Internet Radio/TV Networks
ms99-06-17 - “Lead Inventor: Henning Schulzrinne, Ph.D. Streaming Video/Audio from Internet Overload Server: Internet is an increasingly being used for delivering multimedia content, such as streaming...
View ArticleDynamically Addressing Circuit Network
m00-004 - Addressing Sources and Destinations of Information in Physical Data Network The network comprising the nodes is interconnected by links. Each Node in the network is assigned a set of...
View ArticleScheduling Interactive Audiovisual Presentations
m00-017 - “Name of the inventor: Hari Kalva Object-Based Audiovisual Presentation Scheduling Incorporated into Server A system and method for scheduling an object-based presentation that can be used as...
View ArticleData Sharing in Intermittently Connected Hosts
m00-018 - “Lead Inventor: Henning Schulzrinne, Ph.D. Wireless Networks with Sporadic Access in Buildings, Subways, Remote Areas Wireless networks may lack coverage inside a building, subways,...
View ArticleDynamic Provisioning for Differentiated Services (DiffServ)
m00-043 - “Lead Inventors: Raymond Rui-feng Liao; Andrew Campbell, Ph.D. Differentiated Services (DiffServ) for Quality-of-Service (QoS) Network Traffic requires Efficient Capacity Differentiated...
View ArticleDistributed Computer System using Graphical User Interface Toolkit
m00-070 - “Name of the inventor: Steven Feiner Computer Systems with Distributed User Interfaces Methods and systems for computer systems having distributed user interfaces are described. Interface...
View ArticleMalicious Software (Malware) Detection Using Byte Sequence Analysis
m01-039 - “Lead Inventor: Salvatore J. Stolfo, Ph.D. Malware and Viral Software Cause Disruption and Data Loss, Requiring Better Screening Strategies Malware and viral software is a serious problem in...
View ArticleComputer System Intrusion Detection by Monitoring Operating System Registry...
m02-018 - “Lead Inventors: Salvatore J. Stolfo Ph.D., Frank Apap, Andrew Honig, Shlomo Hershkop Ph.D., Eleazar Eskin, Ph.D. Windows Operating System Virus Scanners Unable to Detect New Malicious...
View ArticleAnomaly Detection and Adaptive Learning for Intrusion Detection Systems (IDSs)
m02-024 - “Lead Inventors: Salvatore J. Stolfo Ph.D., Wei Fan, Ph.D. Intrusion Detection Systems (IDSs) and Credit Card Fraud Detection Systems With increasingly critical data being stored on computer...
View ArticleIntrusion Detection and E-Mail Security
m02-030 - “Lead Inventor: Salvatore J. Stolfo Ph.D. STV Reference: IR M02-030 & M02-031 Cyber Attacks on Computer Systems on the Rise: The number and sophistication of intrusion attacks on computer...
View ArticleIntrusion Detection and E-Mail Security
m02-031 - “Lead Inventor: Salvatore J. Stolfo Ph.D. STV Reference: IR M02-030 & M02-031 Cyber Attacks on Computer Systems on the Rise: The number and sophistication of intrusion attacks on computer...
View Article"Call Routing in IP (Internet Protocol) Based Telephony Network as PBX...
m01-059 - Telephony services are migrating over an IP-based network. Such services include call routing, voicemail, call forwarding, conferencing. An organization planning to deploy IP-based services...
View ArticlePredictive Application Failures in Software Code Errors
m04-065 - “Lead Inventor: Angelos D. Keromytis, PhD. Tech Ventures Reference: IR M04-065, IR M05-081, IR M05-082 Intelligent software application instrumentation for code failure: Software applications...
View ArticleRuntime detection and deactivation of malicious software
m04-074 - To detect malicious software behavior, this technology intercepts calls to operating system services and libraries and determines from what locations in memory the call originated. Calls made...
View ArticleDetecting Targeted Attacks Using Shadow Honeypots in network security
m05-069 - “Lead Inventors: Angelos Keromytis, Ph.D.; Stylianos Sidiroglou; Kostas G. Anagnostakis Honeypots and anomaly detection systems capable of detecting new types of cumputer attacks: Intrusion...
View ArticleTracking Malicious Executables Using Unsupervised Online Learning
m05-075 - “Lead Inventors: Salvatore J. Stolfo, Ph.D.; Angelos D. Keromytis; Stylianos Sidiroglou Algorithm to detect viruses in email attachements removes vulnerability to zero-day malicious...
