Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: communication





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,888,045 IP multimedia subsystem and method for MBMS file repair using HTTP servers
Disclosed in some examples is a method of media repair in an IMS based network, the method includes communicating with an IMS network using SIP to setup a...
US-9,888,044 Extending communication services to a consumption device using a proxy device
A system for data communications comprising a handset having a processor, a wireless communications device, a speaker and a microphone and one or more software...
US-9,888,043 Method for providing voice communication service and electronic device thereof
An apparatus and a method for providing a voice communication service using a Long Term Evolution (LTE) network in an electronic device are provided. A method...
US-9,888,041 Virtual communication endpoint services
Customers can utilize resources of a multi-tenant environment to provide one or more services available to various users. In order to simplify the process for...
US-9,888,039 Network-based permissioning system
Aspects of the present disclosure include a system comprising a computer-readable storage medium storing at least one program and a method for managing access...
US-9,888,038 Method and apparatus for providing mobile and social services via virtual individual servers
A method, computer readable medium and apparatus for providing a virtual individual server service within a communications network are disclosed. For example,...
US-9,888,033 Methods and apparatus for detecting and/or dealing with denial of service attacks
Methods and apparatus for detecting and minimizing the effects of Denial Of Service (DOS) attacks in high-speed networks in which packet processing is carried...
US-9,888,030 Detection of stealthy malware activities with traffic causality and scalable triggering relation discovery
A computer system for distinguishing user-initiated network traffic from malware-initiated network traffic comprising at least one central processing unit (CPU)...
US-9,888,026 Computer system for distributed discovery of vulnerabilities in applications
In one aspect, the disclosure provides: A method comprising: inviting a distributed plurality of researchers to participate in one or more computer...
US-9,888,018 Configuration management for network activity detectors
Network activity detectors, such as firewalls, communicate with one another to form a Unified Threat Management System. A first network activity detector sends...
US-9,888,017 Collaborative content evaluation
In an example embodiment, a system for evaluating published content is provided. The system includes at least one processor and a plurality of components...
US-9,888,016 System and method for detecting phishing using password prediction
Phishing detection techniques for predicting a password for decrypting an attachment for the purpose of malicious content detection are described herein....
US-9,888,011 Social media login and interaction management
A hardware or software firewall may be installed within a private network. The firewall may intercept a first set of login credentials entered into a login...
US-9,888,010 System and method for providing an integrated firewall for secure network communication in a multi-tenant...
An integrated firewall provides security in a multi-tenant environment having a connection-based switched fabric directly connecting database servers which...
US-9,888,007 Systems and methods to authenticate users and/or control access made by users on a computer network using...
A controller for user authentication and access control, configured to: store data representing a graph having: nodes representing data elements associated with...
US-9,888,005 Delivery of items for consumption by a user device
An item-providing system supplies items to a user device for consumption at the user device via communication infrastructure. The device may correspond to a...
US-9,887,996 Bidirectional authentication
Systems, methods, and other embodiments associated with bidirectional authentication are described herein. According to one embodiment, a method includes a user...
US-9,887,994 Data processing based on two-dimensional code
The present disclosure provides example methods and apparatuses of data processing based on a two-dimensional code. The two-dimensional code is generated upon...
US-9,887,993 Methods and systems for securing proofs of knowledge for privacy
Embodiments described herein relate to securing the privacy of knowledge used to authenticate a user (i.e., Proof of Knowledge (PoK) test(s)). In some...
US-9,887,987 Smartphone and computer application for personal meetings documentation that enables access to the...
An application that enables documentation of meetings using a Smartphone or internet-based communication programs installed on a computer whereby the...
US-9,887,980 Global time based authentication of client devices
A system for authenticating client devices for communication with one or more wireless communications networks, includes a client device configured to receive a...
US-9,887,978 System and method for centralized configuration and authentication
A system and method for efficiently obtaining user configuration information for a given device. Multiple devices are deployed in an environment and may be...
US-9,887,976 Multi-factor authentication using quantum communication
Multi-factor authentication using quantum communication ("QC") includes stages for enrollment and identification. For example, a user enrolls for multi-factor...
US-9,887,975 Systems and methods for delegated cryptography
In some embodiments, an authentication method comprises receiving a request for a digital signature of data from a delegate computer over a secure channel using...
US-9,887,974 Method for network communication past encryption devices
This disclosure is directed to techniques for providing communication between devices in different networks wherein the communication must first pass through an...
