At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Communication apparatus, communication apparatus control method, and
storage medium for data communication...
There is provided a multifunction peripheral (MFP) configured to perform data communication using a session initiation protocol (SIP) server, which includes a...
Session initiation protocol message routing method between IP networks
using different IP address format
Disclosed are the examples of an interworking system and related methods. The interworking system can be configured to implement a session initiation protocol...
Apparatus and method for macro operation involving a plurality of session
An apparatus and method for macro operation involving a plurality of session protocol transactions is disclosed. In accordance with an embodiment of the...
Message handling in an IP multimedia subsystem
A Session Initiation Protocol Application Server of an IP Multimedia Subsystem having processing means for handling a message received from a Serving Call/State...
Real time collaboration using embedded data visualizations
Scorecard data is received, processed, and visualizations provided by a performance metric application. Real time collaboration between users is facilitated...
Subscriber dependent redirection between a mobile packet core proxy and a
cell site proxy in a network environment
A method is provided in one example embodiment and includes receiving, by a first proxy within an access network, a first request for content associated with a...
Policy-based selection of remediation
Methods and systems for remediating a security policy violation on a computer system are provided. According to one embodiment, information regarding a...
End-to-end secure cloud computing
A method includes receiving, at a control node of a cloud computing network, a first enterprise policy specific to the first enterprise and a second enterprise...
Methods and apparatus to measure compliance of a virtual computing
Methods, apparatus, systems and articles of manufacture are disclosed to measure compliance of a virtual computing environment. An example method disclosed...
Apparatuses, methods and systems for a secure resource access and
The APPARATUSES, METHODS AND SYSTEMS FOR A SECURE RESOURCE ACCESS AND PLACEMENT PLATFORM ("SRAP PLATFORM") provides a secure supporting infrastructure within a...
A network communications method utilizing a network watermark for providing security in the communications includes creating a verifiable network communications...
Managing cyber attacks through change of network address
A system for responding to a cyber-attack on a server. A notification is sent to a server administrator that a cyber-attack is occurring and the number of...
Limiting the efficacy of a denial of service attack by increasing client
A device may detect an attack. The device may receive, from a client device, a request for a resource. The device may determine, based on detecting the attack,...
Methods, systems, and media for inhibiting attacks on embedded devices
Methods, systems, and media for inhibiting attacks on embedded devices are provided, in some embodiments, a system for inhibiting on embedded devices is...
System and method for below-operating system regulation and control of
A system for securing an electronic device may include a memory, a processor; one or more operating systems residing in the memory for execution by the...
Advanced persistent threat detection
A variety of techniques are disclosed for detection of advanced persistent threats and similar malware. In one aspect, the detection of certain network traffic...
Automated detection of harmful content
This document discloses a solution for automatically detecting malicious content by computer security routine executed in a processing device. A user input to a...
Defending against a cyber attack via asset overlay mapping
Methods, apparatus and articles of manufacture for defending against a cyber attack via asset overlay mapping are provided herein. A method includes determining...
Application security testing system
Embodiments of the invention are directed to an apparatus, method, and computer program product for an exposure based application security testing system. In...
Web vulnerability repair apparatus, web server, web vulnerability repair
method, and program
A Web vulnerability repair apparatus (50) detects the presence of a vulnerability of a Web application of a Web server (30) and the type of the vulnerability....
Streaming method and system for processing network metadata
A method and system for processing network metadata is described. Network metadata may be processed by dynamically instantiated executable software modules...
Operating a network monitoring entity
Network flow records from various administrative domains are provided to a network monitoring entity. The network monitoring entity analyzes the network flow...
Systems and methods for identifying information related to payment card
Approaches for determining a potential merchant breach are described. A system can acquire card transaction data from one or more sources such as merchants or...
System and method for identifying infected networks and systems from
Systems and method of the present disclosure are directed to a network security monitor. The monitor can receive logs of a second computer network indicative of...
