At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
INFORMATION PROCESSING APPARATUS, AND METHOD AND PROGRAM FOR CONTROLLING
INFORMATION PROCESSING APPARATUS
An information processing apparatus individually sets a login distance, as a condition to be satisfied when a login request is transmitted, for a plurality of...
SOCIAL NETWORK SYSTEM AND METHOD OF OPERATION
A method of forming unique, private, personal, virtual social networks on a social network system that includes a database storing data relating to ...
Secure Distribution of Non-Privileged Authentication Credentials
An authentication credentials push service (ACPS) that securely pushes non-privileged authentication credentials to registered client entities. The ACPS...
APPARATUS, SYSTEM AND METHOD OF DYNAMICALLY CONTROLLING ACCESS TO A CLOUD
Embodiments of the present invention are directed to multiple-factor authentication for accessing a cloud service from end-user devices. Authentication can be...
VPN COMMUNICATION TERMINAL COMPATIBLE WITH CAPTIVE PORTALS, AND
COMMUNICATION CONTROL METHOD AND PROGRAM THEREFOR
Provided is, in a scene where a VPN communication terminal, which has a function of restricting its communication in a network outside a company to...
METHOD AND APPARATUS FOR REMOTE IDENTITY PROOFING SERVICE ISSUING TRUSTED
Illustrative methods, processes, and software are disclosed herein that remotely prove the identity of individuals fully compliant with identity proofing...
First Artificial Intelligence Methods and Systems for Asset Trendspotting
(PNN), Cyber Security (DeepCyber),...
New methods, systems, and apparatus, including computer programs called PNN (predictive neural network) artificial intelligence (AI) machines are disclosed for...
ACCESS RELATIONSHIPS IN A COMPUTER SYSTEM
Various mechanisms can be used for authorizing access between entities in a computing environment. Configuring such access may involve configuration data...
Multiscreen Secure Content Access
Methods and systems for securely accessing content irrespective of the security of the environment in which the content is being accessed are described herein....
AUTHENTICATION DEVICE AND METHOD FOR ELECTRONIC ATOMIZATION DEVICE BASED
ON MOBILE TERMINAL
Disclosed are an authentication device and an authentication method for electronic atomization device based on mobile terminal. The device includes a Bluetooth...
INTERNET OF THINGS GROUP FORMATION USING A KEY-BASED JOIN PROTOCOL
Systems and methods may provide for determining a first key associated with a first group and determining a first resource exposure policy for the device with...
SYSTEMS AND METHODS FOR ORGANIZING DEVICES IN A POLICY HIERARCHY
In various embodiments, there is provide a method for organizing devices in a policy hierarchy. The method includes creating a first node. The method further...
SYSTEM AND METHOD OF SECURE ENCRYPTION FOR ELECTRONIC DATA TRANSFER
A system for secure transfer of encrypted data involves a sender client, a recipient client, a main server, and a key server. The sender client receives...
SECURE AND CONTROL DATA MIGRATING BETWEEN ENTERPRISE AND CLOUD SERVICES
A method for operating a cloud gateway is provided. The method includes generating a plurality of rules relating users and groups to data access at a plurality...
SERVER-CLIENT PKI FOR APPLIED KEY MANAGEMENT SYSTEM AND PROCESS
Embodiments described herein relate to obtaining a public key for an application of a communication device, including, but not limited to, receiving a request...
ENABLING TRANSMISSION ENCRYPTION
It is presented a method performed in a proxy. The method comprises the steps of: establishing a first secure connection between the proxy and a content...
METHOD OF SELECTIVELY APPLYING DATA ENCRYPTION FUNCTION
In a method of selectively applying a data encryption function, a CoAP client and a CoAP server perform a DTLS handshake process. The CoAP client generates a...
CONTROLLING ENCRYPTED DATA STORED ON A REMOTE STORAGE DEVICE
A method, system, and apparatus are provided for controlling encrypted data stored on a remote device. In particular, a remote device includes a storage...
Automatic provisioning of meeting room device
Various embodiments enable meeting room devices to be produced such that, after purchase, the devices can be automatically provisioned by a meeting service....
Recording Encrypted Media Session
In one implementation, a media stream is recorded using one or more keys. The one or more keys are also encrypted. The one or more encrypted keys may be stored...
CLIENT SERVICES FOR APPLIED KEY MANAGEMENT SYSTEMS AND PROCESSES
Embodiments described herein relate to apparatuses and methods for enabling applied key management operations at a client including establishing a data...
RESTRICTING COMMUNICATIONS IN INDUSTRIAL CONTROL
Communication in industrial control is restricted (42). Virtual private network functionality is integrated (32) within a programmable logic controller (20) of...
NETWORK SECURITY SYSTEM TO INTERCEPT INLINE DOMAIN NAME SYSTEM REQUESTS
Example embodiments disclosed herein relate to a network security system. The network security system intercepts inline DNS requests. It is determined whether...
METHOD AND DEVICE FOR RECOGNIZING AN IP ADDRESS OF A SPECIFIED CATEGORY, A
DEFENSE METHOD AND SYSTEM
The invention discloses a method and device for recognizing an IP address of a specified category, a defense method and system, wherein the method for...
Methods And Systems For Providing a Token-Based Application Firewall
Token-based firewall functionality. A request is received for access to a resource from a remote user device, the request received by an application firewall....
