Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,025,0654 Method and apparatus for transceiving data packet for transmitting and receiving multimedia data
A method for transmitting complex multimedia data is provided. The method includes selecting one of a data headers composed of basic transmission units...
US-1,025,0653 Proximity service signaling protocol for multimedia broadcast multicast service operations
Methods, systems, and devices are describe for signaling protocols for proximity service functions in a wireless communication system. A first wireless device...
US-1,025,0652 Data transmission system, terminal device, program, and method
A data transmission system including a plurality of terminal devices that are connected to a communication network and that transmit or receive content data...
US-1,025,0651 Method and mobile terminal for publishing information automatically
A method and a mobile terminal for publishing information automatically are provided. The mobile terminal can publish information automatically, thereby...
US-1,025,0650 Discovery playlist creation
One embodiment provides a non-transitory medium containing computer program code that performs an operation that includes retrieving, for each of two or more...
US-1,025,0649 Communications system with sequenced chat, interactive and digital engagement functions
A networked communications system that facilitates real-time interaction with persons-of-interest. The communications system includes an event scheduling...
US-1,025,0648 Ambient communication session
In general, this disclosure describes techniques for initiating a communication session when a user indicates she or he is available to participate in the...
US-1,025,0647 Device triggering
Service layer and application triggering may be used in a machine-to-machine environment. In an embodiment, an existing service layer procedure, such as...
US-1,025,0646 Method and device for establishing channel
Embodiments of the present disclosure provide a method and a device for establishing a channel, capable of reducing data transmission path length when two...
US-1,025,0645 Intelligent controlled-environment facility resident communication and media device interfaces with multitasking
A controlled-environment facility resident interface runs on top of, or as part of, an operating system of a controlled-environment facility resident...
US-1,025,0644 Detection and removal of unwanted applications
A protection application detects and removes unwanted applications. The protection application scans a client device for suspected unwanted applications. A...
US-1,025,0643 Encryption compliance verification system
A compliance checker to verify that a device complies with a policy is described. In one embodiment, the compliance checker comprises a compliance checker...
US-1,025,0642 System, method and apparatus for fine-grained privacy specification and verification
A method includes receiving from a user via a user interface an activation of at least one element to set a privacy policy specifying the maximum amount of...
US-1,025,0641 Natural language dialog-based security help agent for network administrator
Network management technology as disclosed herein conducts conversational natural language dialog with a user to facilitate the user's analysis of network...
US-1,025,0640 Information infrastructure management data processing tools with tags, configurable filters and output functions
Method of organizing and storing data in an information infrastructure by either processing data throughput or a method for processing data throughput or data...
US-1,025,0639 Information infrastructure management data processing tools for processing data flow with distribution controls
Method of processing and organizing (sometimes sanitizing) data throughput in an information infrastructure of a distributed computing system with configurable...
US-1,025,0637 System and method of pre-establishing SSL session connections for faster SSL connection establishment
An appliance and a method of pre-establishing SSL session connections for SSL connection establishment are provided. The appliance comprises a secure session...
US-1,025,0636 Detecting man-in-the-middle attacks
MITM attacks are detected by intercepting network configuration traffic (name resolution, DHCP, ARP, ICMP, etc.) in order to obtain a description of network...
US-1,025,0635 Defending against DoS attacks over RDMA connections
A processor is configured to receive, from a client, a first message indicating a request to establish a connection between the client and a server, to...
US-1,025,0634 Apparatus, system, and method for protecting against denial of service attacks using one-time cookies
The disclosed apparatus may include (1) a storage device that stores a set of cookies that facilitate authenticating packets received from a node within a...
US-1,025,0632 Web service testing
Disclosed is a computer-implemented method and system of inferring a web service infrastructure from a web service hosted on a web server. The method includes:...
US-1,025,0631 Risk modeling
Approaches for modeling a risk of security breaches to a network. Agents gather, from multiple sources across the network, analysis data that identifies...
US-1,025,0630 System and method for providing computer network security
This disclosure relates generally to computer network, and more particularly to a system and method for providing computer network security. In one embodiment,...
US-1,025,0629 Captcha risk or score techniques
Captcha risk or score technique systems and methods are presented. A method can begin with extracting client information from the service request. The extracted...
US-1,025,0628 Storyboard displays of information technology investigative events along a timeline
Techniques and mechanisms are disclosed that enable network security analysts and other users to efficiently conduct network security investigations and to...
