Match Document Document Title
US20160205161 METHOD AND APPARATUS FOR CONTENT DISTRIBUTION OVER A NETWORK  
A method that incorporates teachings of the subject disclosure may include, for example performing, by a wireless communication device comprising a processor, wireless telephony communications via...
US20160205160 MULTIFUSION OF A STREAM OPERATOR IN A STREAMING APPLICATION  
Embodiments of the present disclosure include a method, a system, and a computer program product for fusing a stream operator into more than one processing element within a streaming application....
US20160205159 BROADCAST RESPONSE SYSTEM  
A broadcast response system provides, e.g., a radio broadcast listener with the ability to obtain media content such as music or speech while listening to the radio. The user can respond to items...
US20160205158 SESSION DESCRIPTION INFORMATION FOR OVER-THE-AIR BROADCAST MEDIA DATA  
An over-the-air (OTA) broadcast middleware unit is configured to receive aggregated session description data for a plurality of sessions, wherein each of the sessions transports media data related...
US20160205157 BROADCASTING IN COMMUNICATION NETWORKS  
In one embodiment, a first node is adapted for communication with a plurality of additional nodes of a communication network, such as a Delaunay Triangulation (DT) network. The first node is...
US20160205156 Method for the Processing of a Multimedia Stream, Corresponding Device and Computer Program  
A method is provided for processing multimedia streams between a platform for digital distribution of interactive applications and a customer terminal, connected through a communications network...
US20160205155 METHOD FOR TRANSFERRING CONTROL OF A CONFERENCE CALL  
A method for transferring control of an existing multi-participant conversation in which at least two communication terminals are connected to each other through a data connection to a conference...
US20160205154 PROVIDING A MEETING LINK TO A PARTICIPANT WHO HAS LEFT A LOCATION OF THE MEETING  
In one embodiment, a method includes identifying a first device as being located at a first physical location associated with a meeting, and determining when the first device is no longer located...
US20160205152 REMOTE CALLING METHOD AND APPARATUS  
Disclosed are a remote calling method and terminal, wherein the method includes: a service end registering released services to a register center; a client end sending a service subscription...
US20160205151 METHOD AND APPARATUS FOR ENABLING COMMUNICATIONS BETWEEN USERS  
A method and device are provided for creating and utilizing a database which enables ascribing a plurality of communication addresses to each of a plurality of users' entries comprised therein,...
US20160205150 METHOD AND APPARATUS FOR DELIVERY OF DATA-BASED/VOICE SERVICES OVER PICONETS AND WIRELESS LANs (WLANs) COUPLED TO 3GPP DEVICES INCLUDING PROTOCOL ARCHITECTURE AND INFORMATION ELEMENTS RELATING TO SHORT MESSAGE SERVICE (SMS) OVER WLANs  
Method and apparatus delivering voice/data services within a piconet operating over a limited range or over a WLAN communicating with 3GPP devices by reformatting data into IP format before...
US20160205149 TECHNIQUES FOR DEVICE INDEPENDENT SESSION MIGRATION  
Techniques for device independent session migration are presented. A secure mechanism is presented for a target device to receive a current authenticated communication session from an original...
US20160205148 METHOD AND DEVICE FOR PERFORMING AUDIO/VIDEO STREAMING IN WIRELESS COMMUNICATION SYSTEM  
A method for performing Audio/Video (A/V) streaming between at least one source device and at least one sink device in a wireless communication system, the method performed by a source device...
US20160205147 Session Information Recording Method and Recording Server  
A session information recording method, where the method is executed by a recording server, the recording server is connected to a unified communications system and configured to record a media...
US20160205146 SYSTEM AND METHOD FOR SCHEDULING A VIDEO CONFERENCE IN AN AUTONOMOUS VEHICLE  
A system, a multi-user scheduling unit comprised in the system, and corresponding methods are described for scheduling a video conference call for at least one autonomous vehicle. The system...
US20160205145 PEER-TO-PEER INTERNET PROTOCOL TELEPHONE SYSTEM WITH SYSTEM-WIDE CONFIGURATION DATA  
Various embodiments of the invention provide a Peer-to-Peer (P2P, Internet Protocol (IP) telephone system. The telephone system includes a plurality of terminals coupled together via an IP...
