Patent application number | Description | Published |
20080312924 | SYSTEM AND METHOD FOR TRACKING PERSONS OF INTEREST VIA VOICEPRINT - Disclosed are systems, methods, and computer readable media for tracking a person of interest. The method embodiment comprises identifying a person of interest, capturing a voiceprint of the person of interest, comparing a received voiceprint of a caller with the voiceprint of the person of interest, and tracking the caller if the voiceprint of the caller is a substantial match to the voiceprint of the person of interest. | 12-18-2008 |
20090132999 | Secure and fault-tolerant system and method for testing a software patch - Disclosed is a system and method for testing a software patch. An input is provided to a computer already patched with the software patch and a computer not yet patched with the software patch (i.e., an unpatched computer). A response to the input is generated by each computer. A comparator compares the responses to determine if the responses from each computer are the same. If the responses are the same, then the patch is installed on the previously unpatched computer. | 05-21-2009 |
20090150437 | System and method for tracking an individual using typeprinting - Disclosed is a system and method for tracking an individual of interest over a network. Keystroke dynamics of users using computers are obtained in order to identify the individual of interest when the individual of interest uses one of the computers. Usage data of the individual of interest is recorded when the individual of interest is identified as using one of the computers. | 06-11-2009 |
20100138517 | SYSTEM AND METHOD FOR MULTIMEDIA CONTENT BROKERING - Disclosed herein are systems, computer-implemented methods, and tangible computer-readable media for brokering online multimedia content. The method includes receiving an online request (such as a search) for multimedia content from a user, retrieving a user profile associated with the user, locating a plurality of online multimedia providers having multimedia content satisfying the request, identifying a preferred provider from the plurality of online multimedia providers, determining information required by the preferred provider for access to the multimedia content satisfying the request, transmitting the required information from the user profile to the preferred provider in order to access the multimedia content satisfying the request, and instructing the preferred provider to transmit the multimedia content to a playback device of the user. The method can further include receiving a payment from the user for the multimedia content, and paying the fee charged by the preferred provider. | 06-03-2010 |
20100146395 | Method and System for Exploiting Interactions Via A Virtual Environment - A method on a computer readable storage medium operable to store a virtual representation of a plurality of physical components, introduce a component having a predefined functionality to interact with the virtual representation and generate indications of a response of the virtual representation to the interactions of the component. A system having a memory configured to store a virtual representation of a plurality of physical components and a processor configured to introduce a component having a predefined functionality to interact with the virtual representation and generate indications of a response of the virtual representation to the interactions of the component. | 06-10-2010 |
20100161636 | Messaging Personalization - Participants in a communication are rendered by determining whether each entry in a list of participants in the communication satisfies criteria specified by a user participating in the communication. The criteria are used to identify a first subset of participants that are to be rendered in a first style that differentiates the first subset from remaining participants in the list. The first subset of participants is formatted in the first style. | 06-24-2010 |
20100162378 | METHODS AND APPARATUS TO ENHANCE SECURITY IN RESIDENTIAL NETWORKS - Example methods and apparatus to enhance security in residential networks and residential gateways are disclosed. A disclosed example apparatus includes a transceiver to receive an Internet protocol (IP) packet, a first packet processing module associated with a protected IP address, the first packet processing module to be communicatively coupled to a first network device, a second packet processing module associated with a public IP address, the second packet processing module to be communicatively coupled to a second network device, and a packet diverter to route the received IP packet to the first packet processing module when the IP packet contains the protected IP address and to route the IP packet to the second packet processing module when the IP packet does not contain the protected IP address. | 06-24-2010 |
20110093473 | METHOD AND APPARATUS FOR STAGED CONTENT ANALYSIS - A system that incorporates teachings of the present disclosure may include, for example network device having a controller to receive multiple streams of content for portions of a multimedia work (MMW), perform a high level analysis for features in each of the streams for the MMW, perform a specialized analysis on the portion having a detected general feature to generate a content analysis output, correlate the content analysis output with other content analysis of the MMW, and output a weighted content description based on the correlation function. Other embodiments are disclosed. | 04-21-2011 |
