At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Configuring manifest files referencing infrastructure service providers
for adaptive streaming video
Techniques for serving a manifest file of an adaptive streaming video include receiving a request for the manifest file from a user device. The video is encoded...
Snapshot capture for a communication session
Techniques for snapshot capture for a communication session are described. According to various embodiments, a communication session is established that...
Quality of experience and network optimization
A system may receive information indicating that an amount of content, buffered by a user device, is below a threshold amount that is associated with an...
Method and apparatus for playing live content
A method for providing a client with a playlist of content segments accessible in a live streaming service provided in a Hypertext Transfer Protocol (HTTP)...
Method for creating and providing layered syndicated data for multimedia
content to users
A layered syndicated feed or content is provided having layers defined according to a media type (e.g., text, graphic, audio, or video) wherein each layer has a...
Client side encryption with recovery method
Technology is disclosed herein for client side data encryption with a recovery mechanism. According to at least one embodiment, a computing device encrypts at...
Method for optimizing WAN traffic
A local stream store of a local proxy caches one or more streams of data transmitted over the WAN to a remote proxy, where each stream is stored in a continuous...
Apparatuses and methods for selecting a transport control mechanism
The present invention proposes an apparatus and a method for selecting a transport control mechanism to be used between a first device (110) and a second device...
Data group paging service
A method for setting-up a data connection during a group voice service between several group members as a user of a mobile communication network. In a first...
Program, communication apparatus and control method
In a communication apparatus, a first portion of a shared material is displayed in a first display area within a remote conference screen which is displayed in...
System and method for hosting and sharing a live event
A computer-implemented method and computing system for generating, using one or more computing devices, an event page corresponding to a particular event, the...
Information processing apparatus, information processing system, and
information display method
An information processing apparatus is provided that shares an operation on content with another information processing apparatus. The information processing...
Method and apparatus for identifying a subscriber home domain in a
A method, apparatus and computer-readable medium for identifying a subscriber home domain in a communication network are described. A national subscriber...
Apparatus and methods for origination of voice and messaging communication
in a network
A method that incorporates teachings of the subject disclosure may include, for example, receiving a query from a call session server for a first pointer...
Software defined networking systems and methods via a path computation and
Software Defined Networking systems and methods are described via a Path Computation and Control Element (PCCE) that is based in part on a Path Computation...
Session parameters in the periodic assistance data delivery
Session parameters and/or information regarding session parameters are provided to a target device from a location server in a periodic assistance session. For...
Optimizing call bearer path using session initiation protocol proxy
A system that incorporates the subject disclosure may include, for example, a serving device receiving a first message from a gateway device coupled to a...
Method and apparatus for indicating a type of a network interface
The invention relates to a session border controller, method and computer program for receiving in a first network, from a second network, an indication...
Handling session initiation protocol messages in a wireless
A wireless telecommunications device configured to use Session Initiation Protocol in communication with other telecommunications devices comprises a modem...
Session initiation protocol (SIP) server to efficiently handle session
description protocol (SDP) data sets
A Session Initiation Protocol (SIP) server comprises a signaling data system that receives a first SIP message having a Session Description Protocol (SDP) data...
Provisioning access control using SDDL on the basis of an XACML policy
A method is disclosed, and a corresponding data carrier and policy converter, for producing at least one Security Descriptor Definition Language, SDDL, rule...
Managing social network accessibility based on age
When a user having an age less than a threshold age (a child user) attempts to access an online service or perform actions using the online service, the online...
Techniques for improved run time trustworthiness
Techniques are presented herein for attesting the trustworthiness of devices in a secure network during run-time operation. A security management device is...
Self-provisioning access control
A processor-implemented access control method includes receiving credential and policy directory information to configure an access controller to allow...
Network-attached storage solution for application servers
A storage system for application servers is disclosed. The storage system comprises a network-attached storage device comprising a plurality of files that...
End point secured network
The disclosed embodiments include a method for receiving data packets at a host system. In one embodiment, the method includes the steps of: intercepting a data...
Social network honeypot
The invention is a method and system for detecting attackers that are interested in attacking an organization's infrastructure during the reconnaissance phase...
Phishing and threat detection and prevention
A threat detection system receives links from emails opened in web browsers. The received links are compared with a whitelist of trusted links and blacklisted...
Web page and web browser protection against malicious injections
A method comprising: loading a web page in a web browser, wherein the web page comprises a call to an anti-injection client-side code; loading the ...
Browsing support infrastructure with tiered malware support
A network browser has a Malware detection manager for direct or indirect scanning of files during an upload or download processes for viruses, adware, spyware,...
Cyber threat monitor and control apparatuses, methods and systems
The cyber threat monitor and control apparatuses, methods and systems (hereinafter "CTMC") determines risk across a global Internet network graph model for...
Comparing an organization's security data to aggregate security data
An organization's security data is compared to an aggregation of multiple organizations' security data. Security data is received from multiple organizations...
Analyzing real-time streams of time-series data
A computer-implemented method of analyzing a plurality of metrics associated with one or more real-time streams of time-series data. For each metric, a set of...
Mechanism to augment IPS/SIEM evidence information with process history
snapshot and application window capture...
A method to augment a plurality of IPS or SIEM evidence information is provided. The method may include monitoring a plurality of processes associated with a...
Security information and event management
Systems and methods for universal interception of events. The methods involve: intercepting functions performed by an OS object manager which specify Physical...
Methods and systems for thwarting side channel attacks
A computing device may use machine learning techniques to determine the level, degree, and severity of its vulnerability to side channel attacks. The computing...
Service performance monitoring method
A monitoring system for monitoring a service execution infrastructure for providing a service to client computers via a network manages baselines of monitoring...
Automated secondary linking for fraud detection systems
Systems, methods, and other embodiments associated with automated secondary linking for fraud detection systems. According to one embodiment, a system includes...
A rights-based system is described in which vouchers are employed for creating, managing, distributing, and redeeming rights in digital contexts. A voucher is a...
Proximity based digital rights management
A method, system, and medium are provided for sharing content among network devices. The system includes at least one base station and network devices that are...
Self-selected user access based on specific authentication types
Embodiments of the invention are directed to a system, method, and a computer program product self-selected user access based on specific authentication types....
Management of access to service in an access point
System(s) and method(s) are provided to configure access rights to wireless resources and telecommunication service(s) supplied through a set of access points...
Access control list lockout prevention system
An access control list lockout prevention system includes a network. A first administrator Information Handling System (IHS) is coupled to the network. A...
Systems and methods of managed script execution
Systems and methods of virtual world interaction, operation, implementation, instantiation, creation, and other functions related to virtual worlds (note that...
Method of establishing a trust relationship for sharing resources between
two tenants in a cloud network
One embodiment disclosed herein serves to establish a trust relationship for sharing resources between a trustee tenant and a trustor tenant in a cloud network....
Systems and methods for authorizing attempts to access shared libraries
The disclosed computer-implemented method for authorizing attempts to access shared libraries may include (1) detecting an attempt by a process to access a...
Systems and methods for implementing advanced cooperation between multiple
related companies for employee...
A system and method are provided for implementing improved access to inter-company resources among related companies in a same industry, including a mechanism...
Secure data transmission
A system may include a first network in which user device(s) and a HIP server are communicably coupled. The first network may include a secure data...
Parallel on-premises and cloud-based authentication
A method for parallel authentication comprises receiving a download request from a client computer system to download a document stored in a first storage...
Flexible and generalized authentication
Various exemplary embodiments relate to a method, network node, and non-transitory machine-readable storage medium including one or more of the following:...