Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: communication





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,781,173 System and method for providing enterprise voice call continuity
An improved system and method are disclosed for providing voice call continuity in an enterprise network. For example, an enterprise public branch exchange...
US-9,781,171 Registration method for managing NAT shutdown
The present invention provides a registration method for managing NAT shutdown. In Internet communication field, a user must perform registrations...
US-9,781,170 Establishing communication links using routing protocols
Systems and methods for facilitating shared access-right evaluation using linked communication channels are provided. A first communication can be received over...
US-9,781,168 Systems and methods of distributed silo signaling
The embodiments described herein recite a telephone communication system used for handling information such as messages, typically voice mail messages, and,...
US-9,781,167 WebRTC data channel facilitating IMS support of RCS features
A gateway may be configured to establish a first data connection between the gateway device and a client device. The first data connection may be based on a Web...
US-9,781,166 Gateway device, system, and communication method
A gateway device includes a communication unit communicating a frame signal conforming to an IuUP (Iu User Plane) protocol with a wireless base station...
US-9,781,164 System and method for providing network security to mobile devices
A small piece of hardware connects to a mobile device and filters out attacks and malicious code. Using the piece of hardware, a mobile device can be protected...
US-9,781,158 Integrated paronymous network address detection
Improved techniques involve comparing paronymous addresses received in transaction data with trusted sets of paronymous data stored in a database by both a...
US-9,781,156 Detection and mitigation of denial-of-service attacks in wireless communication networks
A method that incorporates teachings of the subject disclosure may include, for example, obtaining data relating to a set of collision events on a shared...
US-9,781,148 Methods and systems for sharing risk responses between collections of mobile communications devices
Methods are provided for determining an enterprise risk level, for sharing security risk information between enterprises by identifying a security response by a...
US-9,781,143 Systems and methods for detecting near field communication risks
A computer-implemented method for detecting near field communication risks may include (1) identifying a mobile device capable of near field communication, (2)...
US-9,781,141 Secured automated or semi-automated systems
Secured automated or semi-automated systems are provided herein. In one embodiment, a sensor system includes a sensor, a legacy computing environment that is...
US-9,781,139 Identifying malware communications with DGA generated domains by discriminative learning
Techniques are presented to identify malware communication with domain generation algorithm (DGA) generated domains. Sample domain names are obtained and...
US-9,781,130 Managing policies
A method, system and computer program product for use in managing policies is disclosed. Policies associated with a communications device are correlated with...
US-9,781,129 Authenticating an entity
There is disclosed a method and system for use in authenticating an entity. An authentication request is received from the entity. An input signal is received...
US-9,781,126 Export control and clearance authorization for a multi-user CAx environment
A system for authorization level verification includes a host computer having a processor and a memory. The processor and memory are configured to operate a...
US-9,781,125 Enrollment in a device-to-device network
An electronic device in a device-to-device network of a user of the electronic device communicates with a group of one or more other instances of the electronic...
US-9,781,111 Operation apparatus, content parental lock setting method, and electronic apparatus
An operation apparatus includes a communication section to communicate with an electronic apparatus capable of communicating, through a first transmission...
US-9,781,108 System and method of secure encryption for electronic data transfer
A system for secure transfer of encrypted data involves a sender client, a recipient client, a main server, and a key server. The sender client receives...
US-9,781,107 Methods and systems for authenticating users
A method of authenticating users to reduce transaction risks includes indicating a desire to conduct a transaction and determining whether the transaction...
US-9,781,104 Working method of dynamic token
Disclosed is a working method of a dynamic token. The present invention relates to the field of communications. The method comprises: when a token is awakened,...
US-9,781,103 Trusted communication session and content delivery
Methods and systems for configuring a network are disclosed. An example method can comprise receiving a first token and an encryption key from a first device. A...
US-9,781,099 Online communication risks
Systems, methods, and apparatus to analyze potential risks of communicating online are described. In an embodiment, the communication may include communicating...
US-9,781,096 System and method for out-of-band application authentication
Application-to-Application authentication features using a second communication channel for out-of-band authentication separate from a communication channel of...
US-9,781,095 Suppression of authorization risk feedback to mitigate risk factor manipulation in an authorization system
Dynamic risk communication associated with a computer device may include automatically detecting one or more security risk factors for the computer device based...
