Sign up


Match Document Document Title
8799119 System and method for usage billing of hosted applications  
A system, method, and computer readable medium for usage billing of one or more hosted applications serving one or more clients. The hosted applications are contained within one or more isolated...
8800056 Guided implicit authentication  
Embodiments of the present disclosure provide a method and system for guided implicit authentication. The system first receives a request to access the controlled resource from a user. The system...
8799993 Method and apparatus for configuring communication parameters on a wireless device  
A method and apparatus for configuring communication parameters of a wireless device are provided herein. In some embodiments, the method may establishing a communication connection to a wireless...
8798082 Relay communication system and first relay server  
A relay communication system includes a first client terminal which creates routing group information including network addresses of first and second LANs, and identification information of the...
8799447 Notarizing packet traces  
A system and method for capturing non-forgeable packet traces. Upon start-up of a sniffer, a first quote of Platform Configuration Register (PCR) values in a Trusted Platform Module (TPM) utilized...
8799489 Multi-user system with dynamic data source selection  
Techniques to dynamically select data sources for users and to direct queries for the users to the proper data sources. Initially, user information (e.g., user name) for each user is received and...
8799417 System and method for customizing settings in a communication device for a user  
The illustrative embodiments described herein provide a method, apparatus, and computer program product for customizing settings in a communication device for a user. In one illustrative...
8799491 Apparatus, methods and computer programs for metering and accounting for services accessed over a network  
Apparatus, methods and computer programs provided for metering and accounting in a commercial e-services infrastructure address the requirement for handling composite services in which higher-level...
8799431 Virtual systems management  
Automatic configuration management of a network is provided by determining an inventory of resources at a virtualization layer of a node of the network, assigning prioritization to members of a set...
8799490 Automated application server (AS) permissions provisioning  
Systems, methodologies, media, and other embodiments associated with provisioning an Internet Protocol (IP) core network services multimedia subsystem (IMS) are described. One exemplary system...
8799492 Electronic device  
An electronic device includes a storage, a communication device and a controller. The storage stores information identifying the electronic device. The controller, when starting connection of the...
8793332 Content tagging using broadcast device information  
A number of devices co-located at a geographic location can broadcast and receive identity information. The identity information can include a unique device identifier and a device description. The...
8793329 Facilitating communication between isolated memory spaces of a communications environment  
Automatically converting a synchronous data transfer to an asynchronous data transfer. Data to be transferred from a sender to a receiver is initiated using a synchronous data transfer protocol....
8793338 Providing content delivery during a call hold condition  
An approach for providing content transmission upon placement of a call on hold is disclosed. A data communications system includes a proxy server that is configured to receive a message from a...
8793327 Grid computing space  
A method and apparatus for using a tree-structured cluster as a library for a computing grid. In one embodiment, a request for computation is received at a cache node of the cluster. The...
8793767 Network access management via a secondary communication channel  
The present disclosure provides for selectively enabling a primary communication channel upon receipt of enablement instructions received via a secondary communication channel. In some embodiments,...
8793777 Verification and authentication systems and methods  
Embodiments of the present invention provide verification and/or authentication service engines that provide a customizable solution that can be “dialed” based on the risk level assigned to ind...
8793353 Systems and methods for creation of reverse virtual internet protocol addresses  
A method, apparatus, and system are described for a central station to allocate virtual IP addresses. A device service manager server (DSM) has a network access module conFigured to cooperate with...
8793331 Multimedia redirection  
A system for receiving redirected electronic media playback includes a proxy configured to communicate with a remote access module. The remote access module is configured to establish a remote...
8793360 Systems and methods for testing denial of service attacks  
A system (130) for monitoring a denial of service attack upon a target network resource includes a memory (210) and a processor (205). The memory (210) stores instructions. The processor (205)...
8792346 Method of performing multicast admission control in a communications network, central admission controller and communications network  
The invention relates to a method of performing multicast admission control in a communications network (1′), comprising the steps of: a) receiving, at a first node (1-1) of the communications n...
8793388 Method and apparatus for processing a call to an aggregate endpoint device  
A method and an apparatus for processing a call to an aggregate endpoint device over a network are disclosed. For example, the method receives a session request by a Serving-Call Session Control...
8787386 Systems and methods for creating composed communication services  
Systems and methods are described for creating composed communication services within a gateway to a telecom network. Composed communication services are virtual services which can be created by a...
8788673 Systems and methods for providing security through sessions  
Systems and methods are described for providing security through sessions. In an implementation, a method includes initiating a session, by an operating system, in which operating system services...
8789087 System, device, and method for receiver access control in an internet television system  
A system, device, and method for receiver access control in an internet television system uses a push mechanism to distribute access control information froth a distribution device to an access...
