Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,025,7256 IOT interaction system
Systems and methods for facilitating interactions with embedded devices are provided. In one embodiment, a method can include obtaining a first set of data...
US-1,025,7255 Hierarchical organization for scale-out cluster
Performing a distributed data operation. A method includes receiving a request for one or more data operations from a first computing system, such as a client....
US-1,025,7254 Method and associated server for providing user-friendly operation
A server includes a web page service module, a first CGI module and a second CGI module, in which the first CGI module and the second CGI module correspond to...
US-1,025,7253 Systems, methods, and media for correlating information corresponding to multiple related frames on a web page
Systems, methods, and media for correlating information corresponding to multiple related frames on a web page are provided. In some embodiments, a method for...
US-1,025,7252 Transmission apparatus, communication method, and storage medium
A transmission apparatus includes a storage unit configured to store a content, a notification unit configured, in a case where contents identified by a list of...
US-1,025,7251 Systems and methods for using a uniform resource locator to call for different types of content
This disclosure relates to systems and methods for using a uniform resource locator to retrieve content for both a first application and a second application....
US-1,025,7250 Management system, server, client, and method thereof
A server stores association between client information and a network device as a management target of a client corresponding to the client information. In...
US-1,025,7249 Method and system for communicating content to a client device by pulling content from a publisher from a...
A content delivery network and method for operating the same includes a content delivery network (CDN) origin server and a content delivery network edge server...
US-1,025,7248 Scalable and iterative deep packet inspection for communications networks
Systems and methods for scalable and iterative deep packet inspection for communication networks are disclosed. According to one embodiment, a system comprises...
US-1,025,7247 Method, device, and computer program for encapsulating and parsing timed media data
The invention relates according to one of its embodiments to a method for encapsulating a video bitstream organized into slice segments, the slice segments...
US-1,025,7246 Content distribution via a distribution network and an access network
A method and apparatus for streaming content to an access network in an interactive information distribution system. The method encapsulates the content in...
US-1,025,7245 Association of user interactions at a first venue with the user for use in a second venue
There is provided a server and method for association of user interactions of a first venue and a second venue. The server including a memory storing a user...
US-1,025,7244 Method for synchronizing a rich media action with an audiovisual change, corresponding device and computer...
The invention relates to a method for synchronizing an action in a piece of Rich Media.RTM. content with a change in a piece of audiovisual content, said Rich...
US-1,025,7243 Electronic media distribution system
A system and method for sharing electronic content. A sending user can specify one or more criteria that a recipient memory device must have to store the...
US-1,025,7242 Internet provider subscriber communications system
A system, method, and computer readable medium for communicating at least one real-time specially-composed bulletin message to at least one subscriber of a...
US-1,025,7241 Multimodal stream processing-based cognitive collaboration system
A collaboration system includes a stream processing engine and a Bot subsystem. The stream processing engine performs cognitive processing of multimodal input...
US-1,025,7240 Online meeting computer with improved noise management logic
In an embodiment, a method for calculating a noise index value for a digital audio source in a server computer system that is coupled to a plurality of audio...
US-1,025,7239 Packet switched voice service registration techniques with reduced overhead
This disclosure relates to techniques for reducing overhead associated with packet switched voice service registration. According to some embodiments, a...
US-1,025,7238 Apparatus, system, and method of determining destination for state information, and recording medium
A control system includes a plurality of control apparatuses each capable of controlling a first communication terminal connected to the control apparatus. Each...
US-1,025,7237 Recovering from and avoiding network connectivity loss
Systems and methods are disclosed for monitoring and recovering from internal and external network connectivity losses. The systems and applications implement...
US-1,025,7236 Sensor gateway
A sensor gateway manages wireless communications to sensors and the exchange of data between the sensors and a connection to the Internet. A sensor gateway...
US-1,025,7235 Systems and methods for implementing network gateway in catastrophe context or the like
A system has a plurality of communications devices within a geographic area. Each device is capable of communicating from within the geographic area with any...
US-1,025,7234 Method and apparatus for controlling handover procedure in wireless communication system
A method is provided for controlling a handover procedure in a wireless communication system. In a method for operating a base station, whether a session setup...
US-1,025,7233 Method for providing wireless application privilege management
A method for providing an administration policy to a user device comprising a plurality of applications, the method comprising centrally generating the...
US-1,025,7232 Endpoint agent for enterprise security system
An endpoint security agent facilitates a security policy on an endpoint computing device. The endpoint agent comprises an engine and one or more plugins that...
