At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
FEEDBACK OPTIMIZED VIDEO CODING PARAMETERS
A system for managing delivery of video content. The system includes a controller and one or more players. The controller may be configured to control...
MANAGING ADAPTIVE STREAMING OF DATA VIA A COMMUNICATION CONNECTION
An example method includes requesting a data stream using a buffer with an initial maximum window size for buffering received data associated with the...
CONTEXTUAL VIDEO CONTENT ADAPTATION BASED ON TARGET DEVICE
Methods and apparatus for contextual video content adaptation are disclosed. Video content is adapted based on any number of criteria such as a target device...
METHOD AND SYSTEM FOR PROVIDING MEDIA PROGRAMMING
A method of generating media programming includes the steps of providing by an aggregator to a client a list of feeds; receiving by the aggregator from the...
METHOD AND SYSTEM FOR SHARING DIGITAL MEDIA CONTENT
Methods and systems for generating and sharing media clips are described. Consistent with some embodiments, while a selection of digital media content (e.g., a...
EFFICIENT AND SCALABLE CACHING AND REPRESENTATION OF MEDIA WITH
A system for making available at an end-user a media file, from a media provider comprising a media file patch related to at least one object, the system...
METHODS AND APPARATUS FOR EFFICIENT IP MULTICASTING IN A CONTENT DELIVERY
Methods and apparatus for assigning physical channels in a content-based network. In an exemplary embodiment, the network comprises a cable television network...
DISPLAY DEVICE AND METHOD OF CONTROLLING THE SAME
A method of controlling a display device is provided. The display device includes a communicator configured to establish a connection with a first mobile...
METHOD AND APPARATUS FOR DOWNLOADING AN APPLICATION
There is disclosed a method of downloading an application to an electronic device associated with a user. The method is executed at a server, the server being...
SYSTEM AND METHOD FOR AUGMENTED AND VIRTUAL REALITY
One embodiment is directed to a system for enabling two or more users to interact within a virtual world comprising virtual world data, comprising a computer...
Method To Initiate Server Based Collaboration On E-Mail Attachments
Server-based collaboration is initiated by an email. When the user creates the email message with attachments, a collaboration website is provisioned. The...
METHOD OF SEARCHING FOR AND REGISTERING NETWORK DEVICE USING HTTP AND
NETWORK REGISTRATION SERVICE APPARATUS
A method of searching for a network device and registering the network device to a network using HTTP and a network registration service apparatus are...
METHOD AND DEVICE FOR ESTABLISHING CHANNEL
Embodiments of the present disclosure provide a method and a device for establishing a channel, capable of reducing data transmission path length when two...
METHOD FOR PROCESSING TELEPHONY SESSIONS OF A NETWORK
A method for processing telephony sessions of a network including at least one application server and a call router, the method including the steps of...
Method and apparatus for transmitting and receiving data in wireless
Provided is a method for sending and receiving, by a first device, data to and from a second device using a Bluetooth Low Energy (BLE) technology in a wireless...
ACCESS CONTROL USING IMPERSONIZATION
A first service submits a request to a second service on behalf of a customer of a service provider. The request may have been triggered by a request of the...
METHOD, SYSTEM AND SERVER FOR SELF-HEALING OF ELECTRONIC APPARATUS
A method, a system and a server for self-healing of an electronic apparatus are provided. In the method, the components installed in the electronic apparatus...
Security policy editor
A shared computing infrastructure has associated therewith a portal application through which users access the infrastructure and provision one or more...
SECURE LOCAL WEB APPLICATION DATA MANAGER
Apparatus, systems and methods may provide a browser interface to detect an attempt by web content to manipulate data in a local data store. In addition, the...
ENFORCING RUNTIME POLICIES IN A NETWORKED COMPUTING ENVIRONMENT
Embodiments of the present invention provide approaches for enforcing runtime policies in a networked computing environment (e.g., a cloud computing...
MANAGING COMMUNICATIONS BETWEEN COMPUTING NODES
Techniques are described for managing communications between multiple intercommunicating computing nodes, such as multiple virtual machine nodes hosted on one...
POLICY-BASED SLICE DELETION IN A DISPERSED STORAGE NETWORK
A method for execution in a dispersed storage network operates to determine one or more slice names of one or more slices to consider for deletion; determine...
SYSTEM AND METHOD OF RECOMMENDING POLICIES THAT RESULT IN PARTICULAR
REPUTATION SCORES FOR HOSTS
A method provides for associating reputation scores with policies, stacks and hosts within a network and upon receiving information about a newly provisioned...
ELECTRONIC DEVICE AND METHOD FOR ENCRYPTING CONTENT
An electronic device for encrypting content and a method thereof are provided. First and second data segments of a content file may be received. The first data...
A network can achieve compliance by defining and enforcing a set of network policies to secure protected electronic information. The network can monitor...
DETERMINING THE CHRONOLOGY AND CAUSALITY OF EVENTS
An example method includes calculating latency bounds for communications from two sensors to a collector (i.e., maximum and minimum latencies). After the...
