At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Implementing single sign-on across a heterogeneous collection of
client/server and web-based applications
Leveraging an established authenticated session in obtaining authentication to a client application includes receiving a request for access to a client...
Security framework for HTTP streaming architecture
Methods and apparatus for preventing unauthorized access to online content, including in particular streaming video and other media, are provided. In various...
Disclosed are various embodiments that perform confidence-based authentication of a user. An identification of a user account is obtained from a user, and a...
System and method for verified social network profile
A method for verifying the on-line identity of a subscribed user and securely displaying an indicia in connection with that user's on-line content, wherein the...
Systems and methods for inter-network service selection
Systems, methods, and devices for inter-network service selection are described herein. Through the use of one or more of device identifiers and device classes,...
Virtualized endpoints in a multi-tenant environment
Customers accessing resources or services in a multi-tenant environment can obtain assurance that a provider of that environment will honor only requests...
Virtual desktop accelerator support for network gateway
The subject disclosure relates to a method for initiating an accelerated desktop session between a client device and a remote server. In some aspects, the...
User equipment credential system
A user equipment in a communications system, the user equipment comprising: a memory arranged to store at least one identifier associated with the user...
Securing internet of things communications across multiple vendors
A secure connection between a user mobile device and a "Internet-of-Things" network-connected device (e.g., a home appliance or a vehicle) may be provided using...
Efficient key generator for distribution of sensitive material from
multiple application service providers to a...
A method provides end-to-end security for transport of a profile to a target device (e.g., a mobile computing device) over at least one communications network...
Object level encryption system including encryption key management system
A symmetric PGP encrypted communications path is provided in which the recipient may be identified with only publicly available information. Data to be...
Selectively performing man in the middle decryption
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for selectively performing man in the middle decryption. One of...
Code domain isolation
A method for achieving code domain isolation. A first set of data is received in a first domain format. The first set of data is changed to a second domain...
Method for including an implicit integrity or authenticity check into a
A method of performing a cryptographic operation using a cryptographic implementation in a cryptographic system, including: receiving, by the cryptographic...
Method for manufacturing a filtering module
A method is provided for defining a filtering module between a first module processing information with a first sensitivity level, and a second module...
Information delivery system with advertising mechanism and method of
An information delivery system includes: a control unit configured to: generate an anonymous identity for concealing client information of an anonymous client...
System and method for controlling features on a device
Trust between entities participating in an upgrade or enablement/disablement process is established and, to facilitate this remotely and securely, a highly...
Data stream traffic control
Techniques related to data stream traffic control are disclosed herein. A bit equivalent entropy of an anonymized data stream is computed. Traffic of the data...
Selective content cloud storage with device synchronization
Programmable devices selectively allocate file content portions between cloud and secured hardware device storage mediums. A confidential portion of a first...
Virtual desktop accelerator with support for dynamic proxy thread
In particular embodiments, a method includes determining a data flow rate of the active connections at a proxy, comparing the data flow rate to a first...
VPN for containers and virtual machines in local area networks
A method, system and computer program product for a VPN for containers and VMs implemented on different network node. A number of network hardware nodes have...
Device for preventing, detecting and responding to security threats
A device to prevent, detect and respond to one or more security threats between one or more controlled hosts and one or more services accessible from the...
Method for configuring network nodes of a telecommunications network,
telecommunications network, program and...
A method for configuring network nodes of a telecommunications network includes configuring a remote network node of a plurality of remote network nodes based...
Multi-layered application classification and decoding
An intrusion detection system is described that is capable of applying a plurality of stacked (layered) application-layer decoders to extract encapsulated...
Multiple inspection avoidance (MIA) using a protection scope
A multiple inspection avoidance (MIA) technique is implemented in a virtualized environment. Preferably, the technique is implemented in a packet processing...
