At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Method and system for identity-based authentication of virtual machines
A cloud computing system configured to run virtual machine instances is disclosed. The cloud computing system assigns an identity to each virtual machine...
A notification message gateway is disclosed. Notification data and application identification data is received. The application identification data is used to...
Systems and methods for performing authentication at a network device
The disclosed computer-implemented method for performing authentication at a network device may include (1) storing, at a network device that handles traffic...
Methods and systems for increasing the security of electronic messages
A method for generating e-mail messages with increased security includes receiving an e-mail message at a control system. The e-mail message has recipients, a...
Systems and methods for using a client agent to manage HTTP authentication
Systems and methods are described for using a client agent to manage HTTP authentication cookies. One method includes intercepting, by a client agent executing...
Secure data exchange technique
A technique for the secure exchange of data between multiple entities that use compatible business management systems utilizes serializable data transfer...
Method and apparatus for processing authentication request message in a
In order to resolve the problems of the inefficiency in confirming a request to establish a social relationship by a user and inadequacy of parameters provided...
Changing group member reachability information
In an embodiment, a method comprises obtaining a second network address at a computer node, which has been already associated with a first network address and...
Selective password synchronization
A mechanism is provided for selective password synchronization. An indication is received that a password is to be changed for an account in a plurality of...
Utilization of a protected module to prevent offline dictionary attacks
Various technologies pertaining to authenticating a password in a manner that prevents offline dictionary attacks are described. A protected module, which can...
Authentication for application
The present disclosure provides a method, terminal, and system for authentication with respect to an application. The present techniques may be applicable at a...
Using domain name system security extensions in a mixed-mode environment
A method relates to generating, by a processing device executing a DNS resolver, a first domain name system (DNS) query comprising a DNS request generated from...
KAFKA: A cellular automation / complex Fibonacci sequences-based technique
for encrypting and decrypting audio,...
A software system which uses a specially designed cellular automaton network to perform symmetric-key encryptions and decryptions of user-supplied input...
Method for transmitting and receiving a multimedia content
A method for transmitting and receiving multimedia content having cryptoperiods scrambled by a control word includes a sender using an operating key and an...
Communication tunneling in application container environments
Systems, methods, and software described herein provide encryption configurations to application containers. In one example, a method of operating a management...
User interface for controlling use of a business environment on a mobile
A graphical user interface to provision business environments on mobile devices presents a navigation panel that displays a virtual phone template menu item and...
Network traffic processing system
A system for processing network traffic includes a hardware-accelerated inspection unit to process network traffic in hardware-accelerated inspection mode, and...
Detecting image spam
Methods and systems for operation upon one or more data processors for detecting image spam by detecting an image and analyzing the content of the image to...
Anonymous messaging conversation
An anonymous communication module that provides full conversational anonymous messaging and voice/video communication between two or more parties interacting...
Universal DHCP helpers
The present disclosure generally relates to techniques for providing an Internet protocol (IP) address to a client device communicatively coupled to a network....
Logical address configuration and management
Methods and systems for configuring a network are disclosed. An example method can comprise receiving a request from a first device to connect to a first...
Systems and method to discover clients associated with local domain name
server using sampling
A system includes an analyzer module, a content request data collection module, and a domain name server. The content request data collection module is...
Out-of band configuration of IP addresses
In some implementations, an IP address can be configured for a computing device using an out-of-band communication channel. For example, a system administrator...
NSEC3 performance in DNSSEC
A method includes receiving, at a server, a request from a DNS client. The request identifies a domain name to be resolved that is not able to be resolved by...
Tracking interactive text-message communications
Internet or networked communication message items are selectively synchronized and tracked. An interactive communication application presents a message entry...
Augmenting location of social media posts based on proximity of other
A process for augmenting social media posts with location information includes a processor generating a social media message without location information...
Method and system for sending an indication of response to an online post
from a text message
A computer system may send and/or receive text messages. The text messages may contain an indication of a networked post. The computer system may display one or...
System, method, and apparatus for data processing
A data process system including a unit receiving a mail data including an output data or a target output data via a network, a unit identifying a ...
Data communications in a distributed computing environment
Data communications may be carried out in a distributed computing environment that includes a plurality of computers coupled for data communications through...
Rapid assignment dynamic ownership queue
A rapid assignment dynamic ownership queue for text message sessions queues incoming text messages destined for a service bureau, at a network server....
Apparatus and method for dynamic streaming of multimedia files
An apparatus and method for dynamic streaming of multimedia files are disclosed. According to one embodiment, a computer-implemented method comprises receiving...
Network, head subscriber and data transmission method
In a network, a control node is connected to a plurality of network subscribers via a closed ring-shaped data path, wherein the network subscribers form a...
System and method for conducting private messaging
A system method are provided for enabling private messaging. The method comprises displaying a first messaging user interface with at least one contact, the...
Crowdsourcing e-mail filtering
Disclosed herein are system, method, and computer program product embodiments for crowdsourcing e-mail filtering. An embodiment operates by receiving an input...
Content based data routing
A method of routing data from a source to one or more clients over a network, where the data conforms to a structured meta-language; in which the routing is...
Methods and systems for communications processing
Communication systems and methods are described. In an illustrative embodiment, embeddable code is provided to a user to embed on a user web page. A...
Multimedia conversation transfer
A method performed by a first computing device to transfer a multimedia conversation to the first computing device includes sending, to a first service node, a...
Compressing and decompressing electronic messages in message threads
Systems, methods, and computer programs encoded on a computer storage medium, for compressing and decompressing electronic messages in message threads. In one...
System and method for automated chat testing
A system for flexible and scalable automated chat-based contact center testing, comprising a test case management platform, "chat cruncher", contact center...
Enhanced acknowledgement handling in communication packet transfer
Described herein are methods, systems, and software for handling packet buffering between end users and content servers, such as content delivery nodes. In one...
Apparatus and method for aligning order of received packets
An apparatus controls a communication in which packets to be transmitted over a transport layer connection established between a transmission side apparatus and...
Overlay network capable of supporting storage area network (SAN) traffic
In one embodiment, a system includes a server having a hypervisor layer that includes an overlay-configured virtual switch and a Fiber Channel (FC) virtual...
Packet data traffic management apparatus
A packet data network traffic management device comprises a plurality of ports comprising at least a first port, a second port, and a third port; and a...
Method for restoring a service booking system in a network after failure
A method for restoring a service reservation booking system in a network after a failure, that comprises a first step of invalidating at least a portion of the...
Server reservation method, reservation control apparatus and program
An information processing device including a communication interface that exchanges data with a first device and a second device; and a processor that performs...
Resource searching device and computer readable recording medium storing
resource searching program
A resource searching device includes a requirement acquisition unit configured to acquire resource requirement information including resource requirements for a...
System and method for a shared write address protocol over a remote direct
memory access connection
The present invention provides a system and method for a shared write address protocol (SWAP) that is implemented over a remote direct memory address (RDMA)...
Network data prioritizer
A data packaging system is programmed to modify or otherwise manage a data stream from a data source prior to transmission to an intended recipient by applying...
Queue scheduling method, apparatus and system
A queue scheduling method, apparatus and system are provided. The method comprises: performing categorizing processing on a message, and forwarding a message in...
MTU discovery over multicast path using bit indexed explicit replication
A method and system provides for path maximum transmission unit (PMTU) discovery (PMTUD) for a multicast distribution implemented in a network using bit indexed...