Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2017/0366589 Systems and Methods for Playing Adaptive Bitrate Streaming Content by Multicast
Systems and methods for playing adaptive bitrate streaming content by multicast in accordance with embodiments of the invention are disclosed. In one...
2017/0366588 IMPROVED MULTICAST TO UNICAST CONVERSION
Examples of the present invention provide a method of converting a multicast stream into unicast segments. In particular, sequence identifiers are generated...
2017/0366587 METHODS, SYSTEMS, AND MEDIA FOR RECOMMENDING CONTENT BASED ON NETWORK CONDITIONS
Methods, systems, and media for recommending content based on network conditions are provided. In some embodiments, the method comprises: receiving, from a...
2017/0366586 PRESERVING LONG RUNNING SESSIONS DURING SIDE-BY-SIDE UPGRADE
The present disclosure is directed to preserving running sessions during a side-by-side upgrade of system resources. Example aspects include deploying a first...
2017/0366585 APPARATUS, SYSTEM, AND METHOD OF CONTROLLING DATA TRANSMISSION, AND RECORDING MEDIUM
A transmission management system, when a request for starting communication with a second transmission terminal is received from a first transmission terminal,...
2017/0366584 Personal Network Access Control System and Method
A server is provided that includes a processor such that for a Session Initiation Protocol (SIP) request containing a Uniform Resource Identifier (URI)...
2017/0366583 SYSTEMS AND METHODS FOR REMOTE FORENSICS AND DATA SECURITY SERVICES OVER PUBLIC AND PRIVATE NETWORKS
Provided are systems and methods for employing remote forensics and data security services over public and private networks by obtaining full access to digital...
2017/0366582 Incident Response Plan based on Indicators of Compromise
A system and method for responding to incidents in an enterprise network is disclosed. The system tracks incidents by creating, in an incident Manager,...
2017/0366581 NOTIFICATIONS IN A COMPUTER SYSTEM
Certain embodiments provide means for managing automated access to computers, e.g., using SSH user keys and other kinds of trust relationships. Certain...
2017/0366580 EXTRACTING INFORMATION IN A COMPUTER SYSTEM
Certain embodiments provide means for managing automated access to computers, e.g., using SSII user keys and other kinds of trust relationships. Certain...
2017/0366579 SYSTEM AND METHOD FOR CONTROLLED CUSTOMIZATION OF BRANDED ARTWORK
Disclosed is a system and method for online editing to create artwork with layers. The present disclosure describes about the method of managing and using...
2017/0366578 Network Filtering Service System and Process
A process of filtering a wireless service provided to at least one wireless device from a wireless network includes receiving identification of the at least...
2017/0366577 INFRASTRUCTURE DISTRIBUTED DENIAL OF SERVICE (DDOS) PROTECTION
A method of providing infrastructure protection for a network that includes IP addresses as low as a single IP address. An end user sends traffic to an IP...
2017/0366576 SYSTEMS AND METHODS FOR PREVENTING DENIAL OF SERVICE ATTACKS UTILIZING A PROXY SERVER
Aspects of the present disclosure involve systems, methods, computer program products, and the like, for utilizing an access log of a proxy server device of a...
2017/0366575 MANAGEMENT OF CELLULAR DATA USAGE DURING DENIAL OF SERVICE (DOS) ATTACKS
Systems and methods for managing data usage of a cellular modem during DoS/DDoS attacks are provided. According to one embodiment, a network security device of...
2017/0366574 SERVICE LEVEL AGREEMENT RISK ANALYSIS WITH EXOGENOUS ARCHITECTURE
A set of internal information technology (IT) architecture is received and the internal IT architecture is controlled by a service provider. A set of exogenous...
2017/0366573 Automatically Detecting and Correcting Missing and Misconfigured Security Attributes
Some embodiments provide automated and intelligent security configuration at the network edge. A server tasked with distributing content provider content...
2017/0366572 Assessing and Managing Cyber Threats
Methods, systems and apparatus, including computer programs encoded on a computer storage medium, for assessing and managing cyber threats. In some...
2017/0366571 ASSET PROTECTION APPARATUS, SYSTEM AND METHOD
An asset protection system, apparatus and method are disclosed in which threat attack data that is data about a plurality of previous attacks against a...
2017/0366570 NETWORK SECURITY TOOL
A system includes a memory, a survey engine, and a reporting engine. The memory stores identifying information of a plurality of users. The survey engine...
2017/0366569 SYSTEMS AND RELATED METHODS FOR DETECTION, TIERED CORRELATION, AND NOTIFICATION OF RADIO FREQUENCY (RF) ANOMALIES
An apparatus for distributed correlation of RF information includes a radio having an RF transceiver and sensor in communication with the radio. The sensor has...
2017/0366568 ANOMALY DETECTION FOR WEB DOCUMENT REVISION
Aspects of the present disclosure include a system comprising a machine-readable storage medium storing at least one program and computer-implemented methods...
2017/0366567 METHODS AND APPARATUSES FOR OBTAINING AND DELIVERING MOBILE TERMINAL SECURITY INFORMATION BASED ON A CLOUD SERVICE
Obtaining mobile terminal security information based on a cloud service includes synchronizing mobile terminal information with a cloud, receiving security...
2017/0366566 TOKEN BASED AUTOMATED AGENT DETECTION
Service providers may operate one or more services configured to detect requests generated by automated agents. A CAPTCHA may be transmitted in response to...