Conditional policies can be defined that change based on security measurements of network endpoints. In an example embodiment, a network traffic monitoring...
SYSTEM AND METHOD FOR NETWORK POLICY SIMULATION
This disclosure generally relate to a method and system for network policy simulation in a distributed computing system. The present technology relates...
TRUSTED PUBLIC INFRASTRUCTURE GRID CLOUD
Systems and methods of implementing a secured cloud environment allow for design and instantiation of a security policy at the infrastructure level. An example...
HANDLING OUT OF ORDER EVENTS
Processing streaming data in accordance with policies that group data by source, enforce a maximum permissible late arrival value for streaming data, a maximum...
VIRTUAL PRIVATE NETWORK BASED PARENTAL CONTROL SERVICE
In various embodiments, methods and systems for implementing parental controls on mobile devices using virtual private network (VPN)-based parental control...
AUTOMATIC REAL-TIME ALERTING OF SECURITY HARDENING NON-COMPLIANCE
In a computer-implemented method for automatic real-time alerting of security hardening non-compliance security policies of virtual machines in a...
AUTOMATICALLY AUDITING VIRTUAL MACHINES FOR SECURITY HARDENING COMPLIANCE
In a computer-implemented method for automatically auditing virtual machines for security hardening compliance security policies of virtual machines in a...
AUTOMATIC SECURITY HARDENING OF AN ENTITY
In a computer-implemented method for automatic security hardening of an entity at time of creation in a virtualization infrastructure, creation of an entity is...
AUTOMATICALLY GENERATING NETWORK RESOURCE GROUPS AND ASSIGNING CUSTOMIZED
DECOY POLICIES THERETO
A cyber security system to detect attackers, including a data collector collecting data regarding a network, the data including network resources and users, a...
METHOD AND SYSTEM FOR DETECTION OF HEADLESS BROWSER BOTS
A method and system for detecting an access to a protected resource by headless browser bots are provided. The method includes receiving a request from a...
SECURE MESSAGE FILTERING TO VEHICLE ELECTRONIC CONTROL UNITS WITH SECURE
PROVISIONING OF MESSAGE FILTERING RULES
A method according to one embodiment includes the operations of configuring a host processor to receive a message filtering rule, the host processor associated...
NETWORK SIGNALING INTERFACE AND METHOD WITH ENHANCED TRAFFIC MANAGEMENT
DURING SIGNALING STORMS
A signaling controller (DSC) performs dynamic management in networks such as Evolved Packet Core (EPC) networks that rely on Diameter signaling interfaces. The...
MITIGATING SCRIPTED ATTACKS USING DYNAMIC POLYMORPHISM
In an embodiment, a data processing system comprises one or more processors; script analysis logic coupled to the one or more processors and configured to...
SYSTEM FOR ANONYMOUSLY DETECTING AND BLOCKING THREATS WITHIN A
A system is provided for anonymously detecting and blocking threats within a telecommunications network. A network analyzer of the system may intercept...
SYSTEM AND METHOD FOR CYBER ATTACKS ANALYSIS AND DECISION SUPPORT
A method for cyber attack risk assessment is disclosed. The method uses at least one hardware processor for: continuously collecting, from a networked...
COMPUTER NETWORK ATTRIBUTE BILATERAL INHERITANCE
Current approaches to managing security intelligence data often address both threat and malicious behavior at the individual computer level, tracked by the...
DETERMINING A REPUTATION OF A NETWORK ENTITY
An example method can include monitoring a network to identify flows between nodes in the network. Once flows have been identified, the flows can be tagged and...
APPLICATION TESTING FOR SECURITY VULNERABILITIES
In an approach for testing an application for a security vulnerability, a processor inserts an instrumentation hook in the application to be tested, wherein...
SYSTEMS AND METHODS FOR PROVIDING CYBERSECURITY ANALYSIS BASED ON
OPERATIONAL TECHNOLOGIES AND INFORMATION...
The disclosed technology can acquire a first set of data from a first group of data sources including a plurality of network components within an energy...
INGESTING DOCUMENTS USING MULTIPLE INGESTION PIPELINES
A primary ingestion pipeline configured for use in natural language processing includes annotators configured for annotating documents. The annotators and...
ANOMALY DETECTION ELECTRONIC CONTROL UNIT, ONBOARD NETWORK SYSTEM, AND
ANOMALY DETECTION METHOD
An anomaly detection electronic control unit, that performs anomaly detection processing and that is connected to a bus which a plurality of electronic control...
VALIDATING E-MAILS USING MESSAGE POSTING SERVICES
Validation of e-mails is provided. An e-mail is received. A sender of the e-mail is determined. A message posting service account that is associated with the...
APPLICATION MONITORING PRIORITIZATION
An approach for establishing a priority ranking for endpoints in a network. This can be useful when triaging endpoints after an endpoint becomes compromised....
SYSTEM AND METHOD OF DETECTING WHETHER A SOURCE OF A PACKET FLOW TRANSMITS
PACKETS WHICH BYPASS AN OPERATING...
A method includes capturing first data associated with a first packet flow originating from a first host using a first capture agent deployed at the first host...