Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0054492 METHOD AND DEVICE FOR SUPPORTING SERVICE BY USING APPLICATION SERVICE PLATFORM IN WIRELESS COMMUNICATION SYSTEM
The present specification relates to a method by which a device supports a service by using an application service platform (ASP) in a wireless communication...
2018/0054491 MAINTAINING DISTRIBUTED STATE AMONG STATELESS SERVICE CLIENTS
Techniques for managing distributed state for stateless transactions are disclosed herein. In some embodiments a distributed state manager detects a...
2018/0054490 SYSTEM FOR DISTRIBUTED INTELLIGENT REMOTE SENSING SYSTEMS
An Internet of things (IoT) system, including a distributed system of virtual machines, includes at least one IoT platform system control engine, that includes...
2018/0054489 CONTROL DEVICE AND CONTROL METHOD
A control device includes a processor configured to generate, in a learning phase, an operation model by using application information regarding an application...
2018/0054488 System and Method for Decision-Making Based on Source Addresses
An automation system that does not require any of the source node devices transmitting packets of information to have knowledge of the recipients of those...
2018/0054487 SYSTEM AND METHOD FOR DATA COMMUNICATION BASED ON IMAGE PROCESSING
Various aspects of a system and method for data communication based on image processing are disclosed herein. In accordance with an embodiment, the system...
2018/0054486 Speculative Requests
A distributed storage (DS) unit, which is part of a distributed storage network (DSN), receives multiple speculative requests from another processing device...
2018/0054485 METHODS, SYSTEMS AND DEVICES FOR PARALLEL NETWORK INTERFACE DATA STRUCTURES WITH DIFFERENTIAL DATA STORAGE AND...
Systems, methods and devices relating to a network-accessible data storage device comprising a network interface in data communication with a network, the...
2018/0054484 SYSTEM AND METHOD FOR POLICY BASED FIBRE CHANNEL ZONING FOR VIRTUALIZED AND STATELESS COMPUTING IN A NETWORK...
A method is provided in one example embodiment and includes connecting one or more storage arrays to a switch; connecting one or more servers to the switch;...
2018/0054483 UPLOADING USER AND SYSTEM DATA FROM A SOURCE LOCATION TO A DESTINATION LOCATION
Automated uploading of user and system data from one or more source computing systems to one or more destination storage repositories is provided. A data...
2018/0054482 Request Multiplexing
The embodiments provide request multiplexing whereby a server receiving a first request for content clones and issues the cloned request to an origin to...
2018/0054481 SYSTEM AND METHOD FOR SYNCHRONIZING MEDIA PRESENTATION AT MULTIPLE RECIPIENTS
A network media delivery system includes client devices and a host device. Each client device has a network interface, an engine for processing media data, and...
2018/0054480 INTERRUPT SYNCHRONIZATION OF CONTENT BETWEEN CLIENT DEVICE AND CLOUD-BASED STORAGE SERVICE
Technologies may be provided to interrupt a synchronization of content between a client device and a cloud-based storage service. A usage pattern associated...
2018/0054479 REMOTE POSTAGE PRINTING USING EFFICIENT LOAD BALANCING OF POSTAGE REQUESTS
Systems and methods that allow only a single PSD to be used for a customer regardless of the number of servers in the system are provided. This is accomplished...
2018/0054478 VIRTUAL APPLICATION DELIVERY CHASSIS SYSTEM
A method for electing a master blade in a virtual application distribution chassis (VADC), includes: sending by each blade a VADC message to each of the other...
2018/0054477 STATISTICAL RESOURCE BALANCING OF CONSTRAINED MICROSERVICES IN CLOUD PAAS ENVIRONMENTS
A resource balancer for a cluster of nodes in a cloud computing system includes a load calculation module that receives load reports for respective load...
2018/0054476 VIDEO LOAD BALANCING SYSTEM FOR A PEER-TO-PEER SERVER NETWORK
A live-feed video balancing system includes a peer-to-peer server network wherein each server communicates with the remaining servers of the peer-to-peer...
2018/0054475 LOAD BALANCING SYSTEM AND METHOD FOR CLOUD-BASED NETWORK APPLIANCES
A load balancing system is provided including: one or more virtual machines implemented in a cloud-based network and including a processor; and a load...
2018/0054474 DYNAMICALLY INSTANTIATING AND TERMINATING DATA QUEUES
A computer-implemented method, system, and computer-readable media are disclosed herein. In embodiments, the computer-implemented method may entail receiving,...
2018/0054473 SYSTEM, METHOD AND RECORDING MEDIUM FOR CREATING A SOCIAL MEDIA SENSING POST
A social media sensing post creating method, system, and computer program product, include connecting to a plurality of devices within a predetermined area of...
2018/0054472 Data Collection and Estimation Using an Internet of Things
A thing-sourcing project request including requirements for a thing-sourcing task that requires data input by a thing-sourcing device is received from a...
2018/0054471 Hardware Bus Redirection
Examples disclosed herein relate to hardware bus redirection. Some examples disclosed herein may include storing, in a data storage, a connection type...
2018/0054470 STREAMING MEDIA RESOURCE DOWNLOADING METHOD AND APPARATUS, AND TERMINAL DEVICE
A streaming media resource downloading method includes: determining that a first media file is a to-be-downloaded media file according to first network...
2018/0054469 STATE ANALYSIS OF REMOTE COMPUTING IMAGES
Systems and methods for analyzing a computing image (e.g., container image, virtual disk image) while it is on a remote node in a secured environment. An...
2018/0054468 SYSTEMS AND METHODS FOR MEDIA TUNNELING THROUGH EDGE SERVER
Embodiments provide systems and methods for exchanging media through an edge server between different communication networks. More specifically, embodiments of...
