Sign up


Match Document Document Title
8539234 Secure client-side communication between multiple domains  
Methods and systems for secure client-side communication between multiple domains is provided. Such methods and systems can provide for decreased communication latency particularly effective for...
8539080 Application intelligent request management based on server health and client information  
Requests to a server farm are managed in an application intelligent manner based on server health and client information. A request management (RM) module is configured to make smart routing...
8539574 User authentication and access control system and method  
A system and method for permitting user access to a computer controlled device. A display device displays a group of items to the user. Some of the items are known to the user and some are unknown...
8539107 Personal information management data synchronization  
A data management application that may be implemented in a mobile device to perform two-way synchronization of electronic messages and/or PIM data with a server device. The device may be a mobile...
8539018 Analysis of IT resource performance to business organization  
A system, method and computer program product for determining at least one association between at least one business process and at least one network entity. The system maps at least one user to...
8533349 System and method for controlling access to internet sites  
A method and system for providing flexible access to Internet sites is described. The system includes a database of Internet sites that have been categorized so that the system determines the...
8533789 User management for repository manager  
Authenticating a user is disclosed. An indication that a portal user wants to access a docbase is received. A non-user-specific credential is used to log in to the docbase on behalf of the portal...
8533331 Method and apparatus for preventing concurrency violation among resources  
Method and apparatus for preventing concurrency violations among resources in a clustered computer system is described. In one example, a system call is intercepted at a node in the clustered...
8533828 System for protecting security of a provisionable network  
Disclosed is a system for protecting security of a provisionable network, comprising: a network server, a network client communicatively coupled with the server, a pool of resources coupled with...
8533338 Systems and methods for providing secure communications for transactions  
Embodiments of the present invention provide systems and methods for providing secure communications. One aspect of an embodiment of the invention creates a virtual private connection to a remote...
8533784 System and method for separating control of a network interface device  
A system and method for separating control of a network interface device. A portion of a network interface device (NID) is partitioned for utilization by a user. Permissions are established for...
8532694 Interface authorization scheme  
An authorization scheme controls whether an interface is established between communication nodes. Such a scheme may be used, for example, to determine whether to establish a direct interface (e.g.,...
8533465 System and method of encrypting network address for anonymity and preventing data exfiltration  
A method is provided for sending a data packet from a client through a network and to a server. The data packet is a data structure having an originating address portion and destination address...
8533341 System and method for modeling, monitoring and managing telecommunications networks and infrastructure  
An analyzing a telecommunications network that receives environmental data, vendor data, and customer data related to a telecommunications transaction. A telecommunications transaction identifier...
8533261 Extensible and programmable multi-tenant service architecture  
An extensible, multi-tenant software-as-a-service business application platform is provided for hosting multiple organizations. Organization services are provided by virtual or physical servers...
8533849 Traitor tracing in a content protection system  
A method for detecting at least one traitor computer system among a plurality of receiver computer systems including: assigning a version of protected content to each of the plurality of receiver...
8533302 Enhanced network adapter framework  
An enhanced network adapter framework, in which parameters are stored in a configuration table, the parameters being customized for a network and an application. A network adapter customized for...
8533347 Non-modal dialog for managing blocking of multiple web browser cookies  
In order to provide a user with control of how persistent information is used in a Web browser to aid in the display of website content in a non-disruptive manner, a system and a method are...
8533786 Method and apparatus for protecting against attacks from outside content  
A method and apparatus for protecting against attacks from outside content is described. In one example, a request is received from a user to access content from a second domain. An active session...
8531693 Printer control device providing printer masquerading features and related methods  
A computer network may include a network server, a network printer having a printer identifier associated therewith, and a plurality of network computers coupled to the network server for...
8533834 Antivirus intelligent flow framework  
A device receives a data transaction associated with packet, determines a risk level associated with the data transaction, and performs a content type check for the data transaction. The device...
8533343 Virtual network pairs  
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for implementing virtual network pairs between virtual machines and other devices. In one aspect,...
8533350 Method and apparatus for storing information in a browser storage area of a client device  
Disclosed is a method and apparatus for performing steps to cause encoded information to be stored at a client device during a first network session between a server and the client device. To cause...
8533328 Method and system of determining vulnerability of web application  
A method of determining vulnerability of web application comprises: selecting fixed parameters from parameters of URL link extracted from a website; determining whether a process of determining...
8533473 Method and apparatus for reducing bandwidth usage in secure transactions  
A secure end to end connection is established between a remote device having a wireless link and a control/monitoring location for the remote device through a gateway. During the establishing of...
8527645 Distributing transcoding tasks across a dynamic set of resources using a queue responsive to restriction-inclusive queries  
A method and system for performing processing tasks is disclosed. At a resource, a detection is made as to when the resource is available to perform a processing task. Usage of the resource for...
