At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Distributing communication of a data stream among multiple devices
Methods, apparatus and articles of manufacture for distributing communication of a data stream among multiple devices are disclosed. Example methods disclosed...
Time and frequency synchronization for LTE-advanced new carrier type
A particular kind of component carrier that may be used as a secondary cell in an LTE system is a new type carrier that has reduced or eliminated legacy control...
Feed routing for object based collaboration
Systems and methods for routing activity information related to objects in an external application to activity feeds associated with users in a collaboration...
Acquiring online meeting data relating to an online meeting
A technique acquires online meeting data relating to an online meeting. The technique involves running, by processing circuitry, a set of programs (e.g., an...
Real-time communications methods providing pause and resume and related
Operating a receiver communication device during a real time communication session including a real time media content data stream provided by another...
Method and apparatuses for TDF session establishment
More than one TDF session for a user in a PCC architecture are coordinated. There are provided PCRF server, PCEF devices and TDF devices, and method of...
Systems and methods for establishing a Wi-Fi display (WFD) session
Systems, methods, apparatus, and techniques are provided for establishing an application layer communications session over a layer 2 (L2) communications...
Method for the transmission of signalling data in a network interface unit
and in a control unit and...
The embodiments relate to, among other things, a network interface unit (IM-MGW) in which signaling data is separated from useful data by the values of received...
System and method for providing enterprise voice call continuity
An improved system and method are disclosed for providing voice call continuity in an enterprise network. For example, an enterprise public branch exchange...
Broadcast-based trust establishment
A method and apparatus for device authentication are provided. In the method and apparatus, authentication data for a first device is received. The first device...
Geo-mapping system security events
A source of the particular security event is identified that is associated with at least one second computing device, at least one of a geographic location, and...
Technologies for multi-factor security analysis and runtime control
Technologies for client-level web application runtime control and multi-factor security analysis by a computing device include receiving application code...
Managing authentication using common authentication framework circuitry
A technique manages user authentication via common authentication framework circuitry. The technique involves receiving, by the common authentication framework...
Secure on-demand supply method and system and traffic type acquisition
A secure on-demand supply method is disclosed. The method includes: a configuration parameter of a security function module is determined according to a...
System and method to provide management of test data at various lifecycle
Disclosed is a method and system to provide management of test data, the management performed during at least one stage associated with lifecycle of the test...
Method and system for providing transparent trusted computing
A method performed at an electronic device with one or more processors and memory includes obtaining a public record including a plurality of commit nodes,...
Application based policy enforcement
One embodiment is directed to a system that comprises a network device, including at least a first port, which is configured to analyze information within one...
Detecting and applying different security policies to active client
requests running within secure user web...
A method, apparatus and computer program product to detect and apply security policy to active client requests within a secure user session begins by applying a...
Extensible multi-tenant cloud-management system and methods for extending
functionalities and services provided...
The current document is directed to an interface and authorization service that allows users of a cloud-director management subsystem of distributed,...
Privacy scoring for cloud services
Information processing techniques for generating privacy ratings for services that are available via a cloud infrastructure, e.g., cloud services. For example,...
Securing radio-frequency identification systems
In one embodiment, a method includes, by a base station, communicating a challenge to a transponder through a first communication link; and establishing a...
System and method for monitoring network traffic
Described is a method of assigning a network address to a trap, the network address being a dark address of a virtual private network. The network traffic...
Apparatus and method for protecting communication pattern of network
An apparatus for protecting traffic trend in a network of a control system using artificial communication is provided. In accordance with an embodiment, the...
Systems, methods, and media for generating bait information for trap-based
Systems, methods, and media for generating bait information for trap-based defenses are provided. In some embodiments, methods for generating bait information...
Preventing network tomography in software defined datacenter networks
Technologies are provided for preventing abuse of software-defined datacenter networks. In some examples, an SDN abuse prevention module within a control layer...
