Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: communication





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,860,282 Real-time synchronous communication with persons appearing in image and video files
Systems and methods are provided for enabling real-time synchronous communication with persons appearing in image or video files. For example, an image or video...
US-9,860,278 Log analyzing device, information processing method, and program
A log information collecting unit that collects log information and traffic information output from a plurality of communication devices included in a network;...
US-9,860,277 Normalized indications of compromise
Threat detection instrumentation is simplified by providing and updating labels for computing objects in a context-sensitive manner. This may include simple...
US-9,860,276 Emergent network defense
A system and method are provided of a node for use in a network having a plurality of nodes. The node is configured to identify neighboring node(s) within a...
US-9,860,275 Systems and methods to rotate security assets used for secure communications
Systems and methods to rotate security assets used to for secure communications are disclosed. The system includes receiving a first certificate that includes a...
US-9,860,273 Logging encrypted data communications for QOE analysis
A device such as a smartphone may communicate with a server or other network entity using encrypted communications, making it difficult to examine such...
US-9,860,272 System and method for detection of targeted attack based on information from multiple sources
Disclosed are methods, systems, and computer programs for detecting targeted attacks on compromised computer from multiple sources. An example method includes...
US-9,860,269 Managing data traffic in the presence of a sensitive site
Website security may be managed based on known site attributes and placing limits on communication outside a site. One example may include at least one of...
US-9,860,263 System and method for assessing data objects on mobile communications devices
A server receives from a mobile communication device information about a data object (e.g., application) on the device when the device cannot assess the data...
US-9,860,258 Host-based, network enabled, integrated remote interrogation system
An Enhanced Ethernet Network Interface Card (EENIC) interfaces with a host and a network. The EENIC includes an internal network interface controller (NIC), a...
US-9,860,257 Anomaly detection and threat prediction through combined power and network analytics
A network device communicates network traffic in one or more network flows via a plurality of ports. Each port is connected to a corresponding computing device....
US-9,860,248 Computer implemented method, communications system and computer programs products for securing operations in...
The computer implemented method comprising controlling the access to different resources and actions defined for a user by a first server, reducing the exposure...
US-9,860,245 System and methods for online authentication
A method of authenticating a network client to a relying party computer via a computer server comprises the computer server receiving a transaction code from a...
US-9,860,237 Password-based authentication in server systems
A system of .lamda..gtoreq.2 servers is provided. The server system comprises an access control server for communication with user computers via a network and...
US-9,860,235 Method of establishing a trusted identity for an agent device
A trusted identity may be established for an agent device for performing trusted communication with one or more application providing apparatuses. The method of...
US-9,860,233 Comprehensive authentication and identity system and method
A comprehensive authentication and identity system and method are disclosed. A central profile is created for a user which includes user information that can be...
US-9,860,232 Protecting network communication security
A method and apparatus for protecting a network communication security. In one embodiment, there is provided a method for protecting network communication...
US-9,860,231 Relay apparatus, communication apparatus and relay method
A relay apparatus is connected to a communication apparatus, a service providing apparatus and a browser-equipped apparatus. The relay apparatus includes: a...
US-9,860,225 Network directory and access service
A network directory service, responsive to receiving a target device symbolic name from a client, identifies a network access server in communication with a...
US-9,860,224 Systems and methods for secured entry of user authentication data
Techniques for improving security of transactions requesting user authentication data entry via mobile devices are described herein. The mobile device is...
US-9,860,220 Methods and devices having a key distributor function for improving the speed and quality of a handover
A key distributor node for a network includes a memory device with at least one first key, at least one data communication device that can exchange data with...
US-9,860,215 Firewall interface configuration to enable bi-directional VoIP traversal communications
Methods and systems for an intelligent network protection gateway (NPG) and network architecture are provided. According to one embodiment, a firewall provides...
US-9,860,213 Method and system for securing and protecting smart devices within the internet of things ecosystem
A gateway device including a network interface having wired and/or wireless connections to smart devices and a network access point. The gateway device also...
US-9,860,208 Bridging a virtual clone of a target device in a honey network to a suspicious device in an enterprise network
Techniques for bridging a honey network to a suspicious device in a network (e.g., an enterprise network) are disclosed. In some embodiments, a system for...
US-9,860,207 Methods of using beacon messages to discover devices across subnets
A method of discovering a device to be discovered in a communication network having multiple interconnected nodes includes transmitting, by a discoverer, at...
US-9,860,203 Methods, systems, and devices for generating a unique electronic communications account based on a physical...
