Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,002,1160 Sink device and method for controlling the same
Disclosed are a method of controlling a source device in a sink device and apparatus therefor. The present invention includes the steps of outputting the video...
US-1,002,1159 Method of stabilized adaptive video streaming for high dynamic range (HDR)
An adaptive video streaming stabilization system includes a computer network comprising a data source; a video player; and a session controller connected...
US-1,002,1158 Converting data stream in user equipment
Described embodiments provide user equipment for converting a first type data stream to a second type data stream. The user equipment may include a request...
US-1,002,1157 Method and apparatus for an interchangeable wireless media streaming device
It is possible to capture video information using one or more body mounted cameras, to transmit that information over a wireless communication channel, and to...
US-1,002,1156 Method and an electronic device for performing playback and sharing of streamed media
Described herein are methods and electronic devices for performing playback of streamed media, including uploading an associated second media content item while...
US-1,002,1155 Method and system for content distribution
A centralized distribution server includes a converter for embedding content data into a digital delivery stream and a transmitter for transmitting the stream...
US-1,002,1154 Electronic devices for capturing media content and transmitting the media content to a network accessible media...
A client device is operated by obtaining a list of contacts, wherein the list of contacts includes contact information of authorized users, recording media...
US-1,002,1153 Determination of a user context and sending of a third party proposition
A method comprising identifying a user account associated with a user, the user account referencing at least one third party user account associated with the...
US-1,002,1152 Sharing location information for locations accessed during a conference
Concepts and technologies are disclosed herein for providing a location sharing service. A server computer executing a location sharing service can identify a...
US-1,002,1151 Sharing social network information
Social network information may be shared across online service providers. Thus, one online service provider M that maintains a membership separate from a second...
US-1,002,1150 Systems and methods of establishing and measuring trust relationships in a community of online users
Systems and methods for establishing and measuring trust relationships in a community of online users. In the systems and methods, indications of the...
US-1,002,1149 System and method for augmented and virtual reality
One embodiment is directed to a system for enabling two or more users to interact within a virtual world comprising virtual world data, comprising a computer...
US-1,002,1148 Selective copying of track data through peer-to-peer remote copy
In one embodiment, a computer-implemented method includes: receiving a request to establish a Peer-to-Peer Remote Copy (PPRC) relationship between a primary...
US-1,002,1147 Communication control device and method of controlling communication control device for determining whether...
A communication control device and method that determine whether non-standard communication with a plurality of communications devices via a network is...
US-1,002,1146 Asynchronous event-driven messaging framework for a remote video assistance system
The present invention provides an over-the-top intermediary application for delivering video assistance services. The invention brokers and coordinates all...
US-1,002,1145 Home appliance
A communication apparatus is disclosed. A home appliance includes a driving unit to drive a component of the home appliance, a controller configured to control...
US-1,002,1144 Techniques for establishing a trusted cloud service
Techniques for establishing a trusted cloud service are provided. Packages are created for services that include certificates, configuration information, trust...
US-1,002,1143 Method and apparatus for multi-tenancy secrets management in multiple data security jurisdiction zones
A service provider computing environment includes a service provider computing device, which receives tenant secrets policies from tenants. The tenants are...
US-1,002,1142 Method and apparatus for providing privacy management in machine-to-machine communications
A method, non-transitory computer readable medium and apparatus for processing a request from a server of a machine-to-machine service provider are provided....
US-1,002,1141 Managing network resource access using session context
A computing device providing a network service to a service area may receive a connection request from a user device and generate a session start request to...
US-1,002,1140 Advanced asset tracking and correlation
A security management system may be remotely deployed (e.g., using a cloud-based architecture) to add security to an enterprise network. For example, the...
US-1,002,1139 Method, system and computer program product for enforcing access controls to features and subfeatures on...
Embodiments disclosed herein provide feature-level access control functionality useful for enforcing access controls to features and subfeatures on...
US-1,002,1138 Policy/rule engine, multi-compliance framework and risk remediation
Techniques are provided that for providing complete solutions for role-based, rules-driven access enforcement, the techniques including active policy...
US-1,002,1137 Real-time mobile security posture
In an example, a system and method for real-time mobile security posture updates is provided. A mobile device management (MDM) agent may run on the mobile...
US-1,002,1136 Cyber attack disruption through multiple detonations of received payloads
Apparatus and method for disrupting cyber attacks. In accordance with some embodiments, the apparatus includes a network accessible device having a processor...
