At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
System and method for automatically discovering wide area network
optimized routes and devices
A system, medium and method of automatically discovering a wide area network optimized route is disclosed. A client request is received at a second optimization...
Optimization of enhanced network links
A method and apparatus for dynamic network link acceleration provides a managed communication link for accelerated and reliable network communication between a...
Communicating an E-mail from a sender to a plurality of recipients
An e-mail comprising general content is communicated from a sender to a plurality of recipients. The general content is identical for all recipients of the...
Apparatus and method for controlling heating, cooling, and refrigeration
sensor systems utilizing the wireless...
A system for controlling one or more structural appliances, such heating, cooling, and ventilation sensor systems utilizing cloud computing architecture,...
Representing video client in social media
Video client social media account creation and linking of the video client social media account creation to a video services subscription account is provided. A...
External service application discovery method
An external service application discovery process that connects a host with an external application server running a service application allowing a user of a...
Method and apparatus for transferring remote session data
Examples of systems and methods are provided for communication and for forwarding display data and cursor type related to a remote session between a client...
Reliability of a connection during a communication session on a network
The present application details methods and systems for improving the reliability of a connection during a communication session on a network device. In one or...
Long-lived MPTCP sessions
Techniques for supporting long-lived multipath transmission control protocol (MPTCP) sessions. An MPTCP session may be established between two endpoints....
Device optimized transmission and reception for multi-mode, multi-media
An approach is provided for receiving information from a plurality of communication services in a plurality of communication service formats and adjusting the...
Crowd sourced content for local social media context aboard a mobile
A system includes a local social media context server aboard a vehicle, the local social media context server including logic to implement a local social media...
Peer-to-peer data storage
A determination is made of users that form a group within a social network in which the users communicate with each other over a network with electronic devices...
Devices and methods for content distribution in a communications network
According to at least one example embodiment, a method for transmitting data files in a network includes receiving requests from user devices for packets of the...
Method and apparatus of setting data transmission and reception period
A method and an apparatus for setting a data transmission and reception period are provided. The method includes determining an average margin threshold for...
Dynamically designing shared content
A system and method for dynamically designing shared content served via a content sharing source. The system includes a content size determination unit to...
Distribution control system, distribution system, distribution control
method, and computer-readable storage medium
A distribution control system that is connected to one or more communication terminals that output image (sound) data and transmits the image (sound) data to...
Visual communication using a robotic device
Technology is described for visually communicating using a robotic device. An example of a method can include a video feed sent from the video camera of the...
System and method for decision support in a virtual conference
A virtual conferencing system is described which evaluates and selects participants for active participation based on one or more criteria. For example, one...
Context aware interaction
A network-connected server for meeting initiation has software executing on the server from a non-transitory physical medium, the software providing a function...
Method for inserting background audio into voice/video call
A background noise inserter server is described that includes a communication interface for communicating with a network, memory for storing background audio,...
Cooperative IMS access from a visited domain
Embodiments disclosed herein provide systems, methods, and computer readable media to provide roaming IP multimedia subsystem (IMS) access. In a particular...
Intercepting user equipment and lawful interception method thereof for use
in 3GPP direct mode communication
An intercepting user equipment and a lawful interception method thereof are provided. The intercepting user equipment registers to the administrating server for...
System and method for data loss prevention across heterogeneous
In one embodiment, a method includes activating a cross-platform DLP policy for enforcement against a plurality of users on each of a plurality of heterogeneous...
Method and internet terminal for remotely performing operations on a
secure element connected to a...
The invention relates to a method for remotely performing operations determined by a service provider on a secure element connected to a communication device...
Techniques for detecting an intranet spoofing attack
Techniques for detecting an intranet spoofing attack are disclosed. In one embodiment, the techniques may be realized as a system and method for detecting an...
Hacking-resistant computer design
A computer architecture is disclosed for implementing a hacking-resistant computing device. The computing device, which could be a mainframe computer, personal...
Service delivery controller for learning network security services
A learning-based computer network security system may include a service delivery controller executing on one or more of hardware processors that receives...
Method and system for reflectometry based communication network
monitoring, intrusion detection, and message...
Systems and methods are provided for monitoring and detecting intrusions and authenticating messages on a communication network of a vehicle. A plurality of...
Verification of peer-to-peer multimedia content
A method includes receiving, at a first wireless device, from a second wireless device, content and an identification of the second wireless device, over a...
Packet receiving method, deep packet inspection device and system
Embodiments of the present invention provide a packet receiving method, a deep packet inspection device and system, which relates to the field of ...
Trusted peripheral device for a host in a shared electronic environment
A trusted peripheral device can be utilized with an electronic resource, such as a host machine, in order to enable the secured performance of security and...
Multiple data store authentication
System and methods for authenticating access to multiple data stores are disclosed. The system may include a server coupled to a network, a client device in...
Method and system for device dependent encryption and/or decryption of
A method and system is disclosed that provides at least one server device; and at least one remote audio playback device, the remote audio playback device...
Mobile network-based multi-factor authentication
Verification of a user login to a secure account from a mobile device occurs when the user provides login credentials and a hardware identifier (ID)...
Multi-factor authentication techniques
An authentication technique with a teaching phase and authentication phase. In the teaching phase, authentication information is collected for a user in at...
Module for controlling usability of a device
Module (10) for controlling usability of a processing unit (2) of a device (1), the module comprising a modem (11) for communicating with a cellular network,...
Optimizing secure communications between a client authenticating server
and a mobile client
Systems and techniques are described for optimizing secure communications. Specifically, a first intermediary and a second intermediary can split-terminate a...
System and method for secure content sharing and synchronization
A flexible content sharing system may comprise a network based application built on a client device using information from dissociated user experience component...
Mobile handset extension to a device
Mobile operation is extended to a device. An extension interface comprises a client component within a mobile that is linked to a client component within the...
Technologies for secure bootstrapping of virtual network functions
Technologies for bootstrapping virtual network functions in a network functions virtualization (NFV) network architecture include a virtual network function...
Enhanced security for registration of authentication devices
A system, apparatus, method, and machine readable medium are described for enhanced security during registration. For example, one embodiment of a method...
Dynamic file access to files of unmapped remote computers
Dynamically providing access to files of presently unmapped remote computers, including, responsive to receiving a file access request from a user, displaying a...
Authentication system and authentication method
On-vehicle control units include an attaching section for attaching a message code used to check the validity of the transmission source of communication data,...
Systems and methods for enabling secure communication between endpoints in
a distributed computerized...
A computer-implemented method performed in a system comprising a first endpoint, the first endpoint comprising at least one central processing unit, a memory, a...
System and method for authenticating users
A security application for a computing device, e.g., a mobile phone, allows generation of a secret according to a unique user input (e.g., user credentials)....
Secure data verification technique
A technique for the secure exchange and verification of data between multiple entities that use compatible business management systems utilizes serializable...
Network initiated alerts to devices using a local connection
Systems and techniques for managing local communication between a network access point and a host device. Upon connection by a host device to an access point, a...
Communication control method, communication node, and mobile node
A technique is disclosed in which an MN (mobile node) 100 notifies, to a CN (correspondent node), home network connection information indicative of whether or...
Local name resolution
Embodiments described herein relate to systems and methods for local name resolution in network communications. Particular embodiments may enable a device...
Method and apparatus for provisioning a scalable communications network
A method that incorporates teachings of the subject disclosure may include, for example, determining at a first directory server of a first regional call...