Match Document Document Title
US20160021158 MEDIA/COMMUNICATIONS SYSTEM  
A system provides media content/communications data to a plurality of devices. The system includes a server system that includes a central server in communication with a plurality of local units...
US20160021157 SYSTEMS AND METHODS FOR AUTOMATED REAL-TIME INTERNET STREAMING AND BROADCASTING  
A real-time Internet streaming system and method includes a scheduling server that receives queries from media streaming devices and determines if any scheduled events associated with a particular...
US20160021156 SYSTEM AND METHOD FOR NETWORKED VIDEO CAPTURE, BACKUP, AND SERVING  
Transparent backup and archiving of video data for one or more Video Management Systems is provided by capturing such data from at least one network used by the VMS(s) using packet capture by one...
US20160021155 METHOD AND ELECTRONIC DEVICE FOR PERFORMING EXCHANGE OF MESSAGES  
An electronic device is provided that, while traveling, easily performs message exchange exploiting unit information. An electronic device includes: a display unit; a wireless communication unit...
US20160021154 System And Method For Displaying Information  
Methods, software, products and systems of a communications system which provides simultaneous electronic and non-electronic communications from a user to one or more recipients. Methods,...
US20160021153 SYSTEM AND COMPUTER PROGRAM FOR SOCIAL MEDIA UTILIZING NAVIGATION  
A system, computer program, and method for location-based social media interaction between a plurality of participants. The system may receive and store user profiles for participating users and...
US20160021152 DEVICE-DRIVEN SOCIAL NETWORK  
In one embodiment, a method includes receiving information from a network-enabled device, the network-enabled device being associated with a first user of a social-networking system. The...
US20160021151 METHOD FOR INSERTING BACKGROUND AUDIO INTO VOICE/VIDEO CALL  
A background noise inserter server is described that includes a communication interface for communicating with a network, memory for storing background audio, and a processor coupled to the...
US20160021150 METHOD AND SYSTEM FOR MANAGING A SIP SERVER  
A method, system and computer program product are described for managing network communications to a Session Initiation Protocol (SIP) server capable of SIP processing using a SIP stack. A data...
US20160021149 METHODS AND SYSTEMS FOR DYNAMIC ADJUSTMENT OF SESSION PARAMETERS FOR EFFECTIVE VIDEO COLLABORATION AMONG HETEROGENEOUS DEVICES  
Methods and systems for maximizing the quality perceived by the user in a software-based, multi-point video conference or collaboration session between devices that are potentially different...
US20160021148 ARCHITECTURE TO ESTABLISH SERVERLESS WEBRTC CONNECTIONS  
Peer-to-peer connection methods and systems are provided. A first client device receives a request to initiate a peer-to-peer connection with a second client device. Responsive to the request, the...
US20160021147 A MEDIATOR FOR OPTIMIZING THE TRANSMISSION OF MEDIA CONTENTS BETWEEN A MULTIMEDIA RESOURCE FUNCTION AND A PLURALITY OF TERMINALS  
A mediator for the transmission of media contents includes means for receiving video content requests from terminals when they request to take part in said video call conference, and for...
US20160021146 ENHANCED IMS SERVICES RESTRICTION AND SELECTION CONTROL FOR MOBILE DEVICES ROAMING IN FOREIGN NETWORKS  
A system and method that allows a mobile device to register for IMS services while the mobile device is roaming in a visited telecommunications network is disclosed. The system receives a request...
US20160021145 METHOD AND APPARATUS FOR INITIATING COMMUNICATION MODES  
Aspects of the subject disclosure may include, for example, a method for receiving, by a system comprising a processor, a first request to transition a communication device between a hearing mode...
US20160021144 USER-BASED NETWORK ONBOARDING  
A network security system including a first-level security profile engine and a second-level security profile engine is disclosed. The first-level security profile engine may assign a first-level...
US20160021143 DEVICE FEDERATION  
The present application is directed to device federation. Interaction between devices in a federation may be conducted using reduced security, while interactions with devices outside the...
