At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Remote invocation mechanism for logging
One or more events occurring within a client-side web application are logged at a remote server using a script-based invocation mechanism. The mechanism...
Globally distributed utility computing cloud
Teachings of this application include a computing network that may include multiple different data centers and/or server grids which are deployed in different...
Methods and apparatuses for providing a desired portion of a data object
A method for providing a desired portion of a data object document is disclosed. The method comprises receiving, from a client device, an Application Program...
Method and apparatus of setting data transmission and reception period
A method and an apparatus for setting a data transmission and reception period are provided. The method includes determining an average margin threshold for...
Mobile application system
A method includes accessing a webpage at a web server from a mobile application executing at a mobile device. A mobile application tag may be identified in the...
Information processing system for starting up a browser, user terminal,
information processing device, and...
An information processing system comprises a user terminal and an information processing device. A remote operation screen image for remotely operating the...
Dynamically designing shared content
A system and method for dynamically designing shared content served via a content sharing source. The system includes a content size determination unit to...
Methods for dynamically generating an application interface for a modeled
entity and devices thereof
This technology generates a plurality of instances of things each including a dynamically generated interface structure and services associated with and...
System and method for providing an actively invalidated client-side
network resource cache
A system and method for providing an actively invalidated client-side network resource cache are disclosed. A particular embodiment includes: a client...
Resource allocation in distributed systems using grant messages
Resource management techniques for shared resources in a distributed system are described. Clients and servers may exchange messages according to an...
Distribution control system, distribution system, distribution control
method, and computer-readable storage medium
A distribution control system that is connected to one or more communication terminals that output image (sound) data and transmits the image (sound) data to...
Systems and methods for encoding and decoding
Systems and methods for multimedia encoding and decoding are disclosed. The systems and methods include multimedia format detection systems, decoder...
A method is provided for distributing data content in a P2P live streaming network comprising a plurality of peers and a streaming source periodically producing...
Visual communication using a robotic device
Technology is described for visually communicating using a robotic device. An example of a method can include a video feed sent from the video camera of the...
Software streaming system and method
A method for streaming software may include downloading blocks associated with a software title until an executable threshold is reached, initiating execution...
Adaptive content transmission
Techniques for adaptive content transmission are described herein. During transmission of a content item, a network connection may be monitored to collect data...
System and method for decision support in a virtual conference
A virtual conferencing system is described which evaluates and selects participants for active participation based on one or more criteria. For example, one...
Method and system for synchronising content on a second screen
The present disclosure is directed towards a method and system for synching content on a second screen with content being displayed on a first or primary...
Context aware interaction
A network-connected server for meeting initiation has software executing on the server from a non-transitory physical medium, the software providing a function...
Method for inserting background audio into voice/video call
A background noise inserter server is described that includes a communication interface for communicating with a network, memory for storing background audio,...
Cooperative IMS access from a visited domain
Embodiments disclosed herein provide systems, methods, and computer readable media to provide roaming IP multimedia subsystem (IMS) access. In a particular...
Methods and apparatus for processing an IMS session
There is provided a method of processing an IMS session originated by a UE after restart of a S-CSCF that was previously assigned to a user of the UE during...
Intercepting user equipment and lawful interception method thereof for use
in 3GPP direct mode communication
An intercepting user equipment and a lawful interception method thereof are provided. The intercepting user equipment registers to the administrating server for...
Systems and method for assuring security governance in managed computer
An agile governance system provides recommendations for infrastructure change requests concerning a cloud-based computer environment in accordance with security...
System and method for distributing antivirus records to user devices
Disclosed are system and method for distributing antivirus records to user devices. An exemplary method includes collecting, by a server, statistics on the use...
Automatic tuning of virtual data center resource utilization policies
A computer-implemented process receives a request to utilize one or more virtual data center (VDC) resources at a virtual data center and determines a...
Application self-service for assured log management in cloud environments
A log management service provides automated log management for any applications deployed on a cloud. A security profile defining the logging requirements for...
Portable proxy for security management and privacy protection and method
A portable proxy for security management and privacy protection and methods of use are provided. The proxy establishes a connection to a user device. The proxy...
System and method for modeling a networking device policy
Implementations of the present disclosure involve a system and/or method for modeling a networking device policy or set of rules and/or transforming a...
System and method for data loss prevention across heterogeneous
In one embodiment, a method includes activating a cross-platform DLP policy for enforcement against a plurality of users on each of a plurality of heterogeneous...
Policy enforcement in a secure data file delivery system
A server interacts with a sender to form a package which can include one or more attached data files to be sent to one or more recipients, and the server...
Method and internet terminal for remotely performing operations on a
secure element connected to a...
The invention relates to a method for remotely performing operations determined by a service provider on a secure element connected to a communication device...
Techniques for detecting an intranet spoofing attack
Techniques for detecting an intranet spoofing attack are disclosed. In one embodiment, the techniques may be realized as a system and method for detecting an...
Preventing spoofing attacks for bone conduction applications
Concepts and technologies are disclosed herein for preventing spoofing attacks for bone conduction applications. According to one aspect, a device can receive...
Thwarting drone-waged denial of service attacks on a network
Embodiments are directed towards detecting and thwarting incoming network requests by either throttling and/or redirecting the attack requests towards a...
Hacking-resistant computer design
A computer architecture is disclosed for implementing a hacking-resistant computing device. The computing device, which could be a mainframe computer, personal...
Systems and methods for using cognitive fingerprints
A system and method for creating a core cognitive fingerprint. A core cognitive fingerprint can be used to capture the evolution of a system state and...
Agent assisted malicious application blocking in a network environment
Embodiments are configured to receive metadata of a process intercepted on an end host when attempting to access a network. The metadata includes a hash of an...
Method and system for identifying a threatening network
A method for identifying a threatening network comprises an asymmetric threat signature (AT-SIG) algorithm comprising a network movement before/after algorithm...
Service delivery controller for learning network security services
A learning-based computer network security system may include a service delivery controller executing on one or more of hardware processors that receives...
Methods and systems for using causal analysis for boosted decision stumps
to identify and respond to non-benign...
A computing device processor may be configured with processor-executable instructions to implement methods of detecting and responding non-benign behaviors of...
Identifying phishing websites using DOM characteristics
Embodiments of the present invention are directed to identifying phishing websites by rendering and analyzing document object model (DOM) objects associated...
Method and system for reflectometry based communication network
monitoring, intrusion detection, and message...
Systems and methods are provided for monitoring and detecting intrusions and authenticating messages on a communication network of a vehicle. A plurality of...
Analysis of time series data
The systems and methods described herein relate to storing values, such as sketches, that represent time indexed data related to network traffic. The model may...
Method and apparatus for providing forensic visibility into systems and
Methods and systems for providing forensic visibility into systems and networks are provided. More particularly, a sensor agent may receive events defining an...
Detection of anomalous advertising content
Systems, methods, and computer-readable media are disclosed for detecting anomalous advertising content and taking or directing one or more actions to be taken...
Calculating a trust score
Systems, devices, and methods are described herein for calculating a trust score. The trust score may be calculated between entities including, but not limited...
Identifying malicious web infrastructures
Identifying malicious servers is provided. Malicious edges between server vertices corresponding to visible servers and invisible servers involved in network...
Verification of peer-to-peer multimedia content
A method includes receiving, at a first wireless device, from a second wireless device, content and an identification of the second wireless device, over a...
Packet receiving method, deep packet inspection device and system
Embodiments of the present invention provide a packet receiving method, a deep packet inspection device and system, which relates to the field of ...