AcclaimIP-ad

Match Document Document Title
US20150271228 System and Method for Delivering Adaptively Multi-Media Content Through a Network  
A multimedia multimodal dynamic user interface for mobile/wireless devices. With this mechanism, service providers can offer rich user oriented applications and they have the freedom to explore...
US20150271227 Audio Content Playback Management  
An example implementation involves a playback device receiving a request to add continuous automated streaming audio content to a playback queue, the request indicating a playback start time, and...
US20150271226 TRANSPORT ACCELERATOR IMPLEMENTING A MULTIPLE INTERFACE ARCHITECTURE  
Transport accelerator (TA) systems and methods for accelerating delivery of content to a user agent (UA) of the client device are provided according to embodiments of the present disclosure....
US20150271225 TRANSPORT ACCELERATOR IMPLEMENTING EXTENDED TRANSMISSION CONTROL FUNCTIONALITY  
Transport accelerator (TA) systems and methods for accelerating delivery of content to a user agent (UA) of a client device are provided according to embodiments of the present disclosure....
US20150271224 TRANSPORT ACCELERATOR INPLEMENTING EXTENDED TRANSMISSION CONTROL FUNCTIONALITY  
Transport accelerator (TA) systems and methods for accelerating delivery of content to a user agent (UA) of a client device are provided according to embodiments of the present disclosure....
US20150271223 METHOD AND APPARATUS FOR MULTI-EXPERIENCE METADATA TRANSLATION OF MEDIA CONTENT WITH METADATA  
A method or apparatus that incorporates teachings of the present disclosure may include, for example, a method for retrieving a plurality of sensory information from an environment of a device. A...
US20150271222 SOCIAL NETWORKING SYSTEM  
A matching network system including communication devices, servers and software which enables the provisioning of services and execution of transactions based on a plurality of private and public...
US20150271221 SELECTION TRIGGERED COLLABORATIVE CAX EDITING  
A method for collaborative CAx editing includes presenting at least a portion of a model of an engineering object to a user, wherein the model of the engineering object comprises a geometric...
US20150271220 Method and Device for Managing a Conference  
A method and communication system are disclosed for conducting a conference among conference participants connected by a communication system. This system has at least one conference server and at...
US20150271219 SYSTEM AND METHOD FOR POST RESONANCE  
A computer-implemented method, computer program product, and computing system is provided for creating resonance around posts to a collaboration session by important individuals. In an...
US20150271218 All-Electronic Ecosystems for Design and Collaboration  
This invention presents Ecosystems addressing limited capabilities for interactive team design, amidst thrust for improved productivity, enhanced creativity and higher quality. The Ecosystem for...
US20150271217 INFORMATION TERMINAL APPARATUS USED IN CONFERENCE AND CONFERENCE SYSTEM  
In accordance with one embodiment, an information terminal apparatus comprises a storage section, a network interface and a control section. The storage section stores data to be used in a...
US20150271216 Apparatus, Systems and Methods for Providing Telephony Services to Multiple Devices  
Described are call handling methods performed by a carrier network or client stations. A method performed by a carrier network includes designating rules for call handling for an account,...
US20150271215 METHOD FOR SUPPORTING CIRCUIT SWITCHED INTERWORKING  
A method includes receiving internet protocol (IP) multimedia core network subsystem (IMS) session content that includes voice call content in IMS domain and multimedia content in IMS domain;...
US20150271214 TERMINAL MANAGEMENT SYSTEM, COMMUNICATION SYSTEM, TERMINAL REGISTRATION CONTROLLING METHOD, AND RECORDING MEDIUM STORING TERMINAL REGISTRATION CONTROLLING PROGRAM  
A terminal management system transmits identification information for identifying a first communication terminal to one or more of a plurality of communication terminals, in response to receiving...
US20150271213 Enabling Quality Voice Communications From Web Page Call Control  
A system and method of bypassing the regulated portion of the Public Switching Telephone Network (PSTN) to establish carrier-grade voice transmissions and/or IP data communications between an...
