Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0191810 Network Routing Tool
A middleware system validation tool comprising includes a retrieval engine, and a network component status engine. The retrieval engine retrieves a pre-change...
2018/0191809 INFORMATION PUBLISHING METHOD, DEVICE AND SERVER
The present invention provide an information publishing method and device and a server, wherein the method comprises: the server receiving published...
2018/0191808 AUDIO-BASED DATA STRUCTURE GENERATION
Routing packetized actions in a voice activated data packet based computer network environment is provided. A system can receive audio signals detected by a...
2018/0191807 COMMUNICATION PROTOCOLS IN INTEGRATED SYSTEMS
A system and methods comprise a touchscreen at a premises. The touchscreen includes a processor coupled to a security system at the premises. User interfaces...
2018/0191806 SYSTEMS AND METHODS FOR RESUMABLE UPLOADING OF DATA IN A SOCIAL NETWORKING SYSTEM
Systems, methods, and non-transitory computer readable media can receive a request to upload a file from a user. A server of a plurality of servers can be...
2018/0191805 IN-COLLABORATIVE CONTENT ITEM NOTIFICATIONS IN SHARED COLLABORATIVE CONTENT ITEMS
A collaborative content management system allows users to access collaborative content items. When a client device accesses a shared collaborative content...
2018/0191804 SEQUENCE DEPENDENT DATA MESSAGE CONSOLIDATION IN A VOICE ACTIVATED COMPUTER NETWORK ENVIRONMENT
Systems and methods to combine multiple voice activated audio input data packets that indicate sequence dependent operations are provided. A natural language...
2018/0191803 LOW LATENCY MEDIA STREAMING
Examples of the present invention provide a method of reducing the latency in streaming live media by a client from a server. The client uses manifest...
2018/0191802 NANOSECOND ACCURACY UNDER PRECISION TIME PROTOCOL FOR ETHERNET BY USING HIGH ACCURACY TIMESTAMP ASSIST DEVICE
In methods, systems, and devices, master and slave node timestamp synchronization units identify a node start frame delimiter of a time protocol message on...
2018/0191801 ADAPTIVELY UPDATING CONTENT DELIVERY NETWORK LINK IN A MANIFEST FILE
An online system more efficiently streams multimedia content over the Internet for play back on client devices with varying computing power and network...
2018/0191800 DECISION ENGINE FOR DYNAMICALLY SELECTING MEDIA STREAMS
An online system receives content (e.g. video content and/or audio content) from a content provider device to be appropriately transcoded and distributed to...
2018/0191799 EFFECTIVELY FETCH MEDIA CONTENT FOR ENHANCING MEDIA STREAMING
An online system more efficiently streams multimedia content over the Internet for play back on client devices with varying computing power and network...
2018/0191798 METHODS AND SYSTEMS FOR SERVER-SIDE RENDERING OF NATIVE CONTENT FOR PRESENTATION
Systems and methods for server-side rendering of native content for presentation within an environment of an application are provided. A method includes...
2018/0191797 DYNAMICALLY GENERATING CUSTOMIZED MEDIA EFFECTS
The present disclosure is directed toward systems and methods for generating dynamic media effects ready for sending/posting to allow for in-moment sharing of...
2018/0191796 METHOD FOR DYNAMICALLY MANAGING CONENT DELIVERY
Methods and systems are provided for bitrate adaptation of a video asset to be streamed to a client device for playback. The method includes selecting a...
2018/0191795 VEHICLE DETECTION FOR MEDIA CONTENT PLAYER CONNECTED TO VEHICLE MEDIA CONTENT PLAYER
A system for automatically initiating a travel mode of a media playback device is disclosed. The system operates to determine that the media playback device is...
2018/0191794 SEAMLESS SWITCHING BETWEEN MULTICAST VIDEO STREAMS
A packet-based video network including: two or more video data sources, each configured to launch video data packets onto the network as multicast data packets...
2018/0191793 Multicast overlay network for delivery of real-time video
A method of multicasting real-time video is described. The method begins by establishing a multicast network of machines capable of ingress, forwarding and...
2018/0191792 Live Broadcast on an Online Social Network
In one embodiment, a method includes sending, to a social-networking system, information to initiate a live-broadcast session for distribution of a media...
2018/0191791 ENHANCED TIME-SERIES DATA STREAMS FOR TRANSMISSION TO MOBILE DEVICES
A method includes receiving a stream of time-series data. The time-series data was generated by a data generating device. The stream of time-series data is...
2018/0191790 DOCUMENT CONTENT POOL
A method, a computing device and a computer program product are provided. A content pool view is displayed on a display. The content pool view includes a node...
2018/0191789 AUTOMATIC CALL FORWARDING DURING SYSTEM UPDATES
A method includes identifying a system update for a first device. A forwarding command is sent from the first device to a service provider that provides...
2018/0191788 MULTIMODAL TRANSMISSION OF PACKETIZED DATA
A system of multi-modal transmission of packetized data in a voice activated data packet based computer network environment is provided. A natural language...
2018/0191787 COMMUNICATION TERMINAL, COMMUNICATION SYSTEM, COMMUNICATION METHOD, AND DISPLAY METHOD
A communication terminal includes a memory and circuitry. The memory stores, for each image type information indicating a type of image data, sizes of a...
2018/0191786 COMMUNICATION SYSTEM
A communication entity includes a Proxy Call Session Control Function (P-CSCF). The P-CSCF includes a transceiver and a controller. The transceiver is operable...
2018/0191785 METHOD AND DEVICE FOR MAKING SECURE CALL IN MULTI-PARTY CALL, AND MULTI-PASS TERMINAL
Method and device for making a secure call in a multi-party call, and a multi-pass terminal are provided. The method includes: setting up a secure service data...
