Match Document Document Title
US20150319207 HIGH PERFORMANCE DATA STREAMING  
Methods, systems and computer program products for high performance data streaming are provided. A computer-implemented method may include receiving a data mapping describing an association...
US20150319206 SHARING A MEDIA STATION  
Disclosed are systems, methods, and non-transitory computer-readable storage media for sharing a media station. A user can share a media station with one or more other users. The sharing user can...
US20150319205 Method for Transferring Media Stream and User Equipment  
A method for transferring a media stream and a user equipment, where the method for transferring a media stream includes acquiring, by a browser of a first device, information about at least one...
US20150319204 TECHNIQUE FOR COMMUNICATION IN A COMMUNICATION NETWORK CENTERED ON INFORMATION  
The invention relates to a technique for communication implemented by a routing device in a communication network implementing a name-based routing. To process a request relating to a segment of...
US20150319203 COMPUTER SYSTEM AND METHODS FOR CHAT ENABLED ONLINE SEARCH  
Various systems, methods, and apparatuses provide for receiving location data indicative of a location of an initiating user; identifying at least one other user within a predefined distance of...
US20150319202 METHODS AND SYSTEMS FOR DRAG AND DROP CONTENT SHARING IN A MULTI-DEVICE ENVIRONMENT  
Methods and systems for interacting with graphical user interface elements to invoke commands and initiate requests in a multi-device environment are described
US20150319201 SELECTIVELY PROVIDING CONTENT ON A SOCIAL NETWORKING SYSTEM  
News feed stories are ranked so that new stories appear above previously viewed stories for users of a social networking system. Top news stories are selected by the social networking system based...
US20150319200 Natural User Interface for Remote Communication: An Interactive Collaboration System that allows Co-drawing Pad, Co-browsing/sharing Web/Document Files Using Session Initial Protocol (SIP)/Short Message Peer-to-Peer Protocol (SMPP) to Wake Up Remote Devices  
This patent describes a system where we can share some information such as photos, images, electrical documents, and web screen through the TCP/IP or Peer-to-Peer protocol network. From this...
US20150319199 DISPLAY SYSTEM, DISPLAY METHOD IN THE SYSTEM AND DISPLAY PROGRAM  
When retrieving information relating to another user of a different SNS, the CVR of an SNS can be effectively increased by displaying a social graph. According to the invention, by means of a...
US20150319198 CROWDSOURCING FOR DOCUMENTS AND FORMS  
Techniques are disclosed for making an electronic document easier to use based on prior interactions with the same or a similar document by other users. An electronic document is presented to one...
US20150319197 REAL-TIME CONTENT SHARING BETWEEN BROWSERS  
Techniques are provided for selectively broadcasting information from a sender's computer to one or more recipient computers in real-time. A user connects to a networked content server and browses...
US20150319196 Method and System for Transfer of Call Control  
According to an aspect of the present disclosure, a method is disclosed for a SIPIMR node to withdraw from a SIP session set-up loop by replying a redirect message to the SIP Invite sending node....
US20150319195 OBFUSCATION OF LAWFULLY AUTHORIZED ELECTONRIC SURVEILLANCE  
The obfuscation of information included in Session Initiation Protocol (SIP) invites for the purposes of facilitating Lawfully Authorized Electronic Surveillance (LAES) is contemplated. The...
US20150319194 MANAGING SECURE CONTENT IN A CONTENT DELIVERY NETWORK  
A system, method, and computer readable medium for managing secure content by CDN service providers are provided. A network storage provider stores one or more resources on behalf of a content...
US20150319193 METHOD FOR CLOUD-BASED ACCESS CONTROL POLICY MANAGEMENT  
A Web-based management server includes an ACP manager to manage access control rules (ACRs) and access control policies (ACPs). The ACRs and ACPs are configured by an administrator via a Web...
US20150319192 METHOD AND APPARATUS FOR MULTI-TENANCY SECRETS MANAGEMENT  
A service provider computing environment includes a service provider secrets policy. A service provider computing device receives tenant secrets policies from tenants. The tenants are tenants of...
US20150319191 ANTI-PHISHING DOMAIN ADVISOR AND METHOD THEREOF  
A method of anti-phishing and domain name protection. The method comprises: capturing a system call; extracting a URL included in the captured system call; capturing a response to the system call;...