Use of reversed DNS records for distributed mapping of asymmetric
cryptographic keys to custom data
A server sends a lookup request for a first domain name to a Domain Name System (DNS) in response to receiving data associated with a user. The first domain...
Cross registrar compliance and communication mechanism
What is described is a system and method providing an improved customer experience for the registrant. The registrant is able to use a single interface and a...
Message management method
A method for managing computer based messaging involves monitoring messages transmitted within a messaging system over time; identifying related messages; and...
Social networking website system with automatic participation based on
current location information
A social networking website system with automatic registration based on a current location information. Individuals are automatically enrolled into social...
Systems and methods for social parenting platform and network
A parent social network based on relationship of children, including of activities, needs, interests or combinations thereof, is described. The parent social...
Marking of unfamiliar or ambiguous expressions in electronic messages
A method comprising using at least one hardware processor for constructing an index of corpora of multiple users, wherein each corpus of said corpora is...
Managing notification messages
Methods and apparatuses that generate a subtopic identifier identifying a client application within a client device are described. The client application may be...
Processing of messages using theme and modality criteria
Embodiments related to a message processing system are disclosed herein. In some embodiments, a computing system may include receiver logic to receive a message...
Devices and methods for improving web safety and deterrence of
Devices, systems, and methods for allowing parents to view and track smart phone activities of their children can include one or more child software modules....
User initiated rule-based restrictions on messaging applications
A method, system and computer program product are disclosed for user initiated rule based restrictions on sending messages from a sender to a receiver in a...
Reducing photo-tagging spam
A photo spam detector detects illegitimate non-natively captured images through extracting image features and feeding the extracted features into a...
Method and system for attaching scanned documents to email replies via a
mobile communications device
A method and system for attaching a scan to an email reply utilizing a mobile communications device and any standard email client. A scan-to-email attachment...
Alerting recipients to errors occurring when accessing external services
A hosting provider operates a server system that provides a service to one or more tenants. The server system receives configuration data from the tenants. As...
System, method, and computer program for partially authorizing a
multi-target communication request
A system, method, and computer program product are provided for partially authorizing a multi-target communication request. In use, a plurality of targets...
Network switch with external buffering via looparound path
Described embodiments process data packets received by a network switch coupled to an external buffering device. The network switch determines a queue of an...
System and method for data flow identification and alignment in a 40/100
gigabit ethernet gearbox
A system and method for data flow identification and alignment in a 40/100 gigabit Ethernet gearbox. Virtual lane (VL) identifiers can be identified to create...
Methods and apparatus for multicast traffic failover in a network
An apparatus includes an access switch having a set of ports and configured to be operatively coupled to a multicast router via a first port from the set of...
Task scheduling using virtual clusters
In one embodiment, a device receives information regarding a data set to be processed by a map-reduce process. The device generates a set of virtual clusters...
Internal packet steering within a wireless access gateway
In general, techniques are described for steering data traffic for a subscriber session from a network interface of a wireless access gateway to an anchoring...
Instantaneous random early detection packet dropping with drop precedence
A circuit that receives queue number that indicates a queue stored within a memory unit and a packet descriptor that includes a drop precedence value, and in...
Virtual link aggregation of network traffic in an aggregation switch
Access switches in a switching system may use virtual aggregated links. When a link between an aggregation switch and an access switch fails, the link failure...
Method and apparatus for allocating network medium data resources
A method of allocating network medium data resources is disclosed. The method is performed at an apparatus having one or more processors and memory for storing...
Selectable service node resources
In one example, a method includes receiving, by a service node, a request from an access node to establish a pseudowire to be used for sending subscriber...
Flow-control within a high-performance, scalable and drop-free data center
A high-performance, scalable and drop-free data center switch fabric and infrastructure is described. The data center switch fabric may leverage low cost,...
Allocating shaping resources for a cloud computing environment based on
transfer speeds associated with the...
A device stores shaping resource information in a data structure, where the shaping resource information includes identifiers associated with shaping resources...