Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0013843 Computer-Implemented System And Method For Distributed Activity Detection
A computer-implemented system and method for distributed activity detection is provided. Contextual data collected for a user performing an activity is...
2018/0013841 AUTOMATIC SERVICE FUNCTION VALIDATION IN A VIRTUAL NETWORK ENVIRONMENT
Systems, methods, and computer-readable media for improving the reliability of service function (SF) application in a service function chain (SFC) are...
2018/0013837 AUTO DETECTING REMOTE SESSION PROTOCOL FOR REMOTE ACCESS
In an aspect of the disclosure, a method, a computer-readable medium, and an apparatus are provided. The apparatus may be a thin client. The thin client...
2018/0013836 WIRELESS THIN CLIENTS
In an aspect of the disclosure, a method, a computer-readable medium, and one or more apparatuses are provided. The apparatuses may be one or more thin...
2018/0013833 SENSOR DEVICE FOR A BICYCLE
A bicycle sensor device of the type not having Internet accessibility and comprising at least one sensor element adapted for registering data regarding the...
2018/0013829 Cloud Process for Rapid Data Investigation and Data Integrity Analysis
A system and method for rapid data investigation and data integrity analysis is disclosed. A data set is received by a server computer from one or more client...
2018/0013828 EFFICIENT DYNAMIC PROOFS OF RETRIEVABILITY
The present invention relates to a data storage and retrieval system. The system includes a at least one client device; and at least one-server. The server...
2018/0013824 SYSTEMS AND METHODS FOR DISTRIBUTING PARTIAL DATA TO SUBNETWORKS
Computer systems and methods for replicating a portion of a data set to a local repository associated with a subnetwork are disclosed. In one implementation, a...
2018/0013821 CHAINING SERVICE ZONES BY WAY OF ROUTE RE-ORIGINATION
Presented herein are techniques for use in a network environment that includes one or more service zones, each service zone including at least one instance of...
2018/0013817 SHARING NETWORK ADDRESSES
A network address assigned a shared designation by a first client computer is received, in a first data format, automatically, at a host computer from the...
2018/0013815 REMOTE CONTROL AUTHORITY AND AUTHENTICATION
The invention relates to systems and methods to enable a mobile device to be used as a remote control, in order to control one or more remotely controllable...
2018/0013813 METHOD AND APPARATUS FOR CLOUD STREAMING SERVICE
A method and apparatus are provided for a cloud streaming service. A cloud streaming server receives first data corresponding to media source extension (MSE)...
2018/0013811 DISPLAY SYSYEM, A SOURCE DEVICE, A SINK DEVICE AND AN IMAGE DISPLAYING METHOD
The display system adapted to provide a client oriented service is provided. The display system includes a source device and a sink device. The source device...
2018/0013805 HETEROGENEOUS MEDIA SERVICES
Systems and methods adapted for providing heterogeneous media services in communication systems, such as using transport layer security deferral and/or medium...
2018/0013804 Playback Device Media Item Replacement
Embodiments are provided for replacing media items in a queue of a playback device. An example implementation involves receiving, at the playback device, first...
2018/0013802 MANAGING PARTICIPANTS IN AN ONLINE SESSION
The present invention relates to an application that is configured to be operated in a multi-participant environment on a computer network. The application...
2018/0013801 DETERMINING A REFERRAL SOURCE BY A MOBILE APPLICATION OR OPERATING SYSTEM
Systems and methods are provided for associating a tag in a URL to facilitate identifying a source to which the URL was shared. In one or more aspects, a...
2018/0013800 SYSTEMS AND METHODS FOR ENABLING DIALOG AMONGST DIFFERENT PARTICIPANT GROUPS WITH POST-LEVEL QUALIFIERS
An electronic communication service, such as a question-and-answer service, is provided in which content contributions include post-level qualifiers to...
2018/0013797 End-To-End Secure Cloud Computing
A method includes receiving, at a control node of a cloud computing network, a first enterprise policy specific to the first enterprise and a second enterprise...
2018/0013796 Modes of Policy Participation for Feedback Instances
Concepts and technologies disclosed herein are directed to modes of policy participation for feedback instances. According to one aspect, a system can receive...
2018/0013795 CONTEXT-AWARE PATTERN MATCHING ACCELERATOR
Methods and systems for improving accuracy, speed, and efficiency of context-aware pattern matching are provided. According to one embodiment, a packet stream...
2018/0013793 DNS OR NETWORK METADATA POLICY FOR NETWORK CONTROL
Techniques for configuring a network based on a Domain Name System (DNS) or network metadata policy for network control are disclosed. In some embodiments, a...
2018/0013791 METHODS AND SYSTEMS FOR PROVIDING CONFIGURATION MANAGEMENT FOR COMPUTING ENVIRONMENTS
In embodiments, methods and systems for implementing configuration management are provided. A configuration management system facilitates processing and...
2018/0013789 Systems and Methods for Detecting Online Fraud
Described systems and methods enable a swift and efficient detection of fraudulent Internet domains, i.e., domains used to host or distribute fraudulent...
2018/0013785 INCIDENT RESPONSE AUTOMATION ENGINE
Systems, methods, and software described herein enhances how security actions are implemented within a computing environment. In one example, a method of...
2018/0013784 DISTRIBUTED CLIENT-SIDE USER MONITORING AND ATTACK SYSTEM
Methods, systems, and apparatus for use in a distributed client-side user monitoring and attack system are disclosed herein. An example method includes...
