At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Information processing system
An information processing system includes multiple network segments to which one or more information processors are connectable. The network segments includes a...
Method, apparatus and computer program product for invoking local
communication application services
It is presented a method for invoking an application service in response to a tag reading by a mobile terminal. The method comprises the steps of: receiving an...
Software appliance management using broadcast technique
Broadcasts identifying executed execution states and configurations of a plurality of virtual machines may be received. Each of the broadcasts may be received...
Automating client development for network APIs
System and method of automating client development for an application programming interface (API). An embodiment includes an apparatus capable of receiving...
Control device, image processing device, control method, computer-readable
recording medium, and program
Provided is an information processing device constituting at least a part of a communication system. The information processing device includes a master unit...
Optimization of a software application implemented on a client-server
In at least one embodiment, data relating to the usage and the operating status of a frontend module of a software application implemented on the client side is...
Annotations of objects in multi-dimensional virtual environments
A computer-implemented method of enabling participation by a first client and a second client in a communication session in a multi-dimensional virtual...
Providing a framework for developing, deploying and managing sophisticated mobile solutions, with a simple Web-like programming model that integrates with...
Control of data presentation in multiple zones using a wireless home
Sink devices may automatically be partitioned into zones based on location in a home entertainment system. A message may be transmitted to a source device to...
Communication system, communication apparatus, communication method, and
The data server stores, data and user identification information, and transmits to the analysis server the data and first identification information associated...
Network system, device server, and network system control method
A network system enables controlling an image input device without requiring a driver that depends on the computer environment. A client terminal has a...
Methods and apparatus for providing content
One embodiment of the invention relates to the transfer of content between a host computer that issues OAS access requests and a block I/O storage system....
Virtual media systems, methods and devices
In a KVM system, a system provides for USB devices to be accessed by target computers. A KVM switch connects a client with a target server via a network, the...
Managing page-level usage data
Systems and methods are disclosed which facilitate management and monitoring of page-level usage data. Specifically, a client computing device may retrieve...
Information processing system, computer-readable non-transitory storage
medium, information processing method...
Each information processor executes a mission which allows participation of users of a plurality of information processors using wireless communication. While...
Stateless microkernel web server architecture
A method for serving enterprise commerce between a stateless microkernel architecture HTTP server program executed on a server device and an HTTP client program...
Bulk uploading of multiple self-referencing objects
A computer implemented method, computer program product, and system for performing create, read, update, or delete operations on a plurality of resources in a...
Web-based sharing of documents
A technique is disclosed that enables telecommunications endpoints to conveniently share the addressing information--that is, the Uniform Resource Identifiers...
Server defenses against use of tainted cache
Systems, methods, and computer readable media are described for validating objects stored in a web cache. In one embodiment, a computing device caches objects...
Audio/video streaming in a topology of devices with native WiGig sink
A method and system may include a source station to provide wireless multicast transmission to a plurality of destination stations according to a protocol...
Method of streaming media to heterogeneous client devices
A method of dynamically preparing a media clip for delivery from a server to a client is provided. Media attributes comprising media playback formats compatible...
Customizing distribution of an operating system based on detected network
carrier by retrieving differences...
Technology disclosed herein includes a method for loading a carrier specific OS onto a computing device depending on what network the computing device is...
Timing synchronization in discovery signals
Embodiments described herein relate generally to a device that is to transmit signals using a control channel. The device may be, for example, a user equipment...
Simulating broadcast television channel surfing for on-demand content
Described are systems and methods for simulating a traditional television experience with streamed on-demand content. Streamed content may be buffered to allow...
System and method for remote home monitoring utilizing a VoIP phone
A system and method for remote monitoring through a voice over Internet Protocol phone. An indicator configured to activate a video interface of the VoIP phone...
Managing information and content sharing in a virtual collaboration
Systems and methods for managing information and content sharing in a virtual collaboration session. In some embodiments, a method may include creating a...
Systems and methods for video-conference network system suitable for
scalable, private tele-consultation
A scalable social network consultation communication system for teleconsultation private practice includes a social network, a social network processing system,...
System and method for group participation in a digital media presentation
System and method for group participation in a digital media presentation are provided that are capable of selecting digital media items for inclusion in the...
Systems and methods for room system pairing in video conferencing
Systems and methods for the pairing of room systems, and other systems that lack portability and a convenient user interface, to videoconferences are disclosed...
Secure call indicator mechanism for enterprise networks
The concept of a secure call indicator is introduced. In general, the secure call indicator is capable of inspecting the security of signaling associated with...
Optimized user re-distribution over S-CSCF entities
Embodiments of the present invention provide a network entity of an IMS network, in which a registered user is being served by an assigned Serving-Call Session...
Efficient data transmission between computing devices
The subject disclosure is directed towards technology by which data transmission sizes are reduced when uploading files over a network. By processing hash...
Detection of potentially copyrighted content in user-initiated live
Systems and methods modifying a presentation of media content in response to a detected violation are provided. In particular, media content such as a media...
Enforcing policy-based application and access control in an information
A method and apparatus for controlling document access and application usage using centrally managed rules. The rules are stored and manipulated in a central...
Dynamically configured connection to a trust broker
A method for connecting to a trust broker system is disclosed. The method is performed on a client device having one or more processors and memory storing one...
Method and device for securely transmitting data
Cryptographic methods are used at the application level, unlike known methods using point-to-point connections that can only be sufficiently secured at the...
Authenticating an application to access a communication system
Embodiments describe transmitting authentication data from an application to a communication system. The communication system verifies the authentication data...
Methods and systems for phishing detection
A method of determining a probability that a received email comprises a phishing attempt may comprise analyzing a link therein to determine whether the link...
Image-based man-in-the-middle protection in numeric comparison association
An authentication scheme is provided for securely establishing an association with a second device over a wireless communication link. A cryptographic key...
Network device and method for avoiding address resolution protocol attack
A network device records IP addresses and MAC addresses of a plurality of CPEs to form an address mapping table, sends first ARP request packets to the...
Method and apparatus for detecting attack on server
The present invention discloses a method and apparatus for detecting an attack on a server. The method comprises: calculating interval time after a current...
Applying fine-grain policy action to encapsulated network attacks
An intrusion detection system inspects encapsulated packet flows and, upon detecting a malicious encapsulated packet flow, may close an encapsulated network...
Systems and methods for capturing input from users to prevent data loss
The disclosed computer-implemented method for capturing input from users to prevent data loss may include (1) intercepting, as part of a data-loss-prevention...
Identifying stored vulnerabilities in a web service
A computer identifies each web method, of a web service, declared in a web services description language (WSDL) file. The computer adds a node within a directed...
Intrusion detection system false positive detection apparatus and method
Disclosed herein is an Intrusion Detection System (IDS) false positive detection apparatus and method. An IDS false positive detection apparatus includes a...
Apparatus, system and method for suppressing erroneous reporting of
attacks on a wireless network
According to one embodiment, a method for suppressing erroneous alert messages for suspected network attacks comprises a first operation of determining an...
Collaborative phishing attack detection
Described herein are methods, network devices and machine-readable storage media for detecting whether a message is a phishing attack based on the collective...
Detecting and processing suspicious network communications
Analyzing routing information to identify and intercept unauthorized, unwanted, and/or otherwise malicious communications is disclosed. In some embodiments,...
Chunk-based file acquisition and file reputation evaluation
One or more techniques and/or systems are provided for file acquisition for reputation evaluation. A reputation service may be configured to evaluate files and...
Attack mitigation using learning machines
In one embodiment, techniques are shown and described relating to attack mitigation using learning machines. A node may receive network traffic data for a...