20110093902 | System and Method to Process a Data Stream Having Different Content Types - A computer-implemented method includes receiving a data stream at a set-top box device from a residential gateway. The data stream includes first data having a first content type, second data having a second content type, and third data having a third content type. The method includes assigning the first data for processing at a first machine of the set-top box device. The method also includes assigning the second data for processing at a second machine of the set-top box device. The method further includes assigning the third data for processing at a third machine of the set-top box device. The set-top box device is configured to selectively output at least one of the first data, the second data, and the third data for display at a display device. | 04-21-2011 |
20110107386 | System and Method of Problem Detection in Received Internet Data, Video Data, and Voice Data - Methods and systems for problem detection related to received Internet data, video data, and voice data are disclosed. A method may include monitoring, at a set top box device, Internet data to detect a first problem related to the Internet data. The method may further include monitoring, at the set top box device, video data to detect a second problem related to the video data. The method may include automatically taking a first action upon detecting the first problem and automatically taking a second action upon detecting the second problem. | 05-05-2011 |
20110113182 | Devices, Systems and Methods for Time-Sensitive Data and Limited-Persistent Storage - Devices, systems, and methods are disclosed which relate to devices utilizing time-sensitive memory storage. The time-sensitive memory storage acts as normal device memory, allowing the user of the device to store files or other data to it; however the information stored on the time-sensitive memory storage is automatically erased, based on some storage time period. A limited amount of persistent storage is used for names and message headers. | 05-12-2011 |
20110131650 | METHODS, DEVICES, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR EDGE DRIVEN COMMUNICATIONS NETWORK SECURITY MONITORING - An edge monitoring approach can be utilized to detect an attack which includes a plurality of relatively low bandwidth attacks, which are aggregated at a victim sub-network. The aggregated low bandwidth attacks can generate a relatively high bandwidth attack including un-solicited data traffic directed to the victim' so that the aggregated attack becomes more detectable at an edge monitor circuit located proximate to the victim. Related systems, devices, and computer program products are also disclosed. | 06-02-2011 |
20110137557 | CELLULAR-BASED LIVE TRAFFIC SERVICE - A cellular-based live traffic service that does not require pre-deployment of infrastructure or GPS-enabled devices uses signals provided by cellular devices to determine course resolution localization and tracking information of the cellular devices. Specialized statistical analysis is performed on the course resolution data to infer the fine resolution positions of the cellular devices. In an example embodiment, the localization and tracking information is provided on a map, or the like, to show relative position and/or trajectory of cellular devices. | 06-09-2011 |
20110138467 | Method and System for Content Distribution Network Security - A content delivery system includes an upload module, a content delivery module, and a monitoring module. The upload module is configured to receive content from a content provider, detect content containing malicious software or proprietary information, and provide information about the content to a monitoring module. The content delivery module is configured to detect content containing malicious software or unauthorized changes, detect operational changes to the content delivery module, provide information about the content and the operational changes to the monitoring module, receive a request for the content from a client system, and provide the content to the client system. The monitoring module is configured to monitor a network for potentially malicious traffic, receive information from the content delivery module and the upload module, correlate the information and the potentially malicious traffic to identify a security event, and trigger a response to the security event. | 06-09-2011 |
20110141900 | System and Method for Location, Time-of-Day, and Quality-of-Service Based Prioritized Access Control - A priority server for a provider network includes a traffic volume detection module, a traffic analyzer module, and a rules module. The traffic volume detection module receives operational information from the provider network and determines that a host is experiencing a flash event based upon the operational information. The traffic analyzer module determines that the flash event is not a distributed denial of service attack on the host. When it is determined that the flash event is not a distributed denial of service attack, the rules module provides a priority rule to an access router that is coupled to the host. The priority rule is based upon a characteristic of packets routed in the provider network that are associated with the flash event, and the characteristic is determined not solely by information included in the packets. | 06-16-2011 |
