At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Identifying and processing a number of features identified in a document
to determine a type of the document
A system and method for document classification are presented. An input document is received (e.g., by at least one server communicatively coupled to a...
Systems and methods to consistently generate web content
Methods and systems to consistently generate web content are described. The system receives a request, at a server machine, for an interface, from a client...
Managing data transfer using streaming protocols
Techniques are described for managing data transmissions between computing systems based at least in part on using a streaming transport protocol. At least some...
Transmitting device, receiving device, and transceiving method thereof
A transmitting device which transmits a plurality of streams is provided. The transmitting device comprises: a first multimedia data consisting of multimedia...
Constrained fidelity Adaptive Bit Rate encoding systems and methods
This disclosure describes and adaptive bit rate encoding and distribution techniques for conserving bandwidth usage in a channel. The invention comprises, an...
System and method for pre-provisioning adaptive bitrate (ABR) assets in a
content delivery network
A system and method for pre-provisioning ABR assets in a content delivery network (CDN). In an example, historical delivery patterns of one or more ABR assets...
Method and apparatus for providing enhanced streaming content delivery
with multi-archive support using secure...
A system, apparatuses and methods are provided to download and process data and other content streamed over a wide area network using one or more dynamically...
System and method for advancing to a predefined portion of a decompressed
A computer system generates a first decompressed media stream based on a first compressed media stream. While providing the first decompressed media stream to a...
Reduced latency electronic content system
An architecture for selecting and providing content items to a device includes cloud-based resources of a device management service and one or more content...
Methods and apparatuses for streaming content
Methods and apparatuses for streaming content including a base layer and an enhancement layer. According to one implementation, a first stream is fetched...
Media stream modification based on channel limitations
A system and method for modifying media stream based on a channel limitation are disclosed. In one embodiment, the system includes a channel analyzer, a...
System and method for providing intelligent chunk duration
A method is provided in one example embodiment and includes receiving analytics information for a video file at a transcoder, the analytics information includes...
Remote subscription management method and system
A method for enabling a consumer to remotely manage a media content subscription is described. The method includes transmitting, over a network from a computing...
Central conferencing routing server
Aspects of the present disclosure involve systems, methods, computer program products, and the like, for collaboration conferencing with multiple participants...
Apparatus, system, and method of managing data, and recording medium
A transmission terminal includes: a memory to store, for each one of a plurality of candidate counterpart terminals that the transmission terminal is capable of...
Transfer of items between social networking websites
A first website earns rewards, e.g. points and items, for carrying out activities. Those rewards can be transferred to a second website. For example, a parent's...
System, method and computer program product for asset sharing among
hierarchically interconnected objects
In some embodiments, a parent object may share its assets with its descendent(s) in a hierarchical asset sharing model. The hierarchical asset sharing model may...
Device, system and method for generating application data
A device is described. The device comprises: a display configured to display first application data; a processor configured to communicate with a further...
Video conferencing system and associated interaction display method
A video conferencing system is provided. The video conferencing system includes a first video conferencing apparatus and a second video conferencing apparatus....
Method for establishing channel for managing IPV4 terminal and network
A method can be used for establishing a channel for managing an IPv4 terminal. An identifier of a network port of an IPv4 terminal is sent by a home gateway. A...
Packet headers as a trigger for automatic activation of special-purpose
Methods, devices, and systems for automatically controlling the activation and/or deactivation of communication applications are provided. More specifically,...
Seamless host migration based on NAT type
Systems and methods of the present invention for maintaining network data distribution are provided. Network data may be distributed in such as manner as to...
Method and systems for an outgoing unidirectional outage bypass for a
voice over internet protocol private...
A system and method is disclosed herein for providing a unidirectional outage bypass for outgoing communications from a session initiation protocol (SIP) device...
Rights management services integration with mobile device management
Rights management services (RMS) integration with mobile device management (MDM) may be provided. A functionality associated with a document may be restricted...
