Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2017/0331882 DISTRIBUTED PROCESSING SYSTEMS
A distributed processing method is disclosed herein for evaluating student work product. The distributed processing system includes a server, a database...
2017/0331881 Digital Signal Processing Over Data Streams
The techniques and systems described herein are directed to providing deep integration of digital signal processing (DSP) operations with a general-purpose...
2017/0331880 SYSTEMS AND METHODS FOR AGGREGATION OF CLOUD STORAGE
The present disclosure describes systems and methods for aggregation and management of cloud storage among a plurality of providers. In a first aspect, the...
2017/0331879 Multi-Threaded Download with Asynchronous Writing
A system and method are presented for the facilitation of threaded download of software record identifiers and software records. Software record identifiers...
2017/0331878 CONCURRENT ACCESS TO A USER PROFILE IN A LAYERING SYSTEM
Concurrent access to a user profile in a layering system is provided. When a user logs into a computing device, the server can locate a corresponding user...
2017/0331877 PHOTO REQUEST USING A LOCATION IDENTIFIER
A method and system of fulfilling a request for a desired photo. A request from a first service subscriber for a desired photo in a first data packet is...
2017/0331876 CONTROL AND SUPERVISION OF CONNECTED OBJECTS
For a supervision and control of connected objects registered in an IMS network, an application server performs the following steps: receiving a first message...
2017/0331875 A METHOD FOR PROCESSING A DATA DELIVERY REQUEST, DEVICE, PROXY MODULE, CUSTOMER TERMINAL AND ASSOCIATED...
Processing a request for delivery of data sent by a customer terminal to a remote server via a telecommunication network. The terminal accesses the network by...
2017/0331874 Buffer Discard Control for Content Streaming Via Intermediate Node
A node (100) of a communication network receives streamed content in chunks of a given quality level from a streaming server (200). The node (100) buffers the...
2017/0331873 SYSTEM AND METHOD FOR ACTIVE TRANSCODING OF CONTENT IN A DISTRIBUTED SYSTEM
A system and method for streaming media and, more particularly, to a system and method for active transcoding of content in a distributed system. The method...
2017/0331872 Server-Side Interstitial Content Insertion
A first manifest request may be received and, in response, a first manifest may be requested. Next, at least one interstitial content insertion source may be...
2017/0331871 Streaming and Downloading of Content
Methods, apparatuses, systems, and software are described for providing content to a device comprising streaming content and sending content in a non-streaming...
2017/0331870 MANAGING DATA TRANSMISSIONS OVER A NETWORK CONNECTION
In various example embodiments, a system and method for managing media bandwidth usage are disclosed. One disclosed method includes determining a network...
2017/0331869 SHARING MEDIA INFORMATION BETWEEN APPLICATIONS ON CLIENT DEVICES
A media process may receive, from a client application, a request for media information about a range of media items in a queue of a media application, the...
2017/0331868 Dynamic Stream Operator Fission and Fusion with Platform Management Hints
Methods and apparatus, including computer program products, implementing and using techniques for data stream processing in a runtime data processing...
2017/0331867 METHOD, DEVICE AND SYSTEM FOR PUSHING FILE
A method, a device and a system for pushing a file are provided. In some embodiments, the method includes: splitting a data file to be pushed into multiple...
2017/0331866 Social Media Connection Recommendations Based On Playback Information
Embodiments are described herein that involve a computing device initiating playback of a particular media item on a media playback system that is registered...
2017/0331865 GENERATING A GROUP PHOTO COLLECTION
Implementations generally relate to generating a group photo collection. In some implementations, a method includes determining a plurality of users in a...
2017/0331864 NOTIFYING RESPONSE SENDER OF MALFORMED SESSION INITIATION PROTOCOL (SIP) RESPONSE MESSAGES
A method, computer program product, and computer system for notifying a response sender of a malformed SIP response message. The method includes, producing a...
2017/0331863 IMAGE PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND STORAGE MEDIUM
An image processing apparatus includes a reception unit configured to receive a session start message, a determination unit configured to determine whether the...
2017/0331862 METHOD FOR ACCESSING CLOUD SERVICE AND ACCESS DEVICE
The present disclosure provides a method for accessing a cloud service and an access device. The method includes: sending, to a to-be-accessed cloud service,...
2017/0331861 SERVICE SUPPORT FOR SUSPENDED AND INACTIVE SUBSCRIBERS
A method may include receiving, at a serving call session control function (S-CSCF) device, from a home subscriber server (HSS), a subscriber profile that...
2017/0331860 METHOD AND APPARATUS FOR LOCAL DATA MONITORING AND ACTUATOR CONTROL IN AN INTERNET OF THINGS NETWORK
A method, apparatus, and computer program product are disclosed for locally monitoring Internet of Things (IoT) devices without the need to interact via an IoT...
2017/0331859 IN-CHANNEL EVENT PROCESSING FOR NETWORK AGNOSTIC MOBILE APPLICATIONS IN CLOUD BASED SECURITY SYSTEMS
Systems and methods in a mobile device communicatively coupled to a cloud based security system, the method for detecting and processing in-channel events...
2017/0331858 METHOD, SYSTEM, AND APPARATUS TO IDENTIFY AND STUDY ADVANCED THREAT TACTICS, TECHNIQUES AND PROCEDURES
The present disclosure provides an information technology security system, method and apparatus that differentiates advanced attackers from unsophisticated...
2017/0331857 NON-TRANSITORY RECORDING MEDIUM STORING DATA PROTECTION PROGRAM, DATA PROTECTION METHOD, AND DATA PROTECTION...
