At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Deploying an application in multiple cloud computing environments
An example method is provided to deploy an application in multiple cloud computing environments. The method may comprise a computing system generating a first...
Viral engine for network deployment
A private network system operates over a public network to provide an asymmetric service to members with information from other members and non-members. The...
Content delivery network with deep caching infrastructure
Embodiments herein include methods and systems for use in delivering resources to a client device over a local network. An exemplary system comprises a...
Optimizing user interface data caching for future actions
The subject matter of this specification generally relates to pre-caching data for a predicted future action. In some implementations, a client device includes...
Method, system and client for uploading image, network server and computer
The present disclosure relates to the technical field of wireless network communications, and provides a method, system and client for uploading an image, a...
Indexing and searching content behind links presented in a communication
Among other disclosures, a method may include identifying content in an electronic communication, the content including a link. The method may include...
System and method for creating ad-hoc events from sensed sport-specific
A method, a sports watch, a computer program, a computing device and a system for creating an event accessible over a communications network, characterized by...
IoT gateway for weakly connected settings
A gateway that may be implemented in a local network and that communicates with a cloud network to provide efficient services in a weakly connected setting is...
Communication stack optimized per application without virtual machine
A method and a computing device are provided for improving datacenter operation. The datacenter operation is improved by establishing differentiated...
Method and apparatus for switching between sensors
Switching among sensor feeds for optimum performance includes disposing a processor in communication with sensors, each said sensor providing a primary data...
Prioritizing ranges to rebuild based on namespace health
A computing device includes an interface configured to interface and communicate with a dispersed storage network (DSN), a memory that stores operational...
Placement of application services in converged infrastructure information
A system and method access domain information indicating placement domains for an information handling system. The placement domains may include fault domains...
Network system and control method of a network system, and a control
A system having a server and a control device that connects to the server through a global network and executes processes referenced to data stored on the...
Virtual content delivery network
A plurality of virtual content delivery network nodes are implemented using virtualization infrastructure of at least one processing platform. The processing...
Method and communication system for unlocking user data
A method at a server system includes: in response to a request for a user to enter a first information exchange hall, detecting a lock status of predefined...
Systems and methods for allocating communication resources via information
The present disclosure is directed to allocating communication resources via information technology infrastructure. A system can provide a communication tag and...
Processing of streamed multimedia data
A method and device for streaming multimedia data over a communication network. Data associated with multimedia content is received over the communication...
Method and nodes for configuring a communication path for a media service
A network node is operated to configure a communication path for a media service. The communication path is configured in a cloud network that includes at least...
Systems and methods for enhanced conference session interaction
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for enhancing presenter and participant interaction in a presentation....
Bridging physical and virtual spaces
Examples of systems and methods for bridging virtual and physical spaces are described. In some of these examples, a particular communicant's real world state...
Automatic call initiation in response to selecting tags in electronic
documents and applications
The present invention provides a telecom control function in a communication terminal. The telecom control function is configured to receive call indicia when a...
Service chaining for multiple uplink bridges
A system and method for facilitating communication between one or more of a plurality of user virtual machines and external devices is disclosed. The system...
Computer telephony integration (CTI) control of multiple devices with a
single address of record
In order to deal with multiple communication endpoints that use a single address of record (e.g., a telephone number), a list of friendly names is determined...
Methods and systems for applying security policies in a virtualization
The various implementations described herein include systems, methods and/or devices method for applying security policies in a virtualization environment. In...
Communication between frames of a web browser
There is provided a method and apparatus of providing communication between frames of a web browser which is arranged to enforce a same origin security policy...
Dynamic device isolation in a network
In one embodiment, a device in a network inserts a profile tag into an address request sent by an endpoint node in the network to a lookup service. The lookup...
Method, apparatus and computer program product for assessing the risk of
electronic communications using logon...
Disclosed are techniques for use in assessing the risk of electronic communications using logon types. In one embodiment, the techniques comprise a method. The...
Test method and system for PLC security defense device
A test method and system for PLC security defense device are provided. The method including: acquiring by the first test end the information about the device...
Securing services and intra-service communications
A security service enables service providers to register available services. Prospective service consumers may register with the security service to access a...
Systems and methods to authenticate users and/or control access made by
users on a computer network using...
A controller for user authentication and access control, configured to: store data representing a graph having: nodes representing data elements associated with...
Email effectivity facilty in a networked secure collaborative exchange
In embodiments of the present invention improved capabilities are described for managing access to a secure exchange environment managed by an intermediate...
Uncloneable registration of an internet of things (IoT) device in a
An IoT device has a public device identifier and a private device identifier, where the public device identifier is publicly available and the private device...
Communication enhancement methods
A system for automatic authentication of service requests includes authentication of a remote access device. This authentication may be accomplished...
Method and system for establishing a secure communication channel
A first terminal initiates a communication session with a second terminal by sending a first session request to a server for initiating a communication channel...
Electronic device for processing biometric information and method of
An electronic device includes a processor and a memory functionally connected to the processor. The electronic device acquires user's biometric information...
Remote pump monitoring and control
A system includes a pump controller, a user device, and a server. The pump controller transmits identity information via a first communication connection with...
Methods and apparatus for use in enabling a mobile communication device
with a digital certificate
A mobile communication device causes a communication session to be established with a host server of a communication network. The mobile device performs...
Systems and methods for secure automated network attachment
A method for automatically attaching a purpose-built electronic device to a provider network includes steps of discovering, by a Wi-Fi module of the...
Scalable authentication between heterogeneous services
Methods, computer program products, and systems are presented. The methods include, for instance: receiving a request for a private credential of a first...
Method for transferring profile and electronic device supporting the same
A method of transferring a profile by an electronic device and an electronic device supporting the same are provided. The electronic device includes a secure...
Device and method for providing user-configured trust domains
A method of operating a first device in group of devices in a network is disclosed. The method comprises encrypting and decrypting, with a processor of the...
Apparatus and method for managing software applications of a mobile device
A system that incorporates teachings of the present disclosure may include, for example, a non-transitory computer-readable storage medium, which operates in a...
Distributed on-demand key management for rangeless environments
Disclosed herein are systems and methods for distributed key management. A first communications node may join a network. The first communications node may...
Secure communication using physical proximity
Systems and methods may provide for implementing a secure communication using physical proximity. In one example, the method may include transmitting an...
Methods and systems for communication-session arrangement on behalf of
In an embodiment, a communication device receives a request to establish a media session with a remote endpoint. In response to receiving the request, the...
Encrypted message communication
Computer-implemented methods are provided for communicating message data from a sender computer to a receiver computer via a network. The sender computer...
System and method for grid based cyber security
A method and system for providing a secure communication network using an electrical distribution grid is disclosed. A device connected to the electrical...
Apparatus and method for administering proxy identities
A non-transitory computer readable storage medium has instructions executed by a processor to host a proxy identity depot service application program interface...
Obfuscation of email addresses
A method, apparatus, and computer program product are disclosed for facilitating two-way email communication in manner that obfuscates sender and recipient...
Fabric-based anonymity management, systems and methods
Based on a hidden service address table stored in a memory, a virtual circuit related to a hidden service is mapped to a corresponding port-level channel based...