Secure communication device and method
A security enhancement to IPSec processing is achieved by changing the algorithms used at each re-key after expiration or termination of a Security Association...
Method and system for dynamic and comprehensive vulnerability management
One or more relevant scanners used to identify asset vulnerabilities are identified, obtained, and logically arranged for deployment on an asset in accordance...
System, method, and computer-readable medium for performing automated
security validation on a virtual machine
An automated build server communicates with an automated build client to build virtual clients hosted by a virtual server. The automated build client...
System and method for determining and using local reputations of users and
hosts to protect information in a...
A method in an example embodiment includes correlating a first set of event data from a private network and determining a local reputation score of a host in...
Smart virtual private network
In one implementation, a policy server establishes a smart virtual private network between two client devices. The smart virtual private network includes a...
Malware analysis methods and systems
Methods of analyzing malware and other suspicious files are presented, where some embodiments include analyzing the behavior of a first malware sample on both a...
Using mock tokens to protect against malicious activity
A technique provides protection against malicious activity. The technique involves providing a mock token to fraudster equipment. The mock token appears to be a...
Method and system for determining whether domain names are legitimate or
A system and method for determining whether at least one domain is legitimate or malicious by obtaining passive DNS query information, using the passive DNS...
Systems and methods for computer worm defense
A computer worm defense system comprises multiple containment systems tied together by a management system. Each containment system is deployed on a separate...
Detecting a malware process
Detecting a malware process is disclosed, including: monitoring a launch of a process; in response to a completion of the launch of the process, determining a...
Automatic malware signature extraction from runtime information
A computer system receives a file and instruments an original code of the file in memory. The resulting instrumented code allows for collection of runtime...
System and method for cyber threats detection
A system and method for detecting a cyber-threat according to embodiments of the present invention comprise automatically discovering resources on a network, by...
Network security threat detection by user/user-entity behavioral analysis
A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security...
Timeline displays of network security investigation events
Techniques and mechanisms are disclosed that enable network security analysts and other users to efficiently conduct network security investigations and to...
Detecting web exploit kits by tree-based structural similarity search
A method of detecting exploit kits includes receiving, at an input port of a computer, indication of HTTP (Hypertext Transfer Protocol) traffic. The HTTP...
Monitoring propagation in a network
A non-transitory computer-readable recording medium stores therein a program for causing a computer to execute a process. The process includes obtaining, for...
Packet capture and network traffic replay
Implementations disclosed herein provide a network agent embodied in firmware and/or software that replays network traffic of an enterprise network to an entity...
Contagion isolation and inoculation via quarantine
In some embodiments, techniques for protecting a network may include detecting an insecure condition on a first host that has connected or is attempting to...
Time zero classification of messages
Detecting infectious messages comprises performing an individual characteristic analysis of a message to determine whether the message is suspicious,...
Analyzing a group of values extracted from events of machine data relative
to a population statistic for those...
A metric value is determined for each event in a set of events that characterizes a computational communication or object. For example, a metric value could...
Resisting the spread of unwanted code and data
A method or system of receiving an electronic file containing content data in a predetermined data format, the method comprising the steps of: receiving the...
Method and system for correlating self-reporting virtual asset data with
external events to generate an...
A method and system for correlating patterns of operating virtual assets with external events includes receiving an identification of one of the external...
An auditing system and method for analyzing email, including capturing email transferred over a network and transferring the email to a data analyzer. The email...
Apparatus for switching between multiple servers in a web-based system
A main server and a mirror server hold the same content. A server switching apparatus sets only one of the web servers to be active. In the case where the...
Cyber security analytics architecture
Systems and methods are disclosed for responding to security events in real time. The disclosed systems and methods utilize the vast amount of risk and asset...
Systems and methods for providing security services during power
Systems and methods for providing security services during a power management mode are disclosed. In some embodiments, a method comprises detecting with a...