View ArticleAn encryption unit for IP protocol network security
m06-014 - “Lead Inventor: Angelos Keromytis, Ph.D. Problem or Unmet Need: IPsec provides a mechanism to establish a secure end-to-end channel between communicating parties. In an organization, such a...
View ArticleArchitecture to prevent denial-of-service attacks with stateless multipath...
m06-015 - “Lead Inventor: Angelos Keromytis, Ph.D. Websites and database security from denial-of-service attacks: Overlays networks can be used to mitigate the impact of denial-of-service attacks. They...
View ArticleSeamless access point handoff for real-time wireless multimedia communication
m06-027 - The rapidly growing availability of mobile devices has accelerated the development of real-time multimedia communication applications. This growth has resulted in an increased demand for high...
View ArticleIntrusion Detections Systems (IDS) for Inhibiting Attacks on Network...
m06-068 - “Lead Inventors: Michael Locasto, Salvatore Stolfo, Angelos Keromytis, and Ke Wang Network Defense Systems Require Reliable, Targeted, Adaptive Response to Evolving Threats One key problem...
View ArticleDesign of High Performance Session Initiation Protocol (SIP) Aware...
m06-075 - “Lead Inventor: Henning Schulzrinne, Ph.D. Session Initiation Protocol (SIP) Based Systems Require High Speed SIP Packet Processing Session Initiation Protocol (SIP) based systems being...
View ArticleAutomatic Software Self-healing Using Error Virtualization Rescue Points...
m06-099 - “Lead Inventor: Angelos D. Keromytis Software Programming Errors, Bugs, Require Recovery Mechanisms for Improved Software Quality and Security Software programming errors, referred as...
View ArticleDynamic Byzantine Patching for Software Update Testing
m06-100 - “Name of the inventor: Angelos Keromytis Dynamic Byzantine Patching for Running and Testing Software Updates Online - Dynamic Byzantine Patching provides a framework for testing updates for...
View ArticleAlgorithm Detects User Misbehavior and Security Threats in Wireless Networks
m06-101 - “Lead Inventor: Xiaodong Wang Wireless Network Device Protocol Make them Susceptible to Protocol Misbehavior and Security Threats The carrier-sense multiple-access with collision avoidance...
View ArticlePeer to Peer (P2P) Network System for Secured Paid Content Delivery
m06-105 - “Lead Inventor: Alexander Sherman Peer to Peer (P2P) Network System Security needed for Digital Content Sale Peer to peer (P2P) network systems are not preferred by content providers due to...
View ArticleOptical Packet Buffer System is Modular, Scalable and Extensible
m07-011 - “Lead Inventors: Benjamin A. Small and Assaf Schacham Optical Buffers for Optical Packet Switching Networks can Increase Throughput and Efficiency An optical buffer is a device that is...
View ArticleNetwork Bandwidth Capacity Measurement Tool with LinkWidth
m07-029 - Bandwidth Capacity Measurement Tool with Single End TCP Probes • LinkWidth is a tool and method for estimating capacity and available bandwidth using single end controlled TCP packet probes....
View ArticleBeamforming and Power Control Systems Providing Feedback for Digital Wireless...
m07-037 - “Lead Inventor: Xiaodong Wang, Ph.D. Digital Wireless Communication Systems Face Multi-Path Fading Challenges Digital wireless communication systems such as wireless routers and mobile phones...
View ArticleP2P (Peer-to-Peer) File Sharing for Controlled, Scalable Content Distribution
m07-033 - P2P (Peer-to-Peer) File Sharing Require Exploitation Prevention for Paid Content • P2P file sharing provides a powerful content distribution model by leveraging users' computing and bandwidth...
View ArticleCellular Data Multiplexing Transmission
m07-040 - “Lead Inventor: Xiaodong Wang, Ph.D. Cellular data transmission across multiple antennas: When transmitting data wirelessly over a large distance, the wireless signal can often be corrupted...
View ArticleSession Initiation Protocol (SIP) Aware Firewalls Tests for Vulnerability
m07-044 - “Lead Inventor: Henning Schulzrinne, Ph.D. Session Initiation Protocol (SIP)-Based Voice-Over-IP (VoIP) Systems Firewalls Session Initiation Protocol (SIP) is an application layer protocol...
View ArticleExchanging Data between Nodes of Disconnected Networks
m07-074 - “Lead Inventors: Henning G. Schulzrinne, Ph.D., Suman R. Srinivasan Wireless Networks Don’t Reach Everywhere: Wireless networks are widespread today. Many people rely on being connected to...