A unique electronic communications account is generated and linked to a physical address of a user. A network of electronic mail addresses linked to physical...
US-9,860,201 Information processing system, information processing method, and non-transitory computer readable storage...
An information processing system includes a register module, a determining module, and a transfer module. The register module is configured to store event data...
US-9,860,194 Resource management methods and apparatus
Methods and apparatus for managing resource utilization in a distributed system are described. Devices, e.g., servers, which use resources, e.g., processing...
US-9,860,191 Method for constructing optimal time-controlled paths in a large computer network
Embodiments of the invention relate to the dynamic creation of TT paths in a large computer network having computer nodes, communication channels, and...
US-9,860,189 Systems and methods to enable network communications for management controllers
Systems and methods are provided that may be implemented to use memory as a shared interface between a management controller (e.g., such as embedded baseboard...
US-9,860,183 Data redirection in a bifurcated communication trunk system and method
A method, computer program product, and computing system for receiving return data of a dataflow on a first gateway of a first wired communication trunk within...
US-9,860,174 Methods and apparatus for acknowledgment of multi-user uplink wireless transmissions
Methods and apparatus for acknowledgment of multiple user uplink are provided. In one aspect, a method of wireless communication includes receiving a first...
US-9,860,173 General input/output architecture, protocol and related methods to implement flow control
A storage device is provided to maintain a count of flow control credits to be granted to a device in association with transactions over a channel to be...
US-9,860,165 Method and apparatus for detecting and avoiding interference in a communications network
A wireless mesh communication network includes a plurality of wireless routers which can be managed in a hierarchical manner with respect to one another and all...
US-9,860,162 Securing inter-autonomous system links
In one example, an autonomous system boundary router (ASBR) forms part of a first autonomous system (AS). The ASBR is between a first provider edge (PE) router...
US-9,860,161 System and method for computing a backup ingress of a point-to-multipoint label switched path
A method of Path Computation Element (PCE) Communication Protocol (PCEP) communication includes sending, to a path computation element (PCE), a request to...
US-9,860,159 Multi-path routing
Systems and methods are provided for dynamically routing packets using multi-flow and multi-path multiplexing connections. A first computing device and second...
US-9,860,158 Path information exchange method, communication node, communication system, and communication node program
The purpose of the present application is to provide a technique for the exchange of path information between different routing domains, which, while reducing...
US-9,860,156 Accessing local network resources in a multi-interface system
A method is provided for selectively routing data packets on a client device having of plurality of network interfaces for communicating over a network. The...
US-9,860,146 Method and apparatus for estimating available capacity of a data transfer path
A method and apparatus for estimating available capacity of a data transfer path (16) that transfers data between data communication nodes (12, 14) of a data...
US-9,860,145 Recording of inter-application data flow
Mechanism for two portions of an application to communicate so as to facilitate a transition from synchronous to asynchronous communication. In order to prepare...
US-9,860,144 Broadband cable network utilizing common bit-loading
A network for determining a common bit-loading modulation scheme for communicating between nodes in the network is disclosed. The network may include a...
US-9,860,136 Providing network congestion information to mobile devices for sponsored data
A third-party application, executing at a mobile device, may be provided with information describing congestion levels in a network, such as a cellular wireless...
US-9,860,128 Automated command and discovery process for network communications
The embodiments disclose a method for automatically communicating a command, received from a command server, to a set of nodes from a plurality of nodes on a...
US-9,860,121 System and method for processing bank notes
A system and a method for processing value documents comprises a multiplicity of bank-note processing machines connected and arranged to communicate with each...
US-9,860,118 System for deployment of communication terminals in a cloud computing system
A communication system includes a redirect server and a deployment server configured to configure different terminal devices so that those devices are able to...
US-9,860,117 Automatically generated virtual network elements for virtualized packet networks
Systems, methods, and software for providing a virtualized communication networking environment are provided herein. In one example, a method includes...
US-9,860,114 Rapid provisioning in a dynamic network environment
Processes and apparatus are presented for associating an endpoint connection with a port to which it is connected, and for allowing configuration of the port. A...
US-9,860,113 Using an out-of-band network to reconfigure a bus interface port
Provided are a computer program product, system, and method for using an out-of-band network to coordinate a first node reconfiguring a bus interface port used...
US-9,860,112 Techniques for synchronizing operations between regions when a network connection fails
A technique for synchronizing operations in a transaction processing system includes identifying, by a first recovery management connector (FRMC) in a first...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.