Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: California





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,010,4809 Thermal management system for an aircraft avionics bay
A system for managing heat transfer is provided by the present disclosure, which in one form includes a cavity having an inner wall portion, at least one...
US-1,010,4800 Adjustable snap-in rail assembly for storage rack
A rail assembly for a storage rack that includes, in one aspect, a first rail member, a second rail member, and a nut assembly slidably mounted to the second...
US-1,010,4688 Method and apparatus for uplink channel access in a high efficiency wireless LAN
The present disclosure relates to a method and apparatus for uplink channel access in a High Efficiency WLAN (HEW). According to one aspect, a method for...
US-1,010,4664 Enhanced channel contention schemes for high-efficiency WLAN
A unified channel contention scheme is proposed such that spatial reuse can be enabled by a wireless station (STA) when a basic service set (BSS) color of a...
US-1,010,4645 Random access method of devices with different path loss
A method, an apparatus, and a computer program product for wireless communication are provided. According to one embodiment, a method of operating a device...
US-1,010,4636 Location information for voice over WLAN emergency calling
Briefly, in accordance with one or more embodiments, user equipment (UE) comprises processing circuitry to connect to a network via an untrusted wireless local...
US-1,010,4635 Unicast and broadcast protocol for wireless local area network ranging and direction finding
Disclosed embodiments pertain to a first STA may broadcast a first Null Data Packet Announcement (NDPA) frame with an indication of one or more second STAs...
US-1,010,4591 Coordinated packet data network change for selected internet protocol traffic offload
Coordinated P-GW change for SIPTO may be provided. A WTRU may send and/or receive one or more flows via a first PDN connection and via a first P-GW. The WTRU...
US-1,010,4553 Protected control frames
Certain aspects of the present disclosure generally relate to wireless communications and, more particularly, to protecting control frames with power-related...
US-1,010,4490 Optimizing the performance of an audio playback system with a linked audio/video feed
An audio system is provided that efficiently detects speaker arrays and configures the speaker arrays to output sound. In this system, a computing device may...
US-1,010,4426 Media channel identification and action with multi-match detection based on reference stream comparison
A computing system will compare various reference fingerprints each representing a reference media stream broadcast on a different respective known channel, and...
US-1,010,4424 Moving content between set top box and end devices in home
A content moving device which enables providing content stored on a first user device, such as a DVR, in a first format and resolution to be provided to a...
US-1,010,4421 Systems and methods for recording and playing back programs having desirable recording attributes
Systems and methods for recording multiple copies of a program are provided. The method may include receiving a user instruction to record a program. A...
US-1,010,4407 Method and device for network-assisted client-centric QoE optimization
In one implementation, a method performed by a client device includes: determining a perceptual characterization metric, where the perceptual characterization...
US-1,010,4401 Efficient software for transcoding to HEVC on multi-core processors
The latest High Efficiency Video Coding (HEVC) standard achieves significant compression efficiency improvement over the H.264 standard, at a much higher cost...
US-1,010,4375 Method for implementing a quantizer in a multimedia compression and encoding system
Method For Implementing A Quantizer In A Multimedia Compression And Encoding System is disclosed. In the Quantizer system of the present invention, several new...
US-1,010,4341 Animated user identifiers
Implementations relate to providing animated user identifiers. In some implementations, a computer-executed method includes determining that a video call over a...
US-1,010,4221 Language input presets for messaging
Conversation-based context rules for altering virtual reality (VR) gaming and for switching between input languages based on heuristics related to past...
US-1,010,4211 Rotatable electrical connector
A connecting system for an electronic device is disclosed herein. The connecting system may comprise a connector port including an alignment feature and two or...
US-1,010,4194 Method and apparatus for reducing loading time of web pages
A browser receives a web page that includes a script that is configured to control subsequent requests of the browser for at least the web page and caches a...
US-1,010,4176 Remote management for a computing device
Examples are disclosed for remote management of a computing device. In some examples, a secure communication link may be established between a network...
US-1,010,4170 System and method of assigning resource consumers to resources using constraint programming
A system and method of assigning resource consumers to resources using constraint programming is disclosed. The resource consumers are to be assigned to the...
US-1,010,4164 Aggregating plug-in requests for improved client performance
In one embodiment, computer-readable instructions, when executed, cause a client browser to wait for all of the markup language in a document object model to be...
US-1,010,4158 User invisible device diagnostic region in a distributed data storage network
A data storage system may generally have a controller connected to multiple separate data storage devices in a distributed network. Each data storage device may...
