Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: communication





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,013,5902 Exchange of content consumption-related information between networked devices
Content information networks may be provided that may each include a plurality of content consumption devices. One or more of the content consumption devices...
US-1,013,5901 Exchange of content consumption-related information between networked devices
Content information networks may be provided that may each include a plurality of content consumption devices. One or more of the content consumption devices...
US-1,013,5900 User input back channel for wireless displays
As part of a communication session, a wireless source device can transmit audio and video data to a wireless sink device, and the wireless sink device can...
US-1,013,5887 Shared multimedia annotations for group-distributed video content
Synchronized multi-media annotations for shared video content is provided. According to embodiments, viewers of video content may be enabled to create...
US-1,013,5886 Method and device for retaining robust header compression (ROHC) compressor state
A method for retaining a Robust Header Compression (ROHC) state in a User Equipment (UE) during switching from a Voice over Long Term Evolution (VoLTE) call to...
US-1,013,5882 Multiple-master DNS system
In some particular embodiments, DNS servers are operated to maintain consistency of DNS records between the multiple master servers in response to certain types...
US-1,013,5881 Virtual private meeting room
A conference session is established. Different unique identifications and persistent dedicated virtual private network conference rooms are assigned to...
US-1,013,5878 Method for accessing a digital network by way of one or more Internet service providers
Described herein is a method for accessing a digital network. For example, the method may include receiving a message from a network access device at a first...
US-1,013,5872 System and method for context aware mobile policies
A system and method for network policy enforcement for portable data devices such as smartphones, tablets or notebook computers uses the portable device to...
US-1,013,5871 Service oriented software-defined security framework
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for service oriented software-defined security framework are...
US-1,013,5866 Method of preventing drive-by hacking, and apparatus and system therefor
The present disclosure relates to a method of preventing drive-by hacking, and an apparatus and a system therefor. A method of preventing drive-by hacking in a...
US-1,013,5864 Latency-based policy activation
Techniques for latency-based policy activation are disclosed. In some embodiments, a system for latency-based policy activation includes collecting a plurality...
US-1,013,5858 Method and apparatus for protecting consumers and resources in a communication network
Aspects of the subject disclosure may include, for example, a method including comparing call volume of call sessions associated with a wireless network node of...
US-1,013,5849 Securing medical devices through wireless monitoring and anomaly detection
A medical device monitor (MedMon), method and computer readable medium is disclosed. The MedMon is configured to operate in a system having communications...
US-1,013,5841 Integrated security system having threat visualization and automated security device control
Techniques are described for taking direct actions, such as selectively blocking or allowing traffic and applications, while monitoring events from a graphical...
US-1,013,5833 Credential driving an automatic lock update
An access control system including a data storage device configured to store a master credential database having a plurality of master identifiers and master...
US-1,013,5832 Privileged communication indication
Systems and methods, which can provide for an indication of a privileged communication, are provided. A method, according to an embodiment, uses at least one...
US-1,013,5831 System and method for combining an access control system with a traffic management system
A system and method for handling a request from a client device to access a service from a server. The method comprises receiving a request from a user using a...
US-1,013,5829 System and method for secure machine-to-machine communications
Embodiments of the present invention include a method for providing a secure domain name system (DNS) for machine to machine communications. In one embodiment,...
US-1,013,5828 Technologies for secure server access using a trusted license agent
Technologies for secure server access include a client computing device that loads a license agent into a secure enclave established by a processor of the...
US-1,013,5823 Input redirection with a cloud client device
In one embodiment, a cloud client device identifies one or more devices within a pre-determined range of the cloud client device operable to communicate with...
US-1,013,5819 Wearable device authentication
A wearable device is used to authenticate a user into a user account at a user device of the user. In particular, the wearable device may include a sensor...
US-1,013,5817 Enhancing authentication and source of proof through a dynamically updatable biometrics database
The present invention provides for biometric authentication of users using current, updatable biometric data/standards. In this regard, the present invention...
US-1,013,5816 Electronic device and method of transceiving data
An electronic device and a method of transceiving data are disclosed. A method of transceiving data by an electronic device includes: storing one or more pieces...
US-1,013,5814 Self-authenticating chips
A self-authenticating chip includes first and second memory regions storing, respectively, first and second authentication codes. The second memory region is...