2018/0054467 AVAILABILITY-BASED VIDEO PRESENTATION MANAGEMENT
Disclosed aspects relate to availability-based video presentation management using a social networking environment. A user request for a provision of a set of...
2018/0054466 MULTIPLE AVATAR PERSONALITIES
Perception of multiple online personas is enabled in an instant messaging communications session. At least two identities within a communications environment...
2018/0054465 GENERATIVE VISUAL PUZZLE FOR ALIGNING CONNECTED DEVICES
A request from a plurality of mobile devices to join a group may be received. A number of the mobile devices that have joined the group may be identified....
2018/0054464 METHOD AND SYSTEM FOR COLLABORATIVE INTELLIGENT VIRTUAL AGENTS
The present teaching relates to method, system, and medium of automatic re-routing a chat user in a dialog. A request is first received for re-routing the chat...
2018/0054463 SECURITY DOMAIN MANAGEMENT METHOD, APPARATUS, AND SYSTEM
The present invention provides a security domain management method, apparatus, and system, which relate to the communications field, and can manage, according...
2018/0054462 METHOD AND SYSTEM FOR CONFIGURING SIMPLE KERNEL ACCESS CONTROL POLICY FOR ANDROID-BASED MOBILE TERMINAL
A method of configuring a simple kernel access control policy for an Android-based mobile terminal includes: creating an entire list in a file system of a...
2018/0054461 ALLOWING ACCESS TO FALSE DATA
In one aspect, a device includes a processor and storage accessible to the processor. The storage bears instructions executable by the processor to determine...
2018/0054460 TECHNIQUES TO PROVIDE NETWORK SECURITY THROUGH JUST-IN-TIME PROVISIONED ACCOUNTS
Techniques to contain lateral movement of attackers through just-in-time (JIT) provisioned accounts comprising an account management component to receive a...
2018/0054459 SYSTEMS AND METHODS FOR NETWORK ACCESS CONTROL
Network access control systems and methods are provided herein. A method includes receiving at a network device a SYN packet from a client device over a...
2018/0054458 SYSTEM AND METHOD FOR MITIGATING DISTRIBUTED DENIAL OF SERVICE ATTACKS IN A CLOUD ENVIRONMENT
A data network includes a data processor, a network device, and a DDoS Protection System (DPS). The data processor provides an application to a user system....
2018/0054457 Analyzing DNS Requests for Anomaly Detection
A computer-implemented method for detecting anomalies in DNS requests comprises receiving a plurality of DNS requests generated within a predetermined period....
2018/0054456 WEBSITE SECURITY TRACKING ACROSS A NETWORK
Website security tracking is provided which includes, for instance, collecting, by a processor, event-specific information related to a suspicious event at a...
2018/0054455 UTILIZING TRANSPORT LAYER SECURITY (TLS) FINGERPRINTS TO DETERMINE AGENTS AND OPERATING SYSTEMS
A computer system receives a first information detailing a TLS fingerprint. A computer system determines an amount of bad transactions associated with the TLS...
2018/0054454 CLOUD COMPUTING ENVIRONMENT ACTIVITY MONITORING
A computer-implemented method according to one embodiment includes identifying a cloud computing environment, establishing a baseline associated with input and...
2018/0054453 STORAGE ENVIRONMENT ACTIVITY MONITORING
A computer-implemented method according to one embodiment includes identifying a storage environment, establishing a baseline associated with input and output...
2018/0054452 MODEL WORKFLOW CONTROL IN A DISTRIBUTED COMPUTATION SYSTEM
A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The...
2018/0054451 SECURITY IN VIRTUALIZED COMPUTING ENVIRONMENTS
A computer implemented method to identify one or more parameters of a configuration of a target virtual machine (VM) in a virtualized computing environment...
2018/0054450 SMART INTRUSION PREVENTION POLICY
A data packet is received. The data packet is a unit of data transmitted across a packet-switched network. A determination is made whether a new connection is...
2018/0054449 Methods and Systems for Protecting Computing Devices from Non-Benign Software Applications via Collaborative...
A network and its devices may be protected from non-benign behavior, malware, and cyber attacks by configuring a server computing device to work in conjunction...
2018/0054448 APPARATUS AND METHOD FOR SECURELY MANAGING THE ACCESSIBILITY TO CONTENT AND APPLICATIONS
A system that incorporates the subject disclosure may perform, for example, receive secret information and non-secret information from a secure download...
2018/0054447 METHOD FOR SECURELY COMMUNICATING EMAIL CONTENT BETWEEN A SENDER AND A RECIPIENT
One variation of a method for end-to-end encryption of electronic mail includes: receiving an email encrypted according to a first encryption protocol and...
2018/0054446 COMMUNICATION SUPPORT SYSTEM
A communication support system among a plurality of users within a hierarchical structure is disclosed herein. An electronic note may be transcribed using a...
2018/0054445 Blackbox Program Privilege Flow Analysis with Inferred Program Behavior Context
A computer-implemented method for performing privilege flow analysis is presented. The computer-implemented method includes monitoring at least one program...
2018/0054444 SCALABLE APPLICATION-AS-A-SERVICE ENVIRONMENT AND SYSTEMS AND METHODS USEFUL IN CONJUNCTION THEREWITH
A computerized method of managing a computer remote session operation, comprising providing a server for hosting application execution; configuring a number of...
2018/0054443 UTILIZING TRANSPORT LAYER SECURITY (TLS) FINGERPRINTS TO DETERMINE AGENTS AND OPERATING SYSTEMS
A computer system receives, from a first set of computing devices, a first information. The computer system creates a model based on the first information,...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.