Patent application number | Description | Published |
20120159586 | METHOD AND APPARATUS FOR IMPLEMENTING SECURITY MEASURES ON NETWORK DEVICES - A method for providing security measures on a network device, such as a router, is disclosed. In one embodiment, a method includes receiving a request for a network resource. The method further includes determining a classification of the request, and generating, based on the determined classification of the request, a security measure corresponding to the determined classification of the request for authentication of the request. The method also includes permitting access to the network resource when a correct response is received to the security measure corresponding to the determined classification of the request. | 06-21-2012 |
20120213082 | PREVENTION OF CALL SPOOFING IN A VOICE OVER INTERNET PROTOCOL (VoIP) NETWORK - Call spoofing in a Voice over Internet Protocol (IP) system may be detected and/or prevented. A device may receive a call request to initiate a VoIP call. The device may analyze marker information in the call request to determine whether the call request is valid. The device may also analyze the call request, based on call pattern information of a quantity of other calls, to determine whether the call request is suspicious; and complete the call based on the determination of whether the call request is valid and the determination of whether the call request is suspicious. | 08-23-2012 |
20130152143 | SHARED LOCAL GOVERNMENT CHANNEL - A method, performed by a computer device, may include receiving content from a first local government entity; associating a virtual channel identifier with the received content; and transmitting the received content and the virtual channel identifier on a shared local government channel, wherein the shared local government channel includes content received from a second local government entity. | 06-13-2013 |
20130160062 | METHOD AND SYSTEM FOR ASSIGNING DEFINITIONS TO MEDIA NETWORK CHANNELS - An approach for assigning definitions to media network channels is described. A demand for program content of a media network channel associated with a first definition relating to resolution of the program content is determined. A second definition is assigned to the media network channel for the program content in response to the demand, wherein the second definition relates to the resolution of the program content and is higher in resolution than the first definition. | 06-20-2013 |
20130260721 | GRANULAR CONTROL SYSTEM - A method may include receiving, from a first party, restrictions associated with each of a number of applications stored on a mobile device and storing the restrictions, wherein the restrictions include time based restrictions and/or use based restrictions. The method also includes receiving, from a user of the mobile device, a request for access to a first application and providing access to the first application in response to the request. The method further includes receiving, from the user, a second request for performing a first action by the first application and determining whether first action is permitted based on the stored restrictions. | 10-03-2013 |
20140179360 | SHORT MESSAGE SERVICE VALIDATION ENGINE - A method, performed by a computer device, may include receiving a Short Message Service (SMS) message. The method may further include analyzing one or more sender parameters associated with the received SMS message to validate the one or more sender parameters; determining whether the one or more sender parameters have been validated based on the analysis; rejecting the SMS message in response to determining that the one or more sender parameters have not been validated; analyzing message content included in the SMS message to validate the message content; determining whether the message content has been validated based on the analysis; rejecting the SMS message in response to determining that the message content has not been validated; and forwarding the SMS message to a recipient, in response to validating the one or more sender parameters and in response to validating the message content. | 06-26-2014 |
20140181966 | CLOUD-BASED DISTRIBUTED DENIAL OF SERVICE MITIGATION - A method, performed by a computer device, may include receiving an indication of a distributed denial of service event at a front end system associated with a customer; generating one or more virtual front end systems for the customer, in response to receiving the indication of the distributed denial of service event; and redirecting traffic intended for the customer's front end system to the generated one or more virtual front end systems. The method may further include determining whether resource capacity of the generated one or more virtual front end systems has been reached; and generating an additional one or more virtual front end systems for the customer, in response to determining that the resource capacity of the generated one or more virtual front end systems has been reached. | 06-26-2014 |
20140282681 | CHAPTERIZED STREAMING OF VIDEO CONTENT - A method includes sending, by a user device, a request for video content based on a selected video content chapter of the video content. The method also includes receiving video content information that includes a list of video content chapters of the video content. The method includes determining, for each listed video content chapter, whether the video content chapter has been previously stored on the user device. The method further includes downloading particular chapters of the video content in a priority order based on the selected chapter in response to a determination that the particular chapters have not been previously stored on the user device, and playing the video content based on the selected chapter. | 09-18-2014 |
20150058976 | METHOD AND APPARATUS FOR MITIGATING DISTRIBUTED DENIAL OF SERVICE ATTACKS - An approach for mitigating distributed denial of service (DDoS) attacks includes assigning a set of temporary network addresses to a hostname for a finite period and assigning one or more other sets of temporary network addresses to the hostname in one or more following finite periods, responding to a hostname lookup request based on the set of temporary network addresses, the one or more other sets of temporary network addresses, or a combination thereof that are active, responding to a network address lookup request based on at least one of the set of temporary network addresses and the one or more other sets of temporary network addresses that is associated with a current one of the finite period or the one or more following finite periods, and retiring the set of temporary network addresses, the one or more sets of temporary network addresses, or a combination thereof after a configurable number of finite periods, wherein no further network address or hostname lookup request is served based on the retired set of temporary network addresses, the retired one or more sets of temporary network addresses, or a combination thereof. | 02-26-2015 |
20150067490 | VIRTUAL INTERFACE ADJUSTMENT METHODS AND SYSTEMS - An exemplary method includes a virtual interface adjustment system detecting, based on user input data associated with user input received by way of a virtual interface of a user device, an erroneous input pattern that includes at least one unintentional input, determining, based on the erroneous input pattern, an adjustment procedure configured to adjust the virtual interface to avert future unintentional inputs that correspond to the at least one unintentional input of the erroneous input pattern, determining an adjustment procedure trigger for the adjustment procedure, activating the adjustment procedure trigger, detecting, after the activating, an occurrence of the adjustment procedure trigger, and executing, in response to the detecting of the occurrence of the adjustment procedure trigger, the adjustment procedure to avert the future unintentional inputs that correspond to the at least one unintentional input of the erroneous input pattern. Corresponding methods and systems are also described. | 03-05-2015 |