At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Playback stall avoidance in adaptive media streaming
Methods, systems and devices are described to avoid stalling during playback of an adaptive media stream delivered to a media player device over a network. The...
Dash client and receiver with buffer water-level decision-making
A client/receiver downloads data over a network path between a source and the receiver coupled by the network path and stores the media data in a presentation...
Streaming data on data processes
A method, system and computer program product for servicing media content. In one embodiment, the media content is processed by having each of a group of...
System and method for virtual call hold
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for accomplishing a virtual call on hold. A client communication...
A method for establishing for a first smartphone a phone connection with a second smartphone, each smartphone comprising a phone and running a software...
Configuring, networking, and controlling a plurality of unique
Configuring a control session comprises receiving a request to execute an input/output application from a content control application executing on a mobile...
Connecting communicating devices in a multi-server communication system
A system and methods are provided for aggregating communication connections. Multiple users connect to a system (e.g., a web-based system) that hosts an...
Voice transmission technology selection
The present invention relates to a method of transmitting a signal by an MME (Mobility Management Entity) in a wireless network, the method comprising:...
Method and apparatuses for identifying and reporting quality of service
rules applicable to a communication session
According to the present invention there is provided a method of facilitating a communication session between a user terminal and an Application Function over...
Providing a common security policy for a heterogeneous computer
A common security policy for a heterogeneous computer architecture environment is provided. A configuration of a security policy of a heterogeneous computer...
System and method for a security asset manager
Implementations of the present disclosure involve a system and/or method of performing security asset management. The system and/or method may schedule...
Deploying policy configuration across multiple security devices through
hierarchical configuration templates
Deploying policy configuration across multiple security devices through hierarchical configuration templates is disclosed. In some embodiments, deploying policy...
Assessment of network perimeter security
A method and system for assessing security of a network perimeter of a network. Security of an authentication computer from attack is reviewed. Users outside of...
Policy-based secure communication with automatic key management for
industrial control and automation systems
A method includes generating at least one access vector associated with a specified device in an industrial process control and automation system. The specified...
Network policy assignment based on user reputation score
A network controller device, systems, and methods thereof are described herein for enabling a mechanism of assigning network policies to one or more users based...
Anti-takeover systems and methods for network attached peripherals
Methods, systems, and devices are described for the prevention of network peripheral takeover activity. Peripheral devices may implement an anti-takeover...
Self-adaptive and proactive virtual machine images adjustment to
environmental security risks in a cloud...
A computer system includes a security coordinator configured to be communicatively coupled to a plurality of managed machines deployed in a same computing...
Identification of trusted websites
This document describes techniques for identifying trusted websites. In one embodiment, a computer system can receive a request from user to access a website...
Apparatus, system, and method for protecting against keylogging malware
An apparatus, system, and method is disclosed for protecting against key logger malware. The protection includes protection form grabbing keylogger malware. In...
Profiling cyber threats detected in a target environment and automatically
generating one or more rule bases...
A computer implemented method of profiling cyber threats detected in a target environment, comprising: receiving, from a Security Information and Event Manager...
Pre-processing system for minimizing application-level denial-of-service
in a multi-tenant system
Denial-of-service attacks are prevented or mitigated in a cloud compute environment, such as a multi-tenant, collaborative SaaS system. This is achieved by...
Distributed agent based model for security monitoring and response
An architecture is provided for a widely distributed security system (SDI-SCAM) that protects computers at individual client locations, but which constantly...
Anomaly detection system for enterprise network security
Anomaly detection is disclosed, including: determining a set of anomalous events associated with an enterprise network; and determining a path of interest based...
Detecting suspicious web traffic from an enterprise network
Methods, apparatus and articles of manufacture for detecting suspicious web traffic are provided herein. A method includes generating a database comprising...
Network anomaly detection
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for determining network related anomaly scores. One of the...
Cross-validation of a learning machine model across network devices
In one embodiment, a first network device receives a notification that the first network device has been selected to validate a machine learning model for a...
Methods and apparatus to identify malicious activity in a network
Methods, apparatus, systems and articles of manufacture are disclosed to learn malicious activity. An example method includes assigning weights of a distance...
Providing alerts based on unstructured information methods and apparatus
A system, method, and apparatus for providing alerts based on unstructured information are disclosed. An example apparatus includes an interface configured to...
Detection of threats to networks, based on geographic location
A method for a wireless network. The network includes at least a server and a plurality of computer devices wirelessly connected to the server. At least one of...
Authenticating security parameters
A method for authenticating communicating parties is disclosed. In the method biometric information associated with a first party is generated based on a...
Authentication based on proximate devices
In one embodiment, a computer-implemented method includes, in response to an attempt by a user to perform a transaction using a computing device, accessing a...
System and method for managing access for trusted and untrusted
A method is provided in one example embodiment and includes identifying a network location of an endpoint, which is attempting to initiate an application;...
Establishing access controls in a premise-based environment
Establishing access controls includes establishing a communication session between an unrecognized user identity of a user device and a destination system...
Retrospective policy safety net
These and other objectives are attained with a method and system for evaluating an access policy change. The method comprises the step of providing an access...
Administration of access lists for femtocell service
A subscriber account associated with a femtocell can be managed and access can be provided thereto. The account service management can be accessed through a...
Video chat abuse detection based on external context
A server-implemented technique can include obtaining external context parameters indicative of an external context of a video chat session, calculating an abuse...
Controlling access to storage devices shared by host systems
To control access to a source storage device shared by a plurality of host systems, methods and systems include confirming a presence of an application on each...
Smart card service method and apparatus for performing the same
Provided are a smart card service method and an apparatus for performing the same. The smart card service method includes receiving a certificate generation...
OTP-based authentication system and method
Disclosed is an authentication system and method. The authentication system according to one embodiment of the present disclosure comprises a transceiver for...
System and method for identity recognition and affiliation of a user in a
The method integrates the dynamic and authoritative posture of an authenticated user, a registered device, and a registered service provider as a conclusive...
Compromised authentication information clearing house
Techniques for maintaining potentially compromised authentication information for a plurality of accounts may be provided. An individual piece of authentication...
Login security with short messaging
Additional security is provided for on-line account users beyond that which is otherwise conventionally provided by, e.g., longer passwords, passwords that...
Application centric centralized certificate management system for managing
certificates across data centers
A system for managing one or more certificates on granular object level in one or more datacenters is provided. The system includes a discover module, an...
Authenticated session establishment
Methods, devices, and machine-readable media are provided to provide secure communications between entities. As provided in this disclosure, this may include...
Secure communication between processes in cloud
Secure communication between processes in cloud platform may be performed by receiving a request from a client application process hosted in an application...
Authentication within openflow network
An OpenFlow network controller controls an OpenFlow network. A networking connection is established between the OpenFlow network controller and an OpenFlow...
Pre-delivery authentication may be required prior to routing and delivery of electronic content. A sender of the electronic content, for example, may require...
System and method for sharing access to a service within a home network
A home network router and method of operation are provided for seamlessly sharing access to a network service by multiple devices in a home network by...
Secure access systems and methods to network elements operating in a
A network element, configured to operate in a network to provide various network functions therein, includes a main processor communicatively coupled to a main...
Credential-based application programming interface keys
A processing device comprises a processor coupled to a memory and is configured to obtain a credential associated with a particular access control interval, to...