20110145317 | DATA ROUTING IN A CONTENT DISTRIBUTION NETWORK FOR MOBILITY DELIVERY - System(s) and method(s) are provided to route data within a network of content with specific service constraints to mobile devices. A mobile network management component receives an identifier (ID) of a base station that serves a mobile device that originates a request for data, and relays the ID to a network platform that administers content. A mapping that associates one or more base stations with a deployed content node and the received ID are utilized to identify a content node to serve the request for data via the base station. The received request for data is directed to the identified content node. A service constraint configuration can be allocated for exchange of payload data between the mobile device and the network platform. For a request to consume data and a request to supply data, identified content node delivers data and receives data, respectively, in accordance with the service constraint allocation. | 06-16-2011 |
20110145833 | Multiple Mode Mobile Device - In one or more embodiments, one or more methods and/or systems described can perform displaying, on a handheld device, multiple icons associated with multiple segments; receiving first user input indicating a first segment of the multiple segments; executing a first virtual machine associated with the first segment on the handheld device; executing a first application on the first virtual machine; receiving second user input indicating a second segment of the multiple segments; executing a second virtual machine associated with the second segment on the handheld device; and executing a second application on the second virtual machine. In one or more embodiments, one or more methods and/or systems described can further perform before executing the second virtual machine, receiving authentication information and determining that the user is authenticated. In one or more embodiments, the authentication information can include at least one of a user name, a password, and/or biometric information. | 06-16-2011 |
20110145887 | System and Method of Selectively Applying Security Measures to Data Services - Systems and methods of applying security measures to data services are disclosed. In one embodiment, a processor determines when more than one data service is used by or is accessible to a subscriber device and applies a security measure to at least one data service. | 06-16-2011 |
20110289134 | End-To-End Secure Cloud Computing - A method includes receiving, at a control node of a cloud computing network, a first enterprise policy specific to the first enterprise and a second enterprise policy specific to the second enterprise, and managing communications between at least one user device of the first enterprise and the at least one enterprise application hosted on behalf of the first enterprise based on the first enterprise policy. The method also includes managing communications between at least one user device of the second enterprise and the at least one enterprise application hosted on behalf of the second enterprise based on the second enterprise policy. | 11-24-2011 |
20120072218 | SYSTEM AND METHOD FOR TRACKING PERSONS OF INTEREST VIA VOICEPRINT - Disclosed are systems, methods, and computer readable media for tracking a person of interest. The method embodiment comprises identifying a person of interest, capturing a voiceprint of the person of interest, comparing a received voiceprint of a caller with the voiceprint of the person of interest, and tracking the caller if the voiceprint of the caller is a substantial match to the voiceprint of the person of interest. | 03-22-2012 |
20120072605 | System and Method to Detect and Mitigate Distributed Denial of Service Attacks using Random Internet Protocol Hopping - A method includes sending a first redirect instruction to a first client in response to a first session request received at a service address, and establishing a first session with the first client in response to a second session request received at the first redirect address indicated by the first redirect instruction. Additionally, the method includes determining a first service interval has passed, and sending a second redirect instruction to a second client in response to a third session request received at the service address after the first service interval has passed. The method still further includes establishing a second session with the second client in response to the fourth session request received at the second redirect address indicated by the second redirect instruction after the first service interval has passed, and rejecting the fifth session request received from a third client at the first redirect address after the first service interval has passed. | 03-22-2012 |
20120147753 | METHOD AND SYSTEM FOR DYNAMIC TRAFFIC PRIORITIZATION - A method provides for the dynamic traffic prioritization in a communication network. The method electronically monitors traffic in a communication network and determines when traffic exceeds configured thresholds on the links of the communication network. Thus, the method determines a link which is potentially about to be congested in the communication network. The method categorizes the traffic on this link by an end system attached to one end of the potentially congested link into a plurality of priority categories using application layer parameters. Using a re-direct capability of the end system, the method re-directs at least one of the pluralities of priority categories of traffic to an alternate Internet Protocol address. The method uses preconfigured Quality of Service mechanisms on the provider edge router attached to the other end of the potentially congested link to guarantee a predetermined amount of bandwidth capacity of the link to traffic destined to the alternate Internet Protocol address. | 06-14-2012 |
