Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,923,955 Virtual fencing gradient to incrementally validate deployed applications directly in production cloud computing...
A method and a system for enabling resource consumption for one or more applications running in a virtual production environment within a production environment...
US-9,923,954 Virtual fencing gradient to incrementally validate deployed applications directly in production cloud computing...
A method and a system for enabling resource consumption for one or more applications running in a virtual production environment within a production environment...
US-9,923,953 Extending mobile applications to the lock screen of a mobile device
App content, such as an app notification, is displayed on a lock screen or home screen of a mobile device even when the app is closed. In contrast to present...
US-9,923,952 Cloud application deployment
A system (100) includes an application model (140) to characterize a given application (110) for deployment on a cloud (130). A deployment manager (120)...
US-9,923,951 Placeshifting recommendations using geolocation and related systems and methods
Methods and systems are provided for placeshifting data. An exemplary method of placeshifting a media program from a source device to a destination device over...
US-9,923,950 Systems and methods involving features of terminal operation including TOS-agnostic and/or other features
Systems and methods are disclosed associated with processing information involving terminal operating systems. According to one illustrative implementation, an...
US-9,923,949 All-electronic ecosystems for design and collaboration
This invention presents Ecosystems addressing limited capabilities for interactive team design, amidst thrust for improved productivity, enhanced creativity and...
US-9,923,948 Method of acquiring vehicle contents, method of displaying vehicle contents, system for displaying vehicle...
Disclosed is a method of acquiring vehicle contents, the method including receiving contents from a service provision server, acquiring meta information on the...
US-9,923,947 Method and system for providing media programming
A method of generating media programming includes the steps of providing by an aggregator to a client a list of feeds; receiving by the aggregator from the...
US-9,923,946 Moving a portion of a streaming application to a public cloud based on sensitive data
A streams manager determines which portions of a streaming application process sensitive data, and when performance of the streaming application needs to be...
US-9,923,945 Virtual assets for on-demand content generation
A method is provided in one example embodiment and includes generating a key associated with a virtual asset associated with content to be provided to a client...
US-9,923,944 System to communicate media
A system for communicating media is disclosed. Such a system may include, for example, a media broken into a plurality of independent segment files that may...
US-9,923,943 Low energy data streaming service
A service may provide media content metadata describing available media content to reader devices, the service including a zeroth characteristic indicating a...
US-9,923,942 Using messaging associated with adaptive bitrate streaming to perform media monitoring for mobile platforms
Methods, apparatus, systems, storage media, etc., to perform media monitoring for mobile platforms using messaging associated with adaptive bitrate streaming...
US-9,923,941 Method and system for dynamic proximity-based media sharing
Disclosed embodiments provide an approach for sharing media items between mobile devices that are in proximity to one another. A device ID is generated and...
US-9,923,940 Operating a group chat session
A first chat controller receives a request to create a group chat session, and creates the session, including determining a first local chat ID for the session....
US-9,923,939 Electronic share server, screen sharing method, and program for electronic share server
The electronic share server allowing user terminals to share a screen receives a connection request each from a sender's user terminal 100a and a receiver's...
US-9,923,938 Managing drop-ins on focal points of activities
A computer-implemented method manages drop-ins on conversations near a focal point of proximal activity in a gathering place. One or more processors receive a...
US-9,923,937 Dynamic personalized content presentation to re-engage users during online sessions
Users can participate in various different types of online sessions, such as webinars, massive open online courses (MOOCs), social learning sessions, and so...
US-9,923,936 System and method for third party monitoring of voice and video calls
A system is described herein that facilitates the monitoring of inmate communications. The system provides a remotely-accessible means for a reviewer to monitor...
US-9,923,935 Apparatus, system and method of supporting streaming over a protocol adaptation layer (PAL)
Some demonstrative embodiments include apparatuses, systems and/or methods of supporting streaming over a Protocol Adaptation Layer (PAL). For example, an...
US-9,923,934 Method and apparatus for VOIP communication completion to a mobile device
A system and method for establishing a voice over Internet protocol link to a called party's mobile telephony device utilizes push notifications to activate a...
US-9,923,933 Enhancing user experience for internet protocol multimedia core network subsystem based communication services
User experience is enhanced for Internet Protocol Multimedia Core Network Subsystem (IMS) based rich communication services in telecommunication environments. A...
US-9,923,932 Electronic messaging exchange
A computer-implemented system and method for secure electronic message exchange including coupling a control platform to a workstation of a plurality of...
