At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
TRANSMISSION OF HIERARCHICAL DATA FILES BASED ON CONTENT SELECTION
A method, a computer program product, and a computer system for transmitting a hierarchical data file from a first computer device to a second computer device....
Contextual, Two Way Remote Control
This application is directed to enabling interaction between computer devices. An application is executed at a first computer device to access Internet-based...
DATA LOCKER SYNCHRONIZATION
Disclosed are various embodiments enabling a saved state of an application to be stored at a central location and to be retrieved by multiple computing devices...
PLATFORM FOR MULTIPLE DEVICE PLAYOUT
Provided is a platform for data devices in which the architecture and runtime parameters of the platform are adaptively updated based on real-time data...
METHOD AND APPARATUS FOR TIME STRETCHING TO HIDE DATA PACKET PRE-BUFFERING
A special rendering mode for the first few seconds of play out of multimedia data minimizes the delay caused by pre-buffering of data packets in multimedia...
VIDEO INFORMATION PLAYING SYSTEM AND METHOD
The embodiments of the present disclosure provide a video information play system and method. The video information play system comprises: a video file...
CAPTURING A USER REACTION TO MEDIA CONTENT BASED ON A TRIGGER SIGNAL AND
USING THE USER REACTION TO DETERMINE...
A device may receive an indication of a playback of media content. The device may receive a trigger signal associated with the playback of the media content....
SYSTEM AND METHOD FOR MANAGING ABR BITRATE DELIVERY RESPONSIVE TO VIDEO
BUFFER CHARACTERISTICS OF A CLIENT
A scheme for managing delivery of segmented media content in an ABR network, wherein bitrates of a manifest file may be selectively modified or removed based...
SUPPRESSING STREAM FUNCTIONALITY TO EXPEDITE PREFERRED DATA
A controller analyzes a tuple in an operator graph. The controller determines that the tuple includes one or more selected characteristics. These...
SYSTEMS AND METHODS TO ORGANIZE, AGGREGATE, FILTER, SORT, SHARE, AND
DISCOVER, DIGITAL CONTENT
Methods and systems to enable system users to share, discover, stream, purchase, and otherwise support content generated by other users. An interest indication...
APPARATUS AND METHOD FOR ON-DEMAND MULTI-DEVICE SOCIAL NETWORK EXPERIENCE
Methods, computer-readable media and apparatuses for sharing an experience via a social network on demand are disclosed. A processor establishes a first video...
HTTP LIVE STREAMING (HLS) VIDEO CLIENT SYNCHRONIZATION
A streaming media server is provided that receives a request over a network from a customer premises gateway to receive a streaming media content item that is...
PLATFORM FOR FACILITATING PACED, SYNCHRONOUS INTERACTIVE EXPERIENCES
Various embodiments concern a platform for creating and managing paced, synchronous interactions between a celebrity and one or more audience members. More...
GLOBAL ONLINE DIGITAL ASSET MANAGEMENT (DAM)
A method, system, apparatus, article of manufacture, and computer program product provide the ability to manage a digital asset. One or more media content...
Relayed Communication Channel Establishment
Establishing a communication channel via a relay server with reduced setup time. Upon request by an initiating communication device a relay allocation server...
SESSION PROCESSING IN INSTANT MESSAGING
An example method including: with respect to a local session contained in a local session list, determining a remote user account corresponding to the local...
SYSTEM AND METHOD FOR PROCESSING TELEPHONY SESSIONS
In one embodiment, the method of processing telephony sessions includes: communicating with an application server using an application layer protocol;...
AUTOMATICALLY CONFIGURING A WEB-ENABLED PORTABLE DEVICE TO ACCESS THE
Automatically configuring a portable electronic device for accessing a site on a public network is disclosed. The method and system include establishing a...
Single Proxies in Secure Communication Using Service Function Chaining
A first service node receives a message configured to set up a secure communication session between a client and a server, in which the first service node acts...
Method and Device for Negotiating Media Capability
A method includes sending, by a first device, a first message to a second device, sending a third message to the second device, where the first message...
METHODS, APPARATUS AND SYSTEMS TO INCREASE MEDIA RESOURCE FUNCTION
Communications methods, apparatus and systems for detecting a status condition indicative of a failure of a media processing entity and providing media...
SYSTEM, APPARATUS AND METHOD FOR ACCESS CONTROL LIST PROCESSING IN A
In one embodiment, a method includes receiving a first request from a first device to access a first resource of the system and determining whether to grant...
DYNAMIC DATA SOCKET DESCRIPTOR MIRRORING MECHANISM AND USE FOR SECURITY
According to another embodiment, a system includes a processing circuit and logic integrated with and/or executable by the processing circuit. The logic is...
DATA SOCKET DESCRIPTOR BASED POLICIES FOR APPLICATION AND DATA BEHAVIOR
In one embodiment, a system includes a processing circuit and logic integrated with and/or executable by the processing circuit. The logic is configured to...
System and Method for Security Health Monitoring And Attestation Of
Virtual Machines In Cloud Computing Systems
A system for security health monitoring and attestation of virtual machines in cloud computing systems is provided. The system includes a cloud server having a...
