to disable security managers within runtime environments may include (1)...
US-9,942,267 Endpoint segregation to prevent scripting attacks
A secure and efficient technique to prevent cross-site scripting attacks based on segregating the content within a given content page among independent...
US-9,942,266 Preventing application-level denial-of-service in a multi-tenant system
Denial-of-service attacks are prevented or mitigated in a cloud compute environment, such as a multi-tenant, collaborative SaaS system. This is achieved by...
US-9,942,265 Preventing application-level denial-of-service in a multi-tenant system
Denial-of-service attacks are prevented or mitigated in a cloud compute environment, such as a multi-tenant, collaborative SaaS system. This is achieved by...
US-9,942,264 Systems and methods for improving forest-based malware detection within an organization
The disclosed computer-implemented method for improving forest-based malware detection within an organization may include (i) receiving, at a backend computing...
US-9,942,263 Mitigation of anti-sandbox malware techniques
Static analysis is applied to unrecognized software objects in order to identify and address potential anti-sandboxing techniques. Where static analysis...
US-9,942,262 Cyber-physical system defense
System and techniques for cyber-physical system defense are described herein. Sensor disagreements between a plurality of sensors over time can be sampled....
US-9,942,261 Dynamic optimizing scanner for identity and access management (IAM) compliance verification
An identity and access management (IAM) system is associated with a set of data sources from which data is collected. A set of vulnerabilities that the IAM...
US-9,942,260 Enhanced browsing with security scanning
A method securely scans a second web page linked to a first web page being displayed by a browser. The method identifies a target link to a second web page from...
US-9,942,259 Risk assessment using social networking data
Tools, strategies, and techniques are provided for evaluating the identities of different entities to protect individual consumers, business enterprises, and...
US-9,942,258 Runtime protection of Web services
Protecting a runtime Web service application. A web service application is instrumented to log its operation and allow recreation of its execution trace. Trace...
US-9,942,257 Trustworthy indication of software integrity
Computing devices are disclosed that include functionality for providing a trustworthy indication of software integrity. The computing devices include a...
US-9,942,256 Detecting network address translation devices in a network based on network traffic logs
Actual traffic logs of network traffic to and from host devices in a network are collected over time. Artificial traffic logs for each of multiple artificial...
US-9,942,255 Method and system for detecting abusive behavior in hosted services
A hosted service monitoring system detects abuse of a hosted service by monitoring user actions over a period of time. The system will identify an entity, which...
US-9,942,254 Measure based anomaly detection
Method and system for detecting an unknown undesirable event, such as (but not limited to) a cyber-threat, a cyber-intrusion, a financial fraud event or a...
US-9,942,253 Network monitoring, detection, and analysis system
The Kentik Data Engine (KDE) is an integrated real-time, big data software system able to analyze what exactly is happening on a network at the present moment,...
US-9,942,252 Graph-based techniques for detecting coordinated network attacks
One or more proxy logs are processed in order to generate a graph of domains, wherein those domain pairs in the graph that are connected have low support and...
US-9,942,251 Malware detection based on traffic analysis
Detecting malware is disclosed. A candidate malware application is caused to be executed using a virtual machine. Traffic analysis is performed on network...
US-9,942,250 Network appliance for dynamic protection from risky network activities
Electronic appliances, computer-implemented systems, non-transitory media, and methods are provided to identify risky network activities using intelligent...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.