Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,026,4049 System for facilitating utilization of resources
A system for monitoring resource utilization and electronic validation includes an entity system having a network communication interface and a memory device...
US-1,026,4048 Graph framework using heterogeneous social networks
In an example embodiment, a supervised machine learning algorithm is used to train a communication reply score model based on an extracted first set of features...
US-1,026,4047 Dynamic codec negotiation
A method, a device, and a non-transitory storage medium having instructions to store data that provides mappings between criteria information and lists of...
US-1,026,4046 Transition points in an image sequence
Techniques are proposed for embedding transition points in media content. A transition point system retrieves a time marker associated with a point of interest...
US-1,026,4045 Method and server for searching for data stream dividing point based on server
Embodiments of the present invention provide a method for searching for a data stream dividing point based on a server. In the embodiments of the present...
US-1,026,4044 Apparatus and method for sending content as chunks of data to a user device via a network
An apparatus, method and computer-readable medium are provided for sending content from a source to a user device. The content is obtained from the source by an...
US-1,026,4043 Outage notification with client control modification in an ABR streaming network
A scheme for modulating an adaptive bitrate (ABR) streaming client engaged in a current ABR streaming session. In one implementation, a determination is made...
US-1,026,4042 Manifest file configuration based on manifest request characteristics
Techniques for serving a manifest file of an adaptive streaming video include receiving a request for the manifest file from a user device. The video is encoded...
US-1,026,4041 Video delivery expedition systems, media, and methods
The VIDEO DELIVERY EXPEDITION APPARATUSES, METHODS AND SYSTEMS ("VDE") transform Internet content data access request via VDE components into media content...
US-1,026,4040 Systems and methods to manage multicast traffic
In various example embodiments, a system and method for optimizing management of a multicast tree are disclosed. The system receives first multicast group...
US-1,026,4039 Streaming content and placeholders
Aspects of the subject matter described herein relate to file system placeholders. In aspects, placeholders may be used by a client to represent remote file...
US-1,026,4038 Discovery and management of synchronous audio or video streaming service to multiple sinks in wireless display...
Methods, systems, and devices are described for service discovery and session establishment framework to enable a synchronous audio/video streaming service from...
US-1,026,4037 Classroom messaging
In one example, a presentation control device may allow a presenter, such as a teacher, to control interactions between audience members and the presenter. The...
US-1,026,4036 Communication-based digital alliance management
A communication management server computer ("server") and related methods are disclosed to create and store digital records representing alliances between user...
US-1,026,4035 Method and apparatus for architecting multimedia conferencing services using SDN
A multimedia conferencing service uses accessible-forwarding-plane network elements such as OpenFlow.RTM. controllers and OpenFlow.RTM.-enabled switches. A...
US-1,026,4034 Interactions for sharing content items in a digital magazine
A digital magazine server user may identify a content item presented by the digital magazine server to save or present to other digital magazine server users by...
US-1,026,4033 Selectively providing content on a social networking system
News feed stories are ranked so that new stories appear above previously viewed stories for users of a social networking system. Top news stories are selected...
US-1,026,4032 Method and system for enabling a communication device to remotely execute an application
A communication system capable of enabling one or more communication devices to remotely execute one or more applications includes one or more communication...
US-1,026,4031 Methods and systems for virtual conference system using personal communication devices
A method for managing jitter includes determining, by a processor of a master device, at least one of device capabilities of at least one satellite device,...
US-1,026,4030 Networked microphone device control
Systems and methods disclosed herein include, while a microphone of a first networked microphone device is enabled, determining whether a first reference device...
US-1,026,4029 Methods and apparatus for packetized content delivery over a content delivery network
Methods and apparatus for delivery of packetized content (e.g., video, audio, data, etc.) over a content delivery network. In one embodiment, the content is...
US-1,026,4028 Central emulator device and method for distributed emulation
Embodiments of a central emulator, distributed emulator and method for emulation of a system are generally described herein. The central emulator may receive...
US-1,026,4027 Computer-implemented process and system employing outlier score detection for identifying and detecting...
Methods and apparatuses employing outlier score detection method and apparatus for identifying and detecting threats to an enterprise or e-commerce system are...
US-1,026,4026 Providing privileged access to non-privileged accounts
The disclosed embodiments include systems and methods for dynamically managing privileged access for non-privileged accounts. Operations may include receiving a...
US-1,026,4025 Security policy generation for virtualization, bare-metal server, and cloud computing environments
Methods, systems, and media for security in virtualization, bare-metal server, and cloud computing environments are provided herein. Exemplary methods include:...