US-1,025,0627 Remediating a security threat to a network
Remediating a security threat to a network includes obtaining, from a network, security information about the network to determine traffic patterns of the...
US-1,025,0626 Attacking node detection apparatus, method, and non-transitory computer readable storage medium thereof
An attacking node detection apparatus, method, and computer program product thereof are provided. The attacking node detection apparatus stores a plurality of...
US-1,025,0625 Information processing device, communication history analysis method, and medium
An information processing device of the present invention includes: a degree-of-possibility calculation unit that calculates, based on a history of...
US-1,025,0624 Method and device for robust detection, analytics, and filtering of data/information exchange with connected...
A security appliance includes: a network port enabling direct connection to a gateway; a storage module having stored thereon firmware for operating the...
US-1,025,0623 Generating analytical data from detection events of malicious objects
A security server tracks malicious objects detected by malware detection applications that scan for malicious objects on clients. The security server also...
US-1,025,0621 Automatic extraction of indicators of compromise from multiple data sources accessible over a network
A processing device in one embodiment comprises a processor coupled to a memory and is configured to direct one or more web crawlers to obtain textual...
US-1,025,0620 Safe code for signature updates in an intrusion prevention system
Described is a technology by which a signature used by network traffic intrusion prevention/detection systems includes logic that helps a prevention/detection...
US-1,025,0619 Overlay cyber security networked system and method
An overlay cyber security networked system and method that includes one or more devices configured to monitor physical-level signal information to determine a...
US-1,025,0618 Active validation for DDoS and SSL DDoS attacks
Methods and systems for detecting and responding to Denial of Service ("DoS") attacks comprise: detecting a DoS attack or potential DoS attack against a first...
US-1,025,0617 Systems and methods for detecting malware using machine learning
A computer-implemented method for detecting malware using machine learning may include (1) identifying data to be analyzed for malware, (2) classifying, using a...
US-1,025,0616 Server and user terminal
A server includes communication circuitry configured to communicate with a plurality of external terminals, a storage which stores reference data for hardware...
US-1,025,0615 Analog security for digital data
Disclosed are various examples of providing analog security for digital data. Content is split into a plurality of framelets. A first framelet is sent to a...
US-1,025,0614 Account sharing prevention and detection in online education
An application delivers educational, entertainment or work-related content including videos and documents to any computing device of a user via an account, each...
US-1,025,0613 Data access method based on cloud computing platform, and user terminal
A data access method based on a cloud computing platform, and a user terminal, are provided. The method is performed by a user terminal, and the method includes...
US-1,025,0612 Cross-account role management
Approaches presented herein can provide for end-to-end auditing of cross-account roles. A user associated with a first account might request some degree of...
US-1,025,0611 Authenticating drivers
One or more devices in a data analysis computing system may be configured to receive and analyze movement data and determine driving trips based on the received...
US-1,025,0610 Method and system for communication control
A request for communicating with a first user is received by a second user. The request includes a first identification specific to the first user. The first...
US-1,025,0609 Privileged access to target services
A method of providing a client with a privileged access ticket (PAT) to access a target service is performed at a credentials management service (CMS) in...
US-1,025,0608 Methods and systems for managing a network node through a server
The present invention discloses methods and systems for managing a node through a management server. The management server verifies whether a management...
US-1,025,0607 Control systems and methods for providing user access to external devices via communications networks
Control systems and methods for providing a user with access to an external device via a communication network are provided, in which the external device is...
US-1,025,0606 Network access method, proximity communications server, relay terminal and terminal
Embodiments of the present invention provide a network access method, a proximity communications server, a relay terminal, and a terminal. The method includes:...
US-1,025,0605 Combining a set of risk factors to produce a total risk score within a risk engine
A risk engine can be configured to produce a total risk score by combining a set of risk factors. A risk policy can define a percentage that is to be assigned...
US-1,025,0604 Storage medium, information-processing device, information-processing system, and notification method
An example information-processing device, when accepting a login from a user (SA1), executes a first processing (SA2). The first processing is, for example,...
US-1,025,0603 Connection control for virtualized environments
The launching of new software code, virtual machines, and other such instances can undergo one or more scans before being fully available in an electronic...
US-1,025,0602 Authenticator centralization and protection
Provided is a method for authenticating a user communicating with an enterprise via a network. The method includes receiving, via the network, authenticators...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.