US20160205144 METHOD OF CONTROLLING SESSION INITIATION PROTOCOL SESSIONS WITH STATE CHARTS  
A method involves acts of receiving a Session Initiation Protocol (SIP) request, initiating by a computing device having a processor, a SIP session as a result of receiving the SIP request,...
US20160205143 ADAPTIVE NETWORK SECURITY POLICIES  
A method and system for dynamic identification of network security policies are provided. The method comprises inspecting network traffic using a number of network inspection technologies;...
US20160205142 SECURITY-CONNECTED FRAMEWORK  
In an example, a security-connected platform is provided on a data exchange layer (DXL), which provides messaging on a publish-subscribe model. The DXL provides a plurality of DXL endpoints...
US20160205141 POLICY ENFORCEMENT BY END USER REVIEW  
Embodiments are disclosed that relate to enforcement of user policies in a multi-user interactive computing environment by end user review. For example, one disclosed embodiment provides, on a...
US20160205140 Distributed Storage Processing Statement Interception and Modification  
A non-transitory computer readable storage medium has instructions executed by a processor to intercept a query statement at a master machine. The query statement is an instruction from a client...
US20160205139 SECURED MOBILE COMMUNICATIONS DEVICE  
A method is provided for securing a mobile communications device to a level required for accessing a network, for example a secured enterprise network, by means of a public network such as the...
US20160205138 REAL-TIME POLICY DISTRIBUTION  
In an example, there is disclosed a method and system for real-time policy and task distribution to endpoints over a data exchange layer. According to one embodiment, a persistent point-to-point...
US20160205137 VISUALIZATION AND ANALYSIS OF COMPLEX SECURITY INFORMATION  
In one example, a visualization data engine may be responsible for rendering the visualization data obtained from the backend data server and providing the user interface (UI) necessary to allow...
US20160205136 DATA COLLECTION  
A method includes accessing user data corresponding to a user profile. The method may also include accessing at least one privacy setting corresponding to the user profile. The method may further...
US20160205135 METHOD AND SYSTEM TO ACTIVELY DEFEND NETWORK INFRASTRUCTURE  
Disclosed is an invention related to a system and device for actively defending a network infrastructure by implementing certain features that are attributed with lower performance cost and...
US20160205134 ISP BLACKLIST FEED  
Embodiments are provided for an actionable blacklist of DDoS offenders and ISPs associated offenders. The system can collect real-time attack data and perform real-time analysis, which can be fed...
US20160205133 TRANSPARENT DENIAL OF SERVICE PROTECTION  
Embodiments are directed toward transparent denial of service protection. Instruction set information that references a seed file may be communicated to a client computer. A network packet key may...
US20160205132 METHODS AND SYSTEMS FOR PROVIDING COMPREHENSIVE CYBERSECURITY PROTECTION USING AN OPEN APPLICATION PROGRAMMING INTERFACE BASED PLATFORM SOLUTION  
Methods of providing cyber-security services to a plurality of customers include providing a platform that includes a software program that is configured to run on a processor to implement a user...
US20160205131 Method and Apparatus for Transmitting Information  
A method for transmitting information from a first security module to a second security module involves a system comprising the first and the second security modules. An anti-collision phase...
US20160205130 METHOD AND SYSTEM FOR DESTROYING BROWSER-BASED MEMORY CORRUPTION VULNERABILITIES  
Client-less methods and systems destroy/break the predictive layout of, for example, a client computer memory. The methods and systems operate by injecting a library that manipulates the client...
US20160205129 NETWORK APPLIANCE FOR VULNERABILITY ASSESSMENT AUDITING OVER MULTIPLE NETWORKS  
An apparatus, system, and method are directed towards enabling auditing of network vulnerabilities from multiple network vantage points virtually simultaneously. Multiple network vantage points...
US20160205128 ADAPTIVE SECURITY INDICATOR FOR WIRELESS DEVICES  
Methods and apparatus, including computer program products, are provided for adaptive security. In one aspect there is provided a method. The method may include receiving, at a user equipment, at...
