At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Unregistered user account generation for content item sharing
Various embodiments of the present technology involve the sharing of a content item though a synchronized content management system (CMS) without requiring a...
Network layer claims based access control
Embodiments of the invention provide techniques for basing access control decisions at the network layer at least in part on information provided in claims,...
System and method for assessing an application based on data from multiple
Disclosed herein is a system and method for efficiently gathering information about applications for mobile communications devices (e.g., smartphones, netbooks,...
Resource-centric authorization schemes
A first request to change a permission of a first user for accessing a first resource is received via a service application programming interface (API) of an...
Network apparatus based on content name and method for protecting content
A content protection method includes generating content protection information regarding a content to be protected by a content producer, and generating a...
Method and system for digitally certifying the association between an
entity and a place
A method of processing data in order to digitally certify the association of at least one entity with a place, the method comprising the receipt of at least one...
Facilitating multiple authentications
Techniques and constructs to facilitate multiple authentications of passwords are described. For instance, the disclosure describes systems and processes that...
Accessing enterprise resources while providing denial-of-service attack
Techniques for accessing enterprise resources while providing denial-of-service attack protection may include receiving, at a gateway from a client device, a...
Dynamic object creation and certificate management
Systems and methods that facilitate dynamic directory service object creation and certificate management are discussed. One such method can include discovering...
Authorizing access by a third party to a service from a service provider
Systems and methods are provided for authorizing third-party access to a specific service from a service provider. In an example embodiment, a server system...
System and method for user identification and authentication
Systems and methods for user identification and authentication are disclosed. In one embodiment, a method of authenticating a first party to a second party may...
Method to modify android application life cycle to control its execution
in a containerized workspace environment
Methods, devices, and systems are described to modify the life cycle of a Google Android.RTM. application, in its application manifest file and byte code, such...
User access authentication based on network access point
Systems and methods of authenticating user access based on an access point to a secure data network include a secure data network having a plurality of a...
Systems and methods for deploying rich internet applications in a secure
Systems and methods for deploying rich internet applications in a secure computing environment. An example distributed computer system may comprise: a first...
Methods of authenticating users to a site
Systems and methods for user authentication within federated computing systems are provided. In a session, a user can be authenticated multiple times by...
Systems and methods for inhibiting attacks with a network
Systems and methods for inhibiting attacks with a network are provided. In some embodiments, methods for inhibiting attacks by forwarding packets through a...
Authentication method and system
An authenticating method including establishing trust between an authentication provider and service provider; establishing trust between the authentication...
File vault and cloud based document notary service
In one embodiment, a trusted cloud service such as an "electronic vault" may store records of a consumer's electronic data file history. These documents may...
Authentication method of accessing data network and electronic device
Disclosed is an electronic device and an authentication method performing therein. The authentication method includes transmitting a first address to a service...
User similarity provision method
A user similarity provision method for providing mobile communication devices with information about common interests among first and second users of the mobile...
Methods and systems for device disablement
A method for disabling a device associated with a virtual identity may include receiving, from the device, a request to use the virtual identity, where the...
Security key management in IMS-based multimedia broadcast and multicast
A system, method, and nodes for managing shared security keys between a User Equipment, UE, an authentication node such as an SCF/NAF, and a service node such...
Key handling in communication systems
In a method for key handling in mobile communication systems, first and second numbers are exchanged between entities of the mobile communication system. The...
Telecommunication method for securely exchanging data
The invention provides for a telecommunication method of securely exchanging unencrypted data between a telecommunications device and a first server computer...
Method and apparatus for masking non-public data elements in uniform
resource indentifiers ("URI")
Methods may display a URI of a resource. Methods may determine the presence of a non-public data element in the URI. Methods may generate a random number in...
Cloud-basd digital verification system and method
A method for formal verification of a digital circuit using a cloud-based verification engine. The method comprises extracting a proof problem from a design of...
Centrally managed use case-specific entity identifiers
Disclosed are various embodiments for centrally managed use case-specific entity identifiers. An identifier translation service receives an identifier...
Information processing device, information processing method, and computer
According to an embodiment, an information processing device includes an event processor and a first determining unit. The event processor includes an event...
Optimized transport layer security
A method for establishing a secure communication session over communication paths between one or more client devices and one or more server computers according...
System and method for synchronizing connection credentials
In one embodiment, a method includes establishing a connection with an access-point (AP) device via a first communication path. The method further includes...
Industrial network security
A private overlay network is introduced into an existing core network infrastructure to control information flow between private secure environments. Such a...
Method, device, and system for automatically selecting IPV6 address
A method, device, and system for automatically selecting an IPv6 address transmission mode are provided. The method includes a Gateway General Packet Radio...
Methods and systems for providing translations of data retrieved from a
storage system in a cloud computing...
A method for providing translations of data retrieved from a storage system in a cloud computing environment includes receiving, by an interface object...
System and methods of installing and operating devices without explicit
A method of discovering addressing information of one or more upstream devices to respond to specific messages by a second device on behalf of the one or more...
Relay server and relay communication system
A relay server stores a routing apparatus belonging to a VPN group to which the relay server itself belongs, a second routing object address that is an address...
Communicating between clients at same location according to predetermined
naming convention with location-based...
A method of automatic hostname configuration includes receiving a request from a client device. A location detection module may be utilized for determining a...
Client aware DHCP lease management
The management of DHCP address leased based on client properties is described. According to a method of operation, clients are managed in a wireless digital...
System and method for persistent multimedia conferencing services
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for managing a virtual meeting room communication session. The method...
Subscription groups in publish-subscribe system
Disclosed is a technology for publishing subscriptions in a publish-subscribe system in accordance with subscription groups. The technology may include (i)...
System for facilitating thread-based message prioritization
To perform thread-based message prioritization, metadata may be extracted from a received electronic message. Based on the extracted message metadata and...
Secure end-to-end transport through intermediary nodes
A communication network encrypts a first portion of a transaction associated with point-to-point communications using a point-to-point encryption key. A second...
Location sensitive messaging
Methods including computer program products for receiving a request from a first device, the request incorporating a message. One or more users from a first set...
High density hosting for messaging service
Aspects of the subject matter described herein relate migrating message for a messaging service. In aspects, a determination is made that messages need to be...
Systems and methods for electronic document review
Systems and methods enable convenient and accurate searching, filtering, reviewing, and classification of electronic documents without the loss of metadata. A...
Split transcript view for business object integration into messaging
Embodiments of the present invention address deficiencies of the art in respect to messaging and provide a method, system and computer program product for...
System and method for integrating an address book with an instant
messaging application in a mobile station
This relates to a method for operating a mobile station. The method includes grouping two or more member addresses into a group. The group is presented as a...
Analysis of content sharing in a messaging platform
A system and method for message analysis, including: receiving, from a client device, a reporting request identifying a first broadcasted message authored by a...
Methods and apparatus for providing distributed load balancing of
subscriber sessions in a multi-slot gateway
A method and apparatus for providing load balancing of subscriber session in a multi-slot gateway employing utilization counts are disclosed. A process of load...
Asynchronous pipelined interconnect architecture with fanout support
Circuits comprising an asynchronous programmable interconnect with fan out support that include a multi-port switch and a first and second buffer-switch...
Inter-packet interval prediction operating algorithm
An appliance receives packets that are part of a flow pair, each packet sharing an application protocol. The appliance determines an estimated application...