US-9,781,094 Systems and methods for performing remote authentication of a virtual subscriber identity module (SIM)
Various embodiments for performing remote authentication of a virtual subscriber identity module (SIM) on a mobile communication device include receiving, on a...
US-9,781,091 Provisioning for smart navigation services
Techniques for provisioning a smart navigation service are presented. The provisioning can be performed by a name owner, by the smart navigation service itself,...
US-9,781,087 Private and secure communication architecture without utilizing a public cloud based routing server
A method for use with a public cloud network is disclosed. The method includes setting up a private cloud routing server and a smart device client in a client...
US-9,781,085 Device to device security using NAF key
A method, apparatus and computer program product are disclosed for establishing secure off-network communications between first and second Secure Cellular...
US-9,781,084 Reducing start-up delay in streaming media sessions
A method is provided for delivering a streaming media asset to a client device. For the method, a request is received over a communication network from a client...
US-9,781,079 Security key generator
A communication system has a first and a second communicating device operable to send and receive data units through a communication channel. Some of the data...
US-9,781,076 Secure communication system
A communications system (40) comprises a first entity (42), a first encryption device (48) and a network (46). The first encryption device (48) is adapted to...
US-9,781,072 Unifying web and phone presence
The subject matter of this specification can be embodied in, among other things, a computer-implemented method that includes obtaining, at a computer system, a...
US-9,781,071 Method, apparatus and computer program product for providing automatic delivery of information to a terminal
An apparatus for providing automatic delivery of information to a terminal includes a communication element, a registry element and a proxy element. The...
US-9,781,066 Terminal device, server, and method of providing messaging service
A terminal device is provided. The terminal device includes an input unit configured to receive an input of a user command inviting a non-subscriber of a...
US-9,781,058 Dynamically adjusting liveliness detection intervals for periodic network communications
In general, techniques are described to dynamically adjust a session detection time defined by a timer in accordance with a bidirectional forwarding detection...
US-9,781,050 Globalization management system and method therefor
A globalization management system for managing resources of multiple interrelated data sources corresponding to a plurality of sites through a communications...
US-9,781,047 Wireless communication terminal and wireless communication method
A wireless communication terminal includes a processor; and a non-transitory memory storing thereon a program which is executed by the processor, the program...
US-9,781,045 Method and apparatus for providing multimedia broadcast and multicast service (MBMS) in wireless communication...
A method for receiving a multimedia broadcast multicast service (MBMS) by a user equipment (UE) in a wireless communication system; the UE therefore; a method...
US-9,781,043 Identification of internal dependencies within system components for evaluating potential protocol level deadlocks
Systems and methods for automatically building a deadlock free inter-communication network in a multi-core system are described. The example implementations...
US-9,781,041 Systems and methods for native network interface controller (NIC) teaming load balancing
Systems and methods are provided that may be employed in a network environment to implement load balancing for multi-network interface controller (NIC) teaming...
US-9,781,040 Congestion detection based on resource utilization information and user quality-of-experience indicators
A capability is provided for detecting congestion in a communication network. A congestion condition is detected for the network based on resource utilization...
US-9,781,035 Transitioning between communication protocols between networks
A method is provided in one particular example and may include obtaining routing information for a plurality of Internet Protocol (IP) addresses in a first...
US-9,781,027 Systems and methods to communicate with external destinations via a memory network
Various systems and methods to facilitate general communication, via a memory network, between compute elements and external destinations, while at the same...
US-9,781,026 System and method to prevent polling overload for detection of presence information
A feature server determines a hierarchical network topology for identifying presence information of communication endpoints. The hierarchical network topology...
US-9,781,024 Supporting low latency applications at the edge of wireless communication networks
Various embodiments manage data flow between at least one wireless communication device and at least one application executing at an edge of the wireless...
US-9,781,023 Information processing device, information processing method, and recording medium
An information processing device includes a memory configured to store information related to data accesses by executions of a plurality of applications, and a...
US-9,781,022 Fault detection in communication system
Presented is a system for monitoring the integrity of a communication bus.
US-9,781,019 Systems and methods for managing network communication
A computer-implemented method for managing network communication may include (1) identifying a pattern of network communication between a network node and a...
US-9,781,016 Dynamic addition of network function services
A method of dynamically adding a communication service function to a communication session comprises receiving a communication during a communication session on...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.