2018/0191784 Selectively Enabling and Disabling Biometric Authentication Based on Mobile Device State Information
Methods, systems, and computer-readable media for selectively enabling and disabling biometric authentication are presented. In some embodiments, a computing...
2018/0191783 SELECTIVELY APPLYING INTERNET PROTOCOL SECURITY (IPSEC) ENCRYPTION BASED ON APPLICATION LAYER INFORMATION
A network device may receive a packet flow, and may identify an application associated with the packet flow. The network device may determine that packets...
2018/0191782 USER EQUIPMENT CONTAINERS AND NETWORK SLICES
A communication device comprises a container environment with a plurality of containers each having one or more applications and each being connectable to a...
2018/0191781 DATA INSIGHTS PLATFORM FOR A SECURITY AND COMPLIANCE ENVIRONMENT
A multi-purpose platform may collect different types of signals such as metadata, documents, activities, etc. and correlate in a multi-stage evaluation...
2018/0191780 TECHNOLOGIES FOR PRIVACY-PRESERVING SECURITY POLICY EVALUATION
Technologies for privacy-safe security policy evaluation include a cloud analytics server, a trusted data access mediator (TDAM) device, and one or more client...
2018/0191779 Flexible Deception Architecture
Methods and systems for are provided. Exemplary methods include: getting an image for the application; creating an instance of the application in a container...
2018/0191778 SYSTEM AND METHOD FOR GATHERING INFORMATION TO DETECT PHISHING ACTIVITY
A method for detecting phishing resources through collection of URL links. The method is executable by a web server and comprises receiving, by the web server,...
2018/0191777 SYSTEM AND METHOD FOR DETECTING PHISHING WEB PAGES
A method for detecting a phishing web page. The method, executable at a sever, comprises detecting at least one unique web page attribute that allows to...
2018/0191776 SYSTEMS AND METHODS FOR PERFORMING SIMULATED PHISHING ATTACKS USING SOCIAL ENGINEERING INDICATORS
Systems and methods are provided for performing simulated phishing attacks using social engineering indicators. One or more failure indicators can be...
2018/0191775 DETECTION OF UNWANTED ELECTRONIC DEVICES TO PROVIDE, AMONG OTHER THINGS, INTERNET OF THINGS (IoT) SECURITY
Systems and methods for detection of undesired/unwanted electronic devices are provided. According to one embodiment, a spectral signature of an electronic...
2018/0191774 METHOD AND SYSTEM FOR SHUNTING REFLECTIVE DDOS TRAFFIC
Disclosed are a method and system for shunting reflective DDOS traffic. The method includes: acquiring and detecting data flow of a network node A to obtain an...
2018/0191773 SYSTEM AND METHOD FOR MITIGATING DISTRIBUTED DENIAL OF SERVICE ATTACKS
A method and associated system for mitigating a Distributed Denial of Service (DDoS) attack on a target device including, receiving a plurality of data packets...
2018/0191772 Dynamic Session Rate Limiter
Provided are methods and systems for dynamically limiting new sessions. A method for dynamically limiting new sessions may commence with initiating a dynamic...
2018/0191771 THREAT INTELLIGENCE MANAGEMENT IN SECURITY AND COMPLIANCE ENVIRONMENT
Threat intelligence management is provided in a security and compliance environment. A threat explorer platform or module of a security and compliance service...
2018/0191770 REMEDIAL ACTIONS BASED ON USER RISK ASSESSMENTS
In some implementations, a method includes receiving, for each of multiple users, user activity data describing actions taken by the user by use of a user...
2018/0191769 AUGMENTED REALITY MONITOR
Systems, apparatuses and methods may provide for technology that identifies augmented reality (AR) content associated with an AR delivery system and detects a...
2018/0191768 CYBER THREAT INTELLIGENCE THREAT AND VULNERABILITY ASSESSMENT OF SERVICE SUPPLIER CHAIN
Determining the cyber threat risk and vulnerability of an organization may be determined taking in to account the chain of service suppliers to the organization.
2018/0191767 Cyber Threat Intelligence System Infrastructure
A cyber threat intelligence infrastructure allows processing of network data to enrich captured data with data from different sources to identify possible...
2018/0191766 DYNAMIC ASSESSMENT AND CONTROL OF SYSTEM ACTIVITY
Techniques are disclosed relating to monitoring computer system activity. In some embodiments, a computing device receives information from observation...
2018/0191765 METHOD AND APPARATUS FOR CALCULATING RISK OF CYBER ATTACK
Provided are a method and apparatus for calculating a risk of cyber attacks, and, more particularly to a method and apparatus for calculating a risk of cyber...
2018/0191764 AUTOMATIC WEBPAGE CHANGE DETECTION
An improved web crawler, associated method of crawling the Internet, and automatically detection of crawled webpage changes are provided. The method comprises...
2018/0191763 SYSTEM AND METHOD FOR DETERMINING NETWORK SECURITY THREATS
System and methods for determining network threats are disclosed. For each entity operating in a network being monitored for network security, an example...
2018/0191761 METHOD AND APPARATUS FOR DETECTING CYBERTHREATS THROUGH CORRELATION ANALYSIS
Disclosed is a method for detecting a cyberthreat through correlation analysis of security events, which includes extracting a false-positive data set by...
2018/0191760 CLOUD SERVICE USAGE RISK ANALYSIS BASED ON USER LOCATION
A system and method for filtering detected anomalies in cloud service usage activities associated with an enterprise uses a trusted location analysis to filter...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.