US-1,026,4024 Wireless peripheral administration
Aspects of the subject technology relate to administration of wireless peripheral devices. A computer-implemented method includes connecting to a peripheral...
US-1,026,4023 Methods and apparatuses for managing subscriptions on a security element
A method is provided for managing a plurality of subscriptions on a security element of a mobile end device for logging into a respective mobile radio network,...
US-1,026,4022 Information technology governance and controls methods and apparatuses
Embodiments of the present invention provide methods and systems for automated change audit of an enterprise's IT infrastructure, including independent...
US-1,026,4021 Method and apparatus for distributing firewall rules
Some embodiments of the invention provide a novel method for specifying firewall rules. In some embodiments, the method provides the ability to specify for a...
US-1,026,4020 Systems and methods for scalable network monitoring in virtual data centers
A computer-implemented method for scalable network monitoring in virtual data centers may include (1) identifying a plurality of network monitoring agents...
US-1,026,4019 Logging encrypted data communications for QoE analysis
A device such as a smartphone may communicate with a server or other network entity using encrypted communications, making it difficult to examine such...
US-1,026,4018 Systems and methods for artificial model building techniques
Embodiments disclosed describe a security awareness system may adaptively learn the best design of a simulated phishing campaign to get a user to perform the...
US-1,026,4017 Systems and methods of identifying suspicious hostnames
A method includes receiving a set of strings and applying one or more filters to generate a subset of strings that are determined to correspond to strings of...
US-1,026,4016 Methods, systems and application programmable interface for verifying the security level of universal resource...
The present disclosure discloses a method of allowing Web View to verify the security level of a web content and inform the user with regards to the security...
US-1,026,4015 Real-time asynchronous event aggregation systems
A real-time asynchronous event aggregation system, method, and network device are configured to capture real-time asynchronous events, and to pass them as input...
US-1,026,4014 Systems and user interfaces for dynamic and interactive investigation based on automatic clustering of related...
In various embodiments, systems, methods, and techniques are disclosed for generating a collection of clusters of related data from a seed. Seeds may be...
US-1,026,4013 Preventing a memory attack to a wireless access point
Systems, methods, and machine-readable and executable instructions are provided for preventing a memory attack to a wireless access point (AP). Preventing a...
US-1,026,4012 User behavior profile
A method, system and computer-usable medium are disclosed for generating a cyber behavior profile comprising monitoring user interactions between a user and an...
US-1,026,4011 Persistent cross-site scripting vulnerability detection
Various techniques for detecting a persistent cross-site scripting vulnerability are described herein. In one example, a method includes detecting, via the...
US-1,026,4010 Method and apparatus for testing a security of communication of a device under test
A test apparatus (1) for testing a security of communication of a device under test, DUT, (4), wherein the test apparatus (1) comprises an RF unit (2) having an...
US-1,026,4009 Automated machine learning scheme for software exploit prediction
A predictive engine for analyzing existing vulnerability information to determine the likelihood of a vulnerability being exploited by malicious actors against...
US-1,026,4008 Vulnerability exposing application characteristic variation identification engine
Embodiments of the invention are directed to a system, method, or computer program product for an engine for exposing vulnerability within applications based on...
US-1,026,4007 Malware beaconing detection methods
A method for detecting malware beaconing in a network, the method includes capturing network traffic over a network connection at a network connected device,...
US-1,026,4006 Cloud service usage risk analysis based on user location
A system and method for filtering detected anomalies in cloud service usage activities associated with an enterprise uses a trusted location analysis to filter...
US-1,026,4005 Identifying malicious network traffic based on collaborative sampling
Identifying malicious network traffic based on distributed, collaborative sampling includes, at a computing device having connectivity to a network, obtaining a...
US-1,026,4004 System and method for connection fingerprint generation and stepping-stone traceback based on netflow
The method for tracking a cyber hacking is provided. The method of connection fingerprint generation and stepping-stone traceback based on NetFlow includes...
US-1,026,4003 Adaptive network monitoring with tuneable elastic granularity
Embodiments are directed to monitoring network traffic using network computers. Monitoring triggers associated with one or more conditions and one or more...
US-1,026,4002 Program, information processing device, and information processing method
The present invention provides a program, an information processing apparatus, and an information processing method which can effectively prevent malware...
US-1,026,4001 Method and system for network resource attack detection using a client identifier
Methods, systems, and techniques for network resource attack detection using a client identifier. A server receives from a device the client identifier and user...
US-1,026,4000 Malicious website access method and apparatus
A malicious website access method and apparatus are provided. The method includes: determining whether a website is a malicious website; and acquiring a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.