At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Business support system, business support method, information processing
apparatus, communication device, and...
This invention is directed to a business support system that controls business use of a communication device based on a work time without user's awareness. The...
Activity information sharing method and apparatus
The various implementations described herein disclose methods and systems for real-time activity information sharing. In one aspect, a method is performed by a...
Vehicular information processing system, vehicle-mounted device, method
for providing text data, and program...
Provided is a system in which a vehicle-mounted device and a mobile device are connected using a communication protocol. The vehicle-mounted device includes: a...
Image processing apparatus, control method thereof, and non-transitory
computer-readable storage medium
An image processing apparatus performs export by switching, based on the communication type of one or more pieces of stored destination information of an...
Data communications backpack
A data communications backpack apparatus is disclosed having a backpack carrier. A power supply can be positioned in the backpack carrier. A router device can...
Systems and methods for protecting communications
A method includes receiving a data packet including a header having a structure from an operating system at a virtualization layer, where the virtualization...
A virtual machine host may provide IPv4 connections to IPv4 virtual machine guests and map the connections to IPv6 networks. The IPv6 addressed exposed by the...
Personalized location-based services for users
Aspects of the present invention include methods, systems and computer program products. The method includes a detecting, by a processor, a presence of a user...
Mobile communication device self-locating framework
A mobile communication device. The device comprises a cellular radio transceiver, a GPS receiver, a processor, a memory, and a self-locating application stored...
Base station and user terminal
A base station according to a first aspect is used in a mobile communication system supporting a D2D proximity service which enables direct device to device...
Local positioning with communication tags
A local positioning system may include a reader assembly and a data processing assembly. The reader assembly may be configured to read tag data from at least...
Establishing cross-vendor secure connectivity in a shared computing
A method, computer program product, and a device for establishing a direct communications connection between gateways of two computing systems includes a...
Intelligent network service provisioning and maintenance
A network gateway is implemented on behalf of a customer entity. The network gateway may be implemented using a distributed computer system and the network...
Controlling distribution of content within a vehicle
A system and method for displaying content from mobile devices on a plurality of displays in a vehicle are disclosed. Example methods may include receiving...
Iterative learning for reliable sensor sourcing systems
Providing a registry of sensor devices may comprise obtaining a device, determining one or more information types returned by the device, determining one or...
Methods and systems for hybrid synchronous-asynchronous communication in
Systems and methods for automated content selection and/or distribution are disclosed herein. The system can include a packet selection system including a...
System and device for enabling any network functionality client or server
in a HTML5 application
Systems and devices for enabling any network functionality client or server in a HTML5 application. A Network Entity running as a HTML5 Application (NEHA) is...
Electronic device with calendaring capabilities
Systems and methods for providing an Electronic Calendar ("EC"). The methods comprise: generating a first EC by a first Electronic Device ("ED") used by a first...
Server and method for providing design data for application and system for
An application design server, method and system are provided. The application design server according to an exemplary embodiment includes a communicator...
Controlling a remote device over a network
A system for extending the range of a wireless signal is disclosed. A typical or near typical IP packet may be used to establish a connection between a server...
Gateway that enables a browser-based application to communicate with a
server-side application using a...
A generic client engine can associate a transcoder process with a requested server-side application so that the transcoder process can act as an intermediary...
Home automation system and method including remote media access
A device includes a first interface, and a processor. The first interface connects to a wide area network and communicates with a first electronic device via...
Dynamic group and event update method in phone based impromptu meet-up app
This disclosure relates to generating a group of invitees in a wireless communication system. An embodiment of the disclosure receives criteria for an event...
A system is described for setting up videoconferencing between a user 1, 3, 5 and an agent 13, 23, 33 with little or no downloads and configuration. A director...
Method, apparatus, and computer-readable medium for voice call
A method, apparatus and computer-readable medium are provided for voice call in mobile communication technologies. The method may include: displaying at least...
User input back channel for wireless displays
As part of a communication session, a wireless source device can transmit audio and video data to a wireless sink device, and the wireless sink device can...
The present invention relates to a policy decision point for interacting with a computer system comprising a plurality of resources, to which subjects' access...
System and method to spoof a TCP reset for an out-of-band security device
Systems and methods are provided to reset a TCP connection such as in response to a security policy violation. To address reset conditions under RFC 5961, for...
Distributed denial of service attack protection for internet of things
Presented herein are techniques for remediating a distributed denial of service attack. A methodology includes, at a network device, such as a constrained...
Malware detection using internal and/or external malware detection
A system may determine to perform an internal and an external malware detection operation to detect a malware infection associated with a client device. The...
System and method for preventing attacks in communications
A system can connect multiple disparate web products and services through a common interface. Each product can function with or without other plugins as the...
Recursive multi-layer examination for computer network security
Computer-implemented methods and apparatuses for recursive multi-layer examination for computer network security remediation may include: identifying one or...
Threat detection using a time-based cache of reputation information on an
Threat detection instrumentation is simplified by providing and updating labels for computing objects in a context-sensitive manner. This may include simple...
Identifying apparatus, identifying method, and identifying program
A command and control server identifying apparatus provides data received by malware upon execution of the malware with a tag that allows to uniquely identify...
Communication protocols in integrated systems
A system and methods comprise a touchscreen at a premises. The touchscreen includes a processor coupled to a security system at the premises. User interfaces...
Network data obfuscation
Network data obfuscation is disclosed. For example, an obfuscation driver is initialized in an endpoint device connected to an obfuscation gateway over a secure...
Enhanced data interface for contactless communications
An enhanced data interface (EDI) for communications between an application operating on a communication device and an access device can provide enhanced...
Computerized system, method and computer program product, for managing a
computer program's operations
A computerized method of managing a computer remote session operation, comprising providing a server for hosting application execution; configuring a number of...
Intelligent messaging system based temporary receiver registration for
electronic message communications
An intelligent messaging server (herein `messaging server`) that is communicably coupled to trusted directory nodes receives, from a first user computing...
Device blocking tool
A device blocking tool includes a user interface, a location engine, and a connection engine. The user interface receives at least one of a MAC address of a...
Secure data transmission
A system may include a first network in which user device(s) and a HIP server are communicably coupled. The first network may include a secure data...
Cross security layer secure communication
A security layer in an industrial control and automation system includes a user database, a web server, a secure token server (STS), and an application server....
Information processing system, information processing apparatus,
information processing method, and storage medium
An information processing system includes a memory that stores a user and authorization information, indicative of processing permitted for the user to execute...
Network security based on device identifiers and network addresses
Techniques for network security are disclosed. In some implementations, an evaluation module determines whether a network communication from a computing device...
Method for allocating addressing identifier, access point, station, and
A method for allocating an addressing identifier includes: notifying, by an access point, at least two stations of an encrypted new MAC address that corresponds...
Actively federated mobile authentication
To make a trusted web service call, a client application sends a series of messages to obtain tokens that allow service requests to pass through a service...
Network hop count network location identifier
Identifying a communication source includes receiving a message from a client computer requesting access to a computer-based resource; and receiving, a network...
User information management system; user information management method;
program, and recording medium on which...
A management server, a service server, and a plurality of user terminals are connected to each other via a network so as to be capable of transmitting and...
Secret store for OAuth offline tokens
An authentication system includes an authentication server, an application having a proxy, and a token store. The token store receives an authentication request...
Communication device, LSI, program, and communication system
An object of the present invention is to prevent an attack from or via a communication device on an information apparatus in a communication system including...