US20150319190 PREVENTING NETWORK TOMOGRAPHY IN SOFTWARE DEFINED DATACENTER NETWORKS  
Technologies are provided for preventing abuse of software-defined datacenter networks. In some examples, an SDN abuse prevention module within a control layer of an SDN may use graph analysis...
US20150319189 PROTECTING WEBSITES FROM CROSS-SITE SCRIPTING  
Methods and systems for protecting websites from cross-site scripting are disclosed. A request for a web page comprising a web page element is received from a client. It is determined if the web...
US20150319188 Canonical Network Isolator Component  
A method for isolating a computer platform includes receiving a service request from an external requestor via a network at processing circuitry associated with a hardware barrier between the...
US20150319187 METHOD, ELECTRONIC DEVICE, AND USER INTERFACE FOR ON-DEMAND DETECTING MALWARE  
A method, an electronic device, and a user interface for on-demand detecting a malware are provided and adapted for estimating whether an application has vulnerabilities or malicious behaviors....
US20150319186 METHOD AND SYSTEM FOR DETECTING IRREGULARITIES AND VULNERABILITIES IN DEDICATED HOSTING ENVIRONMENTS  
A dedicated hosting environment is provided and a requirement is imposed that each virtual asset deployed in the dedicated hosting environment include one or more required virtual asset...
US20150319185 Systems and Methods for Contextual and Cross Application Threat Detection and Prediction in Cloud Applications  
Systems and methods for contextual and cross application threat detection in cloud applications in accordance with embodiments of the invention are disclosed. In one embodiment, a method for...
US20150319184 APPARATUS AND METHOD FOR COLLECTING HARMFUL WEBSITE INFORMATION  
Provided are a harmful site collection device and method for determining a harmful site by analyzing a connection between harmful sites. The harmful site collection device includes a harmful site...
US20150319183 SYSTEM AND METHOD FOR PROTECTING AGAINST POINT OF SALE MALWARE USING MEMORY SCRAPING  
A software, system and methodology for protecting against malware Point-of-Sale attacks that utilize, for example, memory scraping techniques. The application protects Point-of-sale hardware and...
US20150319182 SYSTEMS AND METHODS FOR DYNAMIC CLOUD-BASED MALWARE BEHAVIOR ANALYSIS  
A cloud-based method, a behavioral analysis system, and a cloud-based security system can include a plurality of nodes communicatively coupled to one or more users, wherein the plurality of nodes...
US20150319181 Application Graph Builder  
Disclosed is a system for recommending content of a predefined category to an account holder, detecting spam applications, or account holders based on the account holder application graphs. The...
US20150319180 METHOD, DEVICE AND SYSTEM FOR ACCESSING A SERVER  
A method for accessing a first server, wherein a first device is coupled or connected to a first server. The first device captures, at at least one predetermined time and/or during at least one...
US20150319179 METHOD AND SYSTEM FOR PROVIDING A PRIVATE NETWORK  
A system for providing a private network to a user terminal (110), the system comprising: the user terminal (110) configured to request content from secure sources (120, 130) compliant with secure...
US20150319178 REMOTE ASSISTANCE FOR MANAGED MOBILE DEVICES  
According to some aspects disclosed herein, a system for remote assistance and control of user devices subject to one or more remote assistance policies may be provided. In some embodiments, an...
US20150319177 METHOD AND SYSTEM FOR PROVIDING REFERENCE ARCHITECTURE PATTERN-BASED PERMISSIONS MANAGEMENT  
Reference architecture pattern role data representing reference architecture pattern roles to be associated with entities taking part in the development, and/or deployment, and/or operation of an...
US20150319176 Client-Side Integration Framework of Services  
Systems and methods for providing client-side integration of apps and services is provided. An integration framework execution upon a computing device provides integration of various apps,...
US20150319175 RETROACTIVE SHARED CONTENT ITEM LINKS  
A content management system implementing methodologies providing retroactive shared content item links is disclosed. The content management system and methodologies allow a team administrator of a...