US-1,013,5803 Dynamic identity switching
Techniques are disclosed for dynamically switching user identity when generating a web service request by receiving, at a client application, an invocation of a...
US-1,013,5800 Electronic discovery insight tool
An electronic discovery insight tool is presented. The tool is implemented in an apparatus comprising one or more processors, one or more memories...
US-1,013,5795 Downlink control channel encryption for jamming resilience
Methods, systems, and devices for wireless communication are described. The methods, systems, and devices may employ mechanisms for encrypting downlink control...
US-1,013,5794 Cryptographic communication device, cryptographic communication method, and non-transitory storage medium...
When a device is connected to a home gateway, if a common connection method is selected, a not-high-security connection method is inevitably selected even for a...
US-1,013,5793 Security maximization for a computer related device based on real-time reaction
Methods and a system are provided that, in turn, are for providing security between a user device and a computer related device. A method includes providing a...
US-1,013,5792 Secure communications with internet-enabled devices
A network device allows inbound connections from external addresses to a computer on a local network while forbidding output connections from the computer to...
US-1,013,5791 Secure communications with internet-enabled devices
A network device allows inbound connections from external addresses to a computer on a local network while forbidding output connections from the computer to...
US-1,013,5790 Secure communications with internet-enabled devices
A network device allows inbound connections from external addresses to a computer on a local network while forbidding output connections from the computer to...
US-1,013,5789 Method and system of establishing a virtual private network in a cloud service for branch networking
In one aspect, a computerized system useful for implementing a virtual private network (VPN) including an edge device that automatically establishes an Internet...
US-1,013,5788 Using hypergraphs to determine suspicious user activities
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for detecting suspicious user activities. One of the methods...
US-1,013,5787 Filtering system, management device, filtering method and management program
The present invention prevents all of the filter rules from leaking and the filter functions of an entire network from stopping, even if problems arise in a...
US-1,013,5783 Method and apparatus for maintaining network communication during email data transfer
Methods and apparatus provide for network communication to be maintained during transfer of email data between two devices. In one aspect a method includes...
US-1,013,5782 Determining close contacts using communication data
One embodiment provides a method including: accessing, using a processor, communication data received at an electronic device of a first entity; identifying,...
US-1,013,5780 Management of commercial messages in a social network
Methods, systems, and computer programs are presented for managing the flow of messages among users of a social network. One method enables the election of an...
US-1,013,5779 Levels of competency in an online community
Techniques and systems are described to determine levels of competency of users as part of an online community and control generation of subsequent digital...
US-1,013,5777 Leveraging an internet of things to initiate a physical object to perform a specific act that enhances an...
A first community Internet of Things (IoT) concentrator can receive first data corresponding to an interaction of a user with at least one of a first plurality...
US-1,013,5776 Cross platform social networking messaging system
Disclosed is a method of cross-social network communication. The method may include determining a plurality of recipients of a social networking service...
US-1,013,5774 Methods and apparatus for targeting communications using social network metrics
A method for a computer system includes receiving a first user communication, determining a first group of users, determining a target number of users,...
US-1,013,5773 Communications system
An electronic communications method includes receiving, by an electronic communications platform, a request to create an electronic communications event. The...
US-1,013,5772 Systems and methods for message prompting
Systems and methods are provided for message prompting. For example, a communication client corresponding to a first user acquires a first communication message...
US-1,013,5771 Secure end-to-end transport through intermediary nodes
A communication network encrypts a first portion of a transaction associated with point-to-point communications using a point-to-point encryption key. A second...
US-1,013,5769 Electronic communication system
An electronic communication system for sending, receiving, storing, organizing, displaying, and sharing electronic messages and content (e.g., text, image,...
US-1,013,5766 System and method for evaluating domains to send emails while maintaining sender reputation
Systems, device and techniques are disclosed for evaluating domains to send emails while maintaining sender reputation. Registration records of a domain are...
US-1,013,5765 Real-time display of multiple annotated images
A user can share (show) multimedia information while simultaneously communicating (telling) with one or more other users over a network. Multimedia information...
US-1,013,5764 Universal interaction platform for people, services, and devices
A universal interaction platform that communicates with service providers and smart devices by receiving a message object that includes information indicative...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.