20120147824 | METHODS AND APPARATUS TO CONFIGURE VIRTUAL PRIVATE MOBILE NETWORKS - Methods and apparatus to configure virtual private mobile networks are disclosed. A disclosed example method includes receiving a request at a wireless network provider from a client, the request instructing the wireless network provider to create the virtual private mobile network for the client, identifying available network elements within a wireless network of the wireless network provider based on the request from the client, configuring a portion of a control plane and a portion of a data plane of the identified network elements for the virtual private mobile network, and enabling user equipment associated with the client to wirelessly communicatively couple to the virtual private mobile network. | 06-14-2012 |
20120151587 | Devices, Systems, and Methods for Detecting Proximity-Based Mobile Malware Propagation - Devices, systems, and methods are disclosed which leverage an agent that resides in a mobile communication device to detect Proximity based Mobile Malware Propagation (PMMP). The agent injects one or several trigger network connections in the candidate connection list. These connections appear as legitimate networks and devices. However, the triggers connect to an agent server on a service provider's network. Essentially, the method is based on the assumption that malware lacks the intelligence to differentiate the trigger network connection from a normal one. Therefore, by attempting to connect through the trigger network connection, the malware reveals itself. The system helps collect the malware signature within a short period of time after the malware outbreak in local areas, and such attacks typically bypass network based security inspection in the network. | 06-14-2012 |
20120222070 | System and Method of Problem Detection in Received Internet Data, Video Data, and Voice Data - A method for problem detection related to received data includes monitoring data to detect a first problem and a second problem related to the data. The first problem may be related to a first data type and the second problem may be related to a second data type. The first data type and the second data type may be distinct from each other. The method includes determining a first remedial action in response to detecting the first problem and a second remedial action in response to detecting the second problem. The method includes determining a priority order for the first remedial action and the second remedial action. | 08-30-2012 |
20120230488 | AUTHENTICATING NETWORK ELEMENTS IN A COMMUNICATION SYSTEM - A system that incorporates teachings of the present disclosure may include, for example, a computer-readable storage medium in a communication device having computer instructions to establish communications with a cellular base station, generate a message request, and transmit to an authentication device by way of the cellular base station the message request. The computer-readable storage medium can also have computer instructions to receive from the authentication device by way of the cellular base station a message response, authenticate the message response, and determine from the authenticated message response whether the cellular base station is an approved network element of a cellular communication system. Other embodiments are disclosed. | 09-13-2012 |
20120291128 | System and Method for Location, Time-of-Day, and Quality-of-Service Based Prioritized Access Control - A priority server for a provider network includes a traffic volume detection module, a traffic analyzer module, and a rules module. The traffic volume detection module receives operational information from the provider network and determines that a host is experiencing a flash event based upon the operational information. The traffic analyzer module determines that the flash event is not a distributed denial of service attack on the host. When it is determined that the flash event is not a distributed denial of service attack, the rules module provides a priority rule to an access router that is coupled to the host. | 11-15-2012 |
20120311107 | METHODS AND APPARATUS TO CONFIGURE VIRTUAL PRIVATE MOBILE NETWORKS TO REDUCE LATENCY - Methods and apparatus to configure virtual private mobile networks for latency are disclosed. A disclosed example method includes provisioning logically a virtual private mobile network within a wireless network to reduce latency of a communication associated with a latency sensitive application, determining a mobile device is communicatively coupling to the wireless network via the latency sensitive application, and coupling the mobile device to the virtual private mobile network to reduce latency of the communication associated with the latency sensitive application. | 12-06-2012 |
20120317221 | MESSAGING PERSONALIZATION - Participants in a communication are rendered by determining whether each entry in a list of participants in the communication satisfies criteria specified by a user participating in the communication. The criteria are used to identify a first subset of participants that is to be rendered in a first style that differentiates the first subset from remaining participants in the list. The first subset of participants is formatted in the first style. | 12-13-2012 |
20120331545 | METHODS AND APPARATUS TO CONFIGURE VIRTUAL PRIVATE MOBILE NETWORKS FOR SECURITY - Methods and apparatus to configure virtual private mobile networks for security are disclosed. A disclosed example method includes identifying, in a wireless network, a communication from a user equipment that matches a security event profile, transmitting, from the wireless network, an instruction to enable the user equipment to be communicatively coupled to a virtual private mobile network, the virtual private mobile network being provisioned for security within the wireless network, and enabling the user equipment to transmit a second communication through the virtual private mobile network securely isolated from other portions of the wireless network. | 12-27-2012 |