US20150271212 RELAY DEVICE, RELAY METHOD AND INFORMATION PROCESSING SYSTEM  
Provided is a relay device including a communication control unit configured to control communication with an external device. The communication control unit maintains a session with an...
US20150271211 RIGHTS MANAGEMENT POLICIES WITH NONTRADITIONAL RIGHTS CONTROL  
A method for managing rights management policies for user access and use of digital documents with nontraditional rights control in addition to traditional rights management services (RMS) based...
US20150271210 Monitoring and Controlling Electronic Activity Using Third Party Rule Submission and Validation  
Concepts and technologies are disclosed herein for monitoring and controlling electronic activity. A policy service can be called for policies for controlling electronic activity occurring at one...
US20150271209 SOFT WEBSITE BLOCK OVERRIDE  
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for overriding a soft website block. One of the methods includes receiving, from a user device, a...
US20150271208 MANAGEMENT AND DISTRIBUTION OF SECURITY POLICIES IN A COMMUNICATION SYSTEM  
A system and method are provided for having a device in a communication system update an operational policy for the device by encoding a policy update in a virtual machine language used by a...
US20150271207 SYSTEMS AND METHODS FOR PROVIDING TARGETED DATA LOSS PREVENTION ON UNMANAGED COMPUTING DEVICES  
A computer-implemented method for providing targeted data loss prevention on unmanaged computing devices may include (1) identifying a data loss prevention policy that defines permissible data...
US20150271206 SECURE TRUST-SCORED DISTRIBUTED MULTIMEDIA COLLABORATION SESSION  
A device may receive a request for a collaboration session. The device may authenticate a user for the collaboration session. The device may generate a trust-score associated with the...
US20150271205 METHOD, SYSTEM, AND LOGIC FOR IN-BAND EXCHANGE OF META-INFORMATION  
In an embodiment, a method is provided for enabling in-band data exchange between networks. The method can comprise receiving, by a first enveloping proxy located in the first network, at least...
US20150271204 METHOD, SYSTEM, AND LOGIC FOR IN-BAND EXCHANGE OF META-INFORMATION  
In an embodiment, a method is provided for enabling in-band data exchange between networks. The method can comprise receiving, by a first enveloping proxy located in the first network, at least...
US20150271203 METHOD, SYSTEM, AND LOGIC FOR IN-BAND EXCHANGE OF META-INFORMATION  
In an embodiment, a method is provided for enabling in-band data exchange between networks. The method can comprise receiving, by a first enveloping proxy located in the first network, at least...
US20150271202 METHOD, DEVICE, AND SYSTEM FOR DETECTING LINK LAYER HIJACKING, USER EQUIPMENT, AND ANALYZING SERVER  
A method for detecting a link layer hijacking includes: requesting web page information to a HTTP server; receiving from the HTTP server the web page information and a monitoring script preset on...
US20150271201 DEVICE FOR DETECTION AND PREVENTION OF AN ATTACK ON A VEHICLE  
A new device for detection and prevention of an attack on a vehicle via its communication channels, having: an input-unit configured to collect real-time and/or offline data from various sources...
US20150271200 TECHNIQUES TO PROVIDE NETWORK SECURITY THROUGH JUST-IN-TIME PROVISIONED ACCOUNTS  
Techniques to contain lateral movement of attackers through just-in-time (JIT) provisioned accounts comprising an account management component to receive a request from a first account via a...
US20150271199 Generating Accurate Preemptive Security Device Policy Tuning Recommendations  
An approach is provided for determining a likelihood of an attack on a first computer system of a first business. Characteristics of the first business and a second business are determined. The...
US20150271198 COMPARING SOURCE AND SINK VALUES IN SECURITY ANALYSIS  
Techniques for determining differences between source and sink values are described herein. The techniques may include identifying a data-flow source statement within a computer program, and...
US20150271197 PROVIDING MULTI-LEVEL PASSWORD AND PHISHING PROTECTION  
Embodiments described herein are directed to preventing development of insecure web pages, preventing deployment of insecure web pages and to preventing access to insecure web pages. In one...
US20150271196 COMPARING SOURCE AND SINK VALUES IN SECURITY ANALYSIS  
Techniques for determining differences between source and sink values are described herein. The techniques may include identifying a data-flow source statement within a computer program, and...