US-1,010,4154 Detecting carriers for mobile devices
In one embodiment, a method includes sending a request to a computing server from a mobile-client system for a multimedia object. The mobile-client system...
US-1,010,4145 System and method for caching data
A method of obtaining radio content from a remote electronic device for a user electronic device includes transmitting a request for radio media content to a...
US-1,010,4139 Selectively signaling selective tunnels in multicast VPNs
In some examples, a method includes receiving, by a first ingress network device for a network, a source tree join route message from an egress network device...
US-1,010,4135 Methods and systems for drag and drop content sharing in a multi-device environment
Methods and systems for interacting with graphical user interface elements to invoke commands and initiate requests in a multi-device environment are described.
US-1,010,4134 Automatic configuration of endpoint communication devices to set up a VOIP network
Implementations relate to automatic configuration of endpoint communication devices to set up a communication network such as a VOIP network. In some...
US-1,010,4132 Network-assisted fabric pairing
Systems and methods for joining a device to a fabric using an assisting device include an indication to add a joining device to a fabric. If the joining device...
US-1,010,4129 Confidentiality-based file hosting
Various embodiments provide confidentiality-based file hosting by automatically directing assets in a shared workspace to appropriate storage locations. The...
US-1,010,4128 Automatically configuring mobile devices and applying policy based on device state
Techniques for network-based security for mobile devices based on device state are disclosed. In some embodiments, automatically configuring mobile devices and...
US-1,010,4125 Enforcing universal access control in an information management system
A method and apparatus for controlling document access and application usage using centrally managed rules. The rules are stored and manipulated in a central...
US-1,010,4122 Verified sensor data processing
Sensor data may be filtered in a secure environment. The filtering may limit distribution of the sensor data. Filtering may modify the sensor data, for example,...
US-1,010,4121 Application layer-based single sign on
Methods and systems are provided for implementing application layer security. According to one embodiment, an application layer packet is received by a network...
US-1,010,4120 Command and control cyber vaccine
Provided are systems, methods, and computer program products for a cyber-antibody technique. In various implementations, the technique includes monitoring, by a...
US-1,010,4119 Short term certificate management during distributed denial of service attacks
In one embodiment, a distributed denial of service attack on a network is identified. In response to the distributed denial of service attack, a script to...
US-1,010,4117 Identifying user behavior in a distributed computing system
A list of electronic mail (e-mail) accounts is extracted from an electronic mail system. A list of electronic mail accounts, with forwarding enabled, are...
US-1,010,4113 Using machine learning for classification of benign and malicious webpages
In an embodiment, a data processing method providing an improvement in computer security, comprises selecting a uniform resource location (URL) for...
US-1,010,4112 Rating threat submitter
Example embodiments disclosed herein relate to update a rating of threat submitters. Information is received of threat observables from threat submitters....
US-1,010,4111 Network security for internet of things
Two wireless networks are established in a local network, one for less-secure IoT devices and one for more-secure conventionally networked devices, with a...
US-1,010,4109 Threat scores for a hierarchy of entities
A device for providing hierarchical threat intelligence includes a non-transitory machine-readable storage medium storing instructions that cause the device to...
US-1,010,4107 Methods and systems for behavior-specific actuation for real-time whitelisting
Various embodiments include methods of evaluating device behaviors in a computing device and enabling white listing of particular behaviors. Various embodiments...
US-1,010,4106 Determining internet-based object information using public internet search
A device may receive an object. The device may determine object information for the object. The device may cause an internet search, based on the object...
US-1,010,4105 Distributed network anomaly detection
A network device may include multiple interfaces, each including a local database to store, in a first group of local records, information associated with a...
US-1,010,4102 Analytic-based security with learning adaptability
An analytics-based security monitoring system is adapted to receive data, such as in the form of event logs, from one or more network devices transferred...
US-1,010,4101 Method and apparatus for intelligent aggregation of threat behavior for the detection of malware
Embodiments disclosed herein are directed to intelligent malware detection. A scanner server is used to scan an endpoint device for malware. Various attributes...
US-1,010,4100 Systems and methods for detecting anomalies that are potentially indicative of malicious attacks
A computer-implemented method for detecting anomalies that are potentially indicative of malicious attacks may include (1) identifying a sequence of activities...
US-1,010,4099 System and method for monitoring a computer system using machine interpretable code
A computer implemented method of monitoring a collector computer system includes receiving machine interpretable code that is configured for interpretation by...
US-1,010,4097 Systems and methods for preventing targeted malware attacks
The disclosed computer-implemented method for preventing targeted malware attacks may include (1) identifying at least one candidate risk factor for targets of...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.