At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Remote data access permission using remote premises monitoring
One embodiment of a source device being able to monitor the premises of a target device before and after permission from the source device is granted to the...
Systems and methods for building and using hybrid mobile applications
Systems and techniques of building and presenting hybrid remote client applications for and to users of a mobile device are presented. Upon a user accessing a...
System and method for distributing web events via distribution channels
A system, method, and computer program for distributing web events via distribution channels are provided. A web event is established in an origination channel....
Mobile device application rating
A system includes a ratings server that receives the list of top applications from a source external to the ratings server and selects at least a subset of the...
Remote conference system and non-transitory computer readable medium
storing program for remote conference
A communication device obtains video data. The video data includes a plurality of inter-frame coded image data and a plurality of intra-frame coded image data....
Systems and methods of communicating platform-independent representation
of source code
A method includes receiving, at a media player software application at a computing device, a first portion of a media stream, and initiating playback of the...
Distributing communication of a data stream among multiple devices
Disclosed example methods to distribute communication of a data stream include, in response to a request received from a first device, assigning a number of...
Method and apparatus for reproducing content in multimedia data providing
A content reproducing method is provided for continuously reproducing content being reproduced by a client device in another client device in a multimedia data...
Dynamic content delivery systems and methods for providing same
Content delivery systems and related methods can provide dynamic content across a network, based on detected network performance. An exemplary content delivery...
Managing adaptive streaming of data via a communication connection
An example method includes requesting a data stream using a buffer with an initial maximum window size for buffering received data associated with the requested...
Media requests to counter latency and minimize network bursts
A client media application sends a first request for a first chunk of a particular media stream. In response to the request, the client media application begins...
Media device and method of enhancing use of media device
A method of enhancing the use of a media device and a media device are provided. The media device receives a broadcast media stream transmitted by a broadcast...
Target content video delivery
A call manager is configured to establish an initial session between an agent and a user. A play request or a hold request from an agent device includes a video...
Method and system for securing content communication in chunks from a
content delivery network to a user...
A user receiving device and method includes a content delivery network manager interaction module communicating a request for a content delivery network address...
End-to-end address transfer
According to a first aspect of the present invention there is provided a method of facilitating the end-to-end transfer of a URI between a plurality of SIP...
Information organization, management, and processing system and methods
A cloud-based system is disclosed including at least one local client device communicatively coupled, via an intermediate network, with a server device having...
Predicting viewing activity of a posting to an activity stream
A method, system and/or computer program product predicts viewing activity of a new posting to an activity stream. A first computer transmits a new posting to...
Automated deduction of user locations and activities in a mobile
positional social media method and system
A method, system, and/or apparatus for automatically tracking a mobile user using the user's mobile device. This invention is particularly useful in the field...
Saving state of a collaborative session in an editable format
In some embodiments, a method includes receiving an input from a participant of a collaborative session among two or more devices, wherein the input is to cause...
Method, device and system for providing historical communication content
A communication server is disclosed. The communication server may receive, via at least one network interface, a request to add one or more new participants to...
Computer readable recording medium, communication terminal device and
Image data corresponding to an image captured by a communication terminal device is transmitted from a communication unit of the communication terminal device...
Method and system for enabling a communication device to remotely execute
A communication system capable of enabling one or more communication devices to remotely execute one or more applications includes one or more communication...
Voice over IP call setup progress indicator
A method and apparatus for providing voice over internet protocol (VoIP) call setup progress status comprising creating an indication associated with a call...
Method and apparatus for S.I.P./H.323 interworking
An interworking function (IWF) for a first and second protocol based network, for example, an H.323 protocol based network and an SIP protocol based network...
Method for repurposing of communications cryptographic capabilities
A system and method for repurposing of cryptographic capabilities in an electronic warfare (EW) environment is presented. A method begins by determining in a...
Access control using impersonization
A first service submits a request to a second service on behalf of a customer of a service provider. The request may have been triggered by a request of the...
Method and system for managing security policies
A system and method of managing security policies in an information technologies (IT) system are provided. In an example, the method includes receiving an input...
Configuring policy settings on client computing devices
Systems and methods for installing policy settings on a client computing device are provided. In some aspects, the client computing device receives policy data...
Dynamic expression evaluation based grouping of VM objects for networking
and security services in a...
Techniques for grouping virtual machine (VM) objects for networking and security services in a virtualized computing system are described. In one example...
Dynamic communication between secure endpoints
In one implementation, a hub and spoke network is made up of hub network devices and spoke network devices. A security protocol channel is established between...
Authorization server access system
Systems and techniques are provided for authorizing restricted action (e.g., data access) requests using a tiered arrangement. A rule set is generated based on...
Securing data communications in a communications network
A method of securing communications between first node attached to first network and second node attached to second network. At the second node, first and...
NAT traversal for local IP access
The invention relates to a method for traversing a NAT device residing in a backhaul IP network. A home cellular base station (HeNB) and a collocated local...
Method and device for preventing domain name system spoofing
A method for preventing Domain Name System (DNS) spoofing includes: performing uppercase/lowercase conversion for letters of a DNS question field in a DNS...
Filtering hidden data embedded in media files
Systems and methods for filtering unsafe content at a network security appliance are provided. According to one embodiment, a network security appliance...
System and method for controlling applications to mitigate the effects of
Methods and systems for mitigating the effects of a malicious software application are disclosed. A dedicated module on the computing device receives from a...
Detection and prevention for malicious threats
A method of identifying one or more malicious threats in a computing device. The device comprises monitoring a plurality of events occurring on a computing...
Malware detection system and method
Methods and systems are presented for detection of malware such as worms in which a network switch entices the malware into sending scan packets by allocating...
Method for identifying potentially malicious network elements within a
network using cross-domain collaborative...
A method for identifying potentially malicious network elements within a network is useable in a network which includes a plurality of domains administrated by...
Randomization of processor subunit timing to enhance security
Technologies are generally provided for a system to enhance security and prevent side channel attacks of targeted functions. Side channel attacks assume that...
Unwanted tunneling alert system
Various systems and methods are provided that detect malicious network tunneling. For example, VPN logs and data connection logs may be accessed. The VPN logs...
De-obfuscating scripted language for network intrusion detection using a
regular expression signature
A device receives data, identifies a context associated with the data, and identifies a script, within the data, associated with the context. The device parses...
Apparatus and method for characterizing the risk of a user contracting
A non-transitory computer readable storage medium includes executable instructions to identify specified network interactions initiated by a client machine. The...
Threat detection using URL cache hits
Threat detection is improved by monitoring variations in observable events and correlating these variations to malicious activity. The disclosed techniques can...
System and method for non-disruptive mitigation of messaging fraud
A system and method are disclosed herein for providing mitigation of fraud in a hosted messaging service while having minimal impact on authorized messaging...
Method and device for prompting information about e-mail
The present invention discloses a method and a device for prompting information about an e-mail. The method comprises: extracting information from a currently...
System to identify machines infected by malware applying linguistic
analysis to network requests from endpoints
A method to identify machines infected by malware is provided. The method includes determining whether a universal resource locator in a network request is...
Identifying a behavior of a service is disclosed. A predetermined interrogation packet that corresponds to a hypothesis is sent to a network communication port...
Secure port forwarding to access data between public processing locations
and on-premise components
A method for transmitting data from an on-premise component to an off-premise computer image includes: sending a message from the off-premise computer image to...
Method and apparatus for providing an adaptable security level in an
A method of communicating in a secure communication system, comprises the steps of assembling a message at a sender, then determining a security level, and...