At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
CONTENT PROVISION SYSTEM, INFORMATION PROCESSING APPARATUS AND CONTENT
There is provided a content provision system including an information processing apparatus and a terminal device wherein the information processing apparatus...
UNICAST SUPPORT IN PROSE DIRECT DEVICE-TO-DEVICE COMMUNICATION
The present disclosure enables a multicast and/or unicast transmitting UE to configure a multicast device-to-device communication and/or the unicast...
PROCESSING OF LIVE MULTIMEDIA CONTENT AND/OR DATA STREAMS OVER A
A method and associated device for streaming multimedia data over a communication network. Data associated with live multimedia content is received. Portions...
METHOD AND SYSTEM FOR CONTROLLING COMMUNICATIONS FOR
The present invention relates to a method for controlling communications for an online meeting. The method includes, at each of a plurality of user devices,...
Dynamic Personalized Content Presentation To Re-engage Users During Online
Users can participate in various different types of online sessions, such as webinars, massive open online courses (MOOCs), social learning sessions, and so...
REROUTING DATA OF A STREAMING APPLICATION
A streams manager monitors performance of a streaming application and determines if operators are underperforming according to a threshold. When the...
SYSTEM AND METHOD FOR PROVIDING A MEDIA COMMUNICATION CONVERSATION SERVICE
A system and method comprising configuring a conversation resource for an account within a communication platform; registering a set of endpoints as...
END USER CONTROLLED MULTI-SERVICE DEVICE PRIORITY SETTING
A communication network allows an end user to dynamically select a user device among user devices associated with the user's subscription as the primary user...
SYSTEM AND METHOD OF LAWFUL ACCESS TO SECURE COMMUNICATIONS
The present disclosure relates to systems and methods for secure communications. In some aspects, a method of signalling an interception time period is...
METHODS AND NODES SUPPORTING LAWFUL INTERCEPT
The following invention relates to methods and nodes for performing Lawful Intercept, LI, when service related content is stored in a Radio Access Network, RAN...
Integrated Development Environment (IDE) for Network Security
An integrated development environment (IDE) preprocesses a configuration file including security rules. The preprocessing maps object names in the security...
MODELLING NETWORK TO ASSESS SECURITY PROPERTIES
A method of assessing a network uses a model (450) having nodes (100, 110) to represent parts of the network infrastructure and the application services, and...
Embodiments relate to a system that includes a computing device and a managed application executable by the computing device. The managed application initiates...
Automatic Phishing Email Detection Based on Natural Language Processing
A comprehensive scheme to detect phishing emails using features that are invariant and fundamentally characterize phishing. Multiple embodiments are described...
SECURITY SYSTEMS FOR MITIGATING ATTACKS FROM A HEADLESS BROWSER EXECUTING
ON A CLIENT COMPUTER
Computer systems and methods in various embodiments are configured for improving the security and efficiency of server computers interacting through an...
INTRUSION DETECTION TO PREVENT IMPERSONATION ATTACKS IN COMPUTER NETWORKS
In an embodiment, a central computer performs a data processing method. The central computer receives telemetry data from intrusion sensors. The central...
Preventing Spoofing Attacks for Bone Conduction Applications
Concepts and technologies are disclosed herein for preventing spoofing attacks for bone conduction applications. According to one aspect, a device can receive...
A method for preventing spoofing in an automotive network, the method comprising storing at least one address of a first vehicle electronic control unit and...
Unobtrusive and Dynamic DDoS Mitigation
Some embodiments provide techniques for mitigating against layer 7 distributed denial of service attacks. Some embodiments submit a computational intensive...
NETWORK DEVICE AND NETWORK SYSTEM
A network device connected via a bus with a plurality of network devices includes: an authentication unit that executes authentication based upon message...
FUZZING SERVER RESPONSES TO MALICIOUS CLIENT DEVICES
A security device may receive a request, from a client device and intended for a server device, to provide a resource. The resource may be associated with...
METHOD AND SYSTEM FOR AGGREGATING AND RANKING OF SECURITY EVENT-BASED DATA
The present invention provides a method of identifying aggregating and mathematically ranking security alert data having the steps of identifying a plurality...
System, Method And Apparatus To Visually Configure An Analysis Of A
A method extracts views from an application program, where at least some extracted views include at least one view component, and presenting the extracted...
DYNAMICALLY-ADAPTIVE-RESILIENT MEASURED CYBER PERFORMANCE AND EFFECTS
THROUGH COMMAND AND CONTROL INTEGRATION...
System-of-systems architectures and methods for dynamically and adaptively managing and executing a command and control system across a global cyber enterprise...
METHOD FOR PATTERN PROCESSING
The invention relates to a method for pattern processing on a processor platform, the method comprising: compiling a plurality of patterns into a plurality of...
EXTERNAL MALWARE DATA ITEM CLUSTERING AND ANALYSIS
Embodiments of the present disclosure relate to a data analysis system that may automatically generate memory-efficient clustered data structures,...