US-1,002,1135 Inducing data loss in Zigbee networks via join/association handshake spoofing
Methods, systems, and devices for instituting a new type of attack on Zigbee networks are provided. Targeting the data-collection aspect of Zigbee's use cases,...
US-1,002,1134 Methods and systems for phishing detection
A method of determining a probability that a received email comprises a phishing attempt may comprise analyzing a link therein to determine whether the link...
US-1,002,1133 System and method for anti-phishing system
A system and method for detecting a phishing site is disclosed. A message from a client to the site is intercepted by a security gateway. The security gateway...
US-1,002,1132 Limiting the efficacy of a denial of service attack by increasing client resource demands
A device may detect an attack. The device may receive, from a client device, a request for a resource. The device may determine, based on detecting the attack,...
US-1,002,1131 Origin controlled attack protections in a distributed platform
Some embodiments provide an origin whose content is distributed by a third party content distributor control over invoking attack protections from the third...
US-1,002,1130 Network state information correlation to detect anomalous conditions
State information relating to the operation of network devices is used to identify network issues and/or anomalies relating to the operation of the network. The...
US-1,002,1129 Systems and methods for malware detection and scanning
Systems and methods are provided for malware scanning and detection in a computing system. In one exemplary embodiment, the method includes launching, in a...
US-1,002,1128 Systems and methods for malware nullification
Generally discussed herein are systems, devices, and methods for malware nullification. A system can include a detect module to identify a file type of an...
US-1,002,1127 Threat indicator analytics system
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for analyzing threat intelligence information. One of the...
US-1,002,1126 Systems and methods for creating and running heterogeneous phishing attack campaigns
A method for creating a plurality of campaigns for simulated phishing attacks includes creating, by a campaign manager, a plurality of campaigns for simulated...
US-1,002,1125 Infrastructure monitoring tool for collecting industrial process control and automation system risk data
This disclosure provides an infrastructure monitoring tool, and related systems and methods, for collecting industrial process control and automation system...
US-1,002,1124 Computer program product and apparatus for multi-path remediation
A system, method, and computer program product are provided for a database associating a plurality of device vulnerabilities to which computing devices can be...
US-1,002,1123 Customized network traffic models to detect application anomalies
Systems, methods, and devices of the various aspects enable identification of anomalous application behavior. A computing device processor may detect network...
US-1,002,1122 Method and an apparatus to perform multiple packet payloads analysis
A method and an apparatus to perform multiple packet payload analysis have been disclosed. In one embodiment, the method includes receiving a plurality of data...
US-1,002,1121 Notification for reassembly-free file scanning
Techniques for notification of reassembly-free file scanning are described herein. According to one embodiment, a first request for accessing a document...
US-1,002,1120 Delayed replication for protection of replicated databases
Apparatuses and methods are disclosed for protection of data servers configured for data replication of a database. As an example, one apparatus includes at...
US-1,002,1119 Apparatus and method for automatic handling of cyber-security risk events
This disclosure provides an apparatus and method for automatic handling of cyber-security risk events and other risk events. A method includes detecting, by a...
US-1,002,1118 Predicting account takeover tsunami using dump quakes
Methods, systems, and computer program products for predicting an account takeover tsunami using dump quakes are disclosed. A computer-implemented method may...
US-1,002,1117 Systems and apparatus for analyzing secure network electronic communication and endpoints
The present invention provides for analyzing secured network traffic to determine which devices and/or applications are accessed by authorized, and in some...
US-1,002,1116 Network segmentation
A method and system for segmenting a network including a plurality of hosts is disclosed. In an example embodiment, the network is a provider network. The...
US-1,002,1115 Integrated security system having rule optimization
Techniques are described for optimizing the placement of automatically generated rules within security policies. An administrator may, for example, interact...
US-1,002,1114 Determining the legitimacy of messages using a message verification process
A server computer receives an indication of an interaction between a first user device of a first user and a second user device of a second user, where the...
US-1,002,1113 System and method for an integrity focused authentication service
Systems and methods for authentication. At an authentication service, key synchronization information is stored for an enrolled authentication device for a user...
US-1,002,1112 System, method and computer program product for performing one or more maintenance tasks on a remotely located...
A method and computer executable program code are disclosed for performing one or more maintenance tasks on a remotely located computer connected to a server...
US-1,002,1111 Location based authentication of users to a virtual machine in a computer system
An apparatus and method uses location based authentication of a user accessing a virtual machine (VM) by using the physical location of the virtual machine as a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.