At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
System And Method For Transferring Playlists
A method, computer program product and computing device for selecting at least one playlist for transfer, the at least one playlist being stored on a first...
Insertion of Supplementary Content into a Segmented Content Stream
Techniques for insertion of supplementary content into a segmented content stream are described. In at least some embodiments, a content stream includes...
SYSTEM AND METHOD FOR STREAMING MUSIC ON MOBILE DEVICES
In accordance with an embodiment, described herein is a system and method for streaming music on mobile devices, including those which may have limited support...
Methods and systems for integrated communications are pro-vided. In one embodiment, a user input is received via a user interface. Media data is received in...
DEVICE FOR TRANSMITTING BROADCAST SIGNAL, DEVICE FOR RECEIVING BROADCAST
SIGNAL, METHOD FOR TRANSMITTING...
Proposed herein is a method for transmitting a broadcast signal. The method for transmitting a broadcast signal proposes a system that can support next...
SERVER CONFIGURATION INCLUDING STREAM PREVIEW
A method includes receiving first input from a computing device, the first input corresponding to selection of a first media player associated with a first...
Session Management and Notification Mechanisms for Push-to-Talk (PTT)
An embodiment method includes receiving, by a notification service running on a processor, a notification from a first component of a push-to-talk (PTT)...
INFORMATION MANAGEMENT PROBLEM INITIATIVE SYSTEM
An information management problem definition system has a processing device configured for receiving a plurality of messages comprising a chat session from a...
ANNOTATING COLLABORATIVE INFORMATION STRUCTURES
Embodiments of the present invention address deficiencies of the art in respect to collaborative information object management and provide a method, system and...
Grid Encoded Media Asset Data
Metadata can identify temporal segments of content associated with a media asset and can identify asset data types. In response to a request for a particular...
METHOD AND DEVICE FOR COMMUNICATING BETWEEN AT LEAST A FIRST TERMINAL AND
A SECOND TERMINAL
The invention concerns a method and a device for communicating between at least a first terminal (15) and a second terminal (12), a first communication session...
MOBILE CONTENT COLLABORATION WITH ONE CLICK MULTIMEDIA CAPABILITY
A method includes performing operations as follows on a processor: receiving a selection of a content item by a first user from a first mobile device, sending...
VIRTUAL MULTI-CLUSTER CLOUDS
An improved scalable object storage system includes methods and systems allowing multiple clusters to work together. Users working with a first cluster, or...
METHOD AND SYSTEM FOR COMMUNICATION DEVICES
In one embodiment a user interface for a communication device is described, the user interface including a first icon representing a first communication event...
METHOD AND APPARATUS FOR CONFIGURING IP MULTIMEDIA SUBSYSTEM NETWORK
A system that incorporates teachings of the present disclosure may include, for example, a method for receiving initial filter criteria from a home subscriber...
NEIGHBOR AWARE NETWORKING (NAN) DEVICE AND METHOD FOR SERVICE DISCOVERY
Embodiments of a Neighbor Aware Networking (NAN) device, NAN proxy device, and method for service discovery in a wireless network are generally described...
To immediately reflect replacement of a field device in a network, a field device is provided. When a field device is newly connected to a low-order network...
INITIATING A COMMUNICATION SESSION BASED ON AN ASSOCIATED CONTENT ITEM
This disclosure describes techniques in which one or more computing devices receive a signal from a first client computing device. The signal indicates that...
METHOD AND APPARATUS FOR CONTROLLING POWER OUTPUT FROM AN ELECTRONIC
DEVICE TO AN EXTERNAL ELECTRONIC DEVICE
A mobile terminal for supporting Rich Communication Suite (RCS) and Voice Over Long Term Evolution (VoLTE) based services is provided. The mobile terminal...
CALL PROCESSING METHOD AND CONTROL APPARATUS, AUTOMATIC CALL DISTRIBUTION
APPARATUS, AND AGENT TERMINAL
Embodiments of the present invention provide a call processing method and control apparatus, an automatic call distribution apparatus, and an agent terminal....
VOICE SESSION TERMINATION FOR MESSAGING CLIENTS IN IMS
An IMS structure is described that hosts an IMS service based on a Rich Communication Suite (RCS) protocol for messaging only and IMS service based on VoLTE or...
Control of Accesses for IMS Services
A method for operating a UE is provided. The method comprises retrieving, by the UE, an IMS transport policy comprising a set of service transport rules. The...
OBTAINING SERVICES THROUGH A LOCAL NETWORK
One or more endpoints may be registered with a gateway at a premises. The gateway may include local physical interfaces for communicating with a first subset...
MULTI-SERVICES GATEWAY DEVICE AT USER PREMISES
An application gateway including application service programming positioned at a user premises can provide voice controlled and managed services to a user and...
Facilitating Separation-of-Duties When Provisioning Access Rights in a
Systems and methods for managing risk management rules are provided. A risk management rule may be configured at a rule configuration interface are described....