Methods for determining cross-site scripting and related vulnerabilities
The invention provides computer-implemented methods and computer systems for testing applications such as web-based (HTTP) applications for cross-site scripting...
Intercepting and supervising calls to transformed operations and objects
In an embodiment, a method comprises intercepting a first set of instructions from a server computer that define one or more objects and one or more original...
System and method to prevent spoofed communication through out-of-band
The disclosed subject matter addresses the problem of spoofing by directly and transparently communicating with the apparent sender of the potentially spoofed...
Packet redirection in a communication network
A method of controlling the re-direction of IP packets to an IP host having two or more different IP addresses comprises generating a first of said IP addresses...
Responses to server challenges included in a hypertext transfer protocol
Example embodiments relate to verification of client requests based on a response to a challenge (135; 235) included in an HTTP Header. In some embodiments, a...
Evaluating URLS for malicious content
A system includes one or more "BotMagnet" modules that are exposed to infection by malicious code. The BotMagnets may include one or more virtual machines...
Network service interface analysis
In one implementation, a service interface analysis system defines a plurality of service templates based on a plurality of Uniform Resource Identifiers...
Collaborative phishing attack detection
Described herein are methods, network devices and machine-readable storage media for detecting whether a message is a phishing attack based on the collective...
Methods and systems for analyzing data related to possible online fraud
Various embodiments of the invention provide methods, systems and software for analyzing data. In particular embodiments, for example, a set of data about a web...
Detecting malware in mobile sites
Behavioral analysis of a mobile webpage is performed to determine whether the webpage is malicious. During analysis, the webpage is visited by an emulated...
Automatic content inspection system for exploit detection
A method of inspecting content intended for a workstation to detect content that performs malicious exploits, including receiving the content for inspection at...
System and method for detecting malicious traffic using a virtual machine
configured with a select software...
The system comprises a traffic analysis device in communication with a network device. The traffic analysis device can analyze network traffic received over a...
Systems and methods for performing security analyses on network traffic in
The disclosed computer-implemented method for performing security analyzes on network traffic in cloud-based environments may include (1) collecting network...
Method and system for detecting network compromise
A method and system are described for detecting unauthorized access to one or more of a plurality of networked victim computers in a victim cloud. The networked...
Systems and methods for detecting suspicious web pages
A computer-implemented method for detecting suspicious web pages. The method may include 1) identifying a plurality of malicious web pages; 2) establishing a...
Security and access system based on multi-dimensional location
An invention is provided for system security and access based on multi-dimensional location characteristics. The invention includes collecting contextual...
System and method for dynamic access control based on individual and
community usage patterns
Systems and methods include receiving data corresponding to a request to access a resource by an identity provided with authority to access the resource....
Method, device, system, token creating authorized domains
This invention relates to a method (100) for creating, on a device (200), an authorized domain (102) for sharing a (103) of a content item (104) between a first...
Disambiguating conflicting content filter rules
A content filtering mechanism is enhanced to resolve conflicts in filtering rules (e.g., those created by a whitelist, on the one hand, and a blacklist, on the...
Method and apparatus for managing access to electronic content
According to at least one example embodiment, a method and corresponding content protection server for managing access to electronic content comprise retrieving...
Selective access to portions of digital content
A method includes receiving a request to access a digital content item, the digital content item including multiple portions. Responsive to the request,...
Data volume scaling for storing indexed data
Embodiments are directed towards a system and method for a cloud-based front end that may abstract and enable access to the underlying cloud-hosted elements and...
Implementing policies for an enterprise network using policy instructions
that are executed through a local...
A policy framework is maintained on the computing device, and the computing device communicates with a policy server of an enterprise network over a network to...
Dynamically applying a control policy to a network
A method of dynamically applying a control policy to a network is described. A network layer of a plurality of network layers associated with user traffic is...
Methods and apparatuses for secure end to end communication
The present invention relates to application-level secure end-to-end communication. Specifically it relates to methods apparatuses and computer program products...