Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,967,306 Prioritized transmission of redundancy data for packetized voice communication
A method for prioritized transmission of redundancy data in a voice-over-packet call. A sending device applies a variable rate codec to generate a sequence of...
US-9,967,305 Systems, methods, and media for streaming media content
Methods, systems, and computer readable media for streaming media content are provided. In some embodiments, the methods comprise: receiving top level index...
US-9,967,304 Method and server for searching for data stream dividing point based on server
Embodiments of the present invention provide a method for searching for a data stream dividing point based on a server. In the embodiments of the present...
US-9,967,303 Throttling a media stream for transmission via a radio access network
A method of throttling a media stream, comprising a sequence of media segments, for transmission to a client via a radio access network is provided. The method...
US-9,967,302 Method and system for complexity adaptive streaming
A method includes calculating a complexity value for each segment or version of multimedia content. The multimedia content has multiple versions associated with...
US-9,967,301 Content segment detection and replacement
Methods and systems for providing content are disclosed. One method can comprise receiving a request for content comprising at least a first segment. The method...
US-9,967,300 Method and apparatus for scheduling adaptive bit rate streams
Embodiments of the claimed subject matter provide a method and apparatus for scheduling adaptive bit rate streams. Some embodiments of the method include...
US-9,967,299 Method and apparatus for automatically data streaming a multiparty conference session
A system, method and computer program product having instructions stored thereon for automatically data streaming a multiparty conference session comprises...
US-9,967,298 Appending to files via server-side chunking and manifest manipulation
The object storage system divides files into a number of object segments, each segment corresponding to a portion of the object, and stores each segment...
US-9,967,297 Generating item suggestions from a profile-based group
Disclosed are various embodiments relating to generating profile-based groups to obtain suggestions regarding a topic. Third party profiles corresponding to...
US-9,967,296 Method and apparatus for playlist synchronization
The present application is applicable to the field of network technologies, and provides method and apparatus for playlist synchronization, where the method...
US-9,967,295 Automated discovery and launch of an application on a network enabled device
A method, apparatus and system related to automated discovery and launch of an application on a network enabled device are disclosed. In one embodiment, a...
US-9,967,294 Sharing of media content
A media sharing system stores share settings that identify one or more users with whom a sharing user wishes to share media segments created in the future. As a...
US-9,967,293 Framework for comprehensive monitoring and learning context of VoLTE call
A method, apparatus, and computer readable medium for managing a voice call in a wireless communication network. The method comprises collecting crowd-sourced...
US-9,967,292 Inline secret sharing
Embodiments are directed to monitoring communication between computers using network monitoring computers (NMCs). NMCs identify a secure communication session...
US-9,967,291 Electronic messaging exchange
A computer-implemented system and method for secure electronic message exchange including coupling a control platform to a workstation of a plurality of...
US-9,967,290 Systems and methods for automating client-side discovery of public keys of external contacts that are secured...
Provided is a method of digitally securing a digital object from a first user in a first domain to a second user in a second domain using a DNS provider. The...
US-9,967,289 Client services for applied key management systems and processes
Embodiments described herein relate to apparatuses and methods for enabling applied key management operations at a client including establishing a data...
US-9,967,288 Providing a common security policy for a heterogeneous computer architecture environment
A common security policy for a heterogeneous computer architecture environment is provided. A configuration of a security policy of a heterogeneous computer...
US-9,967,287 Detection of offline attempts to circumvent security policies
Disclosed are approaches for detecting attempts to circumvent security policies on a client device. A deletion of a user account on a computing device is...
US-9,967,286 Apparatus and method for controlling access to security content using near field network communication of...
Disclosed is an apparatus for controlling access to a security content using near field network communication of mobile devices. A policy issuance provider...
US-9,967,285 Supplying regulatory compliance evidence for a service provider environment
Technology is described for supplying regulatory compliance evidence for a virtual computing service provider. A request is received for providing regulatory...
US-9,967,284 Processing device and method of operation thereof
A processing device (10) includes a policy evaluation module (131) for evaluating policies associated with an item of data or an application and a dynamic...
US-9,967,283 Normalized indications of compromise
Threat detection instrumentation is simplified by providing and updating labels for computing objects in a context-sensitive manner. This may include simple...
