At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
METHOD AND APPARATUS FOR CONTENT DISTRIBUTION OVER A NETWORK
A method that incorporates teachings of the subject disclosure may include, for example performing, by a wireless communication device comprising a processor,...
MULTIFUSION OF A STREAM OPERATOR IN A STREAMING APPLICATION
Embodiments of the present disclosure include a method, a system, and a computer program product for fusing a stream operator into more than one processing...
BROADCAST RESPONSE SYSTEM
A broadcast response system provides, e.g., a radio broadcast listener with the ability to obtain media content such as music or speech while listening to the...
SESSION DESCRIPTION INFORMATION FOR OVER-THE-AIR BROADCAST MEDIA DATA
An over-the-air (OTA) broadcast middleware unit is configured to receive aggregated session description data for a plurality of sessions, wherein each of the...
BROADCASTING IN COMMUNICATION NETWORKS
In one embodiment, a first node is adapted for communication with a plurality of additional nodes of a communication network, such as a Delaunay Triangulation...
Method for the Processing of a Multimedia Stream, Corresponding Device and
A method is provided for processing multimedia streams between a platform for digital distribution of interactive applications and a customer terminal,...
METHOD FOR TRANSFERRING CONTROL OF A CONFERENCE CALL
A method for transferring control of an existing multi-participant conversation in which at least two communication terminals are connected to each other...
PROVIDING A MEETING LINK TO A PARTICIPANT WHO HAS LEFT A LOCATION OF THE
In one embodiment, a method includes identifying a first device as being located at a first physical location associated with a meeting, and determining when...
REMOTE CALLING METHOD AND APPARATUS
Disclosed are a remote calling method and terminal, wherein the method includes: a service end registering released services to a register center; a client end...
METHOD AND APPARATUS FOR ENABLING COMMUNICATIONS BETWEEN USERS
A method and device are provided for creating and utilizing a database which enables ascribing a plurality of communication addresses to each of a plurality of...
METHOD AND APPARATUS FOR DELIVERY OF DATA-BASED/VOICE SERVICES OVER
PICONETS AND WIRELESS LANs (WLANs) COUPLED...
Method and apparatus delivering voice/data services within a piconet operating over a limited range or over a WLAN communicating with 3GPP devices by...
TECHNIQUES FOR DEVICE INDEPENDENT SESSION MIGRATION
Techniques for device independent session migration are presented. A secure mechanism is presented for a target device to receive a current authenticated...
METHOD AND DEVICE FOR PERFORMING AUDIO/VIDEO STREAMING IN WIRELESS
A method for performing Audio/Video (A/V) streaming between at least one source device and at least one sink device in a wireless communication system, the...
Session Information Recording Method and Recording Server
A session information recording method, where the method is executed by a recording server, the recording server is connected to a unified communications...
SYSTEM AND METHOD FOR SCHEDULING A VIDEO CONFERENCE IN AN AUTONOMOUS
A system, a multi-user scheduling unit comprised in the system, and corresponding methods are described for scheduling a video conference call for at least one...
PEER-TO-PEER INTERNET PROTOCOL TELEPHONE SYSTEM WITH SYSTEM-WIDE
Various embodiments of the invention provide a Peer-to-Peer (P2P, Internet Protocol (IP) telephone system. The telephone system includes a plurality of...
METHOD OF CONTROLLING SESSION INITIATION PROTOCOL SESSIONS WITH STATE
A method involves acts of receiving a Session Initiation Protocol (SIP) request, initiating by a computing device having a processor, a SIP session as a result...
ADAPTIVE NETWORK SECURITY POLICIES
A method and system for dynamic identification of network security policies are provided. The method comprises inspecting network traffic using a number of...
In an example, a security-connected platform is provided on a data exchange layer (DXL), which provides messaging on a publish-subscribe model. The DXL...
POLICY ENFORCEMENT BY END USER REVIEW
Embodiments are disclosed that relate to enforcement of user policies in a multi-user interactive computing environment by end user review. For example, one...
Distributed Storage Processing Statement Interception and Modification
A non-transitory computer readable storage medium has instructions executed by a processor to intercept a query statement at a master machine. The query...
SECURED MOBILE COMMUNICATIONS DEVICE
A method is provided for securing a mobile communications device to a level required for accessing a network, for example a secured enterprise network, by...
REAL-TIME POLICY DISTRIBUTION
In an example, there is disclosed a method and system for real-time policy and task distribution to endpoints over a data exchange layer. According to one...
VISUALIZATION AND ANALYSIS OF COMPLEX SECURITY INFORMATION
In one example, a visualization data engine may be responsible for rendering the visualization data obtained from the backend data server and providing the...
A method includes accessing user data corresponding to a user profile. The method may also include accessing at least one privacy setting corresponding to the...