SYSTEMS AND METHODS TO ENABLE NETWORK COORDINATED MAC RANDOMIZATION FOR
This disclosure describes systems, methods, and apparatus related to receiving, at an access point and from a wireless communication station, a media access...
METHOD FOR CHECKING IP ADDRESS COLLISION OF ETHERNET COMMUNICATION MODULE
A method for checking an IP address collision is provided. The method includes: transmitting an ARP (Access Resolution Protocol) request message by setting an...
RELAY MANAGING METHOD AND NETWORK MANAGEMENT SYSTEM SERVER USING THE SAME
In a relay managing method through a network management system (NMS) server, a registration request is received from a relay BTS interface unit (BIU). The...
ENHANCING DNS AVAILABILITY
A system and method for providing an address for a Domain Name System (DNS) server to a consumer device, wherein the consumer device connects to the Internet...
METHOD AND DEVICE FOR SETTING SELECTIVE SOURCE IP ADDRESS
The present invention relates to a method and device for setting a selective source IP address. The method for setting a source IP address of a terminal...
SYSTEM AND METHOD FOR MAC ADDRESS ACQUISITION
Method for MAC address acquisition in a network client device, the method comprising the steps of: generating (202) a client device (101) identifier using a...
METHODS AND SYSTEMS FOR PROCESSING A DNS REQUEST
A method and system for processing Domain name Services (DNS) request in a gateway. The gateway receives a DNS request from a host from its local area network....
MESSAGING MEDIA TO GO VIRAL
Systems and techniques are disclosed for transmitting a message via one or more platforms, the messages being associated with media content and/or related...
Generating Conversation Threads for a Unified Messaging System
Methods and systems directed to assigning individual messages and call log data into an aggregated conversation thread on both client and server devices for a...
MESSAGING SYSTEM AND METHOD
A method of cross-platform messaging including receiving, by a messaging system, at least one initial message having a message format, an initial message...
SYSTEM AND METHOD FOR ORCHESTRATING AND CORRELATING MULTIPLE
SOFTWARE-CONTROLLED COLLABORATIVE SESSIONS THROUGH...
A method for correlating multiple collaborative sessions occurring on multiple single-modality systems includes creating a respective collaborative element...
MONITORING OF SUBSCRIBER MESSAGE PROCESSING IN A PUBLISH/SUBSCRIBE
A message associated with a subscription topic hosted by a publish/subscribe message tracking device is sent by the publish/subscribe message tracking device...
METHODS AND SYSTEMS FOR OPTIMIZING MESSAGES TO USERS OF A SOCIAL NETWORK
Techniques to optimize messages sent to a user of a social networking system. In one embodiment, information about the user may be collected by the social...
STRUCTURING NOTIFICATION OF EVENTS TO USERS IN A SOCIAL NETWORKING
A social networking system identifies an event based on a thread including messages from users of the social networking system and communicates invitations to...
Systems and Method for Reducing Biases and Clutter When Ranking User
Content and Ideas
A method, implemented on a processor, for reducing user biases and exposure to clutter when ranking user content is disclosed. In this method, users are...
RECOMMENDING HASHTAGS TO BE USED IN COMPOSED MESSAGE TO INCREASE
PROPAGATION SPEED AND ENHANCE DESIRED...
A method, system and computer program product for assisting a user in selecting a desired hashtag. The text of a message that is composed by a user is parsed...
BI-DIRECTIONAL MULTI-CHANNEL SOCIAL MEDIA BROKERING
The present disclosure provides a detailed description of techniques used in systems, methods, and in computer program products for bi-directional social media...
MEDIATING MESSAGES WITH NEGATIVE SENTIMENTS IN A SOCIAL NETWORK
Mediating messages with negative sentiments in a social network includes monitoring a number of messages in a social network, analyzing content of the number...
DISTRIBUTION OF ENDORSEMENT INDICATIONS IN COMMUNICATION ENVIRONMENTS
Communication services enable users to communicate electronically over communication exchange channels using multiple modes of communication. Conversations...
MESSAGE NOTIFICATION SYSTEM
A method including: receiving a message configuration; selecting one or more recipients from among users based on the one or more targeting filters and first...
ARCHITECTURE FOR LARGE DATA MANAGEMENT IN COMMUNICATION APPLICATIONS
THROUGH MULTIPLE MAILBOXES
Technologies are described to increase a data limit for a user by introducing additional archive mailboxes as the original archive fills up or subsequently...
LARGE DATA MANAGEMENT IN COMMUNICATION APPLICATIONS THROUGH MULTIPLE
Technologies are described to increase a data limit for a user of a communication application by introducing additional archive mailboxes as the original...
EXTENDED EMAIL FUNCTIONALITY
Enhancing email is disclosed. An email message is received. An enhancement associated with the email message is processed. Content of the email message is...
COMMON EMAIL DATABASE FOR A PLURALITY OF USERS
Enhancing email is disclosed. An email message is received. Content of the email message is stored in a common email database including email data accessible...
METHOD AND APPARATUS FOR IDENTIFYING CHANGED MAILBOXES IN AN INTERNET
MESSAGE ACCESS PROTOCOL (IMAP) LIST
A method and Internet Message Access Protocol (IMAP) server for responding to a LIST request from an IMAP client device by returning a list containing only...