Method and apparatus for associating data loss protection (DLP) policies
A method of policy management in a Data Loss Prevention (DLP) system uses a policy model that associates a user with one or more DLP endpoints. When an...
PRIVACY AWARE CAMERA AND DEVICE STATUS INDICATOR SYSTEM
A privacy indicator is provided that shows whether sensor data are being processed in a private or non-private mode. When sensor data are used only for...
CREATING AND MANAGING A NETWORK SECURITY TAG
An apparatus, computer readable medium, and method are provided in one example embodiment and include a network device, an analysis module, and a tag module....
SYSTEM AND METHOD FOR PRIORITY-BASED RULE GENERATION WITH CONSISTENCY
CHECK AND POLICY ENFORCEMENT
A network node receives rules from a plurality of different domain entities. Each domain entity has a different priority level, and each rule defines an action...
RISK-BASED CREDENTIAL MANAGEMENT
Risk-based credential management is provided. A request to checkout credentials is received. The credentials are associated with at least one managed resource....
TECHNOLOGIES FOR SCALABLE SECURITY ARCHITECTURE OF VIRTUALIZED NETWORKS
Technologies for performing security monitoring services of a network functions virtualization (NFV) security architecture that includes an NVF security...
ENDPOINT POLICY CHANGE
Endpoint device policy change can, in various examples, include detecting a change in a first registered attribute associated with an endpoint device on a...
DYNAMIC ENTERPRISE SECURITY CONTROL BASED ON USER RISK FACTORS
Aspects dynamically set enterprise-level security rules by assessing risk factors associated with a user. Risk values representing likelihoods of loss of...
SEEDING OF MOBILE APPLICATION MANAGEMENT POLICIES
A method includes performing operations as follows on a processor: monitoring use of resources in an enterprise by mobile devices, receiving metrics from the...
DOCUMENT MODIFICATION DETECTION AND PREVENTION
Methods and apparatus, including computer program products, implementing and using techniques for document authentication. An electronic document is presented...
IDENTIFICATION OF AND COUNTERMEASURES AGAINST FORGED WEBSITES
A system, a method, and computer program product identify a website that is a forgery of a primary website. Client side executable code is included in a page...
STATELESS ATTESTATION SYSTEM
A method includes assessing a trustworthiness level of a user computer by communication between the user computer and a first server. A record indicating the...
SECURITY DATA AGGREGATION AND BUSINESS INTELLIGENCE FOR WEB APPLICATIONS
Systems and methods may provide for detecting a browser request for web content. Additionally, interaction information associated with a plurality of sources...
Risk Scoring For Threat Assessment
Threat risks to an enterprise are detected and assessed by assembling singular threats identified using both direct and behavioral threat indicators into...
GLOBAL CLUSTERING OF INCIDENTS BASED ON MALWARE SIMILARITY AND ONLINE
In an embodiment, a method, performed by processors of a computing device for creating and storing clusters of incident data records based on behavioral...
INTEGRATED NETWORK THREAT ANALYSIS
The inventive systems and methods aggregate network information to accompany file information in an indicator and warning environment. This system also...
DETECTION OF MALICIOUS NETWORK CONNECTIONS
In one embodiment a method, system and apparatus is described for detecting a malicious network connection, the method system and apparatus including...
Anomaly Detection Using Adaptive Behavioral Profiles
Anomalous activities in a computer network are detected using adaptive behavioral profiles that are created by measuring at a plurality of points and over a...
SYSTEMS AND METHODS FOR DETECTING AND ADDRESSING HTML-MODIFYING MALWARE
Among other things, embodiments of the present disclosure help provide entities with the ability to remotely detect behavior associated with malware and...
INSPECTED CONTENT DELIVERY WITH PEER-TO-PEER STREAMING
In one embodiment, A tracker computer receives from a first device in a peer-to-peer network that the first device has content for serving. A content request...
Process For Identifying A Compromised Device
Methods and systems are described whereby a server can forward a request from a device behind a NAT router to a system to determine if the request is...
Risk Ranking Referential Links in Electronic Messages
A computer system enables a business to reduce risks from phishing electronic messages. One or more original web links embedded in the electronic message may...
ACTIVE VALIDATION FOR DDOS AND SSL DDOS ATTACKS
Methods and systems for detecting and responding to Denial of Service ("DoS") attacks comprise: detecting a DoS attack or potential DoS attack against a first...
SPACE AND TIME EFFICIENT THREAT DETECTION
A security monitoring system operated by a downstream client continually collects event information indicating events that have occurred within the computing...
SYSTEM AND METHOD FOR DETECTING INTRUSION INTELLIGENTLY BASED ON AUTOMATIC
DETECTION OF NEW ATTACK TYPE AND...
Disclosed are a method and system, capable of performing adaptive intrusion detection proactively coping with a new type of attack unknown to the system and...