At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
System and method for locating a boundary point within adaptive bitrate
A method is provided in one example and includes determining an occurrence of an exception to a predetermined cadence associated with an input stream of a...
High performance data streaming
Methods, systems and computer program products for high performance data streaming are provided. A computer-implemented method may include receiving a data...
Method and apparatus for distributing media content
A system that incorporates teachings of the present disclosure may include, for example, initializing a boundary estimate for an optimization of a linear...
Room cloud environment for conferencing
A room conferencing system includes a hub with a plurality of sensor nodes, each sensor node including a sensor node camera and a sensor node processor. A...
Method and device for removing objects from a video feed in real-time
According to embodiments of the invention, systems, methods and devices are directed to removal of objects in a video feed that are captured continuously...
Apparatus, system and method for maintaining a persistent data state on a
The present invention is an apparatus, system, and method for the improved tracking of a data state. The present invention allows session states to be...
Systems and methods for reducing signalling in an internet protocol
A telephony communication setup request sent from a telephony device to an element of an IP telephony system includes a first encrypted code that is generated...
Acknowledgement message monitoring
The invention relates to a system and method for monitoring a handshaking exchange between a call initiator and a call recipient to determine if handshaking has...
Broadcasting media from a stationary source to multiple mobile devices
A system for synchronized broadcast of media content across large networks, comprising a media source stored and operating on a network-connected electronic...
Pacing communications between a message sending computer and a message receiving computer that are both members of a message group of a sysplex includes...
Protection against unsolicited communication for internet protocol
A protection against an unsolicited communication for an IMS (PUCI) system includes a call session control function (CSCF), and a plurality of PUCE application...
Communication device, router, communication system, and controlling
methods for communication device and router
In order to facilitate connecting to a SIP network, a router (20) forming a communication system (1) acquires information from a carrier network (30) by using...
Preference editor to facilitate privacy controls over user identities
A privacy preference editor enables a user to institute privacy preferences relative to user identity information on a card-based and category-based basis. An...
Contract broker for secure ad-hoc personal data sharing
The present disclosure is directed to a system and method for sharing sensitive personal data such as personally identifying data and financial data of a user....
Systems and methods for enforcing enterprise data access control policies
in cloud computing environments
A computer-implemented method for enforcing enterprise data access control policies in cloud computing environments may include (1) intercepting, at a proxy, an...
Method and apparatus for man-in-the-middle agent-assisted client filtering
Example embodiments of the present invention relate to a method, an apparatus and a computer-program product for man-in-the-middle agent-assisted client...
Analyzing activity data of an information management system
In an information management system, activity data is collected and analyzed for patterns. The information management system may be policy based. Activity data...
Blocking via an unsolvable CAPTCHA
A security device may receive a request from an attacker device and intended for a server device. The security device may identify the request as being...
Malicious request attribution
Methods, apparatuses, and computer readable media for malicious request attribution are presented. For example, according to one aspect, requests for one or...
Protecting computing assets from resource intensive querying attacks
A method and system for managing data traffic and protecting computing assets. The method and system includes intercepting queries and messages, such as EDNS0...
System and method for determining modified web pages
Disclosed is a system and method for determining modified web pages. An example method includes: extracting a plurality of malware trigger code fragments from a...
User terminal, unauthorized site information management server, and method
and program for blocking...
The transmission of an unauthorized request from a terminal is blocked. It is possible to provide a user terminal which blocks an unauthorized request made by...
Determining a risk level for server health check processing
Approaches are provided for determining a risk level for server health check processing. An approach includes creating statistical process control analyzes for...
Monitoring security risks to enterprise corresponding to access rights and
access risk calculation
A system comprising an interface and a memory communicatively coupled to a processor retrieves access information corresponding to an asset. The system stores...
Providing multi-level password and phishing protection
Embodiments described herein are directed to preventing development of insecure web pages, preventing deployment of insecure web pages and to preventing access...
Unified scan management
A particular scan set to be performed on at least a portion of a computing environment is identified. A particular scan engine, in a plurality of scan engines,...
Network anomaly detection
A security system detects anomalous activity in a network. The system logs user activity, which can include ports used, compares users to find similar users,...
Anomaly detection in network-site metrics using predictive modeling
Methods and apparatus for anomaly detection in network-site metrics using predictive modeling are described. A method comprises obtaining time-series data for a...
Method(s) and apparatus are described for use in preventing unauthorized redirection and/or routing of packets transmitted in a communication network. Packets...
Log analysis device and method
A log analysis device that classifies, based on a log collected from a network device, a plurality of attack target communication devices receiving attacks from...
System and method for detecting malicious code in random access memory
Disclosed are system and method for detecting malicious code in random access memory. An exemplary method comprises: detecting, by a hardware processor, a...
Method and system for detecting external control of compromised hosts
A detection engine may be implemented by receiving network traffic and processing the traffic into one or more session datasets. Sessions not initiated by an...
Applying a mitigation specific attack detector using machine learning
In one embodiment, a device in a network detects a network attack using aggregated metrics for a set of traffic data. In response to detecting the network...
Security threat information analysis
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for analyzing data that includes security threat information....
Systems and methods for detecting malicious use of digital certificates
A computer-implemented method for detecting malicious use of digital certificates may include determining that a digital certificate is invalid. The method may...
System and method for consolidating network streams for network analysis
A system for consolidating network streams includes a consolidator in communication with each of a plurality of network streams. Each network stream is...
Application access control method and electronic apparatus implementing
A method and apparatus of access control in an electronic apparatus implementing the method are provided. The method of operating an electronic apparatus...
Service access control
Embodiments of the present invention provide a service access control system having a service object for providing services, a messaging service facility and...
Assessing a security state of a mobile communications device to determine
access to specific tasks
Methods for assessing the current security state of a mobile communications device to determine access to specific tasks is presented. A security component on a...
Validation of a location resource based on recipient access
Aspects of the present disclosure relate to a method, a system, and a computer program product for validating a location resource, e.g., a hyperlink, embedded...
System and method for trusted mobile communications
Systems and methods for trusted mobile communications are described. A network system provisions a mobile client system with a collection of security parameters...
Method for managing and checking data from different identity domains
organized into a structured set
The invention relates to a method and system for managing and checking different identity data relating to a person. According to the invention, a...
Method and apparatus for securely saving and restoring the state of a
An apparatus and method for securely suspending and resuming the state of a processor. For example, one embodiment of a method comprises: generating a data...
Vehicle data delivery
A system and method of delivering vehicle data. Reference data is received by a data processing system. The reference data comprises a reference identifying the...
Cryptographic protocol for portable devices
Embodiments are directed towards communicating using a mobile device that performs actions including. A mobile device may be provisioned with an access point...
System and method for cross-channel authentication
A system includes a memory and processor. The memory stores a user account identifier associated with a user account. The processor receives at least one user...
Transformation rules for one-time passwords
A one-time password may be used and generated using transformation rules. A one-time password transformation rule is received. The one-time password is sent to...
Multi-server passcode verification for one-time authentication tokens with
auxiliary channel compatibility
Multi-server passcode verification is provided for one-time authentication tokens with auxiliary channel compatibility. An exemplary method comprises receiving...
Methods of resetting passwords in network service systems including user
redirection and related systems and...
Resetting a password for a network service account may include redirecting the user to a password reset tool, wherein the user is blocked from network access...
Method for assembling authorization certificate chains
A method for assembling authorization certificate chains among an authorizer, a client, and a third party allows the client to retain control over third party...