At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Methods of operating load balancing switches and controllers using
modified flow entries
A method of operating a load balancing switch may include providing a flow entry in a flow table, the flow entry may include a match pattern that is satisfied...
Command process load balancing system
A command process load balancing system performs load balancing of received commands among a number of server processes to resolve access contention for virtual...
Terminal and controlling method thereof
A method of controlling a first device and a second device, and which includes transmitting first data from the first device to the second device, receiving the...
Methods, secure element, server, computer programs and computer program
products for improved application...
It presented a method, performed in a secure element, the secure element being arranged to enable user applications of the secure element to verify authenticity...
File change notifications in a scale-out NAS system
A method for file change notifications includes creating, on a first local node, a file change notification message in response to a client creating, deleting,...
Method and system for determining identity/presence of a mobile device
user for control and interaction in...
A method and system for using a media access control (MAC) address of a mobile device for communication in a content distribution environment includes detecting...
Content sharing in mobile ad hoc networks
A method for sharing a plurality of content in a mobile ad hoc network is provided. The method may include registering the plurality of content for sharing on a...
Camera data management and user interface apparatuses, systems, and
In certain embodiments, a camera image stored locally by a device is published by the device, over a network, to a content distribution subsystem configured to...
Automatic access of internet content with a camera-enabled cell phone
A camera-enabled cell phone that is adapted to image a machine readable code such as a bar code, decode the bar code, send the bar code data over the Internet...
Loading pegged page objects based on predefined preferences
Methods and systems may provide for receiving a set of attributes that identify a pegged area of a page delivered to a user interface during a first browsing...
Methods and systems for transmitting synchronized visual and audio media
Systems and methods according to the present invention provide methods, devices and systems for delivering media content to users. Broadcast audio and video...
Web page load time prediction and simulation
Embodiments of automated cloud service performance prediction are disclosed. The automated cloud service performance prediction includes extracting one or more...
HTTP proxy based captive portal
HTTP-Based Captive Portal. Client requests through a device such as an access point or wired connection are routed through a captive portal switch (CPS). If the...
System and method for a connector being able to adapt to newer features
introduced to a messaging provider with...
A computer-controlled method can include providing a resource adapter with an object wrapper having a plurality of features, a wrapper generation tool receiving...
Method and apparatus for providing streaming data encoding
A method for encoding streaming data according to one embodiment of the present invention comprises: a step of dividing a forward error correction (FEC) source...
Representation groups for network streaming of coded multimedia data
In one example, a device for receiving information for multimedia data, the device comprising one or more processors configured to analyze at least a portion of...
Dynamic workload balancing for real-time stream data analytics
Router threads read real-time stream data as that data is received at processing nodes along a processing path for the data. The data is initially parsed into...
Mobile device streaming media application
A system and process for coordinating streaming content or messages is provided. A network-connected server maintains a database containing media...
Inline user addressing in chat and document editing sessions
A computer-implemented method is executed on a server having one or more processors and memory storing one or more programs to be executed by the one or more...
Dynamic service and registry for management infrastructure
Information processing techniques for managing data center configurations. In one example, a method comprises the following steps. A registry is maintained...
Convergence of social enterprise and digital telephony
Integrating digital telephony information with a social platform may include using a processor to create multiple virtual groups for multiple parties connected...
Method and apparatus for securely transmitting lawfully intercepted VOIP
A method, apparatus, and computer usable program product for transmitting intercepted VOIP data are provided in the illustrative embodiments. A VOIP call is...
System and method for processing telephony sessions
In one embodiment, the method of processing telephony sessions includes: communicating with an application server using an application layer protocol;...
Session aware notifications
User device information, identifying a first plurality of devices associated with a first user, is stored. A first device of the first plurality of devices is...
Method, device and system for session binding
Disclosed are a method, device and system for session binding. The method includes: a PCRF or BPCF receives a first session from a fixed network, wherein the...
Ensuring health and compliance of devices
A compliance method and associated system is provided. The method includes generating backup devices for devices of a list of devices associated with a data...
Optimizing risk-based compliance of an information technology (IT) system
For each of a plurality of endpoints of an information technology system having a plurality of security policies, a probability of being safe of each of said...
Decoupling hardware and software components of network security devices to
provide security software as a...
Concepts and technologies are disclosed herein for decoupling hardware and software components of network security devices to provide security software as a...
Selective modification of encrypted application layer data in a
transparent security gateway
According to one embodiment, a transparent security gateway is coupled between a client end station (CES) and a web application server (WAS). The security...
Systems, methods, and machine-readable and executable instructions are provided for attack notification. Attack notification can include receiving...
Systems, methods, user interfaces, and computer-readable media for
investigating potential malicious communications
A data analysis system receives potentially undesirable electronic communications and automatically groups them in computationally-efficient data clusters,...
Method and system for protective distribution system (PDS) and
infrastructure protection and management
A method and system for managing a protective distribution system is disclosed. In some embodiments, an information transmission line may be monitored. A...
Systems, methods and apparatuses for prevention of relay attacks
The systems, methods and apparatuses described herein provide an apparatus configured for preventing relay attacks on a communication link between the apparatus...
System and method for preventing web frauds committed using
Generating progressively a perfect hash data structure, such as a
multi-dimensional perfect hash data...
A multi-dimensional perfect hash table construction technique is based on which the well-known AC automaton, and can be implemented by very compact perfect hash...
Identifying source of malicious network messages
System, method and program for identifying a subset of a multiplicity of source networks. The subset including one or more source networks which have sent...
Techniques for intelligently executing a digital signature
Techniques for intelligently executing a digital signature are disclosed. In one embodiment, the techniques may be realized as a method for intelligently...
Computer network attribute bilateral inheritance
Current approaches to managing security intelligence data often address both threat and malicious behavior at the individual computer level, tracked by the...
Trusted hardware component for distributed systems
Techniques for utilizing trusted hardware components for mitigating the effects of equivocation amongst participant computing devices of a distributed system...
Method and apparatus for providing reactive authorization
An approach is provided for providing reactive authorization for accessing a semantic network resource. An access application of a resource owner entity detects...
System and method for role based access control in a content management
Embodiments of the present invention provide an efficient and scalable scheme for role-based access control to resources. The resources are assigned a...
Automatic isolation and detection of outbound spam
Embodiments provide IP address partitioning features that can be used to source outbound email communications, but the embodiments are not so limited. In an...
System and method for verifying status of an authentication device
A system and method that includes receiving a first device profile and associating the first device profile with a first application instance that is assigned...
Method, system and apparatus for geo-verification
A method, system and apparatus are provided for geo-verification for access to data stored in a memory of a server having a processor and a network interface...
Method of authenticating a device to access a service
The invention relates to a method of authenticating a user of a first device while accessing a service offered by a service provider, the first device forming...
Method for secure key injection with biometric sensors
Systems and methods are disclosed for securely injecting one or more key values into an electronic device by reading with a fingerprint sensor a manufactured...
Secret data matching device, secret data matching method, and recording
A secret data matching device includes: a memory; and a processor coupled to the memory. The processor executes a process including: storing a first secret...
Digital signatures for communications using text-independent speaker
A speaker-verification digital signature system is disclosed that provides greater confidence in communications having digital signatures because a signing...
Identification authentication in a communications network
Systems and methods for an identification capable communication device are provided. The communication device or line is registered or associated with a primary...
Method and system for protection against information stealing software
A system and method for identifying infection of unwanted software on an electronic device is disclosed. A software agent configured to generate a bait and is...