Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,992,257 System and method for dynamic in-session altering of remote desktop windows
Examples of systems and methods are provided for the dynamic in-session altering of a remote desktop window. A client device may establish a remote session with...
US-9,992,256 Distributed computing in R
Examples disclosed herein relate to distributed computing in R. Some examples disclosed herein may include identifying a distributed multivariate apply...
US-9,992,255 Apparatuses and methods for application-specific congestion control for data communication (ACDC), and storage...
A mobile communication device including a wireless transceiver and a controller is provided. The wireless transceiver performs wireless transmission and...
US-9,992,254 Method and system of providing a web feed in a uniform resource identifier
A method and a system of providing a web feed in a uniform resource identifier (URI) are provided. The method includes obtaining, by a processing unit, a...
US-9,992,253 Non-invasive remote access to an application program
Systems and methods for providing remote access to an application program. A server remote access program may cooperate with a screen scraping application to...
US-9,992,252 Method and apparatus for adaptively compressing streaming video
The present invention is a method and apparatus for adaptively compressing and transmitting streaming video, preferably implemented in hardware as part of a...
US-9,992,251 Segment routing support in MPEG dash
According to one aspect, a method includes identifying a request for a piece of content, and obtaining a Moving Picture Expert Group (MPEG) Dynamic Adaptive...
US-9,992,250 Carriage of ISO-BMFF event boxes in an MPEG-2 transport stream
A method of media streaming implemented by a network device, the method comprising encapsulating a message box into one or more packets in a segment, and...
US-9,992,249 Live stream manifests for on demand content
Disclosed are various embodiments for requesting fragments of a media item. A latency to a media distribution service and bandwidth for a client are estimated....
US-9,992,248 Scalable event stream data processing using a messaging system
A system processes streaming data and includes at least one processor. The system may write streaming data received from a data source as messages in queues at...
US-9,992,247 Method and system for dispatching received sessions between a plurality of instances of an application using...
A logical module, referred as Load Balancer Module (LBM), is disclosed which listens to one of certain common predefined port number. These well-known ports for...
US-9,992,246 Methods, apparatus, and systems for instantly sharing video content on social media
Methods, apparatus, and systems for instantly posting images or video clips to social media websites during recording of video content are provided. A video...
US-9,992,245 Synchronization of contextual templates in a customized web conference presentation
In a method for customization of contextual information during a web conference presentation, a computer system executes a presentation program during a...
US-9,992,243 Video conference application for detecting conference presenters by search parameters of facial or voice...
In a method for customization of contextual information during a web conference presentation, a computer system executes a presentation program during a...
US-9,992,242 Systems and methods for implementing instant social image cobrowsing through the cloud
In accordance with disclosed embodiments, there are provided methods, systems, and apparatuses for implementing instant social image cobrowsing through the...
US-9,992,241 Unified communications for online collaboration
Technology is disclosed for a unified communications service (UCS) that converts an audio call to an online collaboration session where users collaborate using...
US-9,992,240 Preserving S1-AP UE contexts on SCTP failover
According to some embodiments, a method in a network node of a wireless communication network comprises determining that a plurality of S1-AP UE contexts...
US-9,992,239 Method and apparatus for an I-CSCF to assign to a user equipment a S-CSCF server in an IMS system
A method for assigning to a terminal device (UE) a service server (SS) carried out by an IS, by any of the SSs, and by the UDB in a cooperative/corresponding...
US-9,992,238 Proxy based data transfer utilizing direct memory access
A method for transferring data utilizing direct memory access. The method includes a computer processor establishing a networking connection, using a proxy,...
US-9,992,237 Determining feature unavailability
Method and apparatus for determining feature unavailability are disclosed. In the method and apparatus a user device attempts to communicate with a second...
US-9,992,236 Systems and methods for providing protocol independent disjoint port names
A system and method for providing protocol independent disjoint port names for a session level restriction enabled information handling system utilizes a...
US-9,992,235 Information processing system and user authentication method
An information processing system includes at least one information processing terminal and a first information processing apparatus. When an instruction for...
US-9,992,234 System for providing DNS-based control of individual devices
A device control system is associated with individual devices connected through a network control point to a gateway and thereby to the Internet. The gateway...
US-9,992,233 Enhanced firewall and method for securing internet communications
A system and method are described for securing a network-connected device from a hacker having access to a network to which the network-connected device is...
US-9,992,232 Policy block creation with context-sensitive policy line classification
Presented herein are techniques for creating a policy block comprised of a group of lines of rules/statements across configuration files for network devices. An...
