At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Performing an action on a social networking system based on a content
identifier embedded in provided content
A content source provides metadata associated with content, such as an audio signal or video data, to a social networking system. The metadata identifies...
Communicating multimedia data
A method of communicating multimedia data includes establishing a first connection between a transmitter unit and an administration server, establishing a...
Increasing link throughput to enable admission without exceeding latency
Methods and systems for admitting streaming sessions while controlling links capacities, including the steps of: receiving a request to establish a new...
System and method of media content streaming with a multiplexed
In accordance with an embodiment, a method of operating a streaming media client includes electronically receiving, from a network, information regarding...
Delivery of enhanced content related to a broadcast work
A preference related to the broadcast of a work, for example a song, advertisement, or enhanced content associated with the work can be obtained from an end...
Mobile application migration to cloud computing platform
Technology is disclosed herein for migrating at least portions of computer applications to a server. According to at least one embodiment, a computing device...
Methods and devices for efficient adaptive bitrate streaming
Methods and systems for a content server to select sets of video streams having different encoding parameters for transmitting the sets of video streams to a...
Intelligent client: multiple channel switching over a digital broadcast
A digital broadcast network is disclosed that can divide an application into multiple channels to be distributed to receiving devices. A receiving device can...
Adjusting network operations based on user feedback
A system comprising a broadcast facility, one or more players, and an analytic service center. The broadcast facility may be configured to provide a plurality...
Multiway peer-to-peer media streaming
Multiway peer-to-peer media streaming is disclosed. In one embodiment, a method comprises defining a first portion of a peer-to-peer network. The method then...
Meeting collaboration systems, devices, and methods
A method for conducting a communications session (e.g., a teleconference) may include: displaying, by a client device, a communications interface that may...
Viewing shared documents in a sharing session
In a sharing session between a presenter and several attendees, the presenter can share any type of document quickly and without substantial prior preparation....
Distributed association engine
A computer-implemented method for a distributed association engine, comprising searching, by a processor, for one or more objects of interest within a spatial...
System and method for tracking and auditing data access in a network
A system and method that correlate business transaction in a system and traffic generated from this business transaction in a network back to a user identity...
Managing security breaches in a networked computing environment
Approaches for managing security breaches in a networked computing environment are provided. A method includes detecting, by at least one computer device, a...
Notification for reassembly-free file scanning
Techniques for notification of reassembly-free file scanning are described herein. According to one embodiment, a first request for accessing a document...
Determining trustworthiness of API requests based on source computer
applications' responses to attack messages
A method includes receiving an application programming interface (API) request from a source computer application that is directed to a destination computer...
Threat assessment level determination and remediation for a cloud-based
multi-layer security architecture
A device may obtain information regarding a security situation of a set of computing resources associated with a cloud-based platform. The information may be...
Detecting risky domains
There is disclosed a technique for detecting risky domains. The technique comprises collecting information in connection with a domain. The technique also...
Identifying threats based on hierarchical classification
A system and a method are disclosed for identifying network threats based on hierarchical classification. The system receives packet flows from a data network...
Human user verification of high-risk network access
Systems and methods for performing a human user test when a high-risk network access is captured by an intermediary security device are provided. According to...
Network-layer application-specific trust model
A data verification system facilitates verifying whether a CCN Content Object is authentic or trustworthy on behalf of an application. During operation, the...
Systems and methods for broadcast WLAN messages with message
Systems, methods, and devices for multicast wireless local area network messages with message authentication are contained herein. The method includes...
Automatic group assignment of users in a social network
Methods, systems, and computer programs are presented for managing electronic messages of users in a social network. One method includes an operation for...
Bidirectional authorization system, client and method
Disclosed is a bidirectional authorization system, including a first service provision subsystem configured to acquire a first temporary credential of the first...
System, method, and computer program product for sharing files based on
user profile visibility
In accordance with embodiments, there are provided mechanisms and methods for sharing files based on user profile visibility. These mechanisms and methods for...
Computer network access control
Receive, at an access control node (ACN) of a first network enclave, a plurality of data packets inbound to the enclave. The characteristics of each received...
Off-site user access control
Systems and methods are described for off-site user access control to communications services via a site-based communications network. Embodiments operate in...
A connector 1 includes a connection request information reception processing unit 12 that obtains first connection request information transmitted by the first...
Techniques for call-based user verification
Techniques for call-based user verification are described. In one embodiment, for example, an apparatus may comprise a processor circuit and a storage...
Secure authorization of modules running on virtualized hardware
A method is described that includes securing authorization for a control module to conduct a test using a plurality of test modules running on a plurality of...
Systems and methods for providing a single click access to enterprise,
SAAS and cloud hosted application
The present disclosure is directed to methods and systems of providing a user-selectable list of disparately hosted applications. A device intermediary to a...
Terminal, network locking and network unlocking method for same, and
The present invention discloses a terminal, a network locking and network unlocking method for same, and a storage medium, said network locking method...
Trusted computing base evidence binding for a migratable virtual machine
In an embodiment, at least one computer readable medium has instructions stored thereon for causing a system to cryptographically sign, at a secure platform...
System and methods for UICC-based secure communication
A system that incorporates the subject disclosure may include, for example, instructions which when executed cause a device processor to perform operations...
Smartphone based identification, access control, testing, and evaluation
A suite of testing and evaluation tools that run in conjunction with a smartphone that can be used to both enroll, and for subsequent enrollees, to gain secure...
Virtual smartcard authentication
The invention provides a system and method for signing a user workstation onto an access restricted network utilizing a mobile communication device. The method...
Method for reading attributes from an ID token
A method for reading at least one attribute stored in an ID token assigned to a user involving: authenticating the user to the ID token, authenticating a first...
Integrating operating systems with content offered by web based entities
Example embodiments are provided for integrating operating systems with content offered by internet based entities.
Image forming apparatus capable of executing authentication processing,
method of controlling the same, and...
An image forming apparatus that is capable of executing authentication processing improved in security of a command including authentication information, which...
Audio authentication system
According to one embodiment, an apparatus is provided that comprises a memory, an interface, and a processor communicatively coupled to the memory and to the...
Single sign-on for disparate servers
A system includes authentication of a user with a first server, reception of a request from the user to authenticate the user with a second server, requesting,...
Device authentication within deployable computing environment
A deployable computing environment may facilitate interaction and data sharing between users and devices. Users, devices, and relationships between the users...
Systems and methods for blocking flanking attacks on computing systems
A computer-implemented method for blocking flanking attacks on computing systems may include (1) detecting a denial-of-service attack targeting a computing...
Multi-dimensional framework for defining criteria that indicate when
authentication should be revoked
Methods and systems are presented for defining criteria that indicate when authentication for an identified client device should be revoked based on rules...
Disposable browsers and authentication techniques for a secure online user
Disclosed herein are systems and methods that allow for secure access to websites and web-based applications and other resources available through the browser....
Leveraging a persistent connection to access a secured service
Leveraging a persistent connection to provide a client access to a secured service may include establishing a persistent connection with a client in response to...
Predictive prefetching of attribute information
In one example, a method includes predicting, by a network access control (NAC) device based on a device identifier in a request from a client device and a...
Method and system for including network security information in a frame
A method and apparatus for including network security information in a frame is disclosed. Network security information is included in a secure portion of...
System and method for managing role based access controls of users
A method and system for role based access control for a plurality of users in a heterogeneous enterprise environment, comprising: establishing a functional...