Sign up


Match Document Document Title
8676998 Reverse network authentication for nonstandard threat profiles  
A client-server communication protocol permits the server to authenticate the client without requiring the client to authenticate the server. After establishing the half-authenticated connection,...
8677000 Methods and systems for restricting electronic content access based on guardian control decisions  
Methods, computer-readable media, and systems are provided to facilitate a second user to allow or deny a first user, such as a child, from accessing content by proving the second user with a...
8676576 Information processing system, information processing apparatus, information processing program and recording medium  
A copyright managing information processing apparatus includes a storage module for storing copyrighted content including audio data; a first topic module for recognizing audio data in content...
8677429 Resource conflict resolution for multiple television  
A system for managing resource-usage conflict among a plurality of viewers associated with a plurality of TVs, including a plurality of resources for shared usage among the viewers, the resources...
8671194 System and method for stateless, fault tolerance and load balanced data collection using overlay namespaces  
A resource monitoring method may include determining, at a first monitoring node, a load level for each monitoring node of a plurality of monitoring nodes including the first monitoring node and a...
8671195 Digital media communication protocol  
A digital media communication protocol structured to selectively transmit one or more digital media files between a media terminal and a media node via a communication link on an interactive...
8671207 Communication network system  
The communication network system comprises: a relay device (40) interposed between nodes (30); and a setting device (50) connected to the relay device (40). The relay device (40) comprises: a relay...
8671150 Automatically managing objectionable behavior in a web-based social network  
A system and method for curtailing objectionable behavior in a web-based social network is disclosed. The method includes monitoring various actions of users of a web-based social network for...
8671208 System and method for adaptively routing peer-to-peer (P2P) communications  
Methods and systems for connecting communication devices in a network are provided. A first and a second communication devices are connected to a proxy in the network. The proxy being configured...
8671214 Customizing perishable content of a media channel  
A user can specify particular news, weather, traffic, or other perishable content received on a particular Internet radio station or other media channel. The user can customize the station so that...
8667162 Method, apparatus and computer program product for providing a mobile streaming adaptor  
An apparatus for providing a mobile streaming adaptor includes a processor configured to receive media content from a remote camera, process the received media content by capturing, encoding and...
8667138 Distributed hierarchical rendering and provisioning of cloud services  
Techniques are provided herein for distributed and hierarchical rendering and provisioning of cloud services. At a device in a cloud computing system comprising a plurality of hierarchical levels,...
8665772 Method, device and system for transmitting a push message  
In the field of wireless communications technologies, a method, a device and a system for transmitting a push message are provided, which solve the technical problem that a push message may not be...
8667156 Application-independent service delivery  
A service delivery platform that can support a number of different services is provided. A context regarding an application device is received by the service delivery platform. Applications...
8667151 Bootstrapping method for setting up a security association  
In one embodiment, a method of the invention has the steps of: (A) establishing an access-layer security association (SA) between a mobile node (MN) and an authentication authorization accounting...
8667169 System and method for providing argument maps based on activity in a network environment  
A method is provided in one example and includes receiving network traffic associated with a first user and a second user; evaluating keywords in the network traffic in order to identify a topic of...
8667056 Dynamic traffic management  
Requests from multiple users for one or more shared resources can be dynamically throttled based on at least one allowance value determined for each user at a current point in time. One or more...
8667154 Authentication of unknown parties in secure computer communications  
Authentication of an unknown party in a secure computer communication may be performed even without consulting a public whitelist of trusted parties. A digital certificate from an unknown party not...
8667140 Distinguishing tenants in a multi-tenant cloud environment  
A method, article of manufacture, and apparatus for managing a cloud computing environment. In some embodiments, this includes designating a tenant space for a tenant, allocating resources to the...
8667136 Communication system  
A method of updating a data record stored in a data store with information supplied by at least one of a plurality of users of a communication network includes storing a communication identifier in...
8667092 System and method for providing online file management services  
A first message comprising first information specifying a file is received from a first server. Respective second messages comprising second information specifying the file are transmitted to a...
8665860 Relay device and method for continuing service  
A relay device that relays a message transmitted from a terminal device to a server through a communications network. When a message is received from the terminal device, the relay device obtains...
8667082 System and method for targeting channels to users  
A comprehensive platform for merchandising intellectual property (IP) and conducting IP transactions is disclosed. A standardized data collection method enables IP assets to be characterized, rated...
8667267 System and method for communicating with a key management system  
A method for providing authenticated access to an encrypted file system includes generating a first seed; providing a request for a key to a key server, the request including at least a first seed...
8667153 Using a virtual network interface to obtain access to resources  
A first computing device maps a virtual network address for a virtual resource that is accessible to the first computing device to an address of a designated resource that is inaccessible to the...
8667152 Enhanced content sharing framework  
An enhanced content sharing framework, in which a presence table indexing content globally stored on a respective home network, and policy information identifying users who are authorized to access...
