Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: communication





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,860,362 Method for controlling a cooking appliance, and cooking appliance
A method for controlling a cooking appliance using a mobile terminal that is separate from the cooking appliance, both of which have a controller and a BLE...
US-9,860,359 Method for communicating with neighbor device, electronic device, and storage medium
A method in which a second electronic device communicates with a neighbor device is provided. The method includes connecting to a first electronic device,...
US-9,860,356 Method for updating software of a measuring device, smart computer and computer readable program product
The present invention relates to a method for updating software of a measuring device in a RF sensitive environment is provided, the method comprising:...
US-9,860,352 Headset-based telecommunications platform
A hands-free wireless wearable GPS enabled video camera and audio-video communications headset, mobile phone and personal media player, capable of real-time...
US-9,860,349 Method for transmitting and receiving frame, and wireless device implementing the same method
A method for transmitting a frame is provided by a device in a wireless communication network. The device compensates a carrier frequency using a value of...
US-9,860,346 Dynamic application programming interface builder
A method beginning with adding new resource to an enterprise system. Responsive to adding, an API builder executed by the computer automatically builds a new...
US-9,860,345 System and method for remote graphics display
A method and system for displaying graphics on a display of a second module remotely connected with a first module via a data communications medium. A first...
US-9,860,343 Server for selecting a sequential task-oriented event and methods for use therewith
An event wizard server includes at least one processor that executes the event wizard server application that bidirectionally communicates event planning data...
US-9,860,342 Systems and methods for protecting an identity in network communications
In some embodiments, a method includes sending a first data unit, received from a source device, to a destination device via a first data unit path. The first...
US-9,860,340 Service function chaining branching
A system comprising a plurality of service nodes, a controller and a network device in communication with the controller. Each of the plurality of service nodes...
US-9,860,330 Control method for communication terminal connectable to wearable terminal via network
In a method causing a processor in a communication terminal to execute operations that include; detecting whether the communication terminal, which is connected...
US-9,860,329 Determining customized audio services
In an approach for delivering customized messages, a computer receives a request to initiate a communication, wherein the request includes a caller and at least...
US-9,860,326 Duplex services residing in a messaging bus
An example method of integrating a plurality of heterogeneous peer-to-peer communication participants includes retrieving from a first input queue coupled to a...
US-9,860,325 Tunnel broker in a service oriented architecture
A computer device includes logic configured to implement a tunnel broker. The tunnel broker is configured to receive a request from a client device for a...
US-9,860,324 Rapid establishment of a connection from multiple address locations
A first computing device receives a first token with a first request for data from a second computing device located at a first network address, the first token...
US-9,860,323 System and apparatus for providing policy control and charging to support communications
A system that incorporates teachings of the present disclosure may include, for example, utilizing a first diameter agent function to route messages between...
US-9,860,321 Propagating communication awareness over a cellular network
Techniques for propagating communication awareness over a cellular network are described. According to various implementations, communication awareness of a...
US-9,860,320 Node and communication connecting method between nodes
A communication connecting method between nodes through a network, includes: storing communication connection information acquired through searching for...
US-9,860,310 System and method for providing data and application continuity in a computer system
A system and method for providing or maintaining data and application continuity in a computer system. According to an embodiment, the system comprises a...
US-9,860,308 Collaborative creation of annotation training data
Collaborative annotation of a document. A GUI is generated by a host computer that displays a document to annotate. The GUI is transmitted by the host computer...
US-9,860,307 System and method for virtual desktop infrastructure user level virtual channel
Embodiments for provided for using virtual desktop infrastructure (VDI) user level virtual channels (VCs) which allows client data prioritization within a...
US-9,860,304 Redundant CAN interface for dual actuation systems
The subject matter of this specification can be embodied in, among other things, an actuator controller that includes a first communication node associated with...
US-9,860,302 Method, control module, apparatus and system for transferring data
A method, control module and extracorporeal blood treatment apparatus are provided for transferring data from said extracorporeal blood treatment apparatus....
US-9,860,296 System and method for end-to-end call quality indication
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for generating an end-to-end quality indication associated with a...
US-9,860,290 System and method for adapting video communications
An apparatus may include one or more radio-frequency (RF) transceivers arranged to receive multimedia content during a session over a first link from a wireless...
