Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,013,5907 Maintaining control over restricted data during deployment to cloud computing environments
Releases to the production environment of a cloud computing environment are deployed in a manner that maintains control over restricted data and the data plane...
US-1,013,5906 UICC SMS routing to device application
Information regarding the status of an update to a universal integrated circuit card (UICC) being performed across a mobile wireless communication network is...
US-1,013,5905 Remote user interface
Target electronic devices can be remotely controlled using a personal electronic device are disclosed. The personal electronic device can identify target...
US-1,013,5904 Network attack detection on a mobile API of a web service
Techniques to validate web service requests from applications executing on wireless communication devices are disclosed herein. In at least one implementation,...
US-1,013,5903 Game for guessing whether a name is registered or available for registration
A game is provided that may be run on a client device of a customer. The game identifies one or more registered domain names and generates one or more available...
US-1,013,5902 Exchange of content consumption-related information between networked devices
Content information networks may be provided that may each include a plurality of content consumption devices. One or more of the content consumption devices...
US-1,013,5901 Exchange of content consumption-related information between networked devices
Content information networks may be provided that may each include a plurality of content consumption devices. One or more of the content consumption devices...
US-1,013,5900 User input back channel for wireless displays
As part of a communication session, a wireless source device can transmit audio and video data to a wireless sink device, and the wireless sink device can...
US-1,013,5899 Dynamic archiving of streaming content
Content-specific archive files can be generated concurrently with the encoding of an output stream, such as for broadcast content. Tags or triggers, such as...
US-1,013,5898 Method, terminal, and system for reproducing content
A method of reproducing content is provided. The method includes, when a sync terminal reproduces content by receiving the content from a source terminal via a...
US-1,013,5897 Backfill of video stream
A data streaming system includes one or more processors, memory, and a circular buffer stored in the memory. The system includes a media loader process that...
US-1,013,5896 Systems and methods providing metadata for media streaming
Media devices streaming video from a server may use techniques to maintain presentation of content to one or more users. Described herein are systems and...
US-1,013,5895 Method and apparatus for repeatedly transmitting segment based broadcasting contents
The present invention relates to a method and an apparatus for transmitting broadcasting contents which repeatedly transmits segment based broadcasting contents...
US-1,013,5893 System and method for controlling output of a function in response to media content
Provided is a method for controlling output of a function in response to media content, the method comprising obtaining function information from another party,...
US-1,013,5892 Independent control of interactive streaming media
In one general aspect, a method can include receiving, at a server computing device, a launch request to launch and stream media content pertaining to a game...
US-1,013,5891 Seamless switching between multicast video streams
A packet-based video network including: two or more video data sources, each configured to launch video data packets onto the network as multicast data packets...
US-1,013,5890 Latency-dependent cloud input channel management
Aspects of the present disclosure relate to systems and methods for establishing an assistance output that takes into account client device latency information...
US-1,013,5889 Multiple subscriber videoconferencing system
A system, method, and device for use in videoconferencing. The method typically includes installing a videoconferencing services switch at an access point to an...
US-1,013,5888 Information processing method and device
An information processing method and device thereof are provided according to the embodiments of the disclosure. The information processing method acquires a...
US-1,013,5887 Shared multimedia annotations for group-distributed video content
Synchronized multi-media annotations for shared video content is provided. According to embodiments, viewers of video content may be enabled to create...
US-1,013,5886 Method and device for retaining robust header compression (ROHC) compressor state
A method for retaining a Robust Header Compression (ROHC) state in a User Equipment (UE) during switching from a Voice over Long Term Evolution (VoLTE) call to...
US-1,013,5885 System and method for determining trust for SIP messages
A method for performing initial registration is provided. The method includes receiving a server timeout message, the server timeout message including at least...
US-1,013,5884 Access to a computer network
A system for mediating access to a computer network comprises the steps of identifying a user who wishes to access the computer network, obtaining quality of...
US-1,013,5883 Method and system for over-the-top voice for internet of things devices
A method, a device, and a non-transitory storage medium are provided to receive, from an end device, a registration message pertaining to a voice service that...
US-1,013,5882 Multiple-master DNS system
In some particular embodiments, DNS servers are operated to maintain consistency of DNS records between the multiple master servers in response to certain types...
US-1,013,5881 Virtual private meeting room
A conference session is established. Different unique identifications and persistent dedicated virtual private network conference rooms are assigned to...
