Patent application number | Description | Published |
20100074132 | Systems for Providing Feedback to Sending Entities - Systems for providing feedback to sending entities are provided. In some embodiments, systems for providing feedback to at least one sending entity that sends requests are provided, the systems comprising: a receiving entity comprising at least one processor that: determines a number of active sources associated with each of the at least one sending entity; determines a number of sessions that each of the at least one sending entity is able to accept based on the number of active sources determined; and provides an indication of the number of sessions to each corresponding one of the at least one sending entity. | 03-25-2010 |
20120008495 | Methods And Systems For Controlling SIP Overload - Techniques for controlling Session Initiation Protocol (SIP) overload between a sending entity and a receiving entity includes receiving a message at a send buffer at the sending entity and forwarding the message to a receive buffer at the receiving entity if the send buffer is empty of other messages or rejecting the message if the send buffer is not empty of other messages. | 01-12-2012 |
20130145425 | VERIFICATION SERVICE - Concepts and technologies are disclosed herein for verifying sender information. According to various embodiments of the concepts and technologies disclosed herein, a verification service can determine, receive a request, or receive a call to verify sender information associated with data. The server computer generates and delivers a verification message to a sender device in response to determining that sender information verification is to be provided. The server computer receives a response indicating if the data was sent by the sender device. If the response indicates that the sender device did not send the data, the server computer can block delivery of the data, generate alarms or alerts, take other actions, and/or take no action. If the response indicates that the sender device sent the data, the server computer can deliver the data, provide a verification response to the recipient device, take no action, and/or take other actions. | 06-06-2013 |
20130145465 | MULTILAYERED DECEPTION FOR INTRUSION DETECTION AND PREVENTION - Concepts and technologies are disclosed herein for multilayered deception for intrusion detection. According to various embodiments of the concepts and technologies disclosed herein, a multilayer deception system includes honey servers, honey files and folders, honey databases, and/or honey computers. A multilayer deception system controller generates honey activity between the honey entities and exposes a honey profile with contact information associated with a honey user. Contact directed at the honey user and/or activity at any of the honey entities can trigger alarms and/or indicate an attack, and can be analyzed to prevent future attacks. | 06-06-2013 |
20140006374 | METHOD AND APPARATUS FOR DERIVING AND USING TRUSTFUL APPLICATION METADATA | 01-02-2014 |
20140006375 | METHOD AND APPARATUS FOR ROBUST MOBILE APPLICATION FINGERPRINTING | 01-02-2014 |
20140006418 | METHOD AND APPARATUS FOR RANKING APPS IN THE WIDE-OPEN INTERNET | 01-02-2014 |
20140006440 | METHOD AND APPARATUS FOR SEARCHING FOR SOFTWARE APPLICATIONS | 01-02-2014 |
20140223023 | SYSTEMS FOR PROVIDING FEEDBACK TO SENDING ENTITIES - Systems for providing feedback to sending entities are provided. In some embodiments, systems for providing feedback to a sending entity that sends a request for session are provided, the systems comprising: a receiving entity that receives the request for session from the sending entity, wherein the request for session is used to establish a communication session that takes place after processing the request for session, and wherein the receiving entity comprises at least one hardware processor that: assigns a freed processing slot to the sending entity in response to determining that the request for session has been processed by the receiving entity and that a number of requests for sessions to be processed is less than a first limit. | 08-07-2014 |
20140259112 | Verificaiton Service - Concepts and technologies are disclosed herein for verifying sender information. According to various embodiments of the concepts and technologies disclosed herein, a verification service can determine, receive a request, or receive a call to verify sender information associated with data. The server computer generates and delivers a verification message to a sender device in response to determining that sender information verification is to be provided. The server computer receives a response indicating if the data was sent by the sender device. If the response indicates that the sender device did not send the data, the server computer can block delivery of the data, generate alarms or alerts, take other actions, and/or take no action. If the response indicates that the sender device sent the data, the server computer can deliver the data, provide a verification response to the recipient device, take no action, and/or take other actions. | 09-11-2014 |
20140259172 | Multilayered Deception for Intrusion Detection and Prevention - Concepts and technologies are disclosed herein for multilayered deception for intrusion detection. According to various embodiments of the concepts and technologies disclosed herein, a multilayer deception system includes honey servers, honey files and folders, honey databases, and/or honey computers. A multilayer deception system controller generates honey activity between the honey entities and exposes a honey profile with contact information associated with a honey user. Contact directed at the honey user and/or activity at any of the honey entities can trigger alarms and/or indicate an attack, and can be analyzed to prevent future attacks. | 09-11-2014 |