US-9,860,283 Agile network protocol for secure video communications with assured system availability
A system and method for video conferencing over a secure communication link is disclosed. In various implementations, the system is configured connect to a...
US-9,860,282 Real-time synchronous communication with persons appearing in image and video files
Systems and methods are provided for enabling real-time synchronous communication with persons appearing in image or video files. For example, an image or video...
US-9,860,278 Log analyzing device, information processing method, and program
A log information collecting unit that collects log information and traffic information output from a plurality of communication devices included in a network;...
US-9,860,277 Normalized indications of compromise
Threat detection instrumentation is simplified by providing and updating labels for computing objects in a context-sensitive manner. This may include simple...
US-9,860,276 Emergent network defense
A system and method are provided of a node for use in a network having a plurality of nodes. The node is configured to identify neighboring node(s) within a...
US-9,860,275 Systems and methods to rotate security assets used for secure communications
Systems and methods to rotate security assets used to for secure communications are disclosed. The system includes receiving a first certificate that includes a...
US-9,860,273 Logging encrypted data communications for QOE analysis
A device such as a smartphone may communicate with a server or other network entity using encrypted communications, making it difficult to examine such...
US-9,860,272 System and method for detection of targeted attack based on information from multiple sources
Disclosed are methods, systems, and computer programs for detecting targeted attacks on compromised computer from multiple sources. An example method includes...
US-9,860,269 Managing data traffic in the presence of a sensitive site
Website security may be managed based on known site attributes and placing limits on communication outside a site. One example may include at least one of...
US-9,860,263 System and method for assessing data objects on mobile communications devices
A server receives from a mobile communication device information about a data object (e.g., application) on the device when the device cannot assess the data...
US-9,860,258 Host-based, network enabled, integrated remote interrogation system
An Enhanced Ethernet Network Interface Card (EENIC) interfaces with a host and a network. The EENIC includes an internal network interface controller (NIC), a...
US-9,860,257 Anomaly detection and threat prediction through combined power and network analytics
A network device communicates network traffic in one or more network flows via a plurality of ports. Each port is connected to a corresponding computing device....
US-9,860,248 Computer implemented method, communications system and computer programs products for securing operations in...
The computer implemented method comprising controlling the access to different resources and actions defined for a user by a first server, reducing the exposure...
US-9,860,245 System and methods for online authentication
A method of authenticating a network client to a relying party computer via a computer server comprises the computer server receiving a transaction code from a...
US-9,860,237 Password-based authentication in server systems
A system of .lamda..gtoreq.2 servers is provided. The server system comprises an access control server for communication with user computers via a network and...
US-9,860,235 Method of establishing a trusted identity for an agent device
A trusted identity may be established for an agent device for performing trusted communication with one or more application providing apparatuses. The method of...
US-9,860,233 Comprehensive authentication and identity system and method
A comprehensive authentication and identity system and method are disclosed. A central profile is created for a user which includes user information that can be...
US-9,860,232 Protecting network communication security
A method and apparatus for protecting a network communication security. In one embodiment, there is provided a method for protecting network communication...
US-9,860,231 Relay apparatus, communication apparatus and relay method
A relay apparatus is connected to a communication apparatus, a service providing apparatus and a browser-equipped apparatus. The relay apparatus includes: a...
US-9,860,225 Network directory and access service
A network directory service, responsive to receiving a target device symbolic name from a client, identifies a network access server in communication with a...
US-9,860,224 Systems and methods for secured entry of user authentication data
Techniques for improving security of transactions requesting user authentication data entry via mobile devices are described herein. The mobile device is...
US-9,860,220 Methods and devices having a key distributor function for improving the speed and quality of a handover
A key distributor node for a network includes a memory device with at least one first key, at least one data communication device that can exchange data with...
US-9,860,215 Firewall interface configuration to enable bi-directional VoIP traversal communications
Methods and systems for an intelligent network protection gateway (NPG) and network architecture are provided. According to one embodiment, a firewall provides...
US-9,860,213 Method and system for securing and protecting smart devices within the internet of things ecosystem
A gateway device including a network interface having wired and/or wireless connections to smart devices and a network access point. The gateway device also...
US-9,860,208 Bridging a virtual clone of a target device in a honey network to a suspicious device in an enterprise network
Techniques for bridging a honey network to a suspicious device in a network (e.g., an enterprise network) are disclosed. In some embodiments, a system for...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.