US-1,013,5880 Controlling telephone call processing using global signaling codes
In general, embodiments of the present invention involve attaching (e.g., pre-fixing) a Global Signaling Code (GSC) to a called party's telephone number thereby...
US-1,013,5878 Method for accessing a digital network by way of one or more Internet service providers
Described herein is a method for accessing a digital network. For example, the method may include receiving a message from a network access device at a first...
US-1,013,5877 Enforcing usage policies on combinations of collected data to be disseminated to destination systems
This disclosure relates to enforcing restrictions on data collected from a first set of systems and disseminated to a second set of systems. For example,...
US-1,013,5876 Security compliance framework usage
A method and system for improving usage of a security compliance framework is provided. The method includes authenticating a user for: access to the security...
US-1,013,5875 Networking flow logs for multi-tenant environments
Computing resource service providers may provide computing resources to customers in a multi-tenant environment. These computing resources may be behind a...
US-1,013,5874 Compliance management system and method for an integrated computing system
A integrated computing system compliance management system includes a computer-based system to obtain an integrated computing system object instance of an...
US-1,013,5873 Data sharing method and apparatus, and terminal
The present invention provides a data sharing method and apparatus, and a terminal. The method includes: acquiring shared data, where the shared data is data...
US-1,013,5872 System and method for context aware mobile policies
A system and method for network policy enforcement for portable data devices such as smartphones, tablets or notebook computers uses the portable device to...
US-1,013,5871 Service oriented software-defined security framework
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for service oriented software-defined security framework are...
US-1,013,5870 System for external validation of secure process transactions
A closed-loop system is operatively connected with a block chain distributed network for using the block chain distributed network for facilitating operation of...
US-1,013,5869 Information processing system, information processing apparatus, and method for controlling information...
An information processing system includes a first information processing apparatus for setting a security policy, and a second information processing apparatus...
US-1,013,5868 Defeating wireless signal interference hacks by manipulating signal strength
A method for defeating wireless signal interference hacks is described. The method may include monitoring operations associated with user input of a user into...
US-1,013,5867 Dynamically updated computing environments for detecting and capturing unauthorized computer activities
Disclosed is a computerized system for dynamically updating a honeypot computer environment. The system typically includes a processor, a memory, and a honeypot...
US-1,013,5866 Method of preventing drive-by hacking, and apparatus and system therefor
The present disclosure relates to a method of preventing drive-by hacking, and an apparatus and a system therefor. A method of preventing drive-by hacking in a...
US-1,013,5865 Identifying a potential DDOS attack using statistical analysis
Embodiments can identify requests that may be tied to a DDOS attack. For example, the primary identifiers (e.g., a source address) of requests for a network...
US-1,013,5864 Latency-based policy activation
Techniques for latency-based policy activation are disclosed. In some embodiments, a system for latency-based policy activation includes collecting a plurality...
US-1,013,5863 Malicious software detection in a computing system
A computer system identifies malicious Uniform Resource Locator (URL) data items from a plurality of unscreened data items that have not been previously...
US-1,013,5862 Testing security incident response through automated injection of known indicators of compromise
Disclosed are various embodiments for testing the security incident response of an organization through automated injection of a known indicator of compromise....
US-1,013,5861 Mitigation of anti-sandbox malware techniques
Static analysis is applied to unrecognized software objects in order to identify and address potential anti-sandboxing techniques. Where static analysis...
US-1,013,5860 Security aware email server
A security aware email server and a method of managing incoming email are described. The server includes a memory device configured to store rules, ...
US-1,013,5859 Automated security enclave generation
Creating security enclaves includes determining one or more parameters of one or more applications and one or more services operating in the network. An optimal...
US-1,013,5858 Method and apparatus for protecting consumers and resources in a communication network
Aspects of the subject disclosure may include, for example, a method including comparing call volume of call sessions associated with a wireless network node of...
US-1,013,5857 Structuring data and pre-compiled exception list engines and internet protocol threat prevention
Blocking high-risk IP connections in real-time while allowing tailoring of an acceptable risk profile to match the security requirements of network resources....
US-1,013,5856 Auto-tuning program analysis tools using machine learning
Machine learning (ML) significantly reduces false alarms generated by an automated analysis tool performing static security analysis. Using either user-supplied...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.