At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
STREAMING WITH COORDINATION OF VIDEO ORIENTATION (CVO)
Technology a client operable to receive streaming content from a server is disclosed. The client can signal a device capability exchange message for...
SYSTEMS AND METHODS FOR CAPTURE AND STREAMING OF VIDEO
A system may provide capture and streaming of analog video, from one or more analog cameras to one or more client devices and/or servers, in a single device...
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for coordinating metadata for media streaming content and for sending...
DISTRIBUTED MEDIA CLASSIFICATION ALGORITHM IN A SERVICE CONTROLLER
PLATFORM FOR ENHANCED SCALABILITY
A network system and the method is described that splits media identification logic and media classification and/or general data session processing/management...
NEGOTIATION OF MESSAGE CHUNK SIZE FOR MESSAGE SESSION RELAY PROTOCOL
Embodiments of the invention relates to methods, and apparatuses for exchanging the preferred MSRP chunk sizes between an end-point and a remote end-point,...
SCALABLE ARCHITECTURE FOR MEDIA MIXING
A proxy mixer includes a transceiver configured to receive one or more first requests to provide one or more first media streams to one or more first...
APPARATUS FOR PROCESSING A HYBRID BROADCAST SERVICE, AND METHOD FOR
PROCESSING A HYBRID BROADCAST SERVICE
The present invention provides a method of processing a hybrid broadcast service. The method comprises, receiving broadcast signals for the hybrid broadcast...
REAL-TIME MESSAGING METHOD AND APPARATUS
A system and method for the late-biding of time-based media in real-time. With late binding, the sender may create time-based media before or at the same time...
STREAMING SPHERICAL VIDEO
A method includes receiving a first video stream at a playback device, the first video stream having a first quality, receiving at least two second video...
COLLABORATIVE BUSINESS COMMUNICATION INFORMATION SYSTEM
A collaborative business communication information system that includes one or more communication devices communicatively coupled to one or more networks, and...
SOCIAL NETWORKING AND VIRTUAL FRIENDS FOR WEARABLE DEVICES
Techniques described herein may be used to provide wearable devices (e.g., a watch, a clip on device, etc.) for children with virtual friend and social...
CONTEXTUALIZING INTERACTIONS IN WEB MEETING SESSIONS
In various implementations, a computing device is configured to provide context to annotating inputs made during a web meeting session. In some ...
COMMUNICATION TERMINAL, COMMUNICATION SYSTEM, COMMUNICATION METHOD, AND
A communication terminal receives, from a mobile terminal, counterpart terminal identification information for identifying a counterpart communication terminal...
METHOD AND SYSTEM FOR SELF-REGISTRATION AND SELF-ASSEMBLY OF ELECTRICAL
A method for self-registration and/or self-assembly of a plurality of electrical devices, the method including: performing the self-registration of the...
Method and System for Enabling a Communication Device to Remotely Execute
A communication system capable of enabling one or more communication devices to remotely execute one or more applications includes one or more communication...
METHOD AND DEVICE FOR PERFORMING COMMUNICATION SERVICE
A method of performing a communication service includes: requesting, by a first device, a second device for data; receiving, by the first device, the data from...
Partitioning Media Data
Techniques for partitioning media data are described. According to various embodiments, a set of wireless access points are selected for receiving wireless...
PROXY ADVERTISEMENTS IN A NEIGHBOR AWARE NETWORK
A method for registering a service for proxy advertisement includes selecting, at a client device, a proxy device to proxy advertise the service of the client...
POLYMORPHIC SECURITY POLICY ACTION
In one embodiment, a method of improving the security of a computing device comprises using a computing device that has received one or more messages that have...
METHOD AND SYSTEM FOR MANAGING SECURITY POLICIES
A system and method of managing security policies in an information technologies (IT) system are provided. In an example, the method includes receiving an...
TECHNIQUES FOR ESTABLISHING A TRUSTED CLOUD SERVICE
Techniques for establishing a trusted cloud service are provided. Packages are created for services that include certificates, configuration information, trust...
Inferring Security Policies from Semantic Attributes
Techniques for inferring security policies from semantic attributes are provided. In one aspect, a method for building a query component executable by a...
METHODS AND SYSTEMS FOR PHISHING DETECTION
A method of determining a probability that a received email comprises a phishing attempt may comprise analyzing a link therein to determine whether the link...
LOCAL PORT MANAGING METHOD AND DEVICE, PACKET-ORIENTED DATA NETWORK,
DIGITAL STORAGE MEDIA, AND COMPUTER...
A method for managing local ports in a packet-oriented data network is proposed, wherein packets are assigned to a selected local port, and assignment of a...
IDENTIFYING SUSPICIOUS ACTIVITY IN A LOAD TEST
Identifying suspicious activity in utilizing a load testing service can include establishing an amount of domain calls to a domain, modifying the amount, and...
