Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,027,7657 Virtual browsing method using application and operation server
A web browsing method using an operation server is provided. The web browsing method makes it possible to view contents without installing a dedicated...
US-1,027,7655 Scheduling method and device for protocol stack in remote presentation system
Disclosed are a method and device for scheduling a protocol stack in a telepresence system. The scheduling method includes: a telepresence endpoint acquiring a...
US-1,027,7654 Sharing a streaming video
A video segment can be shared over a computer network by first receiving the video segment at a receiving computer on the network. The receiving computer...
US-1,027,7653 Failure detection manager
A network device is configured to receive information regarding a group of content streams and determine a buffer size for each of the content streams. The...
US-1,027,7652 Transmission apparatus, transmission method, and program
A transmission apparatus includes an acquisition unit configured to acquire a list indicating segment data that is acquirable by a receiving apparatus from...
US-1,027,7651 Session control for media stream transmission
Systems and methods of controlling transmissions of a media stream are provided. In one exemplary embodiment, a method performed by a media client for...
US-1,027,7650 Parallel execution of request tracking and resource delivery
Systems and methods of parallel uniform resource identifier resource extraction are provided. A tracking uniform resource identifier (URI) generation component...
US-1,027,7649 Presentation of computing environment on multiple devices
A user may interact with a collection of devices that each exhibit particular device properties. Where each device executes and presents an isolated computing...
US-1,027,7648 Systems and methods for playing adaptive bitrate streaming content by multicast
Systems and methods for playing adaptive bitrate streaming content by multicast in accordance with embodiments of the invention are disclosed. In one...
US-1,027,7647 Allocating capacity of a network connection to data streams based on type
A user of a communication network may have specific requirements for its critical data streams. The user may require dedicated channel capacity for its critical...
US-1,027,7646 Generating an automated multimedia feed based on virtual IT infrastructure users needs/interest
Techniques for generating multimedia feed based on virtual IT infrastructure user's needs in a virtual datacenter are described. In one example embodiment, a...
US-1,027,7645 Suggestion and background modes for real-time collaborative intelligence systems
Systems and methods for real-time collaborative computing and collective intelligence are disclosed. A collaborative application runs on a collaborative server...
US-1,027,7644 Transmission system, transmission terminal, method, and program
A transmission system is provided. The transmission system includes a first transmission terminal and a second transmission terminal. The second transmission...
US-1,027,7643 Server and method of providing collaboration services and user terminal for receiving collaboration services
A server, method and apparatus for providing collaboration services are provided. The server includes a memory configured to store computer executable...
US-1,027,7642 Composer interface for providing content to a social network
A composer interface provided by a social networking system allows a user to provide input, such as text data, to the social networking system. The composer...
US-1,027,7641 Proximity session mobility extension
A system and method for seamless exchange and interaction of multimedia content between communication devices are disclosed. The method can include the...
US-1,027,7640 System and method for third party monitoring of voice and video calls
A system is described herein that facilitates the monitoring of inmate communications. The system provides a remotely-accessible means for a reviewer to monitor...
US-1,027,7639 Managing digitally-streamed audio conference sessions
Methods, apparatus and systems are disclosed for managing digitally-streamed audio communication sessions between user devices (7a, 7b, 7c). The user devices...
US-1,027,7638 Providing bonded services at a non-anchor node
The disclosure relates generally to supporting bonded services at non-anchor nodes. A non-anchor gateway device is configured to support service bonding for a...
US-1,027,7637 Methods, systems, and computer readable media for clearing diameter session information
The subject matter described herein includes methods, systems, and computer readable media for clearing Diameter session information. According to one method,...
US-1,027,7636 FPGA offload module and processes for seamless frame-level switching of media streams in real-time
A combined hardware and software solution for real-time seamless switching of media streams using standard Ethernet switches and compliant end-points is...
US-1,027,7635 Control of accesses for IMS services
A method for operating a UE is provided. The method comprises retrieving, by the UE, an IMS transport policy comprising a set of service transport rules. The...
US-1,027,7634 System and method for provisioning and registration
A system and method are presented for provisioning and registration of a device. A device in an environment, such as a contact center or enterprise setting, may...
US-1,027,7633 Policy enforcement system
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for storing, by a policy enforcement system, a plurality of...
US-1,027,7632 Automated access, key, certificate, and credential management
Certain embodiments provide means for managing automated access to computers, e.g., using SSH user keys and other kinds of trust relationships. Certain...