2018/0013783 METHOD OF PROTECTING A COMMUNICATION NETWORK
A method of determining a quantitative measure of the danger (a Trust/Risk) that a select network entity poses to the security and integrity of a...
2018/0013782 CONTINUOUS DEVICE/UICC BASED AUTHENTICATION FOR LTE SYSTEMS
An authentication assurance level associated with an entity, for instance a user equipment, may be computed periodically or in response to an event. The...
2018/0013781 ROOT CAUSE ANALYSIS IN DYNAMIC SOFTWARE TESTING VIA PROBABILISTIC MODELING
Techniques for performing root cause analysis in dynamic software testing via probabilistic modeling are provided. In one example, a computer-implemented...
2018/0013774 COLLABORATIVE SECURITY LISTS
Examples relate to collaborative security lists. The examples disclosed herein enable obtaining a first candidate entry suggested by a first user of a...
2018/0013773 METHOD AND SYSTEM FOR CORRELATION AND MANAGEMENT OF DISTRIBUTED AND HETEROGENEOUS EVENTS
Event processing is a vital aspect of modern information systems, but is poorly supported and homogenous in nature. The present disclosure recognizes that any...
2018/0013771 ADVANCED CYBERSECURITY THREAT MITIGATION FOR INTER-BANK FINANCIAL TRANSACTIONS
A system for mitigation of cyberattacks employing an advanced cyber decision platform comprising a time series data store, a directed computational graph...
2018/0013770 System, Apparatus And Method For Using Malware Analysis Results To Drive Adaptive Instrumentation Of Virtual...
According to one embodiment, a computerized method operates by configuring a virtual machine operating within an electronic device with a first instrumentation...
2018/0013769 SECURE AND PRIVATE MOBILE WEB BROWSER
A mobile web browser embedded in a smartphone operative to open a secure and private session with a web server on the Internet via one or more cell towers,...
2018/0013768 Integrity Monitoring in a Local Network
This application is directed to an integrity monitoring method performed at a computational machine in a linear communication orbit. The computational machine...
2018/0013767 Restricting Communications Between Subscriber Machines
A method of transferring information between subscribers associated with a communication service is disclosed. The method includes receiving a first handle...
2018/0013766 INFORMATION PROCESSING APPARATUS, METHOD OF CONTROLLING THE SAME, AND STORAGE MEDIUM
The information processing apparatus stores a cryptographic module and a key that the cryptographic module generated. The information processing apparatus...
2018/0013763 MULTI-TENANT IDENTITY AND DATA SECURITY MANAGEMENT CLOUD SERVICE
A system provides cloud-based identity and access management. The system receives a request from a client for an identity management service, authenticates the...
2018/0013762 System and Method for Secure Machine-To-Machine Communications
Embodiments of the present invention include a method for providing a secure domain name system (DNS) for machine to machine communications. In one embodiment,...
2018/0013761 SUB-NETWORKS BASED SECURITY METHOD, APPARATUS AND PRODUCT
A method, apparatus and product for sub-networks based cyber security. One method for managing a local network, which is divided into subnets, comprises:...
2018/0013760 CCTV MONITORING SYSTEM FOR REGISTERING CAMERA AND MANAGING PERMISSION AND CONTROL METHOD THEREOF
The present invention provides a CCTV monitoring system for registering a camera and managing permission, and a control method of the system. In other words,...
2018/0013757 System and Method of Generating and Using Bilaterally Generated Variable Instant Passwords
Implementations of a system and method of generating and using bilaterally generated variable instant passwords are disclosed. The system is used to secure...
2018/0013755 LOGON USING MASTER PASSWORD OR TURN-VARYING PASSWORD
Embodiments utilize two types of passwords that each, separately, allow a device user to logon to a network. The first is a master password that allows a user...
2018/0013753 BYPASSING CERTIFICATE PINNING
A client application performs certificate pinning as a means of authenticating the identity of a server. A proxy is interposed in the communications path of...
2018/0013751 VEHICLE, VEHICLE SYSTEM INCLUDING THE SAME, AND CONTROL METHOD OF VEHICLE SYSTEM
A vehicle includes a storage to store an authority value representing authority to access vehicle data generated by at least one vehicular component and a...
2018/0013750 Systems and Methods for Task Access Behavior Based Site Security
A method for task access behavior based site security includes recording file accesses by an application and user during operation; automatically generating a...
2018/0013745 METHODS, APPARATUSES & COMPUTER PROGRAM PRODUCTS FOR UTILIZING VISUAL AUTHENTICATION TOKENS AS CROSS-PLATFORM...
An apparatus is provided for facilitating cross-platform authentication. The apparatus may include at least one memory and at least one processor configured to...
2018/0013741 MESSAGE PROCESSING DEVICE AND MESSAGE PROCESSING METHOD
A message processing device includes a memory and a processor coupled to the memory. The processor is configured to receive a transmission instruction from a...
2018/0013738 METHOD FOR AUTHENTICATING CLIENT SYSTEM, CLIENT DEVICE, AND AUTHENTICATION SERVER
Provided are a client system authentication method, a client device, and an authentication server. The client system authentication method includes acquiring a...
2018/0013737 SYSTEMS, METHODS AND DEVICES FOR DIRECT COMMUNICATION
Device to device (D2D) communication can be performed with packet data convergence protocol (PDCP) based encapsulation without internet protocol (IP)...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.