20130030693 | CELLULAR-BASED LIVE TRAFFIC SERVICE - A cellular-based live traffic service that does not require pre-deployment of infrastructure or GPS-enabled devices uses signals provided by cellular devices to determine course resolution localization and tracking information of the cellular devices. Specialized statistical analysis is performed on the course resolution data to infer the fine resolution positions of the cellular devices. In an example embodiment, the localization and tracking information is provided on a map, or the like, to show relative position and/or trajectory of cellular devices. | 01-31-2013 |
20130054763 | METHODS AND APPARATUS TO CONFIGURE VIRTUAL PRIVATE MOBILE NETWORKS WITH VIRTUAL PRIVATE NETWORKS - Methods and apparatus to configure virtual private mobile networks with virtual private networks are disclosed. A disclosed example method includes logically provisioning, for a client, the virtual private mobile network to process wireless network communications associated with the client that correspond to a specified address space of the client, provisioning at least a portion of a server within a cloud computing data center to host resources for the client, and configuring at least a portion of an edge router of the cloud computing data center to transmit the wireless network communications between the portion of the server and the virtual private mobile network. | 02-28-2013 |
20130055343 | Methods, Devices, Systems, and Computer Program Products for Edge Driven Communications Network Security Monitoring - An edge monitoring approach can be utilized to detect an attack which includes a plurality of relatively low bandwidth attacks, which are aggregated at a victim sub-network. The aggregated low bandwidth attacks can generate a relatively high bandwidth attack including un-solicited data traffic directed to the victim' so that the aggregated attack becomes more detectable at an edge monitor circuit located proximate to the victim. Related systems, devices, and computer program products are also disclosed. | 02-28-2013 |
20130073567 | Method and Apparatus for Staged Content Analysis - A system that incorporates teachings of the present disclosure may include, for example network device having a controller to receive multiple streams of content for portions of a multimedia work, perform a high level analysis for features in each of the streams for the multimedia work, perform a specialized analysis on the portion having a detected general feature to generate a content analysis output, correlate the content analysis output with other content analysis of the multimedia work, and output a weighted content description based on the correlation function. Other embodiments are disclosed. | 03-21-2013 |
20130177141 | System and Method for Tracking Persons of Interest Via Voiceprint - Disclosed are systems, methods, and computer readable media for tracking a person of interest. The method embodiment comprises identifying a person of interest, capturing a voiceprint of the person of interest, comparing a received voiceprint of a caller with the voiceprint of the person of interest, and tracking the caller if the voiceprint of the caller is a substantial match to the voiceprint of the person of interest. | 07-11-2013 |
20130179066 | CELLULAR-BASED LIVE TRAFFIC SERVICE - A cellular-based live traffic service that does not require pre-deployment of infrastructure or GPS-enabled devices uses signals provided by cellular devices to determine course resolution localization and tracking information of the cellular devices. Specialized statistical analysis is performed on the course resolution data to infer the fine resolution positions of the cellular devices. In an example embodiment, the localization and tracking information is provided on a map, or the like, to show relative position and/or trajectory of cellular devices. | 07-11-2013 |
20130198306 | Messaging Personalization - Participants in a communication are rendered by determining whether each entry in a list of participants in the communication satisfies criteria specified by a user participating in the communication. The criteria are used to identify a first subset of participants that is to be rendered in a first style that differentiates the first subset from remaining participants in the list. The first subset of participants is formatted in the first style. | 08-01-2013 |
20130205392 | METHOD AND SYSTEM FOR CONTENT DISTRIBUTION NETWORK SECURITY - A content delivery system includes an upload module, a content delivery module, and a monitoring module. The upload module is configured to receive content from a content provider, detect content containing malicious software or proprietary information, and provide information about the content to a monitoring module. The content delivery module is configured to detect content containing malicious software or unauthorized changes, detect operational changes to the content delivery module, provide information about the content and the operational changes to the monitoring module, receive a request for the content from a client system, and provide the content to the client system. The monitoring module is configured to monitor a network for potentially malicious traffic, receive information from the content delivery module and the upload module, correlate the information and the potentially malicious traffic to identify a security event, and trigger a response to the security event. | 08-08-2013 |
