At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
System and method for generating information file based on parallel
The present invention proposes a information file generating system and method based on parallel processing. Wherein, said information file generating system...
Control module for a signal transmitter for a remote-client display of a
sequence of medical images
A system, a method and a computer program product for monitoring a screen configuration process for a sequence of medical images on a remote client are...
SAAS network-based backup system
A system fetches consistent datasets in batches for a given period of time and provides the ability to retrieve each batch. Batches of data may be fetched for...
Fast file server methods and systems
The invention provides, in one aspect, an improved system for data access comprising a file server that is coupled to a client device or application executing...
Method for distributing file descriptors in web-server, and web-server and
computer-readable recording medium...
A method for distributing a file descriptor in a web server is disclosed. The method includes the steps of: (a) a listener processor, if acquiring at least one...
System and method for managing and monitoring information using endpoint
Described herein are systems and methods for managing and monitoring information using endpoint pairs. The system includes a computer having an application...
Device management system, device management method, and storage medium
A device management system includes an electronic device and a remote maintenance server. The electronic device displays an operation screen to a user. The...
Ad hoc injection of IMAP objects
Some embodiments include a method to inject ad-hoc IMAP objects into results of IMAP commands. These IMAP objects may appear in the inbox or in any other IMAP...
Identity service management in limited connectivity environments
A system and technique for identity service management in limited connectivity environments includes: a computing environment comprising a plurality of managed...
Information distribution device
An information distribution device capable of distributing call attention information for calling attention to an event after confirming whether or not an event...
Dynamic management of collaboration sessions using real-time text
System and method to respond to a streaming media link quality problem in a communication session, the method including: monitoring textual messages in the...
Triggering window conditions by streaming features of an operator graph
In a stream computing application, data may be transmitted between operators using tuples. However, the receiving operator may not evaluate these tuples as they...
Coding for real-time streaming under packet erasures
A computer-based real-time streaming system under packet erasures wherein created messages can be decoded within a fixed delay form their creation is presented....
Real-time or near real-time streaming
Methods and apparatuses provide real-time or near real-time streaming of content, specified in one or more playlists, using transfer protocols such as an HTTP...
Message rate mixing for bandwidth management
Disclosed are systems and methods for controlling an amount and rate of security related information (e.g., content encryption or rights management information)...
Distributing intelligence across networks
Methods and apparatus relating to distribution of intelligence across a network are described. In one embodiment, one or more content processors may be provided...
Multimedia communication control unit as a secure device for multimedia
communication between LAN users and...
A system and method for providing multimedia communication between a firewall protected, LAN based endpoint and an endpoint that is external to the LAN. A...
Mobile application migration to cloud computing platform
Technology is disclosed herein for migrating at least portions of computer applications to a server. According to at least one embodiment, a computing device...
Multicast distribution of incrementally enhanced content
A system for providing multicast distribution of incrementally enhanced content is disclosed. The system may include encoding content by utilizing an...
Unique subscriber states for adaptive stream management
Consistent with embodiments of the present invention, a system may be provided to provide per-subscriber stream management comprising: a client capable of...
Dynamic profile sharing using expiring tokens
Access to a user profile of a user device at a location may be provided to a destination device upon detecting that the location is within a proximity of a...
Cooking information providing method, control method, program, and
On the basis of stored recognition result information and current recipe information, there is generated presentation information that includes information...
Distribution of streaming content between media players configured to
locate each other
Methods and devices are provided for receiving and transmitting streaming content from a production node to another device in a network. According to an...
Methods and system for sharing gadgets between users
One embodiment of the present invention provides a system that facilitates sharing gadgets. The system allows a sender to specify a gadget to share with a...
Detection of shared content viewed by attendees in online meetings
Techniques are presented herein for improving experiences in online meetings that include a plurality of attendee devices, where an attendee device is...
Collaborative content streaming
This document describes techniques (300, 400, 500, 600) and apparatuses (100, 700) for collaborative content streaming. These techniques (300, 400, 500, 600)...