8667170 Address conversion method, access control method, and device using these methods  
The conventional address translation techniques cannot allow multiple terminal devices to be accessed by using one identical port number because they can associates one port number with only one...
8665913 Communication device to obtain time information  
A communication device that is to be connected to a providing server for providing time information via a network is provided. The communication device includes a congestion-degree obtainer to...
8667067 System and method for subscribing to a web logging service via a dispatch communication system  
A system for posting web logging (blog) messages, retrieving blog messages, and being notified of the posting of blog messages by way of dispatch communications. The system includes a wireless...
8661153 System and method for dynamic bandwidth provisioning  
Embodiments disclosed herein provide a control device and a method executing thereon for allocating network bandwidth to users accessing a controlled network. In response to a user connecting to...
8661140 Interface apparatus, exchange apparatus with the apparatus, and control method for use in the apparatus  
According to one embodiment, an interface apparatus includes a connector which establishes connection with a plurality of Session Initiation Protocol (SIP) terminals which each include...
8661120 Methods and systems for dynamically managing requests for computing capacity  
Embodiments of systems and methods are described for dynamically managing requests for computing capacity from a provider of computing resources. Illustratively, the computing resources may include...
8661145 Method and system for transmitting a bearer control mode in roaming scenarios  
The present invention provides a method and system for transmitting a bearer control mode in a roaming scenario. The method includes: a home Policy and Charging Rules Function (hPCRF) sets a bearer...
8661158 Smart tunneling to resources in a network  
A client computer hosts a virtual private network tool to establish a virtual private network connection with a remote network. Upon startup, the virtual private network tool collects critical...
8661148 System and method for enabling industry based channels in an IP marketplace  
A comprehensive platform for merchandising intellectual property (IP) and conducting IP transactions is disclosed. A standardized data collection method enables IP assets to be characterized, rated...
8661110 Methods for identifying and recovering non-revenue generating network circuits established outside of the United States  
A method includes issuing a retrieval instruction, such as a database query, to retrieve from a database system a datum associated with a network circuit established outside of the United States....
8661157 Application network communication  
A method and apparatus is provided to discover and integrate applications in an application router framework. The discovery operation includes receiving a registration notification for an...
8661147 Monitoring requested content  
Requested content is monitored and metadata for the content is accessed and reported to an administrator communication device. The reported metadata may be indicative of a classification of the...
8661130 Program, method, and apparatus for dynamically allocating servers to target system  
Server management data describes observed operating condition of a pool of spare servers. Based on a demand forecast of a specific target system, a dynamic allocation period is determined as a...
8660268 Keyed pseudo-random number generator  
A method and apparatus for client authentication using a pseudo-random number generation system. The pseudo-random number generation utilizes a secret key as well as state information as input into...
8661132 Enabling service virtualization in a cloud  
A service-level specification for information technology services is obtained from a user. The service-level specification is mapped into an information technology specific deployment plan....
8661133 Method for allowing and blocking a user PC which can use internet at the same time in a private network thereof a method for analyzing and detecting a judgement about whether NAT(network address translation) can be used or not using a traffic data, and the number of terminals sharing NAT  
The present invention provides according to an embodiment a method including analyzing traffic; judging whether NAT (Network Address Translation) use of a client configuring and using a private...
8656002 Managing resource dependent workflows  
Systems and method for the management of resource dependent workflows are provided. One or more resource control devices monitor usage of a computing resource by server computing devices. Each...
8654675 Interface detection device and detection method employing the same  
An interface detection device in electronic communication with a network tester to receive network packets includes a plurality of local area network (LAN) interfaces, a signal control unit and a...
8656389 Virtual port command processing during migration of virtual machine  
In one embodiment, a method includes upon receipt from a first host of a command to pause a virtual port (Vport) associated with a first physical port establishing a connection with the first host,...
8656490 Safe and secure access to dynamic domain name systems  
A method and apparatus for safe and secure access to dynamic domain name systems. In one embodiment a method comprises transmitting a DNS query to a dynamic DNS server. The DNS query comprises a...
8655994 System for presenting media programs  
A system that incorporates the subject disclosure may use, for example, a method for sending a set-top box an identification of the media player, receiving operational instructions from the set-top...
8655333 Methods, systems, and computer program products for establishing settings of communications service features  
Establishing settings of communications service features for a user includes identifying a plurality of communications services of the user. The plurality of communications services include...
8656475 Method and system for controlling access for mobile agents in home network environments  
Disclosed is a method and system for controlling access for a mobile agent in a home network environment. The method includes the steps of: issuing a role ticket to the mobile agent; verifying...
8655326 Wireless handset connectivity time optimization  
A system includes a user device configured to communicate with an application server over a network. A plurality of network elements are in communication with one another over the network, and each...