US-9,967,282 Labeling computing objects for improved threat detection
Threat detection instrumentation is simplified by providing and updating labels for computing objects in a context-sensitive manner. This may include simple...
US-9,967,281 Security settings and indications of controllers
A system and approach having security assurance for a controller relative to outside connections such as internet. The controller may have locked and exposed...
US-9,967,280 Security appliance
A security appliance may incorporate a touch screen or similar input/output interface, providing command and control over network functionality and...
US-9,967,279 System and method thereof for creating programmable security decision engines in a cyber-security system
A system and method for adaptively securing a protected entity against cyber-threats. The method comprises: determining, based on at least one input feature, at...
US-9,967,278 Systems and methods for application security analysis
Systems and methods for analyzing applications for risk are provided. In the example method, the applications reside on a mobile device that is configurable to...
US-9,967,277 Digital dye packs
Embodiments relate to systems and methods for providing digital dye packs in connection with a transaction via a device user interface. In an embodiment, a...
US-9,967,276 Comment ordering system
In one embodiment, a social networking system receives a request by a first user for user comments associated with a content object, accesses a data store of...
US-9,967,275 Efficient detection of network anomalies
Techniques of identifying anomalous behavior on an electronic network involve iteratively combining groups of adjacent bins of a histogram in such a way as to...
US-9,967,274 Systems and methods for identifying compromised devices within industrial control systems
The disclosed computer-implemented method for identifying compromised devices within industrial control systems may include (1) monitoring network traffic...
US-9,967,273 Abusive traffic detection
Aspects of an abuse detection system for a web service include an abuse detection engine executing on a server. The abuse detection engine includes a...
US-9,967,272 Real-time regular expression search engine
Upon receiving malware detection rules that are to be identified with respect to an input traffic stream, a sequence of state definitions are generated for each...
US-9,967,271 Method and system for detecting restricted content associated with retrieved content
In embodiments of the present invention improved capabilities are described for detecting restricted content associated with retrieved content. The method and...
US-9,967,270 Enterprise intrusion detection and remediation
Events are securely packaged and transmitted from peripherals of terminals and from secure input/out modules (SIOMs) of terminals. The events are collected and...
US-9,967,269 Method, device and system for processing DNS behavior
The invention provides a method, device and system for processing DNS behavior. The method comprises: resolving received network data packet; judging a DNS...
US-9,967,268 Identifying e-mail security threats
One or more processors receive, from one or more social-network sources, social-network data that identifies at least one potentially malicious source accessing...
US-9,967,267 Forensic analysis of computing activity
A data recorder stores endpoint activity on an ongoing basis as sequences of events that causally relate computer objects such as processes and files. When a...
US-9,967,266 Pre-filtering digital content in a digital content system
A digital content system enables users of the content system to access, view and interact with digital content items in a safe, efficient and enjoyable online...
US-9,967,265 Detecting malicious online activities using event stream processing over a graph database
Techniques of detecting malicious events involve generating a relational graph of event data describing events that occur within a specified, limited time...
US-9,967,264 Threat detection using a time-based cache of reputation information on an enterprise endpoint
Threat detection instrumentation is simplified by providing and updating labels for computing objects in a context-sensitive manner. This may include simple...
US-9,967,263 File security management apparatus and management method for system protection
A file security management apparatus and method which protect various types of systems for executing files, entering from the outside, from malicious code, and...
US-9,967,262 Account verification based on content submission
This disclosure is directed to a platform for providing automated verification of a service provider account based on content provided in relation to the...
US-9,967,261 Method and system for secure authentication
A method and system for accessing a resource associated with a resource control entity that includes receiving, by a ledger, a request, corresponding to a user,...
US-9,967,260 Enhanced authentication security
Systems, methods, and apparatus, including computer-readable storage media storing executable instructions, for enhanced authentication security. In some...
US-9,967,259 Controlling devices by social networking
In one embodiment, a method includes analyzing information received from a first network-enabled device to identify instructions for a second network-enabled...
US-9,967,258 Device authentication within deployable computing environment
A deployable computing environment may facilitate interaction and data sharing between users and devices. Users, devices, and relationships between the users...
US-9,967,257 Software defined network (SDN) application integrity
A Software-Defined Network (SDN) authorizes Application Programming Interface (API) calls from user SDN applications to user SDN controllers. A user SDN...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.