At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Apparatus, system and method of communicating traffic to a plurality of
peer to peer devices
Some demonstrative embodiments include apparatuses, systems and/or methods of Peer to Peer communication. For example, a device may include a controller to...
Computing device, method, and program for distributing computational load
A method for distributing load among interconnected computing devices, each computing device having a designated position in each dimension of an array of...
Dynamic session transformation
In particular embodiments, a computing device establishes a remote desktop connection with a remote host, the remote desktop connection including one or more...
Providing contextual data for selected link units
Link units include a keyword or words that, when selected, cause a client device to display a landing page having one or more content items related to the...
Scheduled execution of instances
Techniques are disclosed for a client-and-server architecture where the client makes scheduled execution of instances to the server. The server may then launch...
Managed filed transfer utilizing dynamic horizontal and vertical scaling
An apparatus, methods, and computer program products are described which transfer files/data from one system to other. Source and target system can be external...
Method and system for file transfer over a messaging infrastructure
A method and system for file transfer over a messaging infrastructure are provided. The method includes dividing a file into multiple portions. The method...
System and method for re-directing requests from browsers for
communications over non-IP based networks
A method and system for deploying content to client applications is provided. Inbound messages are accepted from a client application running on a client device...
Efficient storage and retrieval of resources for rendering structured
In one embodiment, a method includes accessing local storage on a computing device to render a structured document. The structured document corresponds to a...
Methods and systems for content access and distribution
A method for disseminating content over an overlay network having a plurality of routers in communication with providers and consumers of content is disclosed....
Systems and methods related to identifying authorship of internet content
Methods and apparatus related to identifying authorship of Internet content. Some implementations are directed to methods and apparatus for identifying a...
Apparatus, method, and computer readable medium for providing a
presentation on a network having a plurality of...
An apparatus, method, and computer readable medium is disclosed for receiving in a client node a timing command indicating a time at which to display a...
Adaptive variable fidelity media distribution system and method
An adaptive variable fidelity media provision system and method are provided herein.
Validation of live media stream based on predetermined standards
A method includes receiving at least one manifest file, playlists and video chunks for at least one channel of a live media stream. The method includes...
Dynamic bandwidth thresholds
Dynamic bandwidth thresholds enable substantially uninterrupted transmission of a highest compatible bit rate of a stream of media from a host to a client via a...
Network-based adaptive rate limiting
An apparatus can include a session rate limit calculator and a rate limiter. The session rate limit calculator can be configured to compute a session rate limit...
System, method, and computer program product for media publishing request
A system, method, and computer program product for publishing transcoded media content in response to publishing service requests from end users. A user request...
Tagging techniques use user interface features such as face icons that can be manipulated by a variety of cursors to tag media items including but not limited...
Video script interpreter platform with cooperating client and server
A first device, such as a PC, is enabled to receive messages from a second device, such as an application server, that does not know the address of the first...
System and method for managing calls
A computer-implemented method for managing calls in a collaboration environment is provided. The method includes receiving, by a processor, a call into a...
Method and system for sharing online content
A system and a computer-implemented method for sharing online content are provided. The method is implemented using a computer device coupled to a user...
Action processing in information exchange services
Provided herein are systems, methods, and software for facilitating information exchange services. In at least one implementation, an information exchange...
Participation queue system and method for online video conferencing
A virtual conferencing system is described for implementing a speaker queue. For example, one embodiment of the virtual conferencing system comprises: a...
SIP anchor points to populate common communication logs
The concept of a centralized communication log is provided. Anchor points, and specifically Session Initiation Protocol (SIP) anchor points, serve as a media...
Method for managing records in an IMS network, and S-CSCF server
implementing said method
A method and apparatus are provided for management of registrations in an IMS network. The method includes: creating, for a given public identity, at least two...
Generalized security policy user interface
A management entity displays a plurality of icons, each icon representing an actor or a resource in a networking environment. The management entity defines...
Systems and methods for testing online systems and content
Systems and methods are provided for automatically monitoring a compliance of web pages and graphical user interfaces with governmental and self-regulatory...
Method of detecting potential phishing by analyzing universal resource
A method for detecting potential phishing URLs includes extracting a URL from a document, analyzing the URL context, and comparing the URL to stored trusted...
Computerized system and method for detecting fraudulent or malicious
A computer system and method for determining the legitimacy of a website determines the presence of a relationship between a received website and at least one...
Communication device and communication control method in communication
A system manager sets a port connected to a specific device (for example, a router device) among a plurality of ports of a switch device as a reliable port. If...
Application-level DDoS detection using service profiling
A method for detecting a malicious network activity. The method includes extracting, based on a pre-determined criterion, a plurality of protection phase...
Method and apparatus for detecting computer fraud
Techniques are provided for detecting computer fraud. The techniques include obtaining a text version of a candidate destination and a graphical rendering of...
Inferential analysis using feedback for extracting and combining cyber
Various embodiments of the present technology include methods of assessing risk of a cyber security failure in a computer network of an entity. Various...
Cloud based logging service
Methods and systems are provided for facilitating access to a cloud-based logging service. According to one embodiment, access to a cloud-based logging service...
Feature aggregation in a computer network
In one embodiment, a device determines that input data to a machine learning model sent from a plurality of source nodes to an aggregation node is causing...
Identifying and assessing malicious resources
Methods, systems, and computer-readable media for analyzing and indicating network resources as potentially malicious are disclosed. Some aspects of the...
Method and product for providing a predictive security product and
evaluating existing security products
A method, product and computer program product for effecting an Evolutionary Process on malware, the method including the steps of: (a) receiving a malware...
Detecting suspicious network activity using flow sampling
Methods, media, and computing devices for network security can include receiving flow sampled network traffic from multiple network devices with a network...
Platform trust extension
A system and method of providing a platform trust extension for an information handling system is disclosed herein. The platform trust extension receives a...
Utilization of multiple keypads for password inputs
A computer program product includes program instructions to generate a first virtual keypad for entry of a first portion of a password, wherein the first...
Automated and policy driven optimization of cloud infrastructure through
A system and method for optimizing a cloud environment using a workflow.
System and method for automatically regulating messages between networks
A system, method, and profiler for regulating access between a remote network and a host network. The profiler includes a processor for executing a set of...
Means and method for controlling network access in integrated
Methods may be used by a Multi Radio Resource Management function for assisting the control of a User Terminal's access to an access network domain in a radio...
Online portal access and management system utilizing multiple IP devices
organized on a server application with...
An on-line portal access and management system uses multiple ip devices organized on a server application with multiple level restricted log-in and event...
Policy based application management
Improved techniques for managing enterprise applications on mobile devices are described herein. Each enterprise mobile application running on the mobile device...
Proof of possession for web browser cookie based security tokens
In one embodiment, a user device 110 may access a network service 122 using a secure cookie 300. A high trust process may create an authentication proof 360...
Methods and apparatuses to provide secure communication between an
untrusted wireless access network and a...
A secure communication channel between an access point (AP) device associated with a wireless network and a mobile gateway (GW) device of a packet core network...
Authority delegate system, authorization server system, control method,
An authority delegate system, including a server system which provides a service to a device having an application, and an authorization server system which...
Content control at gateway based on audience
A gateway device may control access to content based, at least in part, on an audience that will consume the content. In relation to a request for content to be...
System and method for generating passwords using key inputs and contextual
A method and system for automatically generating a new password from user selected characters via key press which are different from the user selected...