SERVICE ORIENTED SOFTWARE-DEFINED SECURITY FRAMEWORK
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for service oriented software-defined security framework are...
System, Apparatus And Method For Access Control List Processing In A
In one embodiment, a system includes: a credential management server to provide credentials to a plurality of computing devices and a plurality of resource...
An evaluation system includes a network device, a gateway device, a policy evaluation device, and first and second control devices. The network device copies a...
SYSTEM, APPARATUS AND METHOD FOR SECURITY INTEROPERABILITY PATH ANALYSIS
IN AN INTERNET OF THINGS (IOT) NETWORK
In one embodiment, an apparatus comprises a first logic to receive security attribute information from a plurality of devices, generate a connectivity graph of...
SYSTEM, APPARATUS AND METHOD FOR PRIVACY PRESERVING DISTRIBUTED
ATTESTATION FOR DEVICES
In one embodiment, a method includes receiving, in a system of an external verifier of a first network, a plurality of attestation reports and a plurality of...
Authenticated Sensor Interface Device
A system and method for the secure storage and transmission of data is provided. A data aggregate device can be configured to receive secure data from a data...
System and Method for Guarding a Controller Area Network
Systems and methods for guarding a controller area network are disclosed. In one embodiment, a system for guarding a controller area network comprises one or...
DIFFERENTIATING AMONG USERS BASED ON RESPONSES TO INJECTED INTERFERENCES
Devices, systems, and methods of detecting user identity, differentiating between users of a computerized service, detecting a cyber-attacker, and detecting...
HIGH-LEVEL REPUTATION SCORING ARCHITECTURE
A method for improving enterprise network security may include accessing a plurality of reputation scoring sources for a corresponding plurality of reputation...
SECURITY KEY DERIVATION IN DUAL CONNECTIVITY
The invention relates to methods for establishing a secure communication link between a mobile station and a secondary base station in a mobile communication...
COMPUTERIZED SYSTEM AND METHOD FOR SECURELY DISTRIBUTING AND EXCHANGING
CYBER-THREAT INFORMATION IN A...
Computerized systems and methods for sharing identified cyber-threat information in a standardized and secure format. The sharing of cyber-threat information...
Security of VDI Clones
Utilizing a virtual desktop interface, including receiving, from a server, a clone image comprising an instance of an operating system and an application...
PREVENTION OF CROSS SITE REQUEST FORGERY ATTACKS
A method is provided for preventing cross-site request forgery (CSRF) attacks at a server that includes embedding a hidden cryptographic nonce in a response...
EXTRACTION CRITERION DETERMINATION METHOD, COMMUNICATION MONITORING
SYSTEM, EXTRACTION CRITERION DETERMINATION...
An extraction criterion determination method performed by an extraction criterion determination apparatus includes collecting a log information entry that is...
SYSTEMS AND METHODS OF DETECTING UTILITY GRID INTRUSIONS
Systems and methods of detecting an attack in a utility grid are described. An anomaly detector establishes a first metric generated using signals received...
SYSTEMS, METHODS, AND MEDIA FOR DETECTING NETWORK ANOMALIES
Systems, methods, and media for detecting network anomalies are provided. In some embodiments, a training dataset of communication protocol messages having...
ABUSIVE TRAFFIC DETECTION
Aspects of an abuse detection system for a web service include an abuse detection engine executing on a server. The abuse detection engine includes a...
SYSTEMS AND METHODS FOR DETERMINING MALICIOUS-DOWNLOAD RISK BASED ON USER
The disclosed computer-implemented method for determining malicious-download risk based on user behavior may include (1) identifying a set of users that are at...
CONTROLLING A COMPUTER SYSTEM
A method and apparatus for control of a computer system are disclosed. The computer system includes a terminal for operator based monitoring of the computer...
SYSTEM AND METHODS FOR DETECTING MALICIOUS EMAIL TRANSMISSION
A system and methods of detecting an occurrence of a violation of an email security policy of a computer system. A model relating to the transmission of prior...
NETWORK INTRUSION DATA ITEM CLUSTERING AND ANALYSIS
Embodiments of the present disclosure relate to a data analysis system that may automatically generate memory-efficient clustered data structures,...
METHOD AND SYSTEM FOR MANAGING A PROTECTIVE DISTRIBUTION SYSTEM
A method and system for managing a protective distribution system is disclosed. In some embodiments, a physical information transmission line may be monitored....
METHODS CIRCUITS DEVICES ASSEMBLIES SYSTEMS AND FUNCTIONALLY ASSOCIATED
COMPUTER EXECUTABLE CODE FOR DETECTING...
Disclosed is a network appliance, and a system comprising same, for detection of a physical condition of a network cable. The appliance includes one or more...
PASSIVE SECURITY ANALYSIS WITH INLINE ACTIVE SECURITY DEVICE
Techniques to facilitate network security analysis and attack response are disclosed herein. In at least one implementation, a passive analysis system receives...
Systems and Methods for Processing Data Flows
A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and...