8526046 Image forming apparatus, control method for image forming apparatus, and program thereof  
An image forming apparatus includes a reception unit and an execution unit. The reception unit receives a first parameter, which is to be transmitted responsive to a user issued request instruction...
8527638 System management via session initiation protocol  
A Session Initiation Protocol (SIP) proxy device associated with a computer system is configured to provide a management device with the ability to manage a computer system using the Session...
8527621 Autologging the presence of a wireless local area network  
A method includes scanning to detect presence of a wireless local area network WLAN, detecting presence of said wireless local area network, contacting a base station of said wireless local area...
8527644 Apparatus and method for provisioning wireless data communication devices  
A system for provisioning wireless data communication devices for a plurality of users is provided in which the system includes a configuration server having an authorization program and a...
8528047 Multilayer access control security system  
A computer-based system provides secure, configurable access to computer network resources. A human-readable language is provided for defining access policy rules. Rules in this language are...
8526042 Information processing apparatus and information processing apparatus control method to provide recovery processes  
An information processing apparatus includes an execution determination unit and a control unit. The execution determination unit determines whether a series of processes including multiple...
8527640 Method and apparatus for browsing using multiple coordinated device sets  
Systems and methods for navigating hypermedia using multiple coordinated input/output device sets. Disclosed systems and methods allow a user and/or an author to control what resources are...
8520234 Communication system, communication apparatus, communication method, and program  
Disclosed herein is a communication system for enabling a first communication apparatus and second communication apparatuses to communicate with one another over a network. The first communication...
8521846 Mechanism for customized aggregation of system-specific information for post-installation suggestions  
A mechanism for customized aggregation of system-specific information for Post-Installation Suggestions is disclosed. A method of embodiments includes determining identifying information of a...
8521857 Systems and methods for widget rendering and sharing on a personal electronic device  
Systems and methods for providing, sharing, storing and playing widgets and associated media content on a personal audiovisual device, such as a digital photo frame, are described. In one...
8522018 Method and system for implementing a mobile trusted platform module  
A method for implementing a mobile trusted platform module includes establishing a connection with a first remote host device via a remote interface. The method also includes authenticating the...
8521815 Post-to-profile control  
Multimedia content is featured on user pages of an online social network using embed codes that are generated using a configuration file associated with the source ID for the multimedia content and...
8522315 Automatic configuration of client terminal in public hot spot  
The invention herein provides an apparatus and a method for automatically configuring an IEEE 802.1x client terminal to provide limited access in a WLAN environment, specifically utilizing the...
8522043 Hardware-based computer theft deterrence  
A hardware-based security module is used to protect an electronic device, especially a portable electronic device. The security module may determine either via timeout of a watchdog timer or via an...
8522350 System and method for run-time attack prevention  
Preventing attacks on a computer at run-time. Content that is configured to access at least one function of a computer is received by the computer. Protections corresponding to the function are...
8522007 Dual cryptographic keying  
A dual cryptographic keying system. In particular implementations, a method includes responsive to an initial session key negotiation, storing security association information for a tunnel in a...
8521624 Method for accounting information handling in an interworking  
A method for accounting information handling in an interworking is provided. A method for processing accounting information by a gateway device includes sending an accounting request message to a...
8521886 Methods and apparatus for determining and/or using a communications mode  
Methods and apparatus for determining whether two or more communications devices, e.g., wireless terminals, in a communications system should communicate using direct peer to peer communications or...
8516138 Multiple authentication support in a shared environment  
An authentication configurator may define a LDAP security group for LDAP authentication, wherein the LDAP security group is associated with rights. It may define a native security group for native...
8516136 Web-based over-the-air provisioning and activation of mobile terminals  
In a method for over-the-air provisioning of a mobile terminal in a wireless network, a first transaction between the mobile terminal and a web server is performed via an external port. During the...
8516045 Method and apparatus for automatic notification and response based on communication flow expressions having dynamic context  
Methods and apparatus are disclosed for automatic notification and response based on communication flow expressions having dynamic context. A message is provided from a sender to at least one...
8514749 Routing requests for duplex applications  
The present invention extends to methods, systems, and computer program products for routing requests for duplex applications. Embodiments of the invention provide a multi-machine scalability...
8516042 Network type content reproducing system  
A client repeatedly transmits a firmware request including an obtaining start address and an obtaining data length. The obtaining start address indicates the first address of firmware data to be...
8516039 Apparatus and method for managing mobile device servers  
A method that incorporates teachings of the present disclosure may include, for example, receiving at a media resource center a first pairing key from a first mobile device server and enabling the...