US20160021142 AUTOMATIC CONTENT INSPECTION SYSTEM FOR EXPLOIT DETECTION  
A method of inspecting content intended for a workstation to detect content that performs malicious exploits, including receiving the content for inspection at an inspection server using a...
US20160021141 RATING NETWORK SECURITY POSTURE AND COMPARING NETWORK MALICIOUSNESS  
Embodiments are disclosed for profiling network-level malicious activity. Profiling embodiments include observing malicious activity, representing such activity in accordance with a set of...
US20160021140 Method and Apparatus to Facilitate Message Transmission and Reception Using Different Transmission Characteristics  
Upon providing (101) message content (such as a remote control instruction) to be transmitted, and in conjunction with provision (102) of a plurality of different transmission characteristics (as...
US20160021139 SYSTEMS AND METHODS FOR DETECTING AND PREVENTING CYBER-THREATS  
A system (100) for detecting and preventing cyber-threats is disclosed. The system (100) can include an online-analytical-processing (OLAP) resource (102) coupled to a data mining engine (104), a...
US20160021138 Pre-processing system for minimizing application-level denial-of-service in a multi-tenant system  
Denial-of-service attacks are prevented or mitigated in a cloud compute environment, such as a multi-tenant, collaborative SaaS system. This is achieved by providing a mechanism by which...
US20160021137 PROACTIVE NETWORK ATTACK DEMAND MANAGEMENT  
Various embodiments described and illustrated herein provide one or more of systems, methods, software, and firmware to handle attack generated demand proactively using distributed virtualization....
US20160021136 Pre-processing system for minimizing application-level denial-of-service in a multi-tenant system  
Denial-of-service attacks are prevented or mitigated in a cloud compute environment, such as a multi-tenant, collaborative SaaS system. This is achieved by providing a mechanism by which...
US20160021135 SYSTEM AND METHOD THEREOF FOR CREATING PROGRAMMABLE SECURITY DECISION ENGINES IN A CYBER-SECURITY SYSTEM  
A system and method for adaptively securing a protected entity against cyber-threats. The method comprises: determining, based on at least one input feature, at least one normalization function,...
US20160021134 DETECTION OF STACK PIVOTING  
Particular embodiments described herein provide for an electronic device that can be configured to receive a function call for a function, determine a current stack pointer value for the function...
US20160021133 SYSTEMS AND METHODS FOR MANAGING DATA INCIDENTS  
Systems and methods for managing a data incident are provided herein. Exemplary methods may include providing an external entity interface that receives external entity information including a...
US20160021132 Method and Apparatus for Providing Content Protection in a Computer System  
A computer system includes a server device which provides one or more content packages each comprising a plurality of asset files. A client device stores the content packages, and generates a...
US20160021131 IDENTIFYING STEALTH PACKETS IN NETWORK COMMUNICATIONS THROUGH USE OF PACKET HEADERS  
A host computer system contains a software module that monitors and records network communications that flow through the legitimate network channels provided by the operating system and reports...
US20160021130 AUTOMATIC CONTENT INSPECTION SYSTEM FOR EXPLOIT DETECTION  
A method of inspecting content intended for a workstation to detect content that performs malicious exploits, including receiving the content for inspection at an inspection server using a...
US20160021129 ROLLBACK FEATURE  
A file stored in a first portion of a computer memory of a computer is determined to be a malicious file. A duplicate of the file is stored in a quarantine area in the computer memory, the...
US20160021128 METHOD FOR DETECTING AN ATTACK IN A COMPUTER NETWORK  
A method for detecting an attack in a computer network having a plurality of computers includes: receiving a plurality of warning messages from the computers, the warning messages being based on...
US20160021127 SYSTEM AND METHOD FOR DETECTING OBD-II CAN BUS MESSAGE ATTACKS  
The present application discloses method and system for detecting potential security attacks against a vehicle networking through an OBD-II port. The system establishes an inbound OBD-II CAN...
US20160021126 Dynamic Tuning of Attack Detector Performance  
In one embodiment, a device in a network receives information regarding one or more attack detection service level agreements. The device identifies a set of attack detection classifiers as...
