Match Document Document Title
US20170054776 System and Method for Online Multimedia Streaming Services  
An embodiment method for network optimization includes obtaining a first request to deliver a first data to a node in a network at a first data rate; obtaining a second request to deliver the...
US20170054775 TIERED CONTENT STREAMING  
Techniques for providing live content at different quality levels to a user device include advertising content availability at multiple quality levels for selection by the user device, receiving a...
US20170054774 Network Media Device  
A network media device is described that pulls multimedia data from one or more sources (e.g., a multimedia website or a multimedia server computer) at a first time, stores it to long-term storage...
US20170054773 Impromptu Community Streamer  
Various systems and methods for streaming an impromptu community are described herein. In one example, a system for streaming impromptu communities includes a data storage device, a community...
US20170054772 SYSTEMS AND METHODS FOR IMPLEMENTING INSTANT SOCIAL IMAGE COBROWSING THROUGH THE CLOUD  
In accordance with disclosed embodiments, there are provided methods, systems, and apparatuses for implementing instant social image cobrowsing through the cloud, including, for example, means for...
US20170054771 APPARATUS, METHOD AND NON-TRANSITORY COMPUTER-READABLE RECODING MEDIUM FOR PROVIDING CONTENT SHARING SERVICE  
A method of providing a content sharing service, the method includes receiving, from a first user, a content registration request including first content; generating identification (ID)...
US20170054770 MULTIMEDIA TELECONFERENCE STREAMING ARCHITECTURE BETWEEN HETEROGENEOUS COMPUTER SYSTEMS  
In one implementation, an apparatus includes a detector of capabilities of each of heterogeneous computing systems, the capabilities including a model, existence of a microphone, video controls,...
US20170054769 WEBRTC CALL RECORDING AT THE EDGE OF AN ENTERPRISE NETWORK  
Embodiments disclosed herein provide systems and methods for recording WebRTC communications at a network edge. In a particular embodiment a method provides, in an edge system of a communication...
US20170054768 SYSTEM AND METHOD FOR FREE-FORM CONFERENCE  
A method of dynamically maintaining conference attributes during a conference includes conducting the conference according to a first set of conference attributes based on a first set of member...
US20170054767 TRANSFERRING APPLICATION STATE BETWEEN DEVICES  
A system and method is disclosed for transferring application state between devices. A server stores state objects for applications operating on a first device. The server receives, from a second...
US20170054766 ENTERPRISE CLIENT-SERVER SYSTEM AND METHODS OF PROVIDING WEB APPLICATION SUPPORT THROUGH DISTRIBUTED EMULATION OF WEBSOCKET COMMUNICATIONS  
A request to establish a bi-directional full-duplex network connection is received. The request conforms to a half-duplex network connection protocol and the half-duplex connection protocol is a...
US20170054765 SYSTEMS AND METHODS FOR ESTABLISHING A CONTROL CHANNEL BETWEEN A VIRTUALIZATION SERVER AND A CLIENT DEVICE  
Systems and methods for establishing a control channel between a virtualization server and a client device are provided. A virtual desktop session is established between the virtualization server...
US20170054764 COMMUNICATIONS METHODS, APPARATUS AND SYSTEMS FOR CONSERVING MEDIA RESOURCE FUNCTION RESOURCES  
Communications methods, apparatus and systems for conserving Media Resource Function (MRF) resources by identifying streams of sessions, for example, non-real time streams, which can be routed to...
US20170054763 METHOD OF EXCHANGING DATA PACKAGES BETWEEN FIRST AND SECOND PORTABLE COMMUNICATION DEVICES USING A FAVOURED FREQUENCY BAND  
The present disclosure relates in a first aspect to a method of exchanging data packages between a first portable communication device and a second portable communication device over a...
US20170054762 METHOD FOR MANAGING FIXED AND MOBILE TERMINALS IN AN ENVIRONMENT COMPRISING A MOBILE NETWORK INCLUDING IMS NETWORK AND A COMPANY NETWORK  
A method of managing fixed and mobile terminals in an environment comprising a mobile network including an IMS network, and an enterprise network including IP-PBX equipment, the method consisting...