US20150319174 Enterprise System Authentication and Authorization via Gateway  
Methods and systems are disclosed for providing approaches to authenticating and authorizing client devices in enterprise systems via a gateway device. The methods and systems may include passing,...
US20150319173 CO-VERIFICATION METHOD, TWO DIMENSIONAL CODE GENERATION METHOD, AND DEVICE AND SYSTEM THEREFOR  
A co-verification method, a two-dimensional code generation method, and a device and system therefor are provided. The method includes: performing first-type verification and second-type...
US20150319172 GROUP AUTHENTICATION AND KEY MANAGEMENT FOR MTC  
An SCS (60) sends out a trigger message for activating a group of MTC devices (10—1 to 10—n) through a network. An HSS (40) verifies whether or not to transfer the trigger message to the given MTC...
US20150319171 OFF-HOST AUTHENTICATION SYSTEM  
An off-host authentication system includes a network. An off-host processing system is coupled to the network and sends an encrypted authentication item through the network in response to...
US20150319170 COMPUTER IMPLEMENTED FRAMEWORKS AND METHODOLOGIES FOR ENABLING IDENTIFICATION VERIFICATION IN AN ONLINE ENVIRONMENT  
Described herein are computer implemented frameworks and methodologies for enabling identification verification in an online environment. Embodiments of the invention have been particularly...
US20150319169 SECURE COMMUNICATIONS SMARTPHONE SYSTEM  
Methods, systems, and non-transitory data storage media are provided for secured communications where biometrics are used to secure communications sent over a data communication path. A sender of...
US20150319168 METHODS AND SYSTEMS FOR ESTABLISHING COMMUNICATION WITH USERS BASED ON BIOMETRIC DATA  
Methods and systems are disclosed herein for establishing communication with users based on biometric data. For example, in response to determining that a user has a particular biometric state,...
US20150319167 VIRTUAL SMARTCARD AUTHENTICATION  
The invention provides a system and method for signing a user workstation onto an access restricted network utilising a mobile communication device. The method includes receiving a sign-on request...
US20150319166 DUAL-PARTY SESSION KEY DERIVATION  
Embodiments relate to negotiating a session key to secure a user session executed in a host computer. An electronic hardware security module (HSM) located in the host computer generates a first...
US20150319165 ASSISTED AUTHENTICATION USING ONE-TIME-PASSCODE  
An authentication method implemented on a server for authenticating a user device in a network comprising user devices and a server associated with a resource to be accessed. The server is...
US20150319164 SYSTEM AND METHOD FOR CONNECTING CLIENT DEVICES TO A NETWORK  
A system and method are provided for enabling a client device to connect to a network. The method comprises: obtaining an authorization code via a communication channel different from the network,...
US20150319163 Method for Identifying a Task Authorization  
In an ad hoc mesh network, roles are assignment to the different network nodes, for example mesh point or mesh portal. The invention envisages that a network node identifies the certification and...
US20150319162 ELECTRONIC ARRANGEMENT AND METHOD FOR ENTITY-SPECIFIC TOKEN SET MANAGEMENT AND RELATED MECHANISM FOR OFFERING PERSONALIZED DIGITAL CONTENT BASED ON INTERACTIONS BETWEEN ENTITIES  
Method (501) for adapting an obtained digital first token set comprising a plurality of tokens, the first token set being associated with a first entity, such as a user of an electronic device,...
US20150319161 Data Verification Using Access Device  
An embodiment of the invention is directed to a method comprising receiving, at a server computer, information for a portable device that includes a mobile device identifier and storing, by the...
US20150319160 Secure Management of Operations on Protected Virtual Machines  
Deploying an encrypted entity on a trusted entity is illustrated herein. A method includes, at a trusted entity, wherein the trusted entity is trusted by an authority as a result of providing a...
US20150319159 System and Method of Generating and Using Bilaterally Generated Variable Instant Passwords  
Implementations of a system and method of generating and using bilaterally generated variable instant passwords are provided. In some implementations, the Bilaterally Generated Variable Instant...
US20150319158 SYSTEM AND METHOD FOR TOKEN DOMAIN CONTROL  
A method for providing a token code in conjunction with a value token is disclosed. The token code serves as a shared secret for authenticating the use of the value token. Multiple token holders...