20130290961 | Multiple Mode Mobile Device - A particular method includes receiving authentication information at a device. The method also includes determining, by the device, whether a user is authenticated based on the authentication information. The method further includes executing, by the device, a first virtual machine in response to determining that the user is authenticated. The first virtual machine has access to sensitive information. The method also includes executing, by the device, a first application on the first virtual machine. The method further includes determining, by the device, whether execution of an instruction associated with a second virtual machine would result in a fault. The method also includes, in response to determining that execution of the instruction would result in the fault, preventing execution of the instruction and allowing the second virtual machine to fail without adversely affecting the first virtual machine. | 10-31-2013 |
20140052277 | Method and system for controlling physical components via a virtual environment - A computer readable storage medium storing a set of instructions that are executable by a processor, the set of instructions being operable to store a virtual representation of a plurality of physical components, display the virtual representation, receive user interaction with at least one of the virtual representations and send a command to the physical component corresponding to the user interaction. | 02-20-2014 |
20140142843 | CELLULAR-BASED LIVE TRAFFIC SERVICE - A cellular-based live traffic service that does not require pre-deployment of infrastructure or GPS-enabled devices uses signals provided by cellular devices to determine course resolution localization and tracking information of the cellular devices. Specialized statistical analysis is performed on the course resolution data to infer the fine resolution positions of the cellular devices. In an example embodiment, the localization and tracking information is provided on a map, or the like, to show relative position and/or trajectory of cellular devices. | 05-22-2014 |
20140189089 | DATA ROUTING IN A CONTENT DISTRIBUTION NETWORK FOR MOBILITY DELIVERY - System(s) and method(s) are provided to route data within a network of content with specific service constraints to mobile devices. A mobile network management component receives an identifier (ID) of a base station that serves a mobile device that originates a request for data, and relays the ID to a network platform that administers content. A mapping that associates one or more base stations with a deployed content node and the received ID are utilized to identify a content node to serve the request for data via the base station. The received request for data is directed to the identified content node. A service constraint configuration can be allocated for exchange of payload data between the mobile device and the network platform. For a request to consume data and a request to supply data, identified content node delivers data and receives data, respectively, in accordance with the service constraint allocation. | 07-03-2014 |
20140244663 | METHOD AND APPARATUS FOR STAGED CONTENT ANALYSIS - A system that incorporates teachings of the present disclosure may include, for example network device having a controller to receive multiple streams of content for portions of a multimedia work, perform a high level analysis for features in each of the streams for the multimedia work, perform a specialized analysis on the portion having a detected general feature to generate a content analysis output, correlate the content analysis output with other content analysis of the multimedia work, and output a weighted content description based on the correlation function. Other embodiments are disclosed. | 08-28-2014 |
20140304820 | Devices, Systems, and Methods for Detecting Proximity-Based Mobile Malware Propagation - Devices, systems, and methods are disclosed. An agent resides in a mobile communication device. The agent detects Proximity-based Mobile Malware Propagation. The agent injects one or more trigger network connections in the candidate connection list. These connections appear as legitimate networks and devices, but instead trigger connection to an agent server on a service provider's network. By attempting to connect through the trigger network connection, the malware reveals itself. The system helps collect the malware signature within a short period of time after the malware outbreak in local areas, though such attacks typically bypass network based security inspection in the network. | 10-09-2014 |
20150016602 | METHOD AND APPARATUS FOR PROVIDING SECURE IMAGE ENCRYPTION AND DECRYPTION - Methods, non-transitory computer readable media and apparatuses for decrypting an image are disclosed. For example, a method captures a portion of an encrypted image and decrypts the portion of the image using a decryption key. The portion of the image contains partial information for an adjacent portion of the image. The method then displays the portion of the image that is decrypted and also displays the adjacent portion of the image using the partial information for the adjacent portion of the image. Another method includes capturing a first portion of an image that is encrypted using a first key and a second key, decrypting the first portion of the image using a first key and displaying the first portion of the image that is decrypted. | 01-15-2015 |
20150085999 | System and Method for Tracking Persons of Interest Via Voiceprint - Disclosed are systems, methods, and computer readable media for tracking a person of interest. The method embodiment comprises identifying a person of interest, capturing a voiceprint of the person of interest, comparing a received voiceprint of a caller with the voiceprint of the person of interest, and tracking the caller if the voiceprint of the caller is a substantial match to the voiceprint of the person of interest. | 03-26-2015 |