At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
METHOD AND DEVICE FOR TRANSMITTING MEDIA DATA
A method and a device for transmitting media data are provided, where a device sending the media data and a device receiving the media data are currently...
METHOD FOR SHARING A DIGITAL CONTENT DURING COMMUNICATION
The invention relates to a method for sharing a digital content associated with a communication between a first terminal and a recipient terminal, the method...
METHOD FOR SWITCHING BETWEEN MEDIA PLAY DEVICES, AND DEVICE
The present invention applies to the field of multimedia communication technologies, and provides a method for switching between media play devices, and a...
LOW LATENCY APPLICATION STREAMING USING TEMPORAL FRAME TRANSFORMATION
The present describes low latency streaming using temporal frame transformation. An execution component in an edge server executes a first instance of an...
PORTABLE GROUP COMMUNICATION DEVICE HAVING AUDIO PLAYBACK AND/OR PHONE
A portable communication device that is a first electronic device, the first electronic device comprising: an interface for electronic communication with a...
METHOD AND APPARATUS FOR DISTRIBUTED BOTTLENECK COORDINATION IN DASH WITH
Systems and methods for allocating bandwidth between a coordinator device and a user equipment (UE). In the system, the UE includes a communication interface...
LIVE CONTENT STREAMING SYSTEM AND METHOD
A live media streaming system and method is presented herein. The system and method includes broadcasting a live media stream in at least one of a plurality of...
MEDIA-TIMED WEB INTERACTIONS
An example method of rendering media content includes receiving, at a client application executing on a computing device, streaming media content. The method...
SYSTEM AND METHOD FOR DELIVERING CONTENT
A method for delivering media content includes receiving a request identifying a requested media file. The method also includes, in response to receiving the...
CONTENT SUPPLY DEVICE, CONTENT SUPPLY METHOD, PROGRAM, TERMINAL DEVICE,
AND CONTENT SUPPLY SYSTEM
The present disclosure relates to a content supply device, a content supply method, a program, a terminal device, and a content supply system, which are...
SEAMLESS SWITCHING BETWEEN MULTICAST VIDEO STREAMS
A packet-based video network including: two or more video data sources, each configured to launch video data packets onto the network as multicast data packets...
Data Processing Method in Stream Computing System, Control Node, and
Stream Computing System
A stream computer system and a method for processing a data stream in a stream computing system are disclosed. In an embodiment, the method includes collecting...
SYSTEM AND METHOD FOR CREATING CONTENTS BY COLLABORATING BETWEEN USERS
In one or more example embodiments, a method includes receiving, at a server, primary content and location information from one or more of a plurality of user...
METHOD AND APPARATUS OF PERFORMING REMOTE MANAGEMENT OF A MANAGED MACHINE
Disclosed are an apparatus and method of remotely communicating with a managed machine. One example method of operation may include selecting the managed...
INITIATING A SERVER-DIRECTED COMMUNICATION SESSION
A method includes sending, from a first device while the first device is coupled to a second device, a signal to a third device to request a server to host a...
AUTOMATIC EQUIPMENT CONFIGURATION FOR MEETINGS
The act of setting up a user's device to participate in a meeting may be performed automatically, using location information and calendar information. With...
APPARATUS FOR TRANSMITTING BROADCAST SIGNAL, APPARATUS FOR RECEIVING
BROADCAST SIGNAL, METHOD FOR TRANSMITTING...
The present invention provides a method for transmitting a broadcast signal, and a system capable of supporting future broadcast services in an environment...
SYSTEMS AND METHODS FOR PROVIDING PROTOCOL INDEPENDENT DISJOINT PORT NAMES
A system and method for providing protocol independent disjoint port names for a session level restriction enabled information handling system utilizes a...
IP Based Real-Time Communications Over a Mobile Network
Techniques for improving real-time communications over a mobile network are provided. In one aspect, a method for managing data transfer in a mobile network...
Security Policy Deployment and Enforcement System for the Detection and
Control of Polymorphic and Targeted Malware
The present system and method pertain to the detection of malicious software and processes such as malware. A cloud security policy system receives hashes and...
UNIFIED HOST BASED SECURITY EXCHANGE BETWEEN HETEROGENEOUS END POINT
In one embodiment, a system includes a processing circuit and logic integrated with and/or executable by the processing circuit. The logic is configured to...
ZONE-BASED SECURITY ARCHITECTURE FOR INTRA-VEHICULAR WIRELESS
Systems and methods provide secure and wireless intra-vehicular communication. An intra-vehicular communication system has a secured network segment including...
HONEYPORT ACTIVE NETWORK SECURITY
A device comprises a processor. The processor is configured to generate a first signal using a first communication protocol. The first signal corresponds to...
METHOD AND DEVICE FOR DETECTING WEB ADDRESS HIJACKING
The present disclosure relates to a method and a device for detecting web address hijacking. The method includes: obtaining a currently accessed web address...
