At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
SERVICE CAPABILITIES IN HETEROGENEOUS NETWORK
In some implementations, a telecommunications network can include a core network device. The core network device can receive from a session-originating device...
Systems and Methods of Making a Call
Systems and methods of making calls are provided. A particular method includes receiving input indicating a destination address at a mobile communication...
Personal Network Access Control System and Method
A server is provided that includes a processor such that for a Session Initiation Protocol (SIP) request containing a Uniform Resource Identifier (URI)...
COMMUNICATION WITH ACCESSORIES
A plurality of connections may be established between an accessory interface and a plurality of accessories. A connection between the accessory interface and a...
CRISSCROSS CANCELLATION PROTOCOL
Technologies, systems, and methods for ordered message delivery that avoid message races or crisscrosses between communicating nodes. For example, if Node A...
MANAGED REAL-TIME COMMUNICATIONS BETWEEN USER DEVICES
Managed real-time communications between user devices may be provided. Upon receiving a request to instantiate a communication connection from an application,...
Systems and Methods for Rule-Based Anomaly Detection on IP Network Flow
A system to detect anomalies in internet protocol (IP) flows uses a set of machine-learning (ML) rules that can be applied in real time at the IP flow level. A...
INFORMATION PROCESSING APPARATUS AND CONTROL METHOD FOR INFORMATION
In an information processing apparatus that communicates with a printing control apparatus, whether the printing control apparatus is connected is determined...
SYSTEM AND METHOD FOR PROVIDING USER WITH SERVICES
Improper communication using modified software is inhibited without checking game data itself. A system according to one embodiment realizes provision of an...
SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR SHARING CONTENT VIA LINKS
In accordance with embodiments, there are provided mechanisms and methods for sharing content via links. These mechanisms and methods for sharing content via...
DETECTING AND BREAKING CAPTCHA AUTOMATION SCRIPTS AND PREVENTING IMAGE
A security device may receive a request from a client device and intended for a server device. The security device may identify the request as being associated...
Systems, methods and apparatuses for analyzing a string of terms (e.g., a search query, text of an email, and the like) are provided. In some examples, a...
VIRTUAL MACHINE COMPLIANCE CHECKING IN CLOUD ENVIRONMENTS
One or more examples provide a method of transferring a virtual machine between a virtualized computing system and a cloud computing system that includes:...
EXPOSURE OF AN APPARATUS TO A TECHNICAL HAZARD
Embodiments of the invention are directed to systems, methods and computer program products for determining exposure of an apparatus to a technical hazard and...
DIFFERENTIAL DEPENDENCY TRACKING FOR ATTACK FORENSICS
Methods and systems for intrusion attack recovery include monitoring two or more hosts in a network to generate audit logs of system events. One or more...
NETWORK ATTACK DETECTION METHOD
It is described a network attack detection method. A topology analysis on network is conducted to obtain a probing path set containing at least one probing...
Filtering Network Traffic Using Protected Filtering Mechanisms
Concepts and technologies are disclosed herein for filtering network traffic using protected filtering mechanisms. An indication that traffic is to be filtered...
INFORMATION PROCESSING APPARATUS, SECURITY MANAGEMENT METHOD AND
INFORMATION PROCESSING SYSTEM
When security software is activated, it is determined whether the mode is a safe mode or a normal mode. And the security software switches a monitor in...
PREVENTING EXECUTION OF TASK SCHEDULED MALWARE
A method for preventing malware attacks includes the steps of detecting an attempt on an electronic device to access a task scheduler, determining an entity...
RELIABLE USER-DEVICE CONTENT AND MEDIA DELIVERY APPARATUSES, METHODS AND
The RELIABLE USER-DEVICE CONTENT AND MEDIA DELIVERY APPARATUSES, METHODS AND SYSTEMS ("SEME") can allow for the delivery of electronic content in malware and...
Method, Apparatus, and Computer Program Product for Privacy Management
An apparatus for privacy management may include a processor. The processor may be configured to access one or more privacy options. In this regard, each...
TIME-BASED CONFIGURATION PROFILE TOGGLING
Time-based configuration profile toggling of a client device can be provided. A computing device in data communication with a client device over a network can...
APPLYING FORWARDING POLICY TO AN APPLICATION SESSION
A method for applying a security policy to an application session, includes recognizing the application session between a network and an application via a...
COMMUNICATIONS SYSTEM, MANAGEMENT SERVER, AND COMMUNICATIONS METHOD
A communications system includes communications terminals connected to a management server. The management server includes a terminal manager managing data...
ENFORCING ALIGNMENT OF APPROVED CHANGES AND DEPLOYED CHANGES IN THE
SOFTWARE CHANGE LIFE-CYCLE
On a host, host content change requests are intercepted in real-time. In a tracking mode, the change requests are logged and allowed to take effect on the...