US-9,992,231 Method and apparatus for data protection in cloud-based matching system
Enhanced security is provided for cloud based matching systems by using the principle of Independence of Irrelevant Alternatives (IIA). The client uses IIA to...
US-9,992,230 Assessing security control quality and state in an information technology infrastructure
Disclosed herein are representative embodiments of methods, apparatus, and systems for processing and managing information from one or more security control...
US-9,992,229 Programming a data network device using user defined scripts with licenses
Exemplary embodiments for programming a network device using user-defined scripts are disclosed. The systems and methods provide for a servicing node to receive...
US-9,992,227 Secure remote maintenance and support system, method, network entity and computer program product
A remote, secure maintenance and support system, method, network entity and computer program product are provided. The system can include site terminal(s)...
US-9,992,226 Enhanced thread handling in security handshaking
Disclosed herein are methods, systems, and software for handling threaded processes in security handshaking between end users and content delivery nodes are...
US-9,992,225 System and a method for identifying malware network activity using a decoy environment
A system for gathering information about malware and a method of use therefor, the system comprising a working environment including physical working...
US-9,992,224 Passenger presence indication system and method
A system to indicate the presence of one or more bystanders during wireless communications is herein presented. The system includes: a memory, controller, one...
US-9,992,223 Flow-based anti-replay checking
This disclosure describes an approach to detect replay attacks while having multiple cores in a multi-core processor manage an established tunneling session....
US-9,992,222 Systems and methods for inhibiting attacks with a network
Systems and methods for inhibiting attacks with a network are provided. In some embodiments, methods for inhibiting attacks by forwarding packets through a...
US-9,992,221 System, method, and computer program for utilizing a decoy in response to a distributed denial of service...
A system, method, and computer program product are provided that utilize a decoy in response to a distributed denial of service attack in a communication...
US-9,992,220 Graphical display of events indicating security threats in an information technology system
A disclosed computer-implemented method includes receiving and indexing the raw data. Indexing includes dividing the raw data into time stamped searchable...
US-9,992,219 Framework and methodology for supply chain lifecycle analytics
The various technologies presented herein relate to pertaining to identifying and mitigating risks and attacks on a supply chain. A computer-implemented...
US-9,992,218 Method and system for managing compliance of one or more network devices
Embodiments of the present disclosure disclose a method and a device for managing compliance of one or more network devices. The method comprises receiving one...
US-9,992,217 Methods, systems, and computer readable media for detecting malicious network traffic
Methods, systems, and computer readable media for detecting malicious network traffic are disclosed. According to one method, the method includes caching...
US-9,992,216 Identifying malicious executables by analyzing proxy logs
Identifying malicious executables by analyzing proxy logs includes, at a server having connectivity to the Internet, retrieving sets of proxy logs from a...
US-9,992,215 Network intrusion detection
A system for identifying a network intrusion includes four modules. The first module monitors network transmissions and creates a model of regular network...
US-9,992,214 Generating malware signatures based on developer fingerprints in debug information
Techniques for generating malware signatures based on developer fingerprints in debug information are disclosed. In some embodiments, a system, process, and/or...
US-9,992,213 Risk-adaptive access control of an application action based on threat detection data
Risk-adaptive access control techniques are disclosed. In various embodiments, a value for a threat level attribute is determined based at least in part on...
US-9,992,212 Technologies for handling malicious activity of a virtual network driver
Technologies for handling malicious activity of a virtual network driver include a network computing device on which a virtual machine is being executed and the...
US-9,992,211 Systems and methods for improving the classification accuracy of trustworthiness classifiers
The disclosed computer-implemented method for improving the classification accuracy of trustworthiness classifiers may include (1) identifying a set of training...
US-9,992,210 System and method for intrusion detection and suppression in a wireless server environment
A system for data communications includes a port scan detector, a decoy port system, a data packet hash manager, an encapsulated artificial intelligence system...
US-9,992,209 System and method for characterizing security entities in a computing environment
System and method to characterize a security entity in a computing environment is disclosed. Communication between a user computer and at least one destination...
US-9,992,208 Role-based application program operations on machine data in a multi-tenant environment
Embodiments are directed towards a system and method for a cloud-based front end that may abstract and enable access to the underlying cloud-hosted elements and...
US-9,992,207 Scalable authentication process selection based upon sensor inputs
Disclosed is a mobile device that selects an authentication process based upon sensor inputs and mobile device capabilities. The mobile device may include: a...
US-9,992,206 Enhanced security for electronic communications
Techniques are described for providing enhanced security for electronic communications, such as by including in a message sent between two services a digital...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.