US20160205127 DETERMINING A RISK LEVEL FOR SERVER HEALTH CHECK PROCESSING  
Approaches are provided for determining a risk level for server health check processing. An approach includes creating statistical process control analyses for each of one or more servers on a...
US20160205126 INFORMATION TECHNOLOGY SECURITY ASSESSMENT SYSTEM  
A method and system for creating a composite security rating from security characterization data of a third party computer system. The security characterization data is derived from externally...
US20160205125 SYSTEM AND METHOD FOR ANALYZING MOBILE CYBER INCIDENT  
A system and method for analyzing mobile cyber incidents that checks whether codes attacking the weaknesses of mobile users are inserted into collected URLs and whether applications are downloaded...
US20160205124 SYSTEM AND METHOD FOR DETECTING MOBILE CYBER INCIDENT  
A system for detecting mobile cyber incidents includes: a mobile incident collection server adapted to collect text messages sent through communication company servers to produce text message...
US20160205123 SYSTEM, APPARATUS, AND METHOD FOR DETECTING HOME ANOMALIES  
An anomaly detection system includes appliances connected to a network and circuitry configured to receive statuses of the appliances. Patterns of use are determined for the appliances including...
US20160205122 System and Method for Cyber Security Analysis and Human Behavior Prediction  
An improved method for analyzing computer network security has been developed. The method first establishes multiple nodes, where each node represents an actor, an event, a condition, or an...
US20160205121 MANAGING DOMAIN NAME ABUSE  
A method for providing an abuse sentry service for responding to domain name abuse is described. The method comprises the following steps. A plurality of disparate abuse feeds is received, each...
US20160205120 VERTICAL THREAT ANALYTICS FOR DDOS ATTACKS  
Embodiments are provided to allow institutions and individuals the ability to subscribe to notifications regarding DDoS attacks on certain types of institutions, e.g., institutions that fall into...
US20160205119 USER DETERMINATION DEVICE AND METHOD  
A user determination device includes a processor that executes a procedure. The procedure includes causing a simulated abnormality to occur on a terminal, acquiring operation information...
US20160205118 CYBER BLACK BOX SYSTEM AND METHOD THEREOF  
Provided is a cyber black box system. The cyber black box system includes a data collector configured to collect entire packet data, flow data, and a portable executable (PE) file from monitored...
US20160205117 METHOD AND SYSTEM FOR REFLECTOMETRY BASED COMMUNICATION NETWORK MONITORING, INTRUSION DETECTION, AND MESSAGE AUTHENTICATION  
Systems and methods are provided for monitoring and detecting intrusions and authenticating messages on a communication network of a vehicle. A plurality of signals transmitted over communications...
US20160205116 METHOD AND SYSTEM FOR VIRTUAL SECURITY ISOLATION  
A virtual security isolation method includes monitoring security status information of a plurality of virtual machines in a virtual LAN; determining whether the security status information has...
US20160205115 MANAGED SOFTWARE REMEDIATION  
According to one example, a system and method are disclosed for malware and grayware remediation. For example, the system is operable to identify applications that have some legitimate behavior...
US20160205114 METHOD AND APPARATUS FOR PRIVACY-ENHANCED EVIDENCE EVALUATION  
A method for privacy-enhanced evidence evaluation may comprise: sending a request for pre-evaluation information regarding evidence data of a target object to a first network entity from a...
US20160205113 Method For Sharing A Media Collection In A Network Environment  
In one aspect, the present disclosure provides for the accessing and playing of media files having differing associated rights such as non-DRM media files, purchased and downloaded media files,...
US20160205112 SYSTEM AND METHOD FOR TRANSACTION SECURITY ENHANCEMENT  
A detection is made that a first entity residing on a mobile device is requesting authentication. The first entity resides in a first portion of the mobile device. A determination is made that the...
US20160205111 SHAREABLE CONTENT ITEM LINKS WITH USE RESTRICTIONS  
Shareable content item links with use restrictions. In one embodiment, for example, a method comprises: receiving, from a client computing device used by an authenticated link submitter, a first...