Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,948,706 Preemptive address mapping for server load balancing
A method and an apparatus for global server load balancing are described. Attributes of a set of network addresses may be maintained. Each network address may...
US-9,948,705 Load balanced network file accesses
A system comprises control circuitry that is operable to assign a first of a plurality of computing devices to serve file system requests destined for any of a...
US-9,948,704 Determining a best fit coordinator node in a database as a service infrastructure
A computer-implemented method for determining a coordinator node in a database as a service (DBaaS) infrastructure includes receiving, via a processor on a...
US-9,948,703 System and method for signaling through data storage
An application platform system and method. A data synchronization instance manages a reference state object for a data synchronization system (DSS) account. A...
US-9,948,702 Web services documentation
A method for distributing documentation for an application service includes receiving, at an endpoint configured to provide an application service, a...
US-9,948,701 System and method for integrating an electronic pointing device into digital image data
A method and system is provided for creating an integrated video stream based on relative location and movement of a wireless pointing device. The system...
US-9,948,700 ADFDI support for custom attribute properties
In various embodiments, methods, systems, and non-transitory computer-readable media are disclosed that expand the ability of integrated workbook developers to...
US-9,948,699 Scoring content based on social interaction
Methods, systems, and apparatus, including computer programs encoded on computer storage medium, for identifying a set of items of digital content displayed to...
US-9,948,698 Web services documentation
A method for distributing documentation for an application service includes receiving, at an endpoint configured to provide an application service, a...
US-9,948,696 Cloud service control and management architecture expanded to interface the network stratum
Disclosed is a method comprising: transmitting, by a cloud service control gateway (CSCG) positioned in an application stratum, a resource query to a network...
US-9,948,695 Enabling delivery of protected content using unprotected delivery services
Disclosed are an apparatus and method configured to perform media file encryption. One example method may include retrieving a media file stored in a memory...
US-9,948,694 Addressing application program interface format modifications to ensure client compatibility
An approach is described for addressing API modifications to ensure client compatibility. An associated method may include receiving, via a communications...
US-9,948,693 Generic cloud service for publishing data to be consumed by RSS readers
Data from applications is published using a web feed document such as according to the Really Simple Syndication (RSS) protocol. The applications can be...
US-9,948,692 Apparatus, method, and computer readable medium for providing a presentation on a network having a plurality of...
An apparatus, method, and computer readable medium is disclosed for receiving in a client node a timing command indicating a time at which to display a...
US-9,948,691 Reducing input processing latency for remotely executed applications
Disclosed are various embodiments for reducing input processing latency for remotely executed applications. An application is executed in a hosted environment,...
US-9,948,690 Caching media in a media fling system
Aspects of the disclosure relate to a content (e.g., media) transfer or fling platform system and method. In a media fling platform system, media items may be...
US-9,948,688 Grid encoded media asset data
Metadata can identify temporal segments of content associated with a media asset and can identify asset data types. In response to a request for a particular...
US-9,948,687 Network interface device and method having passive operation mode and noise management
A system, method and device provide passive operation mode and noise management. The system, in one embodiment, includes power loss bypass and upstream noise...
US-9,948,686 Method and apparatus for sharing DLNA device
A method and an apparatus for sharing a DLNA device are provided. The method includes: establishing a data channel between a first DLNA gateway in a first DLNA...
US-9,948,685 Smart home system using portable device
A smart home system using a portable device in which a gateway function is installed in the portable device to provide a smart home service using a multiplex...
US-9,948,684 Multi-access gateway for direct to residence communication services
Different residences can be communicatively linked to a communication backbone via a multi-access gateway, where each residence comprises an adapter through...
US-9,948,683 Enforcing usage policies on combinations of collected data to be disseminated to destination systems
This disclosure relates to enforcing restrictions on data collected from a first set of systems and disseminated to a second set of systems. For example, a...
US-9,948,682 Data resource control through a control policy defining an authorized context for utilization of a protected...
Disclosed is a method, a device, and/or a system of a data resource control data structure. In one embodiment, a computer-implemented method includes receiving...
US-9,948,681 Access control monitoring through policy management
A computing resource service receives a request to access the service and perform various actions. In response to the request, the computing resource service...
US-9,948,680 Security configuration file conversion with security policy optimization
Systems and methods for converting a configuration file from a first language into a second language with policy optimization and auditing are provided....
