Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,973,559 Systems and methods for presenting content streams to a client device
Systems and methods for presenting content streams to a client device are provided. In some aspects, a method includes providing an indicator of a plurality of...
US-9,973,558 Distributed streaming platform for real-time applications
Software for a distributed streaming platform receives a specification for a streaming application and converts the specification into a logical plan that...
US-9,973,557 Media acceleration for virtual computing services
Streaming media is problematic for thin clients using remoting protocols like RDP that were never designed to handle the volume of data associated with...
US-9,973,556 Distributing communication of a data stream among multiple devices
Methods, apparatus and articles of manufacture for distributing communication of a data stream among multiple devices are disclosed. Example methods disclosed...
US-9,973,555 Apparatus and method for transmitting and receiving streaming data using multiple paths
The present invention relates to an apparatus and method for transmitting/receiving streaming data using multiple paths, in which the streaming data is smoothly...
US-9,973,554 Interactive broadcasting between devices
Methods and systems for providing and utilizing interactive broadcasting are provided. First content of a first file and state information associated with a...
US-9,973,553 Meeting support apparatus, method for executing meeting support process, and non-transitory computer-readable...
A method includes reporting area information identifying a predetermined area to the predetermined area, transmitting an application when terminal ...
US-9,973,552 Systems and methods for organizational collaboration
A peer collaboration method comprising: receiving commands from certain users to create project correspondence environment (PCE) objects each containing PCE...
US-9,973,551 System, method, and logic for managing content in a virtual meeting
An example method is provided and includes detecting, during a virtual meeting session, a plurality of events associated with each of a plurality of endpoints...
US-9,973,550 Systems and methods for applying intelligence and prioritization to calendared events
Methods and systems are provided for displaying calendared events on a mobile computing device. The method includes: receiving, by the mobile computing device,...
US-9,973,549 Method and apparatus for communicating between communication devices
Aspects of the subject disclosure may include, for example, receiving from a web real-time communications gateway a first request for communication services...
US-9,973,548 Notifying response sender of malformed session initiation protocol (SIP) response messages
A method, computer program product, and computer system for notifying a response sender of a malformed SIP response message. The method includes, producing a...
US-9,973,547 Method and systems for adaptively managing hypertext transfer protocol sessions in a content delivery network
A system (100) includes an interface portal (116) to receive (401), at a resource locator (402) pointing to media content (101), a request (117) for the media...
US-9,973,546 Dialing approach and implementations therefor
A connection procedure for communications devices is implemented in a variety of embodiments. In one such embodiment, the procedure uses a first set of...
US-9,973,545 Method and device for managing circuit switched data calls
Aspects of the subject disclosure may include, for example, generating a tone during first communications with another communication device, providing the tone...
US-9,973,544 Method and apparatus for enhancing inter-carrier communications
Aspects of the subject disclosure may include, for example, a method including receiving, at a first carrier, a first query for a record of a called number...
US-9,973,543 Seamless switching between computing devices during an online meeting
Methods and systems for switching between computing devices during an online meeting are described herein. A collaboration server may receive a token from a...
US-9,973,542 Method and apparatus for facilitating establishing and maintaining communication services
Aspects of the subject disclosure may include, for example, providing radio access information to a first server of an IP multimedia subsystem network to cause...
US-9,973,541 Lawful interception in an IP multimedia subsystem network
A method and apparatus for providing lawful interception in an IMS network. A first node in an IMS network receives a message from a Lawful Intercept mediation...
US-9,973,540 System and method for building intelligent and distributed L2-L7 unified threat management infrastructure for...
A security gateway appliance is configured to evaluate network traffic according to security rules that classify traffic flows according to specifically...
US-9,973,539 Enforcing runtime policies in a networked computing environment
Embodiments of the present invention provide approaches for enforcing runtime policies in a networked computing environment (e.g., a cloud computing...
US-9,973,538 Architecture of transparent network security for application containers
A system comprises one or more application containers, each application container including computer-readable instructions and initiated via a container service...
US-9,973,537 Method and system for updating security information
A method for updating security information is applied to a system including an information service provider and mobile devices. The information service provider...
US-9,973,536 Directing audited data traffic to specific repositories
Data traffic is monitored on a network and data access elements thereof are collected. The collected data access elements are compared to security rules. A...
US-9,973,535 Network security systems and methods
This disclosure relates to systems and methods for managing connected devices and associated network connections. In certain embodiments, trust, privacy,...