Method and apparatus for management and troubleshooting of a processing
The present invention includes an apparatus connected to a processing system including a data collector to gather and store data regarding operation of the...
System and method for matching pattern
System and method for matching a pattern are provided. The pattern matching method includes performing a sub pattern matching operation to match at least one...
Method and system for dynamic protocol decoding and analysis
A method for dynamically decoding protocol data on a computer system is provided using a protocol decoder, which inspects and analyzes protocol data received by...
Internet security cyber threat reporting system and method
A risk assessment and managed security system for network users provides security services for dealing with formidable cyber threats, malware creations and...
System and method of providing virus protection at a gateway
A system, a method for providing virus protection, and a computer program stored on a storage medium in a communication system including at least a first...
Multilayered deception for intrusion detection and prevention
Concepts and technologies are disclosed herein for multilayered deception for intrusion detection. According to various embodiments of the concepts and...
Re-authentication timer for user equipment
A device receives, from a user equipment (UE), a first request to access a first packet data network (PDN), and receives authentication information from the UE....
Method and system for executing applications in a mobile device
A method and system for executing applications in a mobile device including receiving a request for execution of the application; determining whether the mobile...
Extended OAuth architecture supporting multiple types of consent based on
multiple scopes and contextual...
Method, device, and storage medium to receive a request to authorize a release of protected resource data, wherein the request includes a device identifier that...
Message processing apparatus, wireless device and method of storing a
message in a wireless device
Embodiments of the invention relate generally to a message processing apparatus, to a wireless device and to a method of storing a message in a wireless device....
Auditable retrieval of privileged credentials
In an approach for providing auditable retrieval of privileged credentials in a privilege identity management (PIM) system, a processor invokes a checkout of a...
Remote processing of mobile applications
In an example implementation of the disclosed technology, a method includes accessing, by a management agent associated with a client device, a profile...
Contextual device locking/unlocking
Particular embodiments of a computing device associated with a user may detect an event using a sensor of the computing device. The event may be a...
Sharing content by indicating activity from users in a social network
The subject technology discloses configurations for receiving an indication of user activity from a first user with respect to a post, wherein the post includes...
System and method for secure control of resources of wireless mobile
Systems and methods for secure control of a wireless mobile communication device are disclosed. Each of a plurality of domains includes at least one wireless...
Messaging gateway for directory and anonymous services
A subscriber who seeks to block access to contact information may receive identifying information for people attempting to access the subscriber's contact...
User authentication based on self-selected preferences
Embodiments of the invention are directed to a system, method, and a computer program product for a user authentication based on self-selected preferences. The...
Automatic identification of returned merchandise in a data center
A method and system for determining a device identifier assigned to a device within an installation of devices connected via a network is provided. A system...
Community biometric authentication on a smartphone
Methods and systems are presented for performing biometric authentication of a plurality of users on a user device (e.g., smartphone). In some embodiments, a...
Biometric personal authentication
A module for authenticating a person is characterized in that it comprises: a processing circuit (102) comprising an authentication memory (104), a sensor...
Method and apparatus for providing multi-sensor multi-factor identity
An approach for multi-sensor multi-factor identity verification. An identity verification platform determines biometric data associated with a user from one or...
Environment-based two-factor authentication without geo-location
The invention provides a method and system for accomplishing two-factor authentication for internet transactions, wherein the user of the device through which...
Mobile virtual communication and entertainment service
Aspects of the subject disclosure may include, for example, a method including providing, by a processor in a dongle coupled to a display device, a graphical...
Method and system for access control
In a method for control accessing to a communication account, a second terminal obtains the identification information of a first terminal, and sends the...
Network authentication of multiple profile accesses from a single remote
A network authentication system and method is described for authenticating multiple profile accesses from a single remote device. A device remote from a web...
Registration and credential roll-out for accessing a subscription-based
A user may access a subscription-based service via a system comprising one or more devices with one or more separate domains where each domain may be owned or...