AcclaimIP-ad

Match Document Document Title
US20150288732 UNICAST ABR STREAMING  
A method of delivering unicast adaptive bitrate (UABR) streaming includes receiving, at a content delivery network (CDN) node, a request for a video asset to be streamed at a selected bitrate;...
US20150288731 Content switching method and apparatus  
Provided are a content switching method and device. The method includes: acquired media content data is uploaded to a server (S102); and media playing resource information, which is corresponded...
US20150288730 Efficient On-Demand Generation of ABR Manifests  
In one embodiment of the present invention, an HLS transcoder inserts a plurality of encoder boundary points (EBPs) into an HLS formatted content item, a processor places hints about locations of...
US20150288729 METHOD AND SYSTEM FOR PLAYING VIDEO MEDIA FILE OF VIDEO SHARING WEBSITE IN AREA NETWORK  
A video media playing method for playing video media files of a video sharing website in an area network is provided. Firstly, a digital media server logins into the video sharing website....
US20150288728 INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING APPARATUS, TERMINAL APPARATUS, AND PROGRAM  
An information processing system including terminal apparatuses and an information processing apparatus, wherein the information processing apparatus includes a first information memory unit...
US20150288727 SOFTPHONE OVER DESKTOP-AS-A-SERVICE (DAAS)  
Techniques for delivering telephone access are provided. In one embodiment, a server system can determine a telephone number assigned to a user operating a client device. The server system can...
US20150288726 METHOD OF CONVEYING A LOCATION INFORMATION REPRESENTING A PHYSICAL LOCATION OF A FIRST COMMUNICATION DEVICE, A COMPUTER PROGRAM PRODUCT FOR EXECUTING THE METHOD, AND THE FIRST COMMUNICATION DEVICE FOR CONVEYING THE LOCATION INFORMATION  
A method of conveying a location information (2) representing a physical location of a first communication device (D) from the first communication device (D) to a server (S) comprises sending a...
US20150288725 Systems and Methods For Digital Forensic Triage  
In one embodiment, a method for forensic triage may include coupling, communicatively, a computer and a mobile device. The computer can be booted with machine readable instructions stored on the...
US20150288724 Intercepting Device-To-Device Communication  
Mobile network (MN) for mobile devices (UE1, UE2), the mobile devices being arranged for exchanging communication data via the mobile network or, by selection, via a Device-To-Device [D2D]...
US20150288723 PROCESSING INFORMATION BASED ON POLICY INFORMATION OF A TARGET USER  
An information processing apparatus includes a policy acquisition unit configured to acquire a policy on disclosure of information on a target user; a collection unit configured to collect...
US20150288722 SYSTEMS AND METHODS FOR IMPLEMENTING SECURITY  
Systems and method are provided in accordance with one or more processes that run within an operating system, in which a first process of the one or more processes is an agent that encodes...
US20150288721 SYSTEM FOR PROVIDING DNS-BASED CONTROL OF INDIVIDUAL DEVICES  
A device control system is associated with individual devices connected through a network control point to a gateway and thereby to the Internet. The gateway inserts an EDNS0 pseudo resource...
US20150288720 Malicious Mobile Code Runtime Monitoring System and Methods  
Protection systems and methods provide for protecting one or more personal computers (“PCs”) and/or other intermittently or persistently network accessible devices or processes from undesirable or...
US20150288719 Portable Proxy For Security Management And Privacy Protection And Method Of Use  
A portable proxy for security management and privacy protection and methods of use are provided. The proxy establishes a connection to a user device. The proxy also establishes a secure connection...
US20150288718 POLICY PARTIAL RESULTS  
Technology for policies with reduced associated costs is disclosed. A policy may include an ordered rule set. When evaluated, the highest priority rule in the order that does not skip may control...
US20150288717 AUTOMATED SPEAR PHISHING SYSTEM  
A system, method and program product for spear phishing. As system is disclosed having a system for automatically constructing a background story using computational logic that includes true...
US20150288716 Fraud Prevention Via Distinctive URL Display  
In some embodiments, techniques for displaying a URL comprise receiving a URL; normalizing the URL, wherein normalizing the URL includes standardizing an encoding of a character contained in the...
