Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: communication





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,578,126 System and method for automatically discovering wide area network optimized routes and devices
A system, medium and method of automatically discovering a wide area network optimized route is disclosed. A client request is received at a second optimization...
US-9,578,124 Optimization of enhanced network links
A method and apparatus for dynamic network link acceleration provides a managed communication link for accelerated and reliable network communication between a...
US-9,578,122 Communicating an E-mail from a sender to a plurality of recipients
An e-mail comprising general content is communicated from a sender to a plurality of recipients. The general content is identical for all recipients of the...
US-9,578,121 Apparatus and method for controlling heating, cooling, and refrigeration sensor systems utilizing the wireless...
A system for controlling one or more structural appliances, such heating, cooling, and ventilation sensor systems utilizing cloud computing architecture,...
US-9,578,116 Representing video client in social media
Video client social media account creation and linking of the video client social media account creation to a video services subscription account is provided. A...
US-9,578,114 External service application discovery method
An external service application discovery process that connects a host with an external application server running a service application allowing a user of a...
US-9,578,113 Method and apparatus for transferring remote session data
Examples of systems and methods are provided for communication and for forwarding display data and cursor type related to a remote session between a client...
US-9,578,112 Reliability of a connection during a communication session on a network device
The present application details methods and systems for improving the reliability of a connection during a communication session on a network device. In one or...
US-9,578,109 Long-lived MPTCP sessions
Techniques for supporting long-lived multipath transmission control protocol (MPTCP) sessions. An MPTCP session may be established between two endpoints....
US-9,578,105 Device optimized transmission and reception for multi-mode, multi-media communications
An approach is provided for receiving information from a plurality of communication services in a plurality of communication service formats and adjusting the...
US-9,578,103 Crowd sourced content for local social media context aboard a mobile communications platform
A system includes a local social media context server aboard a vehicle, the local social media context server including logic to implement a local social media...
US-9,578,102 Peer-to-peer data storage
A determination is made of users that form a group within a social network in which the users communicate with each other over a network with electronic devices...
US-9,578,099 Devices and methods for content distribution in a communications network
According to at least one example embodiment, a method for transmitting data files in a network includes receiving requests from user devices for packets of the...
US-9,578,086 Method and apparatus of setting data transmission and reception period
A method and an apparatus for setting a data transmission and reception period are provided. The method includes determining an average margin threshold for...
US-9,578,083 Dynamically designing shared content
A system and method for dynamically designing shared content served via a content sharing source. The system includes a content size determination unit to...
US-9,578,079 Distribution control system, distribution system, distribution control method, and computer-readable storage medium
A distribution control system that is connected to one or more communication terminals that output image (sound) data and transmits the image (sound) data to...
US-9,578,076 Visual communication using a robotic device
Technology is described for visually communicating using a robotic device. An example of a method can include a video feed sent from the video camera of the...
US-9,578,073 System and method for decision support in a virtual conference
A virtual conferencing system is described which evaluates and selects participants for active participation based on one or more criteria. For example, one...
US-9,578,071 Context aware interaction
A network-connected server for meeting initiation has software executing on the server from a non-transitory physical medium, the software providing a function...
US-9,578,070 Method for inserting background audio into voice/video call
A background noise inserter server is described that includes a communication interface for communicating with a network, memory for storing background audio,...
US-9,578,069 Cooperative IMS access from a visited domain
Embodiments disclosed herein provide systems, methods, and computer readable media to provide roaming IP multimedia subsystem (IMS) access. In a particular...
US-9,578,067 Intercepting user equipment and lawful interception method thereof for use in 3GPP direct mode communication
An intercepting user equipment and a lawful interception method thereof are provided. The intercepting user equipment registers to the administrating server for...
US-9,578,060 System and method for data loss prevention across heterogeneous communications platforms
In one embodiment, a method includes activating a cross-platform DLP policy for enforcement against a plurality of users on each of a plurality of heterogeneous...
US-9,578,058 Method and internet terminal for remotely performing operations on a secure element connected to a...
The invention relates to a method for remotely performing operations determined by a service provider on a secure element connected to a communication device...
US-9,578,057 Techniques for detecting an intranet spoofing attack
Techniques for detecting an intranet spoofing attack are disclosed. In one embodiment, the techniques may be realized as a system and method for detecting an...