US-9,923,931 Systems and methods for identifying violation conditions from electronic communications
Some aspects of the present disclosure relate to systems and methods for identifying potential violation conditions from electronic communications. In one...
US-9,923,930 Selectively enabling and disabling biometric authentication based on mobile device state information
Methods, systems, and computer-readable media for selectively enabling and disabling biometric authentication are presented. In some embodiments, a computing...
US-9,923,929 Systems and methods for in-session refresh of entitlements associated with web applications
The described technology provides a capability to perform in-session updates to entitlements associated with a user's access to content served by a web...
US-9,923,928 Automated generation of access control rules for use in a distributed network management system that uses a...
An access control rule authorizing communication between a plurality of managed servers within an administrative domain is determined. Communication information...
US-9,923,927 Methods and systems for enabling access control based on credential properties
Methods and systems are provided to enable access control based on credential properties. Besides authenticating a credential, an authentication service can...
US-9,923,926 Seamless management of untrusted data using isolated environments
Approaches for managing potentially malicious files using one or more isolated environments. In response to receiving a request to perform an action on a file,...
US-9,923,925 Cyber security sharing and identification system
Systems and techniques for sharing security data are described herein. Security rules and/or attack data may be automatically shared, investigated, enabled,...
US-9,923,924 Endpoint policy change
Endpoint device policy change can, in various examples, include detecting a change in a first registered attribute associated with an endpoint device on a...
US-9,923,923 Secure transport channel using multiple cipher suites
Cipher suites and/or other parameters for cryptographic protection of communications are dynamically selected to more closely match the intended uses of the...
US-9,923,922 Virtualized network honeypots
Disclosed are various embodiments for virtualized network honeypots. In one embodiment, client computing devices that are coupled to a network are each...
US-9,923,921 Disarming malware in digitally signed content
Systems and methods for disarming malicious code in digitally-signed content are provided. An example method includes determining that content is associated...
US-9,923,920 Detecting computer security threats in electronic documents based on structure
In an embodiment, a method providing an improvement in remediating vulnerabilities in computer security comprising: receiving, using a network tap of a sensor...
US-9,923,919 Safe intelligent content modification
A computer-implemented method for deflecting abnormal computer interactions includes receiving, at a computer server system and from a client computer device...
US-9,923,918 Methods and systems for controlling access to computing resources based on known security vulnerabilities
Methods and systems are provided for fine tuning access control by remote, endpoint systems to host systems. Multiple conditions/states of one or both of the...
US-9,923,917 System and method for automatic calculation of cyber-risk in business-critical applications
A system for calculating cyber-risk in a software application includes a cyber-risk calculator. The cyber-risk calculator receives a security assessment result...
US-9,923,916 Adaptive web application vulnerability scanner
Adaptive methods and systems are provided to scan websites/Web applications for vulnerabilities. The methods and systems identify a reference string in a first...
US-9,923,915 Systems and methods for providing cybersecurity analysis based on operational technologies and information...
The disclosed technology can acquire a first set of data from a first group of data sources including a plurality of network components within an energy...
US-9,923,914 Systems and platforms for intelligently monitoring risky network activities
Technology for improving and monitoring data communication security is presented herein. The technology monitors a plurality of sources of risky activities,...
US-9,923,913 System and method for malware detection learning
Malware detection techniques that detect malware by identifying the C&C communication between the malware and the remote host, and distinguish between...
US-9,923,912 Learning detector of malicious network traffic from weak labels
Techniques are presented that identify malware network communications between a computing device and a server utilizing a detector process. Network traffic...
US-9,923,911 Anomaly detection supporting new application deployments
In one embodiment, a device in a network maintains information regarding anomaly detection models used in the network and applications associated with traffic...
US-9,923,910 Dynamic installation of behavioral white labels
In one embodiment, a device in a network analyzes data regarding a detected anomaly in the network. The device determines whether the detected anomaly is a...
US-9,923,909 System and method for providing a self-monitoring, self-reporting, and self-repairing virtual asset configured...
A trigger event monitoring system is provided in one or more virtual assets. One or more trigger parameters, including security threat patterns, are defined and...
US-9,923,908 Data protection in a networked computing environment
Approaches for providing data protection in a networked computing environment are provided. A method includes detecting, by at least one computer device, a...
US-9,923,907 Push notifications of system events in a restricted network
Methods, computing systems and computer program products implement embodiments of the present invention that include associating a token with a computing...
US-9,923,906 System, method and computer program product for access authentication
A method and technique for access authentication includes: responsive to receiving an access request from a user for a secure resource, transmitting a uniform...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.