MITIGATION OF COMPUTER NETWORK ATTACKS
Various techniques for mitigating computer network attacks are disclosed herein. In one embodiment, a method includes receiving indications of denial of...
SECURITY ACTION VERIFICATION IN A COMPUTING NETWORK
Systems, methods, and software described herein provide for validating security actions before they are implemented in a computing network. In one example, a...
Domain Classification And Routing Using Lexical and Semantic Processing
Domain classification based on lexical and semantic processing of target domains is provided. A target domain name or URL may undergo a lexical analysis to...
AUTOMATED PENETRATION TESTING DEVICE, METHOD AND SYSTEM
A method for performing automatic penetration testing (PT) in an organization having at least one end unit, the method comprising: providing a PT device having...
Software/Hardware Device with Uncertain Service Function and Structural
Characterization, and Scheduling Method...
The present invention discloses a software/hardware device with uncertain service function and structural characterization and a method for scheduling the...
SECURITY WITH RESPECT TO MANAGING A SHARED POOL OF CONFIGURABLE COMPUTING
Disclosed aspects include management of a shared pool of configurable computing resources having a first region and a second region. Using an analysis...
NETWORK ANOMALY DETECTION
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for determining network related anomaly scores. One of the...
IDENTIFYING DEVIATIONS IN DATA
In an example, metrics that cause a deviation in data may be identified by collecting the data for selected metrics stored in a plurality of tables. A metric...
NETWORK-CENTRIC VISUALIZATION OF NORMAL AND ANOMALOUS TRAFFIC PATTERNS
In one embodiment, a device in a network analyzes local network data regarding a portion of the network that is local to the device using a first anomaly...
FINGERPRINT MERGING AND RISK LEVEL EVALUATION FOR NETWORK ANOMALY
In one embodiment, a device in a network receives fingerprints of two or more network anomalies detected in the network by different anomaly detectors. Each...
WARM-START WITH KNOWLEDGE AND DATA BASED GRACE PERIOD FOR LIVE ANOMALY
In one embodiment, a device in a network loads an anomaly detection model for warm-start. The device filters input data for the model during a warm-start grace...
Method And System For Detecting Malicious Code
The present application discloses a method and a system for detecting malicious code. The method comprises receiving a testing sample; testing the sample with...
Probabilistically Detecting Low Intensity Threat Events
A method, system, and/or computer program product probabilistically detects a low intensity threat event against an attack surface. A notification of disparate...
DETECTION OF MALWARE AND MALICIOUS APPLICATIONS
A method comprises receiving, at a network infrastructure device, a flow of packets, determining, using the network infrastructure device and for a first...
Tracking Users over Network Hosts Based on User Behavior
A method of tracking users over network hosts based on behavior includes analyzing data representing behavior of active network hosts during two or more time...
Utilizing Big Data Analytics to Optimize Information Security Monitoring
Disclosed herein is a method comprising: obtaining one or more responses of a security sensor to events from each of a plurality of sources; clustering each of...
Media Stream Trust Display
Media stream trust display techniques are described in which trust information regarding content elements is accessible on an individual element basis. In...
INFORMATION INTERACTION METHOD, APPARATUS AND SYSTEM
An information interaction method, apparatus and system are provided. A sensitive operation pre-performing message is received from a terminal where a...
DATA PROCESSING APPARATUS
A data processing apparatus (30) comprising: a local source of data (4); a first controller (31); and a tamper-resistant second controller (32) configured to...
Decrypting Content Samples Including Distinct Encryption Chains
Embodiments may be configured to receive a protected version of content that includes multiple encrypted content samples. In various embodiments, each...
METHOD FOR SENDING CONTENTS INCLUDING TRACKING INFORMATION AND APPARATUS
THEREOF, AND METHOD FOR RECEIVING...
A method for transmitting contents including tracking information is described. The method comprising the steps of generating a content transmission stream...
DELEGATED PERMISSIONS IN A DISTRIBUTED ELECTRONIC ENVIRONMENT
Permissions can be delegated to enable access to resources associated with one or more different accounts, which might be associated with one or more different...
ONE TIME USE PASSWORD FOR TEMPORARY PRIVILEGE ESCALATION IN A ROLE-BASED
ACCESS CONTROL (RBAC) SYSTEM
Techniques to facilitate temporary escalation of access privileges for a control program associated with a machine system in an industrial automation...
METHOD FOR CONTROLLING ACCESS TO A SERVICE
The invention relates to a method for controlling the access to an on-line service, the access to the service being requested, via a communications network, by...
SCALABLE APPLICATION-AS-A-SERVICE ENVIRONMENT AND SYSTEMS AND METHODS
USEFUL IN CONJUNCTION THEREWITH
A computerized method of managing a computer remote session operation, comprising providing a server for hosting application execution; configuring a number of...