2017/0366565 METHOD AND SYSTEM FOR DETECTING RESTRICTED CONTENT ASSOCIATED WITH RETRIEVED CONTENT
In embodiments of the present invention improved capabilities are described for detecting restricted content associated with retrieved content. The method and...
2017/0366564 IDENTITY AUTHENTICATION METHOD, APPARATUS, AND SYSTEM
When a security authentication request sent by a terminal is received, an identity authentication solution includes acquiring network environment information...
2017/0366563 Agentless ransomware detection and recovery
A network security apparatus includes an interface and a processor. The interface is configured to communicate at least with an endpoint computer over a...
2017/0366562 On-Device Maliciousness Categorization of Application Programs for Mobile Devices
An on-device security vulnerability detection method performs dynamic analysis of application programs on a mobile device. In one aspect, an operating system...
2017/0366561 RISK BASED PRIORITY PROCESSING OF DATA
Utilities (e.g., methods, systems, apparatuses, etc.) for use in generating and making use of priority scores for data generated by one or more data systems...
2017/0366560 SERVER-ASSISTED ANTI-MALWARE CLIENT
A host-based antimalware client can interface with a server-based antimalware support server. A file is identified at a host device. It is determined whether...
2017/0366559 AUTOMATIC STABILITY DETERMINATION AND DEPLOYMENT OF DISCRETE PARTS OF A PROFILE REPRESENTING NORMAL BEHAVIOR TO...
A system for automatic stability determination and deployment of discrete parts of a profile representing normal behavior to provide fast protection of web...
2017/0366558 VERIFICATION METHOD, APPARATUS, AND SYSTEM USED FOR NETWORK APPLICATION ACCESS
This application provides a verification method, apparatus, and system that are used for network application access, and the method includes: performing, by a...
2017/0366556 MULTICHANNEL DEVICE UTILIZING A CENTRALIZED OUT-OF-BAND AUTHENTICATION SYSTEM (COBAS)
A multichannel security system is disclosed, which system is for granting and denying access to a host computer in response to a demand from an access-seeking...
2017/0366555 CONTEXTUAL DEVICE LOCKING/UNLOCKING
Particular embodiments disclose a first device associated with a user that may receive an indication that a second device of a second user of the online system...
2017/0366554 PEER-TO-PEER AUGMENTED REALITY HANDLERS
A method and system are provided for generating peer-to-peer augmented reality handlers. The method includes receiving, from a user wearing a pair of augmented...
2017/0366553 RESTRICTING ACCESS TO CONTENT BASED ON A POSTERIOR PROBABILITY THAT A TERMINAL SIGNATURE WAS RECEIVED FROM A...
A method by a content server includes maintaining a historical repository of terminal signature tuples received from computer terminals. Each of the terminal...
2017/0366552 MODE-BASED ACCESS CONTROL METHOD AND DEVICE
Provided is a mode-based access control method that includes: making a security mode list which indicates security setting states of devices existing in a home...
2017/0366551 USING TRANSIENT PROCESSING CONTAINERS FOR SECURITY AUTHORIZATION
Authorization decisions can be made in a resource environment using authorization functions which can be provided by customers, third parties, or other such...
2017/0366550 TARGETED USER ACCESS CONTROL SYSTEM
A system includes a network interface, at least one processing device, and at least one memory device. The at least one memory device stores instructions that...
2017/0366549 THREAT-AWARE PROVISIONING AND GOVERNANCE
A management component of a computing system evaluates end-users, end-user devices, and user accounts for access to provisioned-resources of the computing...
2017/0366548 THREAT-AWARE PROVISIONING AND GOVERNANCE
A management component of a computing system evaluates end-users, end-user devices, and user accounts for access to provisioned-resources of the computing...
2017/0366547 REMOTELY DEAUTHENTICATING A USER FROM A WEB-BASED APPLICATION USING A CENTRALIZED LOGIN SERVER
Provided is a process including: relaying, with a server at a first domain, at least part of a plurality application-layer messages between a client web...
2017/0366546 COMPUTER ACCESS CONTROL SYSTEM AND METHOD
A computer access control system includes a client electronic device configured to administer an alertness test to a user. A computer access controller is...
2017/0366545 SEALED NETWORK EXTERNAL APPLICATIONS
Embodiments are provided for external applications in a sealed network. A sealed network does not require administrators and may run on hardware and software...
2017/0366544 METHOD FOR ASSOCIATING AN OBJECT WITH A USER, DEVICE, OBJECT, AND CORRESPONDING COMPUTER PROGRAM PRODUCT
A method for associating a communicating object with at least one user. A remote server receives a signal requesting an association between an user identifier...
2017/0366543 Multi-Modal Biometric Identification
At least two biometric measurement signals are generated by contact with a single individual. At least one feature is extracted from each signal of the at...
2017/0366542 Independent biometric identification system
The inventive data processing system and method enable verifiable secure transfer of information between two or more parties, each having access to at least...
2017/0366541 OFFLINE ACCESS CONTROL FOR AN APPLICATION
Techniques to facilitate offline access control for an application associated with an industrial automation environment are disclosed herein. In at least one...
2017/0366540 Preventing Unauthorized Access to Secured Information Systems Using Multi-Device Authentication Techniques
A computing platform may receive, from a client portal server, a request to authenticate a user to a user account associated with a client portal provided by...
2017/0366539 VALIDATION FOR REQUESTS
A customer can demonstrate control over an element, such as a domain, by receiving a certificate from a certificate authority. After receiving a request for a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.