METHOD AND SYSTEM TO ACTIVELY DEFEND NETWORK INFRASTRUCTURE
Disclosed is an invention related to a system and device for actively defending a network infrastructure by implementing certain features that are attributed...
ISP BLACKLIST FEED
Embodiments are provided for an actionable blacklist of DDoS offenders and ISPs associated offenders. The system can collect real-time attack data and perform...
TRANSPARENT DENIAL OF SERVICE PROTECTION
Embodiments are directed toward transparent denial of service protection. Instruction set information that references a seed file may be communicated to a...
METHODS AND SYSTEMS FOR PROVIDING COMPREHENSIVE CYBERSECURITY PROTECTION
USING AN OPEN APPLICATION PROGRAMMING...
Methods of providing cyber-security services to a plurality of customers include providing a platform that includes a software program that is configured to...
Method and Apparatus for Transmitting Information
A method for transmitting information from a first security module to a second security module involves a system comprising the first and the second security...
METHOD AND SYSTEM FOR DESTROYING BROWSER-BASED MEMORY CORRUPTION
Client-less methods and systems destroy/break the predictive layout of, for example, a client computer memory. The methods and systems operate by injecting a...
NETWORK APPLIANCE FOR VULNERABILITY ASSESSMENT AUDITING OVER MULTIPLE
An apparatus, system, and method are directed towards enabling auditing of network vulnerabilities from multiple network vantage points virtually ...
ADAPTIVE SECURITY INDICATOR FOR WIRELESS DEVICES
Methods and apparatus, including computer program products, are provided for adaptive security. In one aspect there is provided a method. The method may...
DETERMINING A RISK LEVEL FOR SERVER HEALTH CHECK PROCESSING
Approaches are provided for determining a risk level for server health check processing. An approach includes creating statistical process control analyses for...
INFORMATION TECHNOLOGY SECURITY ASSESSMENT SYSTEM
A method and system for creating a composite security rating from security characterization data of a third party computer system. The security...
SYSTEM AND METHOD FOR ANALYZING MOBILE CYBER INCIDENT
A system and method for analyzing mobile cyber incidents that checks whether codes attacking the weaknesses of mobile users are inserted into collected URLs...
SYSTEM AND METHOD FOR DETECTING MOBILE CYBER INCIDENT
A system for detecting mobile cyber incidents includes: a mobile incident collection server adapted to collect text messages sent through communication company...
SYSTEM, APPARATUS, AND METHOD FOR DETECTING HOME ANOMALIES
An anomaly detection system includes appliances connected to a network and circuitry configured to receive statuses of the appliances. Patterns of use are...
System and Method for Cyber Security Analysis and Human Behavior
An improved method for analyzing computer network security has been developed. The method first establishes multiple nodes, where each node represents an...
MANAGING DOMAIN NAME ABUSE
A method for providing an abuse sentry service for responding to domain name abuse is described. The method comprises the following steps. A plurality of...
VERTICAL THREAT ANALYTICS FOR DDOS ATTACKS
Embodiments are provided to allow institutions and individuals the ability to subscribe to notifications regarding DDoS attacks on certain types of...
USER DETERMINATION DEVICE AND METHOD
A user determination device includes a processor that executes a procedure. The procedure includes causing a simulated abnormality to occur on a terminal,...
CYBER BLACK BOX SYSTEM AND METHOD THEREOF
Provided is a cyber black box system. The cyber black box system includes a data collector configured to collect entire packet data, flow data, and a portable...
METHOD AND SYSTEM FOR REFLECTOMETRY BASED COMMUNICATION NETWORK
MONITORING, INTRUSION DETECTION, AND MESSAGE...
Systems and methods are provided for monitoring and detecting intrusions and authenticating messages on a communication network of a vehicle. A plurality of...
METHOD AND SYSTEM FOR VIRTUAL SECURITY ISOLATION
A virtual security isolation method includes monitoring security status information of a plurality of virtual machines in a virtual LAN; determining whether...
MANAGED SOFTWARE REMEDIATION
According to one example, a system and method are disclosed for malware and grayware remediation. For example, the system is operable to identify applications...
METHOD AND APPARATUS FOR PRIVACY-ENHANCED EVIDENCE EVALUATION
A method for privacy-enhanced evidence evaluation may comprise: sending a request for pre-evaluation information regarding evidence data of a target object to...
Method For Sharing A Media Collection In A Network Environment
In one aspect, the present disclosure provides for the accessing and playing of media files having differing associated rights such as non-DRM media files,...
SYSTEM AND METHOD FOR TRANSACTION SECURITY ENHANCEMENT
A detection is made that a first entity residing on a mobile device is requesting authentication. The first entity resides in a first portion of the mobile...
SHAREABLE CONTENT ITEM LINKS WITH USE RESTRICTIONS
Shareable content item links with use restrictions. In one embodiment, for example, a method comprises: receiving, from a client computing device used by an...