An example method for accessing a target resource in accordance with aspects of the present disclosure includes retrieving a configuration from a local profile...
SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR SHARING FILES BASED ON
USER PROFILE VISIBILITY
In accordance with embodiments, there are provided mechanisms and methods for sharing files based on user profile visibility. These mechanisms and methods for...
Providing Restricted Access to Given Devices by Constructing Abstract
Methods, systems, and computer program products for providing restricted access to given devices by constructing abstract devices are provided herein. A method...
METHOD AND SYSTEM FOR DATA SESSION ESTABLISHMENT
A method and system for data session establishment from a mobile device in a multiple networks scenario, the method including, checking whether an identifier...
Anti-Hacking System for Quantum Communication
A method and apparatus for reducing unauthorized access of an information stream. The information stream is received at a node along a path to a destination...
SYSTEM, METHOD, AND APPARATUS FOR AUTHENTICATION
An authentication apparatus updates a first execution information entry corresponding to a first identification information entry of an authentication target...
DEVICE AND AUTHENTICATION SYSTEM
A device includes a storage unit that stores generated challenges which are challenges previously generated, a determination unit that determines whether a...
SECURITY VERIFICATION METHOD, APPARATUS AND TERMINAL
Disclosed are a security verification method, apparatus, and terminal. The method includes: acquiring a first verification code and prompting the first...
SYSTEMS AND METHODS TO AUTHENTICATE IDENTITY FOR SELECTIVE ACCESS TO
INFORMATION RELATING TO PROPERTY
Credential and/or location data included in data received by a networked system from a device that communicated the data to the networked system may be...
SECURE TWO-WAY AUTHENTICATION USING ENCODED MOBILE IMAGE
A digital authentication method, system, and related devices/media, the authentication method comprising displaying a web page comprising one or more website...
INFORMATION PROCESSING DEVICE, WIRELESS COMMUNICATION SYSTEM, INFORMATION
PROCESSING METHOD, AND PROGRAM
[Object] To propose an information processing device, wireless communication system, information processing method, and storage medium which can mutually...
SYSTEM AND METHOD TO PROVIDE INTERACTIVE, USER-CUSTOMIZED CONTENT TO
A method of displaying content to a user within a managed space comprised of one or more touch-free interactive kiosks includes collecting user data about the...
METHOD OF PROVIDING SNS-GROUP INVITING SERVICE AND SNS SERVER THEREFOR
A method for registering a device to a server is provided. The method includes connecting a first device to a second device, the first device having been...
SYSTEMS AND METHODS FOR DISTRIBUTED TRUST COMPUTING AND KEY MANAGEMENT
Devices, systems, and methods for conducting trusted computing tasks on a distributed computer system are described. In some embodiments, a client device...
CONTROLLED USE OF A HARDWARE SECURITY MODULE
Methods are provided for using a hardware module connectable to multiple computer systems, where the multiple computer systems are connectable to a server...
AUTHENTICATION FOR OVER THE TOP BROADCAST STREAMING USING AUTOMATED
An authenticator in a second user device captures a media sample comprising at least one of an audio portion, a video portion or an image portion. The media...
Attesting Authenticity of Infrastructure Modules
A user device is provided that includes an authentication application that runs on the user device. A calibration device is also provided that includes...
SYSTEM AND METHOD FOR ONE TIME PASSWORD-BASED AUTHENTICATION
Disclosed are a system and a method for one-time password (OTP)-based authentication. The system for OTP-based authentication includes a transceiver module...
Systems, methods, and other embodiments associated with bidirectional authentication are described herein. According to one embodiment, a method includes a...
NETWORK-ASSISTED FABRIC PAIRING
Systems and methods for joining a device to a fabric using an assisting device include an indication to add a joining device to a fabric. If the joining device...
CERTIFICATES FOR LOW-POWER OR LOW-MEMORY DEVICES
Methods and systems for generating or validating compact certificates include receiving a first format of the certificate. Moreover, obtain a signature for the...
LATE BINDING AUTHENTICATION
A late-binding token (LBT) is securely generated and provided to a device application. When the LBT is presented and validated, a resource associated with the...
SYSTEM AND METHOD INVOKING SECURITY AND PROFILE UTILITIES FOR GLOBAL
Systems and methods are disclosed herein for managing electronic access from remote devices to a plurality of back-end computer platforms. The system includes...
Identity and Access Management
An access management account that includes an access identifier may be used to control access to telecommunications services or applications. An access...
METHOD FOR LOGGING OF A REMOTE CONTROL SESSION
A method for logging of a remote control session, for use in a remote control system comprising a session initiator operable to initiate a remote control...