At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Visually indicating a calendar event among different time zones
A calendared event may be visually indicated. A proposed time for the calendared event can be identified and each of a plurality of event participants can be...
Method, system, and apparatus for exchanging data between client devices
Systems and methods for exchanging data between two client devices are disclosed. A method includes, at a computer system, obtaining, from a first client...
Cloud computing environment for biological data
The present invention provides a novel approach for storing, analyzing, and/or accessing biological data in a cloud computing environment. Sequence data...
Approach for downloading data over networks using automatic bandwidth
An approach is provided for downloading data over a network that uses automatic bandwidth detection. According to the approach, a first version of data to be...
Systems and methods for device emulation on mobile channel
A user may access a website via a mobile channel using a mobile device. As the user is logged into the website, the user may call or otherwise contact a...
Automated file delivery systems and methods
The invention provides systems and methods for automatically delivering a file from an originating computer system including a processor and memory to a...
Content distribution system
Systems and methods for delivering digital content are disclosed herein. The system facilitates the transfer of digital content to consumers from one or more...
Managing navigation and history information
History and navigation information in a computer application are managed by establishing a global context that can communicate with multiple resources, each of...
Automatic Ad-Hoc network creation and coalescing using WPS
A device previously configured as a registrar and that has established an independent ad-hoc network is automatically discovered by another device also...
Website compatibility shims
Various embodiments provide compatibility shims that can be utilized by a web browser to dynamically change web browser platform features per domain or website....
Method, server and system for data sharing
Embodiments of the present invention provide method, server and system for data sharing, and non-transitory computer-readable medium storing instructions which,...
Time shifted transcoded streaming (TSTS) system and method
A method and system for transmitting multimedia content from a server to a client device includes a source multimedia retriever to retrieve source multimedia...
Adaptive video white spot learning and user bandwidth delivery control
A system and method that utilize a learning system to maintain a set of geographical locations indicating an area where network data coverage is poor. When it...
Associating unique identifiers of primary and enriching content
A unified system of unique identifiers is used to match enrichment content with primary content being delivered by subscribers, e.g. broadcasters, in different...
System to communicate media
A system for communicating media is disclosed. Such a system may include, for example, a media broken into a plurality of independent segment files that may...
Systems and methods for data synchronization in a network application
A computer receives user input events associated with a network application. Each user input event corresponds to a respective image frame of the network...
Network condition predictions for multimedia streaming
Network condition prediction and multimedia streaming consumption prediction are provided. The prediction may be based on a device's prior location, behavior,...
Distributing intelligence across networks
Methods and apparatus relating to distribution of intelligence across a network are described. In one embodiment, one or more content processors may be provided...
Playlist compilation system and method
A method, computer program product and client electronic device for storing, in a memory of a client electronic device, a location of at least one remote media...
Manager for DASH media streaming
Client devices streaming content adhering to the Dynamic Adaptive Streaming over HTTP (DASH) standard may send Quality of Experience (QoE) information to a DASH...
Dynamic media content output for mobile devices
Embodiments of mechanisms for dynamic media content type streaming management for mobile devices are generally described herein. In some embodiments, the mobile...
Predictive caching for content
Disclosed are various embodiments for predictive caching of content to facilitate instantaneous use of the content. If a user is likely to commence use of a...
Method and system for data driven checklist sharing
A method for checklist sharing. The method includes monitoring actions of a user on a computer device, identifying an action of the user, identifying a...
Event management system
A system is provided that performs event management operations. The operations include receiving a request to manage an event on behalf of an event sponsor...
Method and system for self-regulating content download
A method, system and mobile application for self-regulating content downloads to mobile communication devices is disclosed herein. The invention determines if a...
Systems and methods for implementing instant social image cobrowsing
through the cloud
In accordance with disclosed embodiments, there are provided methods, systems, and apparatuses for implementing instant social image cobrowsing through the...
System and method for managing adjacent channels in an adaptive streaming
A system and method for managing adjacent channels in an adaptive streaming environment. One or more adjacent channels may be defined for a client device...
Initiating a central server-directed communication session from an
in-progress half call model communication...
A particular method includes receiving a signal to invoke a central server-directed service from a first communication device at a session initiation protocol...
Session initiation protocol (SIP) router
Systems and methods for a Session Initiation Protocol (SIP) router are described. In one aspect, the SIP router receives a SIP INVITE for an incoming call to a...
Method and apparatus for monitoring access of pre-read materials for a
A method, non-transitory computer readable medium, and apparatus for monitoring access of a pre-read material for a meeting are disclosed. For example, the...
Bandwidth management and codec negotiation based on WAN topology
A system for bandwidth management and codec negotiation, according to one embodiment of the present invention comprises: a configuration storage module having...
Intercepting device-to-device communication
Mobile network (MN) for mobile devices (UE1, UE2), the mobile devices being arranged for exchanging communication data via the mobile network or, by selection,...
Seeding of mobile application management policies
A method includes performing operations as follows on a processor: monitoring use of resources in an enterprise by mobile devices, receiving metrics from the...
Enforcing policy compliance on a device
Disclosed herein is a method for enforcing policy compliance on a device that includes detecting a compliance action associated with an electronic device. The...
Conditional access to services based on device claims
Providing access to one or more resources to a user device. A method includes at a user device, registering with an identity service to obtain an identity...
Synchronized distribution of compliance policy updates
A notification is received at a workload that indicates that a compliance policy update is available for the workload at a compliance policy management system....
Methods and apparatuses for trust computation
Embodiments of a method are disclosed for computing trust index among multiple entities associated with a resource marketplace. The method includes receiving...
Network security apparatus and method
A network security apparatus includes a management unit, a security policies monitoring unit, a security monitoring unit, a log security check unit, and a log...
Malicious mobile code runtime monitoring system and methods
Protection systems and methods provide for protecting one or more personal computers ("PCs") and/or other intermittently or persistently network accessible...
Mobile communication device and method of operating thereof
A mobile communication device is provided. The mobile communication device includes a first trusted platform module, a second trusted platform module, a...
Security mediation for dynamically programmable network
A network security policy may be implemented at network switches as a set of active packet disposition directives. In a dynamically programmable network, the...
Method and apparatus for application awareness in a network
A method for enforcing a network policy is described herein. In the method, a network socket event request from an application executing in a first context is...
Method and apparatus for a distributed security service in a cloud network
Various embodiments provide a method and apparatus of providing a distributed security service that runs light instances in a number of security devices and...
Method and system for uniquely identifying a user computer in real time
for security violations using a...
A method is provided for identifying a compromised client device from a masquerading device. The method includes capturing a plurality of attributes from a...
Pre-processing system for minimizing application-level denial-of-service
in a multi-tenant system
Denial-of-service attacks are prevented or mitigated in a cloud compute environment, such as a multi-tenant, collaborative SaaS system. This is achieved by...
Process and devices for selective collision detection
The present invention concerns a method in a network including at least a first device and a second device, where the sending of a packet by two devices...
Modeling and outlier detection in threat management system data
Methods, systems, and computer-readable media for identifying potential threats on a network based on anomalous behavior in communication between endpoints are...
Method for tracking machines on a network using multivariable
fingerprinting of passively available information
A method for tracking machines on a network of computers includes determining one or more assertions to be monitored by a first web site which is coupled to a...
Method and system for detecting behavior of remotely intruding into
The invention discloses a method and system for detecting a behavior of remotely intruding into a computer, wherein the method comprises: monitoring a process...
Systems and methods for optimizing antivirus determinations
Systems and methods for optimizing an antivirus determination for executable files. Optimization by excluding from an antivirus check executable files such as...