A non-transitory recording medium storing a data protection program causing a computer to perform a process, the process includes: storing, in a memory, a...
2017/0331856 LURING ATTACKERS TOWARDS DECEPTION SERVERS
Endpoints in a computer network create connections to a deception server without sending any payload data. The connections create records of the connection on...
2017/0331855 DETECTION AND WARNING OF IMPOSTER WEB SITES
Embodiments are directed to a computer-implemented method of identifying an imposter web page. The method includes extracting, using a processor system,...
2017/0331854 Short Term Certificate Management During Distributed Denial of ServiceAttacks
In one embodiment, a distributed denial of service attack on a network is identified. In response to the distributed denial of service attack, a script to...
2017/0331853 SECURITY SYSTEM
A security system which performs predetermined control processing to a computer in a private network and is provided outside the private network, in which the...
2017/0331852 SYSTEM FOR DETERMINING EFFECTIVENESS AND ALLOCATION OF INFORMATION SECURITY TECHNOLOGIES
Disclosed is a computerized system for determining the collective effectiveness of information security technologies. The system typically includes a...
2017/0331851 CYBER THREAT MONITOR AND CONTROL APPARATUSES, METHODS AND SYSTEMS
The cyber threat monitor and control apparatuses, methods and systems (hereinafter "CTMC") determines risk across a global Internet network graph model for...
2017/0331850 SYSTEMS AND METHODS FOR ANALYZING SOFTWARE USING QUERIES
Systems and methods for software verification. In some embodiments, a first statement is identified, from a discovery query written in a query language, the...
2017/0331849 SYSTEM FOR RESOURCE-CENTRIC THREAT MODELING AND IDENTIFYING CONTROLS FOR SECURING TECHNOLOGY RESOURCES
Systems, computer program products, and methods are described herein for identifying threat vectors and implementing controls for securing resources within a...
2017/0331848 SYSTEM AND METHOD OF COMPARATIVE EVALUATION FOR PHISHING MITIGATION
The present disclosure generally relates to information security and, more particularly, to systems and methods of comparative evaluation for phishing...
2017/0331847 DISTRIBUTED ONLINE WIRELESS SECURITY TEST SYSTEM
Systems and methods are disclosed herein to provide improved online security testing of security devices and networks, including but not limited to networks...
2017/0331846 Method and System for Tamper-Proofing a Dual Modulation Network
A system and method for a tamper-resistant network is disclosed. The system includes a primary network hub (PNH) having a PNH transceiver and a PNH...
2017/0331845 SEQUENCING VIRTUAL MACHINES
A method for sequencing virtual machines in a shared pool of configurable network computing resources includes sequencing at least one computing element for...
2017/0331844 SYSTEMS AND METHODS FOR ASSESSING AIRFRAME HEALTH
A method of assessing structural health includes receiving an anomaly detector, receiving an anomaly detection threshold, and receiving a strain measurement...
2017/0331843 Systems and Methods for Targeted Attack Protection Using Predictive Sandboxing
Provided herein are systems and methods for targeted attack protection using predictive sandboxing. In exemplary embodiments, a method includes retrieving a...
2017/0331842 SDN CONTROLLER
An SDN controller used in a network constructed with an SDN, the SDN controller causes a computer to function as an address information specifying processing...
2017/0331841 Automatic Categorization of IDPS Signatures from multiple different idps systems
Unknown and reference signatures are accessed. The unknown and reference signatures indicate patterns that correspond to known threats to resources (such as...
2017/0331840 SYSTEMS AND METHODS FOR DETERMINING SECURITY RISK PROFILES
A computer-implemented method for determining security risk profiles may include (1) detecting a security breach of an entity within a set of entities, (2)...
2017/0331839 CYBER-SECURITY PRESENCE MONITORING AND ASSESSMENT
Methods, computer-readable media, software, and apparatuses may monitor consumer information in order to determine a probability of a data breach associated...
2017/0331838 METHODS AND COMPUTING DEVICES TO REGULATE PACKETS IN A SOFTWARE DEFINED NETWORK
A method to allow applications to regulate packets in a software defined network includes receiving a request from an application to regulate at least some of...
2017/0331837 METHOD AND APPARATUS FOR PROVIDING INTEGRITY CHECK DATA
Provided is a method of a device transmitting integrity check data. The method includes establishing a voice communication channel with at least one other...
2017/0331836 METHOD AND DEVICE FOR MANAGING COMMUNICATION MESSAGE VERIFICATION PROCESS IN COMMUNICATION SYSTEM CONTAINING...
A method and device for managing a communication message verification process in a communication system containing a plurality of nodes N1 to N9, including: a...
2017/0331835 SYSTEM FOR GENERATION AND REUSE OF RESOURCE-CENTRIC THREAT MODELING TEMPLATES AND IDENTIFYING CONTROLS FOR...
Systems, computer program products, and methods are described herein for creating reusable resource-centric threat models and identifying controls for securing...
2017/0331834 CENTRALIZED AUTHENTICATION FOR GRANTING ACCESS TO ONLINE SERVICES
Methods, apparatus, systems and articles of manufacture (e.g., physical storage media) to authenticate a first device for access to a first service provider...
2017/0331833 SECURE CONNECTIONS IN AN INTERACTIVE ANALYTIC VISUALIZATION INFRASTRUCTURE
A method and system is described securely capturing up-to-date data and presenting the up-to-date data in an analytic visualization. An update server receives...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.