US-1,025,7231 Centralized validation of email senders via EHLO name and IP address targeting
A DNS server receives from a receiving email system, a DNS query for an email domain stored at the DNS server, the DNS query including identifying information...
US-1,025,7230 System and method for encryption key management, federation and distribution
Systems and methods are described for orchestrating a security object, including, for example, defining and storing a plurality of policies in a database...
US-1,025,7229 Systems and methods for verifying users based on user motion
The disclosed computer-implemented method for verifying users based on user motion may include (1) instructing a user of a mobile device to physically move in a...
US-1,025,7228 System and method for real time detection and prevention of segregation of duties violations in...
A system is configured for real time detection and prevention of segregation of duties violations in business-critical applications. The system includes a...
US-1,025,7227 Computer security threat correlation
A computer security threat sharing technology is described. An example method may include receiving security threat information transmitted over a computing...
US-1,025,7226 Identifying and trapping wireless based attacks on networks using deceptive network emulation
A system and method are provided that enable identifying and trapping cyber security attacks via wireless connectivity on enterprise and corporate networks. A...
US-1,025,7225 Systems and methods for artificial intelligence driven agent campaign controller
The present disclose describes systems and methods for creating a simulated phishing campaign for a user based on at least a history of the user with respect to...
US-1,025,7224 Method and apparatus for providing forensic visibility into systems and networks
Methods and systems for providing forensic visibility into systems and networks are provided. More particularly, a sensor agent may receive events defining an...
US-1,025,7223 Secured home network
Malware detection logic executed by a secured device residing in a home network may receive a message from an unsecured device of a first unsecured network and...
US-1,025,7222 Cloud checking and killing method, device and system for combating anti-antivirus test
A cloud checking and killing method for combating an anti-antivirus test includes receiving, by a cloud sever, a cloud checking and killing request for...
US-1,025,7221 Selective sinkholing of malware domains by a security device via DNS poisoning
Techniques for selective sinkholing of malware domains by a security device via DNS poisoning are provided. In some embodiments, selective sinkholing of malware...
US-1,025,7220 Verifying success of compromising a network node during penetration testing of a networked system
A method of carrying out a penetration testing campaign of a networked system by a penetration testing system comprising (A) a penetration testing software...
US-1,025,7219 Correlated risk in cybersecurity
Computer-implemented methods are provided herein for quantifying correlated risk in a network of a plurality of assets having at least one dependency, where...
US-1,025,7218 Runtime protection of web services
Protecting a runtime Web service application. A web service application is instrumented to log its operation and allow recreation of its execution trace. Trace...
US-1,025,7217 Methods and systems for ranking, filtering and patching detected vulnerabilities in a networked system
Systems and methods for determining priority levels to process vulnerabilities associated with a networked computer system can include a data collection engine...
US-1,025,7216 Method and system for obtaining and analyzing forensic data in a distributed computer infrastructure
A system for obtaining and analyzing forensic data in a distributed computer infrastructure. The system includes a plurality of computing devices and at least...
US-1,025,7215 Identifying and disabling a rogue access point in a public wireless environment
A system for identifying a wireless security threat on a vehicle. The system includes a broadband controller including a data processor and memory in which the...
US-1,025,7214 Using a machine learning classifier to assign a data retention priority for network forensics and retrospective...
In one embodiment, a device in a network receives traffic data regarding one or more traffic flows in the network. The device applies a machine learning...
US-1,025,7213 Extraction criterion determination method, communication monitoring system, extraction criterion determination...
An extraction criterion determination method performed by an extraction criterion determination apparatus includes collecting a log information entry that is in...
US-1,025,7212 Method and system for detecting malware
A system and method of analysis. NX domain names are collected from an asset in a real network. The NX domain names are domain names that are not registered....
US-1,025,7211 Method, apparatus, and computer-readable medium for detecting anomalous user behavior
An apparatus, computer-readable medium, and computer-implemented method for detecting anomalous user behavior, including storing user activity data collected...
US-1,025,7209 System and methods for protecting users from malicious content
A method, system and device for allowing the secure collection of sensitive information is provided. The device includes a display, and a user interface capable...
US-1,025,7208 Method and system for using a network analysis system to verify content on a website
A system and method for verifying content on a network site is provided. A document such as a website is identified. The document is accessed over a network...
US-1,025,7207 Managed clone applications
Disclosed are various embodiments relating to managed clones of applications. In one embodiment, an application is received. If it is determined that the...
US-1,025,7206 Monitoring actions performed by a network of peer devices using a blockchain
A blockchain of transactions may be referenced for various purposes and may be later accessed by interested parties. One example may comprise one or more of...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.