US-9,973,533 Enforcing application and access control policies in an information management system with two or more...
A method and apparatus for controlling document access and application usage using centrally managed rules. The rules are stored and manipulated in a central...
US-9,973,532 Secure control of insecure device
A computer system for securely controlling an insecure computer is provided. The system comprises an insecure computer, a secure computer and a unidirectional...
US-9,973,531 Shellcode detection
According to one embodiment, a threat detection system is integrated with at least a dynamic analysis engine. The dynamic analysis engine is configured to...
US-9,973,530 Method for providing a connection between a communications service provider and an internet protocol, IP,...
A method of providing at least one communications service provider a connection to an Internet Protocol, IP, server in a perimeter network, the IP server...
US-9,973,529 Communications methods, systems and apparatus for protecting against denial of service attacks
The present invention relates to methods, systems and apparatus for mitigating denial of service attacks. One exemplary embodiment in accordance with the...
US-9,973,528 Two-stage hash based logic for application layer distributed denial of service (DDoS) attack attribution
Methods and systems for a two-stage attribution of application layer DDoS attack are provided. In a first table just a hash index is maintained whereas the...
US-9,973,527 Context-aware proactive threat management system
This disclosure is directed to a context-aware proactive threat management system. In general, a device may use internal activity data along with data about...
US-9,973,526 Mobile device sensor data
A system, method, and computer-readable medium for reporting sensor data over a communication network are provided. A data reporting instruction that identifies...
US-9,973,525 Systems and methods for determining the risk of information leaks from cloud-based services
The disclosed computer-implemented method for determining the risk of information leaks from cloud-based services may include (1) identifying a cloud-based...
US-9,973,524 Information technology security assessment system
A method and system for creating a composite security rating from security characterization data of a third party computer system. The security characterization...
US-9,973,523 Cognitive information security using a behavioral recognition system
Embodiments presented herein describe a method for processing streams of data of one or more networked computer systems. According to one embodiment of the...
US-9,973,522 Identifying network security risks
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for identifying network security risks. One of the methods...
US-9,973,521 System and method for field extraction of data contained within a log stream
Embodiments of the present invention disclose populating a database by conducting a training phase to analyze training security log streams. A server extracts...
US-9,973,520 Explaining causes of network anomalies
In an embodiment, the method comprises receiving network performance data for a computer network; receiving, from an intrusion detection system, network anomaly...
US-9,973,519 Protecting a server computer by detecting the identity of a browser on a client computer
A computer-implemented method for identifying abnormal computer behavior includes receiving, at a computer server subsystem, data that characterizes subsets of...
US-9,973,518 Apparatus and method for checking message and user terminal
A message checking apparatus comprising one or more processors, the message checking apparatus includes: a uniform resource locator(URL) extracting unit to...
US-9,973,517 Computing device to detect malware
Disclosed is an apparatus and method for a computing device to determine if an application is malware. The computing device may include: a query logger to log...
US-9,973,516 Traffic shape obfuscation when using an encrypted network connection
According to one exemplary embodiment, a method for obfuscating a traffic pattern associated with a plurality of network traffic within a tunnel connection is...
US-9,973,515 Network security for avionics with ethernet connections system and related method
A system and method is disclosed for identification and response to an unauthorized transmission to a networked critical system. The invention employs a...
US-9,973,514 Method and apparatus for assuring location data integrity with minimum location disclosure
An invention relates to method and apparatus of a location assurance system and particularly, although not exclusively, the present invention also relates to...
US-9,973,513 Method and apparatus for communication number update
A communication number updating method is provided. The method includes obtaining an old communication number and a new communication number used by a same user...
US-9,973,512 Determining variable wait time in an asynchronous call-back system based on calculated average sub-queue wait time
A method includes a workload management (WLM) server that receives a first CHECK WORKLOAD command for a workload in a queue of the WLM server. It may be...
US-9,973,511 Method and system for enabling access of a client device to a remote desktop
A computer implemented method, computer program product, and systems for enabling access of a client device to a remote desktop. The remote desktop is...
US-9,973,510 Contextual device locking/unlocking
Particular embodiments disclose a first device associated with a user that may receive an indication that a second device of a second user of the online system...
US-9,973,509 Provisioning system-level permissions using attribute-based access control policies
A permissions provisioning module includes a data adapter and a permissions calculator associated with a policy evaluator operable to evaluate an ABAC policy....
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.