At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Systems and methods of distributed silo signaling
The embodiments described herein recite a telephone communication system used for handling information such as messages, typically voice mail messages, and,...
Remote multi-party and/or event-driven visitation for residents of
Remote multi-party and/or event-driven visitation for controlled-environment facilities. In some embodiments, a method may include receiving a request to...
Bidirectional network data replications
A system and method establishes bidirectional contact through firewall devices. A method includes establishing a first connection between a first device and a...
Session initiation for multimedia services
A method includes receiving, at a first communication service provider, a request (by a first device and including identification information associated with a...
A multicast system is contemplated. The multicast system may be configured to facilitate changing between multicast steams by caching one multicast stream while...
Method and system to add video capability to any voice over internet
protocol (Vo/IP) session initiation...
Systems and methods of configuring an add-on device to augment the capability of existing endpoint infrastructure are disclosed. In one embodiment, a video...
Switching between networks
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for switching between parallel networks. One of the methods...
Access management system
An access management system includes an access management server and one or more fulfillment servers associated with endpoint computers of a production computer...
System for supervising the security of an architecture
A method is provided for supervising security of an architecture having a plurality of interconnected clouds. A cloud includes a plurality of resources and a...
Unified generation of policy updates
User input mechanisms are displayed for defining a compliance policy update. A unified compliance policy update is generated according to a unified schema that...
Reputation system in a default network
A system and a method are disclosed for computing a reputation score for user profiles of a social network according to actions taken by user profiles of the...
System, method, and computer program for preventing infections from
spreading in a network environment using...
A method for containing a threat in network environment using dynamic firewall policies is provided. In one example embodiment, the method can include detecting...
Method for detection of persistent malware on a network node
The present invention relates to methods and devices for detecting persistency of a first network node (12). In a first aspect of the invention, a method is...
Intrusion detection mechanism
In one embodiment, a method implemented on a node connected to a network bus includes: storing one or more message identifiers, the one or more identifiers...
Method and device for data transmission
Embodiments of the present disclosure provide a method and a device for data transmission. In the method, a network layer communication entity of a receiving...
Modification of computing resource behavior based on aggregated monitoring
A computer system deploys monitoring agents that monitor the status and health of the computing resources. An analysis engine aggregates and analyzes event...
IPS detection processing method, network security device, and system
An IPS detection processing method, a network security device and a system are disclosed. The method includes: determining, by a network security device,...
Distributed traffic pattern analysis and entropy prediction for detecting
malware in a network environment
Technologies are provided in embodiments to detect malware. The embodiments are configured to receive an entropy rate of a potentially affected system. The...
Systems and methods for identifying illegitimate activities based on
Systems, methods, and non-transitory computer-readable media can acquire historical data including a plurality of features associated with known legitimate...
System and method for improving the resiliency of websites and web
A system is disclosed for monitoring the status of a website operating on a host and for remedying any identified problems. A first platform is coupled to the...
Rule-based application access management
A container that manages access to protected resources using rules to intelligently manage them includes an environment having a set of software and...
Techniques for sharing virtual machine (VM) resources
Techniques for sharing virtual machine (VM) resources are provided. A relative location for a resource within a VM is created; the relative location dynamically...
A method and system for determining whether user accounts in a client-server architecture are legitimate is described, the method and system including...
Machine-to-machine service based on common data format
A method, a device, and a non-transitory storage medium having instructions to establish a connection with the simple sensor device; receive sensor data from...
Systems and methods for configuring an electronic device
A method for configuring a device is performed at a target device with a processor and memory storing instructions for execution by the processor. In some...
Systems and methods for anonymous authentication using multiple devices
A system and method of anonymous authentication is described. In operation, the authenticator receives a request to access a resource from one of the user...
Systems and methods for combined OTP and KBA identity authentication
Certain implementations include systems and methods for combined one-time-passcode (OTP) and knowledge-based-authentication (KBA) identity authentication. A...
Multiple input based passwords
A computer-implemented method, carried out by one or more processors, for utilizing one or more input methods for passwords. In an embodiment, the method...
Device control method, device management system, and in-house server
apparatus connected to device management...
A method in the disclosure includes: receiving, from an information device, a device password which is used for controlling a target device via an in-house...
Systems and methods for application signing are disclosed. In some implementations, an application package identifier and a password may be received at an...
Using resource records for digital certificate validation
A digital certificate incorporated within a communication is received from a server associated with a host name. Resource records associated with the host name...
System and method for biometric protocol standards
A one-time certificate is provided that enables an initial two-way secured communication session between a user computing device and a trusted server. An...
Automatically authenticating a host key via a dynamically generated
certificate using an embedded cryptographic...
A network device initiates a transmission control protocol (TCP) connection to establish a TCP session with a management device, and performs, via the TCP...
Scan image authentication
Methods and systems receive an electronic scanned image generated by activity of an application running on a portable computerized device, and calculate a...
Method and system for authentication-based multi-user online video game
The invention relates to a method, comprising: registering user groups to a video game server, and assigning video game identifiers for the user groups;...
Certificate authority server protection
This invention includes a solution to enable a digital authentication solution comprising a network. Next, a first device is coupled to the network. The first...
Insecure connection prohibition
A server system may be configured to receive a request for a connection from a client application. The server system may also be configured to determine if the...
Communication apparatus and control method therefor
It is determined whether a user who has logged in in communication using a selfsigned certificate stored by default is an administrator or a general user. If it...
Method and apparatus for providing authentication
A method and apparatus for providing authentication are disclosed. For example, the method receives a request from a customer to access a service via a first...
Supporting differentiated secure communications among heterogeneous
A gateway apparatus supports differentiated secure communications among heterogeneous electronic devices. A communication port communicates via communication...
System and method for providing a one-time key for identification
A server includes a key generator and an authenticator. The key generator is configured to receive a request for a first key from a worker device, to create the...
Method for operating a network device
The invention relates to a method for releasing a network device of a network system that comprises at least the one network device and at least one server. At...
Identification, verification, and authentication scoring
Systems and methods are provided for responding to a communication received from an individual. An identification score may be obtained for the communication...
Method for downloading preauthorized applications to desktop computer
using secure connection
A method and computer program product for establishing a connection and downloading server applications on a desktop. A user downloads and installs custom...
Systems and methods for automatically logging into a user account
Systems and methods for automatically logging into a user account are described, including receiving, using a device, data from an external source or from two...
Bootstrap authentication framework
A bootstrap authentication framework may automatically provide stored authentication credentials to an application server on behalf of an application. The...
Methods and devices for trusted protocols for a non-secured, distributed
environment with applications to...
The present invention discloses methods for trusted protocols for a non-secure computing-environment. Methods include the steps of: upon request for determining...
Methods and devices for securing keys for a nonsecured, distributed
environment with applications to...
The present invention discloses methods and devices for securing keys for a non-secure computing-environment. Methods include the steps of: providing a...
Decoding of encrypted file
A method and system for decoding an encrypted file. A recipient computer: receives, from a sender computer, the encrypted file having a filename that includes...
Systems and methods for data gathering without internet
Systems and methods are provided in which external key devices are used for sealing and unsealing data-gathering devices without Internet, wherein the...