8788611 Method for using partitioning to provide capacity on demand in data libraries  
A method for providing data storage capacity on demand comprises disabling a set of slot elements and data transfer elements of a data library disallowing access to the disabled set by end users of...
8788685 System and method for testing multi-protocol storage systems  
A system and method for testing multi-protocol network access using a synthetic multi-protocol client is provided. The synthetic multi-protocol client implements one or more predefined and/or user...
8788663 Managing resource dependent workflows  
Systems and method for the management of resource dependent workflows are provided. One or more resource control devices monitor usage of a computing resource by server computing devices. Each...
8788690 Systems and methods for providing content and services on a network system  
Systems and methods for managing and providing content and services on a network system. Aspects of the invention include location-based determination of network content and services that may be...
8788646 Home gateway policy controlling device, system and implementing method thereof  
An apparatus for implementing policy control for home gateway comprises a Co-located Policy Decision Function Entity (PD-FE) for receiving the QoS policy issued by the PD-FE at network side and...
8788654 System and method for allocating resources based on events in a network environment  
An example method is provided and includes receiving information associated with a network event; predicting network activity associated with the network event; determining a level of network...
8787828 In-band provisioning for a closed subscriber group  
In-band provisioning enables subscribers to manually provision themselves via an access point at which the subscribers would not otherwise be allowed access. For example, a subscriber may be...
8788807 Privacy protection in communication systems  
Methods and apparatus for protecting user privacy in a shared key system. According to one aspect, a user generates a derived identity based on a key and a session variable, and sends the derived...
8789151 Remote device communication platform  
Managing via a web portal a remote device from a source device connected to a communication network. A device ID is assigned to the remote device, and a remote management software for remote...
8788674 Buffering proxy for telnet access  
A single- or multi-protocol buffering proxy accepts communication option negotiation commands from a client before establishing a connection between the client and a host. The proxy negotiates a...
8788686 Continuous cloud computing sessions using handheld mobile communication device interfaced to different kiosks  
A kiosk may be accessible to the public and may include a keyboard, a display, a pointing device, and a device interface. The device interface may be configured to temporarily establish a...
8787314 Method, system, and apparatus for registration processing  
A registration processing method and an apparatus are disclosed herein to enable the network to distinguish between different registration processing types. The method includes: identifying, by a...
8782233 Embedding a cloud-based resource request in a specification language wrapper  
Embodiments relate to systems and methods for embedding a cloud-based resource request in a specification language wrapper. In embodiments, a set of applications and/or a set of appliances can be...
8782260 Network access control system and method using adaptive proxies  
A method, system and computer program for providing multilevel security to a computer network. The method comprises the step of receiving a first communication packet on at least one network...
8782261 System and method for authorization of segment boundary notifications  
Systems and methods for processing segment boundary notifications in a digital media receiver are disclosed. One such method includes the step of registering for notification of segment boundary...
8782783 Method and system for tracking machines on a network using fuzzy guid technology  
A method for querying a knowledgebase of malicious hosts numbered from 1 through N. The method includes providing a network of computers, which has a plurality of unknown malicious host machines....
8782262 Method and system for use in coordinating multimedia devices  
Some embodiments of the present invention provide methods for use in playing back content. Some of these methods access a content package comprising media content to be locally played back; detect,...
8782246 Optimized multi-component co-allocation scheduling with advanced reservations for data transfers and distributed jobs  
Disclosed are systems, methods, computer readable media, and compute environments for establishing a schedule for processing a job in a distributed compute environment. The method embodiment...
8782255 Handling of user access-dependent information in a core network subsystem  
An object of the present invention is a method for the handling of user access-dependent information in a system comprising a core network subsystem accessed by an access network, said method...
8782787 Distributed packet flow inspection and processing  
Distribution of network processing load among a set of packet processing devices is improved by employing means for eliminating, controlling, or otherwise affecting redundant packet processing...
8782739 Access list key compression  
Methods and apparatus for implementing an access list key for accessing information associated with a packet from an access list are disclosed. The packet includes an IP source address field and an...
8782183 Methods for auto-configuring a router on an IP subnet  
An autoconfiguring data router is connected to a communications network subnet having a second network data router. The autoconfiguring data router includes a configuration determination module...
8782399 Automated secure DNSSEC provisioning system  
A system and method that maintains a secure chain of trust from domain name owner to publication by extending the trust placed in existing cryptographic identity systems to the records published in...
8782207 System and method to prevent endpoint device recovery flood in NGN  
A mechanism is provided for recovering from a catastrophic failure that results in a large number of user endpoints attempting to come on line simultaneously after an NGN is restored. In an...
8780699 Handling switchover of multi-homed connections in VPLS networks  
A method includes establishing a bi-directional pseudowire (BPW) between a first provider edge (PE) router and a second PE router that are forwarders for a multi-homed VPLS customer site associated...