US20150271195 METHOD AND SYSTEM FOR PROVIDING TEMPORARY SECURE ACCESS ENABLED VIRTUAL ASSETS  
Temporary secure access enabled virtual assets are provided that include a temporary secure access communications door. Upon receipt of temporary access authentication data from a source outside...
US20150271194 Fake Base Station Detection with Core Network Support  
The present invention provides methods, apparatuses and computer program product relating to fake base station detection with core network support. The present invention includes receiving, at a...
US20150271193 INTRUSION MANAGEMENT  
A computer implemented method for managing a network intrusion is disclosed. The method can include monitoring, by an intrusion management system, a set of nodes of a computer network. The method...
US20150271192 SYSTEM AND METHOD FOR CONTINUOUS DEVICE PROFILING  
A system and method for monitoring, modeling and assessing networked devices. A continuous device profiling (CDP) system builds and maintains device-specific and network-specific behavioral models...
US20150271191 Embedded Anti-Virus Scanner for a Network Adapter  
A network adapter system and associated method are provided. The network adapter system includes a processor positioned on a network adapter coupled between a computer and a network. Such...
US20150271190 Method And Apparatus Enabling Browsers To Perform Security Scan Of Devices  
A method and an apparatus enabling browsers to perform security scan of devices is described. The method includes receiving a device scan request triggered when a device scan function in a browser...
US20150271189 APPARATUS AND METHOD FOR PREVENTING A VIRUS FILE FROM ILLEGALLY MANIPULATING A DEVICE  
A scanning module scans files in a device and generates a signal when a virus file is detected. A clearing module clears the virus file based on the signal. A monitoring module judges whether an...
US20150271188 CLIENT/SERVER SECURITY BY AN INTERMEDIARY EXECUTING INSTRUCTIONS RECEIVED FROM A SERVER AND RENDERING CLIENT APPLICATION INSTRUCTIONS  
In an embodiment, a method comprises intercepting, from a server computer, a first set of instructions that define a user interface; executing, using a headless browser, the first set of...
US20150271187 SYSTEMS AND METHODS FOR PROVIDING SECURITY SERVICES DURING POWER MANAGEMENT MODE  
Systems and methods for providing security services during a power management mode are disclosed. In some embodiments, a method comprises detecting with a mobile security system a wake event on a...
US20150271186 METHOD, CLIENT TERMINAL DEVICE AND SYSTEM FOR VERIFYING PAGE INFORMATION  
Examples of the present disclosure provide a method, client terminal device and system for verifying page information, the method includes: verification decryption information of real verification...
US20150271185 Method and device for operating a vehicle application  
In a method, each received vehicle-to-X message is at least partly forwarded to at least one application of a vehicle depending on specified information of the vehicle-to-X message (N), the...
US20150271184 MULTI-MODE COMPUTER WITH SELECTOR  
There is disclosed a computing apparatus including a first context within which first processing activity may be performed and a second context within which second processing activity may be...
US20150271183 VIRTUAL CURRENCY SYSTEM  
Methods for use with computing devices implementing a plurality of nodes of a ring-shaped overlay network. A joining node implemented by a joining computing device requests a connection with a...
US20150271182 Cross Access Login Controller  
Systems and methods here may be used for authorizing network access including using a flow controller server in communication with a first gateway associated with a first network, a second gateway...
US20150271181 System Utilizing a Secure Element  
A device includes a receiver configured to receive a request to perform a function. A secure element connected with the receiver, the secure element to verify the request to perform the function,...
US20150271180 PROTECTION OF USER DATA IN HOSTED APPLICATION ENVIRONMENTS  
A method of converting an original application into a cloud-hosted application includes splitting the original application into a plurality of application components along security relevant...
US20150271179 SYSTEM AND METHOD FOR PARTIAL URL SIGNING WITH APPLICATIONS TO DYNAMIC ADAPTIVE STREAMING  
A partial URL signing scheme for controlling access to content provided in adaptive streaming such as DASH is disclosed herein. Partial URL signing and verifying algorithms act as extensions to...