THREAT DETECTION AND MITIGATION THROUGH RUN-TIME INTROSPECTION AND
A graph of a plurality of resources in a computing environment is generated, with the graph associating a first resource of the plurality with a second...
METHOD AND DEVICE FOR EVALUATING SECURITY ASSESSMENT OF AN APPLICATION
Embodiments of the present disclosure disclose a method and a device for evaluating security assessment of an application. The method comprises receiving...
ADVANCED SECURITY FOR DOMAIN NAMES
Various techniques for improving security of domain name records are disclosed herein. In one embodiment, a method includes receiving a request to modify a...
Detecting and Analyzing Operational Risk in a Network Environment
In one embodiment, a system for the realization of operational risk in a network includes an interface to receive a change request to update a network...
USER BEHAVIORAL RISK ASSESSMENT
A particular activity performed by a particular user of a computing device is identified, for instance, by an agent installed on the computing device. It is...
According to an example, data acceleration may include receiving indications of levels of capabilities respectively needed for data movement, data processing,...
METHOD AND APPARATUS FOR SERVICE TRAFFIC SECURITY USING DIMM CHANNEL
DISTRIBUTION IN MULTICORE PROCESSING SYSTEM
The present invention relates to a multicore communication processing service. More specifically, aspects of the present invention provide a technology for...
TECHNOLOGIES FOR SECURE PERSONALIZATION OF A SECURITY MONITORING VIRTUAL
Technologies for secure personalization of a security monitoring virtual network function (VNF) in a network functions virtualization (NFV) architecture...
TRIP ANOMALY DETECTION SYSTEM
An anomaly detection system is provided in connection with a transport service. The anomaly detection system can construct routine route profiles for...
CAPTURING CORRELATIONS BETWEEN ACTIVITY AND NON-ACTIVITY ATTRIBUTES USING
Identifying correlations between events recorded in a computer system log, the recorded events are generated by a plurality of processes executing on the...
HUMAN USER VERIFICATION OF HIGH-RISK NETWORK ACCESS
Systems and methods for performing a human user test when a high-risk network access is captured by an intermediary security device are provided. According to...
MANAGING SECURITY BREACHES IN A NETWORKED COMPUTING ENVIRONMENT
Approaches for managing security breaches in a networked computing environment are provided. A method includes detecting, by at least one computer device, a...
METHOD AND SYSTEM FOR DETECTING RESTRICTED CONTENT ASSOCIATED WITH
In embodiments of the present invention improved capabilities are described for detecting restricted content associated with retrieved content. The method and...
Mitigating the Impact from Internet Attacks in a RAN Using Internet
The present disclosure relates to methods and devices for mitigating the impact from Internet attacks in a Radio Access Network, RAN (10), using Internet...
Mitigating the Impact from Internet Attacks in a RAN Using Internet
The present disclosure relates to methods and devices for mitigating the impact from Internet attacks in a Radio Access Network, RAN, using Internet transport....
Systems, methods, apparatuses, and computer-readable media configured to receive a search query and identify one or more messages matching at least a portion...
Application Spam Detector
A search engine includes a network interface that receives a search query and a search module. The search module determines a consideration set of applications...
COMMUNICATION SYSTEM, METHOD AND BASE STATION
A communication system includes an information processing apparatus storing a plurality of filter rules corresponding to respective application programs, a...
PAYLOAD INTERROGATION PRIOR TO EXTERNAL DATA CHANNEL SUBMISSION
The present invention relates to verification of the contents of a data file prior to external recipient communication. Specifically, the invention provides...
Template Uniform Resource Locator Signing
An apparatus including a memory configured to store content items, and a processor operably coupled to the memory and configured to generate Uniform Resource...
INMATE INFORMATION CENTER FOR CORRECTIONAL FACILITY PROCESSING
A platform application and methods of operation that integrate both native and third-party modules into an integrated environment on an inmate computing device...
IMAGE FORMING APPARATUS, COMMUNICATION SYSTEM, AND PROGRAM
A communication system includes: an image forming apparatus including a browser function and being configured to set permission/non-permission for access...
VIRTUAL DESKTOPACCESS CONTROL
A virtual desktop access control is disclosed. A gateway apparatus receives a virtual desktop access request from a client, obtains a virtual desktop access...
SYSTEMS AND METHODS FOR MANAGING ELECTRONIC TOKENS FOR DEVICE INTERACTIONS
Systems and methods are provided for managing electronic tokens for device interactions. In some embodiments, a unified graphical user interface is provided...
POWER TOOL PROFILE SHARING AND PERMISSIONS
Method and system for programming a power tool from an external device. The method includes establishing a first communication link with a server. The server...
BUSINESS INTELLIGENCE (BI) QUERY AND ANSWERING USING FULL TEXT SEARCH AND
A computer-implemented method for initiating, at a user interface, execution of a software application implementing a plurality of business processes...