US-1,027,7631 Self-preserving policy engine and policy-based content transmission
Systems and methods herein discuss a policy engine stored on a mobile device that intercepts content requests to a content provider. The policy engine is...
US-1,027,7630 MobileNet
A system, method, and apparatus for establishing communications with a secure network using a non-secure mobile device operating in a non-secure network are...
US-1,027,7629 Systems and methods for creating a deception computing system
A computer-implemented method for creating a deception computing system may include (i) identifying, by a computing device, a dataset of security alert...
US-1,027,7628 Detecting phishing attempts
Classifying electronic communications is disclosed. An electronic communication is received. A first likelihood that a potential recipient of the electronic...
US-1,027,7627 Telephone service delay and connection system
A denial of service (DoS) detection and circumvention system is described herein. The DoS detection and circumvention system can track phone calls that are...
US-1,027,7626 Systems and methods for suppressing denial of service attacks
Techniques for network traffic filtering and flow control are disclosed. Some implementations provide a network communication evaluation module ("NCEM") that...
US-1,027,7625 Systems and methods for securing computing systems on private networks
The disclosed computer-implemented method for securing computing systems on private networks may include (i) identifying a set of computing systems that are...
US-1,027,7624 Systems and methods for reducing infection risk of computing systems
The disclosed computer-implemented method for reducing infection risk of computing systems may include (i) determining a distance between a computing system...
US-1,027,7623 Method of detection of comptromised accounts
Processes and systems described herein enable a computing device to detect compromised accounts. The computing device may obtain a user credential including a...
US-1,027,7622 Enterprise level cybersecurity automatic remediation
Automatic detection and remediation of cybersecurity threats to an information technology installation is disclosed. An information technology installation...
US-1,027,7621 Systems and methods for detecting vulnerabilities on servers
The disclosed computer-implemented method for detecting vulnerabilities on servers may include (i) sending requests to servers for information about services...
US-1,027,7620 Determining an assessment of a security breach for an asset of a network infrastructure
An identification of an asset that is associated with a network infrastructure may be received. Additional assets of the network infrastructure that are...
US-1,027,7619 System and methods of identifying system vulnerabilities
The invention relates to detecting vulnerabilities in technology infrastructure environments. Data describing vulnerabilities detected in a technological...
US-1,027,7618 Privilege inference and monitoring based on network behavior
Embodiments are directed to monitoring network traffic. A monitoring engine may monitor network traffic associated with entities in one or more networks. A...
US-1,027,7617 Method and device for feature extraction
Provided are a method and device for feature extraction. The method comprises: acquiring a batch of black sample files and white sample files from an...
US-1,027,7616 Secure digital traffic analysis
A network monitoring "sensor" is built on initial startup by checking the integrity of the bootstrap system and, if it passes, downloading information from...
US-1,027,7615 Maintenance of distributed computing systems
Systems, methods, and non-transitory computer readable media providing build and deploy a known file and identify unknown files found on the system. The method...
US-1,027,7614 Information processing apparatus, method for determining activity and computer-readable medium
An information processing apparatus is provided with: a comparison unit that compares a communication by a terminal connected to a network with a pattern held...
US-1,027,7613 URL matching apparatus, URL matching method, and URL matching program
A URL matching apparatus generates partial character string information storing therein, as keys of an associative array, partial character strings obtained by...
US-1,027,7612 Autonomic exclusion in a tiered delivery network
An edge device is dynamically reconfigured to block undesired traffic using control information that originates in a core network. The control information is...
US-1,027,7611 Abating padding oracle attacks
The present disclosure is directed toward systems and methods for identifying and abating padding oracle attacks. One or more embodiments described herein...
US-1,027,7610 Reassembly-free deep packet inspection on multi-core hardware
Some embodiments of reassembly-free deep packet inspection (DPD on multicore hardware have been presented. In one embodiment, a set of packets of one or more...
US-1,027,7609 Communication protocols in integrated systems
A system and methods comprise a touchscreen at a premises. The touchscreen includes a processor coupled to a security system at the premises. User interfaces...
US-1,027,7608 System and method for verification lineage tracking of data sets
Whenever users receive or transfer a copy of any of a set of documents, prior verification of the document is enforced by an administrative system, which...
US-1,027,7607 Login performance
An embodiment of the invention may include a method, computer program product and system for receiving a request from a user to access a system. The user...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.