US20150288715 Systems And Methods For Protecting Websites From Botnet Attacks  
A computer-implemented method for preventing an unauthorized login attempt includes the steps of: (i) receiving, at a central server in communication with a plurality of servers in a distributed...
US20150288714 Classifier Bypass Based On Message Sender Trust and Verification  
In some embodiments, techniques for computer security comprise receiving an email message; determining a sender of the email message; determining whether the sender of the email message is...
US20150288713 Systems And Methods For Managing Information Associated With Legal, Compliance And Regulatory Risk  
Some embodiments include a system, method, apparatus and means for managing information associated with risk. In some embodiments, information associated with risk is collected, analyzed, stored,...
US20150288712 THREAT MODELING AND ANALYSIS  
A system is provided for modeling and analysis of cybersecurity threats may include a data flow diagram (DFD) creator, threat indicator and threat analyzer. The DFD creator may identify elements...
US20150288711 NETWORK ANALYSIS APPARATUS AND METHOD  
A system, method, and computer-readable storage medium configured to collect, parse and monitor Domain Name System information from a network and black hole identified suspect or bad FQDNs and...
US20150288710 APPLICATION-AWARE SIGNATURE-BASED INTRUSION DETECTION FOR VIRTUALIZED DATA CENTERS  
A method includes discovering identities of one or more applications that run on one or more Virtual Machines (VMs) at a given time. A set of signatures, which characterize hostile traffic that is...
US20150288709 Using Trust Profiles for Network Breach Detection  
Actions of servers and other network devices within a network are monitored to detect whether the servers and network devices are performing tasks, using protocols, and communicating through ports...
US20150288708 METHOD AND SYSTEM FOR PROVIDING SECURITY AWARE APPLICATIONS  
Instructions for monitoring and detecting one or more trigger events in assets used to implement an application are generated. Instructions for implementing at least one responsive action...
US20150288707 Virus Detecting Method and Device  
A virus detecting method and device are provided, where the method includes that the virus detecting device receives a network data stream carrying a portable execute (PE) file; calculates first...
US20150288706 SYSTEM AND METHOD FOR MALWARE DETECTION USING HASHING TECHNIQUES  
A system and method in accordance with example embodiments may include systems and methods for generating and transforming data presentation. The method may include receiving, using a processor, a...
US20150288705 SYSTEM, METHOD AND APPARATUS TO VISUALLY CONFIGURE AN ANALYSIS OF A PROGRAM  
A method extracts views from an application program, where at least some extracted views include at least one view component, and presenting the extracted views to a user. In response to the user...
US20150288704 METHODS AND NODES FOR VERIFICATION OF DATA  
A first data handling node (304) is configured to verify data received in a data distribution network with multiple data handling nodes forming a distribution path of a network topology, by...
US20150288703 DATA POSSESSION VERIFICATION SYSTEM AND METHOD  
In the data possession verification system and method for verifying whether a server device possesses the verification target data deposited to the server device by the user terminal, the user...
US20150288702 SYSTEMS AND METHODS FOR PROVIDING INFORMATION-TECHNOLOGY ASSETS IN AN OPEN ENVIRONMENT  
The disclosed embodiments include methods and systems for providing information-technology (IT) assets in an open environment. In certain aspects, an IT system may provide an online portal that...
US20150288701 INVITATION LINKS WITH ENHANCED PROTECTION  
A method and system for providing invitation links with enhanced protection are presented. The method includes sending, to at least one invitee, at least one invitation link for accessing the...
US20150288700 PHASED BUCKET PRE-FETCH IN A NETWORK PROCESSOR  
A packet processor provides for rule matching of packets in a network architecture. The packet processor includes a lookup cluster complex having a number of lookup engines and respective on-chip...
US20150288699 Method and Device for Controlling an Internet Access  
Disclosed are a method and a device for controlling internet access. The method comprises: an internet range allowed to be accessed by a monitored user using a mobile terminal is acquired; it is...