US-9,948,679 Object-relation user interface for viewing security configurations of network security devices
In a computer implemented method, selectable device icons that represent respective network security devices are generated for display. Responsive to a...
US-9,948,678 Method and system for gathering and contextualizing multiple events to identify potential security incidents
A method and system for aggregating and correlating disparate and unrelated events to enable faster security event detection. A plurality of event logs...
US-9,948,677 System and method for secure synchronization of data across multiple computing devices
A computer implemented method and apparatus comprises detecting a file content update on a first client computer system, the file to be synchronized on a...
US-9,948,676 System and method for securing documents prior to transmission
A system and method for securing documents attached to emails is disclosed. The system and method apply security rules to an email as it is being composed to...
US-9,948,675 Identity-based internet protocol networking
A network architecture that eliminates anonymous traffic, reduces a threat surface, and enforces policies is described herein. A method based on this network...
US-9,948,674 Splicing into an active TLS session without a certificate or private key
An origin server selectively enables an intermediary (e.g., an edge server) to shunt into and out of an active TLS session that is on-going between a client and...
US-9,948,673 Reliable timestamp credential
A process for generating an access credential by a communication device may include determining whether a communication device successfully executed a...
US-9,948,672 Simulating unauthorized use of a cellular communication network
Described embodiments include a system that includes a digital memory and a processor. The processor is configured to simulate, using information stored in the...
US-9,948,671 Method and system for network-based detecting of malware from behavioral clustering
A computerized system and method for performing behavioral clustering of malware samples, comprising: executing malware samples in a controlled computer...
US-9,948,670 Cloud security-based file processing by generating feedback message based on signature information and file...
The invention discloses a cloud security-based file processing method and apparatus. The method comprises: generating a signature identifier uniquely...
US-9,948,669 Method and system for application migration due to degraded quality of service
A method and system for managing an application in a cloud data center by monitoring the bandwidth of a subnet of which the primary operating instance of an...
US-9,948,668 Secure host communications
A trusted device includes a secure interface and a host interface, the secure interface being isolated from the host interface by an isolated environment. A...
US-9,948,667 Signature rule processing method, server, and intrusion prevention system
A signature rule processing method, a server, and an intrusion prevention system is provided. The method includes: performing, by a cloud server, correlation...
US-9,948,666 Forecasting and classifying cyber-attacks using analytical data based neural embeddings
A first collection including an analytical feature vector and a Q&A feature vector is constructed. A second collection is constructed from the first collection...
US-9,948,665 Persistent cross-site scripting vulnerability detection
Various techniques for detecting a persistent cross-site scripting vulnerability are described herein. In one example, a method includes detecting, via the...
US-9,948,664 Method and system for correlation and management of distributed and heterogeneous events
Event processing is a vital aspect of modern information systems, but is poorly supported and homogenous in nature. The present disclosure recognizes that any...
US-9,948,663 Systems and methods for predicting security threat attacks
A computer-implemented method for predicting security threat attacks may include (1) identifying candidate security threat targets with latent attributes that...
US-9,948,662 Providing security in a communication network
Systems and methods for optimizing system resources by selectively enabling various scanning functions relating to user traffic streams based on the level of...
US-9,948,661 Method and apparatus for detecting port scans in a network
A method and an apparatus for detecting a port scan in a network are disclosed. For example, the method extracts statistics from a message, detects the port...
US-9,948,660 Computer security based on hierarchical cache latency signature authentication
A processor is coupled to a hierarchical memory structure which includes a plurality of levels of cache memories that hierarchically cache data that is read by...
US-9,948,659 Context based management for secure augmented reality applications
An example system that allows a camera enabled application, such as an augmented reality application, to run in a protected area may include a first device...
US-9,948,658 System and method for authorizing and validating user agents based on user agent location
An embodiment of a method includes receiving a request from a user agent to use a communication network, determining that the user agent is not recognized on...
US-9,948,657 Providing an enterprise application store
Methods, systems, and computer-readable media for providing an application store are presented. In some embodiments, a request for a software application may be...
US-9,948,656 Indirect user authentication
As disclosed herein, a computer program product, executed by a computer, includes receiving, from a user, a request for access to a shared system, wherein the...
US-9,948,655 Data access authorization for dynamically generated database structures
Techniques for determining user authorization to access data in dynamically generated database structures are presented. A method can commence upon receiving...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.