US-9,578,054 Hacking-resistant computer design
A computer architecture is disclosed for implementing a hacking-resistant computing device. The computing device, which could be a mainframe computer, personal...
US-9,578,050 Service delivery controller for learning network security services
A learning-based computer network security system may include a service delivery controller executing on one or more of hardware processors that receives...
US-9,578,047 Method and system for reflectometry based communication network monitoring, intrusion detection, and message...
Systems and methods are provided for monitoring and detecting intrusions and authenticating messages on a communication network of a vehicle. A plurality of...
US-9,578,041 Verification of peer-to-peer multimedia content
A method includes receiving, at a first wireless device, from a second wireless device, content and an identification of the second wireless device, over a...
US-9,578,040 Packet receiving method, deep packet inspection device and system
Embodiments of the present invention provide a packet receiving method, a deep packet inspection device and system, which relates to the field of ...
US-9,578,034 Trusted peripheral device for a host in a shared electronic environment
A trusted peripheral device can be utilized with an electronic resource, such as a host machine, in order to enable the secured performance of security and...
US-9,578,027 Multiple data store authentication
System and methods for authenticating access to multiple data stores are disclosed. The system may include a server coupled to a network, a client device in...
US-9,578,026 Method and system for device dependent encryption and/or decryption of music content
A method and system is disclosed that provides at least one server device; and at least one remote audio playback device, the remote audio playback device...
US-9,578,025 Mobile network-based multi-factor authentication
Verification of a user login to a secure account from a mobile device occurs when the user provides login credentials and a hardware identifier (ID)...
US-9,578,022 Multi-factor authentication techniques
An authentication technique with a teaching phase and authentication phase. In the teaching phase, authentication information is collected for a user in at...
US-9,578,020 Module for controlling usability of a device
Module (10) for controlling usability of a processing unit (2) of a device (1), the module comprising a modem (11) for communicating with a cellular network,...
US-9,578,016 Optimizing secure communications between a client authenticating server and a mobile client
Systems and techniques are described for optimizing secure communications. Specifically, a first intermediary and a second intermediary can split-terminate a...
US-9,578,013 System and method for secure content sharing and synchronization
A flexible content sharing system may comprise a network based application built on a client device using information from dissociated user experience component...
US-9,578,010 Mobile handset extension to a device
Mobile operation is extended to a device. An extension interface comprises a client component within a mobile that is linked to a client component within the...
US-9,578,008 Technologies for secure bootstrapping of virtual network functions
Technologies for bootstrapping virtual network functions in a network functions virtualization (NFV) network architecture include a virtual network function...
US-9,577,999 Enhanced security for registration of authentication devices
A system, apparatus, method, and machine readable medium are described for enhanced security during registration. For example, one embodiment of a method...
US-9,577,998 Dynamic file access to files of unmapped remote computers
Dynamically providing access to files of presently unmapped remote computers, including, responsive to receiving a file access request from a user, displaying a...
US-9,577,997 Authentication system and authentication method
On-vehicle control units include an attaching section for attaching a message code used to check the validity of the transmission source of communication data,...
US-9,577,995 Systems and methods for enabling secure communication between endpoints in a distributed computerized...
A computer-implemented method performed in a system comprising a first endpoint, the first endpoint comprising at least one central processing unit, a memory, a...
US-9,577,993 System and method for authenticating users
A security application for a computing device, e.g., a mobile phone, allows generation of a secret according to a unique user input (e.g., user credentials)....
US-9,577,986 Secure data verification technique
A technique for the secure exchange and verification of data between multiple entities that use compatible business management systems utilizes serializable...
US-9,577,984 Network initiated alerts to devices using a local connection
Systems and techniques for managing local communication between a network access point and a host device. Upon connection by a host device to an access point, a...
US-9,577,981 Communication control method, communication node, and mobile node
A technique is disclosed in which an MN (mobile node) 100 notifies, to a CN (correspondent node), home network connection information indicative of whether or...
US-9,577,979 Local name resolution
Embodiments described herein relate to systems and methods for local name resolution in network communications. Particular embodiments may enable a device...
US-9,577,978 Method and apparatus for provisioning a scalable communications network
A method that incorporates teachings of the subject disclosure may include, for example, determining at a first directory server of a first regional call...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.