Dynamic virtual private network
Various embodiments establish a virtual private network (VPN) between a remote network and a private network. In one embodiment, a first system in the remote...
System and method for maximizing system data cache efficiency in a
connection-oriented data proxy service
A method and system that is configured for receiving a connection request at a server over a fiber channel network from a client using SCSI, generating a...
History inclusive connection management
Different types of connections can be established between a device and an endpoint (e.g., an address associated with a service) based at least in part upon the...
Apparatus and method for reproducing contents using digital living network
alliance in mobile terminal
An apparatus and a method for reproducing contents using a Digital Living Network Alliance (DLNA) network are provided. The apparatus includes a Digital Media...
Identifying phone calls for internet telephony feature handling by routing
the phone calls to a softswitch via...
A communication system includes a plurality of time division multiplexed (TDM) public switched telephone network (PSTN) trunks, a Signal Control Point (SCP), a...
Method and system for prioritizing and scheduling services in an IP
An IP multimedia gateway (IMG) determines device capabilities and proposed service priority profiles of communicatively coupled client devices. The determined...
Methods and apparatus for packetized content delivery over a content
Methods and apparatus for delivery of packetized content (e.g., video, audio, data, etc.) over a content delivery network. In one embodiment, the content is...
Generating accurate preemptive security device policy tuning
An approach is provided for determining a likelihood of an attack on a first computer system of a first business. Characteristics of the first business and a...
Dynamic user identification and policy enforcement in cloud-based secure
A cloud-based secure Web gateway, a cloud-based secure Web method, and a network deliver a secure Web gateway (SWG) as a cloud-based service to organizations...
Management of security policies across multiple security products
A management entity discovers security devices connected to a network. Each security device controls access to resources by devices associated with the security...
System and method for providing error handling in an untrusted network
An example method is provided and may include receiving a DIAMETER-based error over an SWm interface by a first evolved packet data gateway (ePDG) for a user...
Field selection for pattern discovery
Fields are determined for pattern discovery in event data. Cardinality and repetitiveness statistics are determined for fields of event data. A set of the...
Methods, circuits, apparatus, systems and associated software applications
for providing security on one or...
Disclosed are methods, circuits, apparatus, systems and associated software applications for providing security on one or more servers, including virtual...
Protected application stack and method and system of utilizing
A secure appliance for use within a multi-tenant cloud computing environment which comprises: a) a policy enforcement point (PEP); b) a hardened Operating...
Detection of spyware threats within virtual machines
A system analyzes content accessed at a network site to determine whether it is malicious. The system employs a tool able to identify spyware that is...
System and method for identifying phishing website
The present invention discloses a system and method for identifying a phishing website. The system comprises: a domain name acquisition unit, a domain name...
A method for preventing spoofing in an automotive network, the method comprising storing at least one address of a first vehicle electronic control unit and...
Prevention of query overloading in a server application
A system for processing a transaction request. A transaction request is received by a server computer that includes a user identification and an associated...
System, method, and computer program product for reacting in response to a
detection of an attempt to store a...
A system, method, and computer program product are provided for reacting in response to a detection of an attempt to store a configuration file and an...
A transparent proxy for malware detection includes a monitor module, a protocol determination module, a challenge generation module, a response determination...
Generating accurate preemptive security device policy tuning
An approach is provided for determining a likelihood of an attack on a first computer system of a first business. Characteristics are determined for target...
Crowd-sourced security analysis
A cloud-based static analysis security tool that is accessible by a set of application development environments is augmented to provide for anonymous knowledge...
In-line filtering of insecure or unwanted mobile device software
components or communications
Techniques for in-line filtering of insecure or unwanted mobile components or communications (e.g., insecure or unwanted behaviors associated with applications...
Data trend analysis
According to an example, a method for data trend analysis may include retrieving data from data sources, associating the data with a time, and identifying...