US-9,887,973 Private peer-to-peer data transfers
A computer system implements a peer-to-peer network that permits peer-to-peer data transfers with privacy with respect to the identities of requestor peers,...
US-9,887,972 Cryptanalysis method and system
A cryptanalysis method comprising: (A) Performing a ciphertext-only direct cryptanalysis of A5/1 and (B) Using results of Step (A) to facilitate the decryption...
US-9,887,966 Method and apparatus for mediating communications
A method of mediating communications between a first computing device and a second computing device, by an intermediary computing device, comprising...
US-9,887,945 System and method for unfiltering filtered status messages
An approach for unfiltering a filtered electronic communication is provided. In one aspect, a computer system receives filtered electronic communication,...
US-9,887,944 Detection of false message in social media
Communications in social networking environment are monitored and patterns of sharing a communication are identified. The patterns of sharing are compared to...
US-9,887,940 Selectively translating portions of electronic messages
A method, system and computer program product for instant message communication in a wireless and non-wireless environment. A message is sent from a mobile unit...
US-9,887,938 Enhanced audio video bridging (AVB) methods and apparatus
A network device determines that a frame priority of a received frame is a value corresponding to an audio video bridging (AVB) communication protocol. When the...
US-9,887,926 Wireless communication system
A data signal is transmitted in a wireless communication system from a primary station to a secondary station. The data signal comprising a medium access...
US-9,887,925 Network performance enhancement
Methods for overcoming latency and throughput degradation ensuing from packet fragmentation performed at a source node are disclosed. Some embodiments of the...
US-9,887,921 Methods and nodes for handling congestion in backhaul networks
The present invention relates to nodes and method in such nodes of a Radio Access Network or a Backhaul Network connected to the Radio Access Network comprising...
US-9,887,920 Terminal, control device, communication method, communication system, communication module, program, and...
A terminal communicating with a network including a forwarding device for forwarding a packet and a control device for controlling the forwarding device in...
US-9,887,914 Communication path selection for content delivery
Disclosed herein are methods, systems, and software for modifying a communication path based on latency. In one example, a method of operating a content node to...
US-9,887,911 Systems, methods, and devices for adaptive communication in a data communication network
Disclosed herein are devices, systems, methods, and computer-program products for multiplexing data from multiple transport protocols in computing. Dynamic,...
US-9,887,909 Network elements, integrated circuits and methods for routing control
A method for identifying whether a selective internet protocol transport opportunity (SIPTO) route is allowed to be used by at least one wireless communication...
US-9,887,908 Data processing lock signal transmission
In accordance with one aspect of the present description, a node of the distributed computing system has multiple communication paths to a data processing...
US-9,887,907 Base station initiated control mechanism for supporting supplemental link
Methods, systems, and apparatuses are described for a base station initiated control mechanism for supporting supplemental a link. In some aspects, control...
US-9,887,893 System, method and program for detecting anomalous events in a network
A communication device detects whether anomalous events occur with respect to at least one node in a utility network. The communication device has recorded...
US-9,887,890 Wireless communication between wireless communication devices
Methods and apparatus for operating a first apparatus in a communication system. The method comprises receiving content from a second apparatus, and determining...
US-9,887,887 Information throttle based on compliance with electronic communication rules
Throttles electronic devices based on compliance with rules for electronic communications such as emails, texts, or postings on social media sites. Rules may...
US-9,887,883 Systems and methods of discovering and controlling devices without explicit addressing
A method of discovering a device in a communication network having multiple interconnected nodes includes continuously monitoring, by a device to be discovered,...
US-9,887,870 Methods and apparatuses for signaling with geometric constellations
Communication systems are described that use signal constellations, which have unequally spaced (i.e. `geometrically` shaped) points. In many embodiments, the...
US-9,887,868 Techniques using a first band of communication to determine frequency synchronization for communication on a...
Various embodiments are generally directed to an apparatus, method and other techniques to determine a first frequency offset for a first band of communication...
US-9,887,866 Method and apparatus for converting analog radio frequency (RF) signals to the digital domain in a multiband...
Methods and systems are provided for converting wideband analog radio frequency (RF) signals. In an implementation, a first wideband analog RF signal may be...
US-9,887,858 Method and apparatus for using demodulation reference signal multiplexing in wireless communication
The present solution discloses a method and apparatus for controlling demodulation reference signal allocation of a user equipment by utilizing a cyclic shift...
US-9,887,856 Methods and systems for network switch configuration for a modular component carrying one or more information...
A method may include, receiving, by a controller integral to a chassis, a user request to apply a switch configuration. The method may also include ...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.