At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Apparatus and method for live streaming between mobile communication
An apparatus and method support live streaming between mobile communication terminals. A server Mobile Station (MS) Transport Stream (TS)-multiplexes...
Mission tuples in a streaming application environment
Tuple communication and decision determination is provided in a streaming environment. A processor: generates mission tuples wrapped in a computing object or...
A technology for content delivery is provided. In one example, performance of a caching network, performance of a delivery network, and customer demand are...
Adaptation, shunt transmission and stream switching method and system for
The present disclosure provides an adaptation, shunt transmission and stream switching method and system for a coordinated service, and the method includes: a...
Content adaptive high precision macroblock rate control
Methods and systems may include an apparatus having hardware logic to allocate a set of macroblock bit budgets for a bitstream associated with a video signal....
Reassigning streaming content to distribution servers
Example systems and methods of distributing content in computer networks are provided. Content received at a first distribution server is transmitted to a...
Rapidly initializing and dynamically adjusting media streams
A device may generate a media stream to be shared with other users by building a media graph, comprising a series of interconnected processing units that...
Application control translation
Disclosed are various embodiments that facilitate translation of application controls. An application is executed in a hosted environment that virtualizes a...
Digital signage playback system, monitoring system, and monitoring method
A digital signage playback system, a monitoring system, and a monitoring method thereof are disclosed. The digital signage playback system is used for providing...
System and method for integrating VoIp client for audio conferencing
Aspects of the present disclosure disclose system, apparatus and methods for providing an integrated web conferencing. In various aspects, the disclosure is...
Determining capacity of virtual devices in a voice over internet protocol
A method for determining a capacity of a virtual machine configured as a telephony device in a VoIP system includes determining a resource configuration of the...
Implicit social graph connections
A method includes: determining a first user interaction on a social network system; identifying a social network object in the social network system associated...
Application of a non-secure warning tone to a packetised voice signal
A method is disclosed of applying a non-secure warning tone to a packetized voice signal which includes receiving a voice signal containing a sequence of voice...
Method for establishing an IP-based communications connection between an
electric vehicle and a charging...
A method establishes an IP-based communications connection between an electric vehicle and a charge control unit associated with a charging station assigned an...
Real-time placeshifting of media content to paired devices
Methods, devices, and systems are provided for placeshifting a media program. An exemplary method involves a media device storing identification information for...
Apparatus and method for computer controlled call processing applications
in packet switched telephone networks
A method is presented comprising transmitting, from an application computer communicably connected to a call controller which is connected to a data network,...
Methods and apparatus to manage internet protocol (IP) multimedia
subsystem (IMS) network capacity
Methods and apparatus to manage Internet Protocol (IP) Multimedia Subsystem (IMS) network capacity are disclosed. An example method comprises identifying a...
Class 4 long distance softswitch network with integrated class 5
A telecommunication system including a class 4 long distance softswitch network with one or more a core routing engines and one or more class 5 application...
Method of conveying a location information representing a physical
location of a first communication device, a...
A method of conveying a location information (2) representing a physical location of a first communication device (D) from the first communication device (D) to...
Tracking the progression of a communication session
A global identifier is generated based on the initiation of a communication session in a network. The global identifier is sent during the initiation of the...
Service based consolidation of applications across networks
Embodiments of the invention provide systems and methods for consolidating applications or services across networks to allow the applications or services to be...
Systems and methods for implementing computer security
A security server transmits a specification of a first set of files and directories to a computing device for monitoring according to a security policy. Each of...
System and method for configuring a computer system according to security
Method and system for configuration of a computer system according to security policies. The configuration of an employee's personal computer system according...
Identification of web form parameters for an authorization engine
A method, system and computer-usable medium are disclosed for automating the identification of web form parameters for an authorization engine. A web page...
Mobile communication device and method of operating thereof
A mobile communication device is provided. The mobile communication device includes a first trusted platform module, a second trusted platform module, a...
Dynamically generating perimeters
Systems and techniques relating to securely managing electronic resources are described. A described technique includes receiving a request to add to a mobile...
Enforcing control policies in an information management system with two or
more interactive enforcement points
A method and apparatus for controlling document access and application usage using centrally managed rules. The rules are stored and manipulated in a central...
System and method for detection of phishing scripts
Disclosed are exemplary aspects of systems and methods for detection of phishing scripts. An exemplary method comprises: generating a bytecode of a script;...
Endpoint traffic profiling for early detection of malware spread
According to one exemplary embodiment, a method for detecting malware in a network stream to at least one host computer is provided. The method may include...
Detecting fraudulent activity by analysis of information requests
Techniques are described for use in inhibiting attempts to fraudulently obtain access to confidential information about users. In some situations, the...
Stealth mitigation for simulating the success of an attack
In one embodiment, attack traffic corresponding to a detected DoS attack from one or more attacker nodes is received at a denial of service (DoS) attack...
System and method for uploading and verifying a document
A computer implemented method may allow for the upload and verification of a document. In one aspect, the method may receive a file associated with an insurance...
System and method to manage sinkholes
A system and method operable to manage and/or distribute sinkholes.
Detecting malicious resources in a network based upon active client
Systems and methods for detecting malicious resources by analyzing communication between multiple resources coupled to a network are provided. According to one...
Systems, methods, and devices for defending a network
Certain exemplary embodiments comprise a method comprising: within a backbone network: for backbone network traffic addressed to a particular target and...
Stateless attestation system
A method includes assessing a trustworthiness level of a user computer by communication between the user computer and a first server. A record indicating the...
Image vulnerability repair in a networked computing environment
Embodiments of the present invention provide an approach to repair vulnerabilities (e.g., security vulnerabilities) in images (e.g., application images) in a...
Distributed network protection
A method and system for processing frames transmitted in a network including nodes and network segments connecting the nodes. Frames transmitted over network...
Securing of software defined network controllers
Methods and arrangements for securing a software defined network. One or more control messages are intercepted. Information is extracted from the one or more...
Anomaly detection in groups of network addresses
A method for identifying anomalies in a group of network addresses includes building a model of the group of network addresses and identifying a network address...
Global commonality and network logging
Data is divided into blocks, a signature is derived for a block, and the signature is stored in a storage device without retaining the block. The signature may...
In-situ trainable intrusion detection system
A computer implemented method detects intrusions using a computer by analyzing network traffic. The method includes a semi-supervised learning module connected...
System and methods for adaptive model generation for detecting intrusion
in computer systems
A system and methods for detecting intrusions in the operation of a computer system comprises a sensor configured to gather information regarding the operation...
Controlling privacy in a face recognition application
Embodiments of the present invention may involve a method, system, and computer program product for controlling privacy in a face recognition application. A...
Applying security policy to an application session
Applying a security policy to an application session, includes: recognizing the application session between a network and an application via a security gateway;...
Managing limited network access configuration
A system, a method, and a computer program product for managing network configuration by a controller. A request to connect a device to a network is received....
Access control for event data stored in cloud-based data stores
Embodiments are directed towards a system and method for a cloud-based front end that may abstract and enable access to the underlying cloud-hosted elements and...
Systems and methods for application based interception of SSL/VPN traffic
A method for allowing or denying, by an appliance, access to a resource by an application on a client via a virtual private network connection includes basing...
Systems and methods for secure resource access and network communication
Systems and methods for secure resource access and network communication are provided. A plurality of policies are received on a client device, each policy...
IOT device environment detection, identification and caching
A method and apparatus for controlling latency within a wireless system, and more specifically sharing, updating and storing status information between devices...