US20170054761 LOCK-FREE UPDATES TO A DOMAIN NAME BLACKLIST  
A computer-implemented method updates a domain name system blacklist in a lock-free manner is disclosed. In the method, an entry of the domain name blacklist is read at a DNS resolver in a...
US20170054760 Policy-Based Application Management  
Improved techniques for managing enterprise applications on mobile devices are described herein. Each enterprise mobile application running on the mobile device has an associated policy through...
US20170054759 METHOD AND APPARATUS FOR SECURITY CHECKING OF IMAGE FOR CONTAINER  
Method and apparatus for security checking of image for container are provided, one of methods comprises, receiving an image for creating a container, wherein the container is an isolation region...
US20170054758 DYNAMIC VPN POLICY MODEL WITH ENCRYPTION AND TRAFFIC ENGINEERING RESOLUTION  
High-level network policies that represent a virtual private network (VPN) as a high-level policy model are received. The VPN is to provide secure connectivity between connection sites of the VPN...
US20170054757 OBJECT-RELATION USER INTERFACE FOR VIEWING SECURITY CONFIGURATIONS OF NETWORK SECURITY DEVICES  
In a computer implemented method, selectable device icons that represent respective network security devices are generated for display. Responsive to a selection of one of the device icons,...
US20170054756 DATA COLLABORATION  
A method and system are provided for enabling collaborative access to a data object. The method comprises establishing an access control policy, the access control policy defining at least one...
US20170054755 SECURE POLICY MANAGER  
An event that changes the security of a communication session between communication endpoints is determined. The event that changes the security of the communication session between the...
US20170054754 MALWARE AND EXPLOIT CAMPAIGN DETECTION SYSTEM AND METHOD  
A malware and exploit campaign detection system and method are provided that cannot be detected by the malware or exploit campaign. The system may provide threat feed data to the vendors that...
US20170054753 POLLUTING RESULTS OF VULNERABILITY SCANS  
A security device may receive, from a server device, a response to a request. The request may be provided by an attacker device and may include a plurality of input values. The security device may...
US20170054752 METHOD FOR ANALYZING SUSPICIOUS ACTIVITY ON AN AIRCRAFT NETWORK  
An aircraft includes an aircraft network having nodes and links and a sandbox network in communication with the aircraft network. The sandbox network simulates the aircraft network and includes...
US20170054751 METHOD FOR MITIGATION OF CYBER ATTACKS ON INDUSTRIAL CONTROL SYSTEMS  
Methods and systems for detecting a potential compromise of cyber security in an industrial network are disclosed. These methods and systems comprise elements of hardware and software for...
US20170054750 RISK ASSESSMENT  
A method is provided in accordance with an aspect of the present disclosure. The method includes processing data related to a plurality of security risk metrics for an entity and identifying a...
US20170054749 DETECTING WEB EXPLOIT KITS BY TREE-BASED STRUCTURAL SIMILARITY SEARCH  
A method includes receiving, at an input port of a computer, indication of HTTP (Hypertext Transfer Protocol) traffic and clustering, using a processor on the computer, the HTTP traffic according...
US20170054748 LATENCY-BASED DETECTION OF COVERT ROUTING  
A method and apparatus for detecting covert routing is disclosed. In the method and apparatus, data addressed to a remote computer system are forwarded over a first network path, whereby the data...
US20170054747 BEHAVIOR DATA MANAGEMENT IN AN APPLICATION COMPONENT ENVIRONMENT  
Systems, methods, and software provided herein manage behavioral data for application components in a computing environment. In one example, a method of operating collection service includes...
US20170054746 IDENTIFYING UNVERIFIED APPLICATION BEHAVIOR IN A COMPUTING ENVIRONMENT  
Systems, methods, and software provided herein identify unverified behavior in an application component environment. In one example, a method of operating a collection service includes receiving...
US20170054745 METHOD AND DEVICE FOR PROCESSING NETWORK THREAT  
The invention provides a method and device for processing a network threat. The method comprises: listening for a network access behavior of a network device and acquiring a network datagram;...