GLOBAL CLUSTERING OF INCIDENTS BASED ON MALWARE SIMILARITY AND ONLINE
In an embodiment, a method, performed by processors of a computing device for creating and storing clusters of incident data records based on behavioral...
UNWANTED TUNNELING ALERT SYSTEM
Various systems and methods are provided that detect malicious network tunneling. For example, VPN logs and data connection logs may be accessed. The VPN logs...
COMMUNICATION CHIPSET AND APPARATUS SECURE FROM INTERNET ATTACK
A communication chipset and a communication apparatus are disclosed. A register map establishes a communication channel with a plurality of apparatuses, a...
Configurable Robustness Agent in a Plant Security System
A communications network security system includes a robustness agent that operates within a communications interface of a device at one or more nodes of the...
METHOD FOR INSTRUCTION SET MORPHING TO INHIBIT MALICIOUS CODE INJECTION
A method for improving the reliability and security of computer-based processing by providing instruction set morphing to inhibit malicious software code...
BRUTE FORCE ATTACK PREVENTION SYSTEM
A system for preventing a brute force attack includes an output interface, an input interface, and a processor. An output interface is to provide a workfactor,...
CUSTOMIZED RECORD HANDLING IN A CONTENT DELIVERY NETWORK
Systems, methods, apparatus and software for customized record handling in a content delivery network are disclosed. In one implementation, a user request...
Apparatus and Method for Characterizing the Risk of a User Contracting
A non-transitory computer readable storage medium includes executable instructions to identify specified network interactions initiated by a client machine....
METHOD AND APPARATUS FOR PROTECTING COMPUTER FILES FROM CPU RESIDENT
Apparatus for use with a computer to secure the computer's stored data against malware in the computer's central processing unit (CPU). The apparatus comprises...
DISTRIBUTED TOPOLOGY ENABLER FOR IDENTITY MANAGER
Provided are techniques for combining existing identity management information from multiple Identity Manager (IM) nodes. The combined information from the...
METHOD AND SYSTEM FOR SECURELY AND AUTOMATICALLY OBTAINING SERVICES FROM A
MACHINE DEVICE SERVICES SERVER
A vehicle processing device authenticates that an authorized user has requested an action by the vehicle, and generates an authentication acknowledgement...
TAINT MECHANISM FOR MESSAGING SYSTEM
A method for managing a plurality of messages associated with an online messaging system is provided. The method may include receiving a message from a...
METHOD AND PROTOCOL FOR SECURE DEVICE DEPLOYMENT USING A
PARTIALLY-ENCRYPTED PROVISIONING FILE
A method, system, and computer program product for Internet-connected device deployment, and to techniques for secure device deployment using a ...
APPLICATION PROTOCOL QUERY FOR SECURING GBA USAGE
A network element provides an application service to a device over a network. Using a shared key generated according to the Generic Bootstrapping Architecture...
User Interface Driven Translation, Comparison, Unification, and Deployment
of Device Neutral Network Security...
A method is performed at a management device to manage multiple network security devices over a network. The security devices are configured to control access...
Method and Apparatus for Providing an Adaptable Security Level in an
A method of communicating in a secure communication system, comprises the steps of assembling a message at a sender, then determining a security level, and...
Integration User for Analytical Access To Read Only Data Stores Generated
From Transactional Systems
The technology disclosed preserves the tenant specificity and user specificity of the tenant data by associating user IDs to complementary special IDs referred...
SYSTEM AND METHOD FOR ACCESS AND MANAGEMENT OF THINGS OVER A COMMUNICATION
NETWORK RELATED THERETO
The system and method of the present invention to provide at least one cloud-based things access and management system (things-system) for things lifecycle...
METHOD FOR CONTROLLING, CHARGING, AND POSITIONING A UE IN A SMALL CELL
A method for controlling, charging and positioning a UE is disclosed, which includes: a master base station sending closed subscriber group (CSG) member status...
Determining Similarity Between Security Rules Based On Weighted
Comparisons Of Their Rule Parameters
First and second security rules are accessed in a configuration file. Comparison points for comparing the first and second security rules are determined. Each...
UNIQUENESS AND AUDITING OF A DATA RESOURCE THROUGH AN IMMUTABLE RECORD OF
TRANSACTIONS IN A HASH HISTORY
Disclosed is a method, a device, and/or a system of uniqueness and auditing of a data resource through an immutable record of transactions in a hash history....
SECURED ACCESS CONTROL TO CLOUD-BASED APPLICATIONS
A method and proxy device for securing an access to a cloud-based application are presented. The method includes receiving an authentication token, wherein the...
SYSTEM AND METHOD FOR DELEGATION OF PERMISSIONS TO A THIRD PARTY
A system and method for delegating permissions to a third party are presented. A request to access a first computing resource of a computer server is received...
SYSTEM FOR PREVENTING UNAUTHORIZED ACCESS TO OPERATIONAL AIRCRAFT DATA
Embodiments of the present invention provide improved systems and methods for a programmable portable electronic device for airborne operational ...