At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Playing of media content among multiple devices using a temporal progress
In a playing of media content among multiple devices, a first device creates a first progress information associated with a media content and the first device....
Methods and systems for dynamic creation of hotspots for media control
Methods, systems, and/or devices for controlling media presentation at a shared media presentation system are described herein. In one aspect, a first...
System and method for effectively controlling client behavior in adaptive
The present invention teaches new solutions based on an alternative approach to controlling client behavior in adaptive streaming applications, namely, server...
Determining available media data for network streaming
A client device includes one or more processors configured to send a plurality of probe requests for segments of media data to a server device, wherein the...
Method and system for downloading content
The present document discloses a method and system for realizing content download, including: after a portal site receives a request for triggering download,...
User-selected media content blocking
Presented herein is a method of blocking user-selected media content, such as, for example, audio and/or video content. In the method, at least one media...
Skip feature for a broadcast or multicast media station
A skip function for broadcast or multicast media content is disclosed. In general, a receiving device simultaneously receives two or more content streams...
Method and apparatus for voice and/or video communication
A method and apparatus for voice and/or video communication are disclosed. The method includes: a primary terminal device searching for one or more secondary...
Sharing links in an augmented reality environment
Various embodiments provide methods and systems for users and business owners to share content and/or links to visual elements of a place at a physical...
Communication system, non-transitory computer-readable medium storing
communication program and communication...
A communication system includes a first communication device and a second communication device connecting to a LAN. Using a first proxy setting for a specific...
Facilitating user communication about a common topic
Among other things, we describe identifying, in first data available to a first user and not available to a second user, and in second data available to the...
Presenting an event-related post in a stream
Systems and methods for presenting an event-related post in a stream are provided. In some aspects, a plurality of event-related posts are received. Each of the...
Embeddable media upload object
A user device's browser receives a page from a publishing system and presents content of the page within a window. Instructions from a media hosting system...
Apparatus, system, and method of managing communication, and recording
medium storing communication management...
A communication management system that manages a plurality of communication terminals transmits, to a request communication terminal, one of operation state...
Measures for processing data in a telecommunications network. At a first network node in a cluster of network nodes, a communication session setup request...
Control of codec negotiation for communication connection
The invention relates to a session control entity, method and a computer program product for receiving a request for a session, deciding on removal of a user...
User equipment and method for executing a service
User equipment and method for executing an application, which uses application data, and which is executed in an Application Server in a VoIP based...
System and method for routing and communicating in a heterogeneous network
An improved system and method are disclosed for peer-to-peer communications. In one example, the method is for connecting an endpoint that is separated from...
A method includes receiving power via a communication line at a power coupling device of a removable module coupled to a connector of a network interface...
System and method for extending SCIM / service broker processing IMS
initial filter criteria (IFC) for pipeline...
In accordance with various embodiments, systems and methods that integrate pipeline processing into a SCIM are provided. Such a system can include a plurality...
Apparatus and method for managing emergency calls
A system that incorporates teachings of the present disclosure may include, for example, a network element operably couplable to an Internet Protocol Multimedia...
Signalling gateway, method, computer program and computer program product
for communication between HTTP and SIP
A signalling gateway is arranged to allow a first client using hypertext transfer protocol, HTTP, to initiate a real-time connection to a SIP, session...
Providing and accessing data in a standard-compliant manner
In certain embodiments, a computer-implemented method includes receiving intercepted data associated with a first entity. The intercepted data may be...
System and method for resolving conflicts between application control
Disclosed are systems, methods and computer program products for configuring application control rules. An example method includes, in response to testing a new...
Communicating status regarding application of compliance policy updates
A set of compliance policy updates are received. The compliance policy updates are sent to workloads for application. A status of the application of the...
System for managing access to protected resources
A rules evaluation engine that controls user's security access to enterprise resources that have policies created for them. This engine allows real time...
Method, system and computer program product for tagging content on
uncontrolled web application
Communications by a device in a private network to a site operating outside of the network can be programmatically inspected. Unstructured data, including...
System and method for uploading files to servers utilizing GPS routing
This invention provides a system and a method to manage the uploading of data files from multiple wireless field devices in multiple locations to multiple data...
Providing consistent security information
A method for providing consistent security information between multiple applications is described herein. The method includes detecting potentially deceptive...
Method and system for protecting against unknown malicious activities by
detecting a heap spray attack on an...
A method and system for protecting against unknown malicious activities by detecting a heap spray attack on a electronic device are disclosed. A script is...
Systems and methods for HTTP-body DoS attack prevention with adaptive
The present disclosure is directed generally to systems and methods for changing an application layer transaction timeout to prevent Denial of Service attacks....
Securing cloud computing environments
Some examples of security cloud computing environments can be implemented as methods. A processor of a first computer system that lacks permission to store data...
Preboot environment with system security check
Booting an operating system that includes a secure preboot environment that performs integrity checks against security threats. A computer system boots to a...
Security threat detection using domain name registrations
Domain names are determined for each computational event in a set, each event detailing requests or posts of webpages. A number of events or accesses associated...
Application spam detector
A method for performing an application search. The method includes receiving a search query from a remote device and determining a consideration set of...
Methods, systems, and computer readable media for converging on network
protocol stack vulnerabilities using...
A method for progressive convergence on network protocol stack vulnerabilities includes defining an initial protocol field and field value space for fuzz...
Global clustering of incidents based on malware similarity and online
In an embodiment, a method, performed by processors of a computing device for creating and storing clusters of incident data records based on behavioral...
System and method for performing remote security assessment of firewalled
Methods and systems for scanning an endpoint terminal across an open computer network are disclosed. An exemplary method includes providing a scanner engine in...
Method, device and apparatus for acquiring security state of mobile
Disclosed are a method, device and apparatus for acquiring the security state of a mobile terminal, which belong to the field of computers. The method includes:...
Scene identification system and methods
Certain embodiments are directed to a system for high security delivery of real time video containing an authentication signature or unique identifier.
System, apparatus and method for detecting a malicious attack based on
static analysis of a multi-flow object
In an embodiment, a threat detection and prevention system comprises a network-traffic static analysis logic and a classification engine. The network-traffic...
System and method for recording and monitoring communications using a
A communication system including a media server through which communication packets are exchanged for recording and monitoring purposes is disclosed. A tap is...
Detecting network attacks
This disclosure generally relates to the generation of a packet signature for packets determined to correspond to a network attack, such as a denial of service...
Mobile point-of-presence for on demand network client services and
Devices, systems and methods are disclosed which relate to implementing a point-of-presence system on a mobile service network. Such a point-of-presence system...
System and method for denial of service attack mitigation using cloud
A method to mitigate attack by an upstream service provider using cloud mitigation services. An edge detection device, which located at the subscriber's network...
Methods and nodes for verification of data
A first data handling node (304) is configured to verify data received in a data distribution network with multiple data handling nodes forming a distribution...
Web page integrity validation
An aspect identifier of an integrity validation script may be provided to a browser application, that, during execution thereof by the browser application when...
Transmitting and receiving self-destructing messages
A device may receive, from a first user device, a request to transmit a message to a user of a second user device. The request may include particular...
Managed dissemination of location data
A location provider manages dissemination of location data of a user to one or more third-party services, so that the user can take advantage of services...
Network control security
Technologies are generally described for systems, devices and methods effective to allow a network element to retrieve a control command. In some examples, a...