US20150288698 EVOLVING RULE BASED CONTACT EXCHANGE  
Methods and systems are described for managing a user's contact data which use evolving sequential sets of rules where the applicability of each set depends upon adherence or proper application of...
US20150288697 SECURE FRONT-END INTERFACE  
A secure front-end interface for a PLC, RTU or similar device is disclosed. A first server is coupled to the PLC via a communications link and is configured to receive status information from the...
US20150288696 SYSTEMS AND METHODS FOR AUTHENTICATING NODES  
To authenticate nodes, a connection between a first node and a second node may be identified. A first set of nodes having connections with the first node and assigned to a first plurality of...
US20150288695 APPARATUS AND METHOD OF PROVIDING SECURITY TO CLOUD DATA TO PREVENT UNAUTHORIZED ACCESS  
A method and apparatus for providing security of an electronic apparatus are provided. The method includes identifying an environment of a client to be provided with a cloud service from at least...
US20150288694 METHOD AND SYSTEM FOR SECURE AUTHENTICATION  
A method and system for accessing a resource associated with a resource control entity that includes receiving, by a ledger, a request, corresponding to a user, to access the resource; obtaining,...
US20150288693 VALIDATION OF A LOCATION RESOURCE BASED ON RECIPIENT ACCESS  
Aspects of the present disclosure relate to a method, a system, and a computer program product for validating a location resource, e.g., a hyperlink, embedded in a message for one or more...
US20150288692 METHOD AND SYSTEM FOR DIGITAL RIGHTS ENFORCEMENT  
There is provided a method and system for digital rights enforcement. The method includes: determining digital content requested by a user via a selected user device; determining digital rights...
US20150288691 MULTI STAGE AGGREGATION USING DIGEST ORDER AFTER A FIRST STAGE OF AGGREGATION  
According to embodiments of the present invention, methods, systems and computer-readable media are presented for processing a database query. The query may specify an arrangement for resulting...
US20150288690 TWO FACTOR AUTHENTICATION OF ICR TRANSPORT AND PAYLOAD FOR INTERCHASSIS REDUNDANCY  
Exemplary methods for performing authentication by a first network device of an inter-chassis redundancy (ICR) system, the ICR system comprising the first network device communicatively coupled to...
US20150288689 CLOUD-BASED SYSTEM FOR READING OF DECODABLE INDICIA  
A data decoding system can comprise one or more computers communicatively coupled to a network. The computers can execute at least one decoding process. The decoding process can be configured,...
US20150288688 BIO LEASH FOR USER AUTHENTICATION  
Systems and methods for electronically leashing a user to a mobile device. A user is authenticated on the mobile device and initial sensor data (e.g., radio signal readings, accelerometer...
US20150288687 SYSTEMS AND METHODS FOR SENSOR BASED AUTHENTICATION IN WEARABLE DEVICES  
Systems and methods are disclosed for providing sensor based authentication of a user's identification and may be used to control access. In this manner, a user's identity may be used to control...
US20150288686 Method for Managing Identifiers in an Integrated Circuit Board and Corresponding Integrated Circuit Board  
A method of managing file identifiers in a portable data medium having an integrated circuit by means of a table of identifiers associating a given reference with each of the identifiers of a...
US20150288685 METHOD, SYSTEM AND TERMINAL FOR ENCRYPTING/DECRYPTING APPLICATION PROGRAM ON COMMUNICATION TERMINAL  
A method, system and terminal for encrypting and decrypting an application program on a communication terminal are disclosed, including the communication terminal using an identification number of...
US20150288684 DEVICE ASSEMBLY FOR CARRYING OUT OR ENABLING AN ELECTRONIC SERVICE AND A METHOD FOR SECURELY INPUTTING AUTHORIZATION DATA  
A device assembly for carrying out or enabling an electronic service includes a mobile device on which an operating system runs and which includes a network interface for connection to a network,...
US20150288683 METHOD, DEVICE, AND SYSTEM FOR AUTHENTICATION  
The present invention provides a method, a device, and a system for authentication, which can avoid the problem of password disclosure caused by that authentication password information is...