US20160021125 PROCESS LEVEL LOCALITY AND SPECIALIZATION FOR THREAT DETECTION IN THE DENDRITIC CELL ALGORITHM  
Artificial Immune Systems (AIS) including the Dendritic Cell Algorithm (DCA) are an emerging method to detect malware in computer systems. An implementation of the DCA may detect anomalous...
US20160021124 Volatility-based Classifier for Security Solutions  
Various embodiments provide an approach to classifying security events based on the concept of behavior change detection or “volatility.” Behavior change detection is utilized, in place of a...
US20160021123 Reverse NFA Generation And Processing  
In a processor of a security appliance, an input of a sequence of characters is walked through a finite automata graph generated for at least one given pattern. At a marked node of the finite...
US20160021122 EXPLAINING CAUSES OF NETWORK ANOMALIES  
In an embodiment, the method comprises receiving network performance data for a computer network; receiving, from an intrusion detection system, network anomaly data indicating a plurality of...
US20160021121 METHODS, SYSTEMS, AND MEDIA FOR INHIBITING ATTACKS ON EMBEDDED DEVICES  
Methods, systems, and media for inhibiting attacks on embedded devices are provided, in some embodiments, a system for inhibiting on embedded devices is provided, the system comprises a processor...
US20160021120 DENDRITIC CELL ALGORITHM MODULE WITH INFLAMMATORY INTER-NODE SIGNALING  
Artificial Immune Systems (AIS) including the Dendritic Cell Algorithm (DCA) are an emerging method to detect malware in computer systems. An implementation of the DCA may detect anomalous...
US20160021119 METHOD FOR ESTABLISHING A PLURALITY OF MODES OF OPERATION ON A MOBILE DEVICE  
A method, device and system for establishing plural modes of operation on a mobile device, including: associating each application on the mobile device with one of a plurality of modes; and...
US20160021118 PARAMETER BASED KEY DERIVATION  
A delegation request is submitted to a session-based authentication service, fulfillment of which involves granting an entity an access privilege to a computing resource. A session key is received...
US20160021117 DEVICES AND METHODS FOR THREAT-BASED AUTHENTICATION FOR ACCESS TO COMPUTING RESOURCES  
In some embodiments, a method includes receiving, at a host device, a signal indicative of an authentication request for a client device to access a resource from a set of resources. A resource...
US20160021116 CONTROLLING DEVICES BY SOCIAL NETWORKING  
In one embodiment, a method includes analyzing information received from a first network-enabled device to identify instructions for a second network-enabled device associated with a second user...
US20160021115 UNREGISTERED USER ACCOUNT GENERATION FOR CONTENT ITEM SHARING  
Various embodiments of the present technology involve the sharing of a content item though a synchronized content management system (CMS) without requiring a user to register or provide login...
US20160021114 Method and Server of Remote Information Query  
A method and a server of remote information query are disclosed. The method includes receiving a query request sent by a client side and acquiring content of a type field of the query request;...
US20160021113 TECHNIQUES FOR SECURE DEBUGGING AND MONITORING  
Techniques for secure debugging and monitoring are presented. An end user requests a secure token for logging information with a remote service. A secure monitoring and debugging token service...
US20160021112 COMPUTER READABLE STORAGE MEDIA FOR TIERED CONNECTION POOLING AND METHODS AND SYSTEMS FOR UTILIZING SAME  
Systems and methods for tiered connection pooling are disclosed herein. An example system may include a memory encoded with computer executable instructions that when executed cause a processing...
US20160021111 Method, Terminal Device, and Network Device for Improving Information Security  
A method, a terminal device, and a network device are provided. The method of the present invention includes acquiring, by a terminal device, a key, an identity of the terminal device, and...
US20160021110 INFORMATION PROCESSING APPARATUS AND ENCRYPTION COMMUNICATING METHOD  
An information processing apparatus for performing encryption communication with an external apparatus by an encryption communication protocol has an inhibition unit for inhibiting use of a set of...
US20160021109 METHOD AND DEVICE FOR FILE ENCRYPTION  
A method for encryption and sealing of a plaintext file by hashing the plaintext file to produce a plaintext hash, encrypting the plaintext file to produce ciphertext, hashing the ciphertext to...