US20170054744 DETECTION OF ANOMALOUS ADMINISTRATIVE ACTIONS  
A method for monitoring includes defining a plurality of different types of administrative activities in a computer system. Each administrative activity in the plurality includes an action...
US20170054743 DETECTING NETWORK TRAFFIC CONTENT  
A device for detecting network traffic content is provided. The device includes a memory configured for storing one or more signatures, each of the one or more signatures associated with content...
US20170054742 INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND COMPUTER READABLE MEDIUM  
A receiving unit (111) receives log information of a data communication that has occurred in a data processing system (106), as communication log information. An attacked terminal log information...
US20170054741 ABATING PADDING ORACLE ATTACKS  
The present disclosure is directed toward systems and methods for identifying and abating padding oracle attacks. One or more embodiments described herein identify and abate padding oracle attacks...
US20170054740 AERONAUTICAL MESSAGE MONITOR  
A system includes a transmitting line replaceable unit (TLRU) configured to receive messages including instructions for avionics receiving line replaceable units (RLRUs). The system further...
US20170054739 High-Yielding Detection of Remote Abusive Content  
Methods, systems, and computer program products for providing high-yielding detection of remote abusive content are disclosed. A computer-implemented method may include generating a graphical user...
US20170054738 DATA MINING ALGORITHMS ADOPTED FOR TRUSTED EXECUTION ENVIRONMENT  
Distributed systems for protecting networked computer assets from compromise are disclosed. The distributed system includes one or more enterprise event sources, such as endpoint(s). The system...
US20170054737 MEDIA CONTENT SYSTEM UTILIZING USER SPONSORED DATA  
A system may receive a request to access user sponsored media content (“media content”), the request including a digital token (“token”), the media content being associated with a user sponsored...
US20170054736 SYSTEM AND METHOD FOR VERIFICATION LINEAGE TRACKING OF DATA SETS  
Whenever users receive or transfer a copy of any of a set of documents, prior verification of the document is enforced by an administrative system, which associates verification metadata with the...
US20170054735 Augmented and Virtual Reality Based Process Oversight  
The present disclosure involves systems and computer implemented methods for generating a virtual or augmented reality-based oversight system of business processes at a location remote from where...
US20170054734 WORK DESK USAGE MONITORING AND TRACKING SYSTEM AND METHOD EMPLOYING USB DONGLE  
The present disclosure relates to a system for tracking usage, as well as type of usage, location and occupancy, of at least one furniture component, for example a desk, in one or more facilities....
US20170054733 METHOD AND SYSTEM FOR PROVIDING SECURE POINT-TO-POINT COMMUNICATION  
A communication system for providing secure point-to-point communication comprising a communication network, a first client device and a second client device configured to communicate with each...
US20170054732 METHODS, MEDIA, AND SYSTEMS FOR SECURING COMMUNICATIONS BETWEEN A FIRST NODE AND A SECOND NODE  
Methods, media, and systems for securing communications between a first node and a second node are provided. In some embodiments, methods for securing communication between a first node and a...
US20170054731 INDIRECT AUTHENTICATION  
Techniques are provided for or granting authorization to restricted content on a display device from an authorizing device. In one embodiment, the display device may operate in a display triode...
US20170054730 SYSTEM AND METHOD FOR APPLICATION USAGE CONTROLS THROUGH POLICY ENFORCEMENT  
A method includes a particular user application, without operating system kernel access, performing the operations of: identifying a set of applications that a user has permission to access,...
US20170054729 Identity Management System  
A identity management system is provided for managing documents within an computer system. The computer system receives a document within an authentication context of a user. The computer system...
US20170054728 SYSTEM, METHOD, AND SOFTWARE FOR PROVIDING ACCESS CONTROL ENFORCEMENT CAPABILITIES IN CLOUD COMPUTING SYSTEMS  
According to one embodiment, a system comprises one or more processors coupled to a memory. The one or more processors when executing logic encoded in the memory provide a topology manager. The...
US20170054727 INFORMATION PROCESSING APPARATUS, RECORDING MEDIUM, AND COMMUNICATION CONTROLLING METHOD  
An information processing apparatus for connection to a first network and to a second network is disclosed. The information processing apparatus includes a storage unit storing device information...