View ArticleSIP-Aware Denial-of-Service Detection and Mitigation Systems
m07-092 - “Lead Inventor: Henning Schulzrinne, Ph.D. Hackers use Denial-of-Service Attacks Against VoIP and SIP Phones : Denial-of-service (DoS) is an attempt by attackers to prevent legitimate users...
View ArticleIntegrated Enterprise Network Security Management
m07-096 - “Lead Inventor: Angelos D. Keromytis, Ph.D. Network Security Firewalls, User Password Protection Inadequate: Current network security generally depends on a firewall to protect an internal...
View ArticlePower Control Strategy for MIMO with OFDM Wireless Communications
m07-101 - “Lead Inventors: Xiaodong Wang, Ph.D., Filippo Zuccardi Merli MIMO with OFDM Communication for Wireless Systems: In the last few years multi-input multi-output (MIMO) communication has...
View ArticlePeer-to-Peer Video Streaming for Set-Top Based IP Network
m07-102 - “Lead Inventor: Henning Schulzrinne, Ph.D. Streaming Movies and Videos Uses Large Bandwidth: Streaming videos and movies over the Internet are increasingly becoming popular. Devices such as...
View ArticleDetecting Theft-of-Service in SIP-based Systems
m07-103 - “Lead Inventor: Henning Schulzrinne, Ph.D. Theft of Service Prevention for Session Initiation Protocol Services: Session Initiation Protocol (SIP) based Voice-over-IP (VoIP) services are more...
View ArticleSignaling Compression for Push-to-Talk Over Cellular
m08-003 - “Lead Inventors: Andrea Forte, Henning Schulzrinne, Ph.D. Session Initiation Protocol for Push-To-Talk Over Cellular Has Message Size Limitations: There are two issues in using Session...
View ArticleFair and efficient bandwidth allocation for peer-to-peer networking
m08-093 - Peer-to-peer (P2P) networks allow users to share content directly without a centralized server by leveraging each user’s ability to both upload and download files. In current P2P models,...
View ArticleUsing Conference-Servers for SIP-based Vertical Handoff Technique for...
m08-094 - “Lead Inventor: Henning G. Schulzrinne, Ph.D. Transferring a Call Between Cellular and Wireless Networks Without Interruption VoIP technology has been popular with landline phones to allow...
View ArticleSIP Server Overload Mechanisms
m09-021 - “Lead Inventors: Henning Schulzrinne, Ph.D., Charles Shen Preventing Congestion Collapse of Session Initation Protocol Servers Session Initiation Protocol (SIP) is a protocol for establishing...
View ArticleReal-time video chat application performance measurement tool
m09-086 - Capture-to-display latency (CDL) and frame-rate are two metrics that provide quick insights into the performance of real-time video applications such as video chat and conferencing. This...
View ArticleAnonymization and privatization of sensitive network data
m09-088 - “Lead Inventor: Salvatore J. Stolfo Ph.D. Computer network tracing using new method to anonymize, privatize and protect data: Computer network traces, i.e., copies of network packets or...
View Article"Voice over IP for air traffic communications "
m10-043 - “Lead Inventors: Henning Schulzrinne, Ph.D.; Xiaotao Wu, Ph.D.; Supreeth Subramanya Air traffic controller system using voice over IP replaces analog hardware: The Federal Aviation...
View ArticleProtecting running multithreaded applications from races without a restart
m11-009 - Large software applications such as web and database servers employ multiple threads of execution in order to facilitate development or improve performance. Multithreaded software often...
View ArticleLow-Voltage Optical Phase Modulators and Tunable Filters
cu12018 - Optical information processing and transmission systems afford significant speed and bandwidth advantages compared to electrical systems. These systems rely upon components such as spectral...
View ArticleCompact high-power transmitter for long-range high-speed millimeter-wave...
cu15078 - The technology is a digital polar phased array transmitter architecture for wireless communication in the millimeter-wave spectrum (30-300 GHz). Using multiple stacked digital-to-analog...
View ArticleEfficient neighbor discovery for ultra-low power wireless devices
cu15281 - Object tracking can be achieved by affixing ultra-low power wireless transmitters (nodes) to desired inventories, where neighboring nodes then communicate to exchange information. To minimize...
View ArticleClient-Server Interaction in Interactive Communications
ms98-02-17 - Client-Server Interaction in Communication Systems These communication systems are based on the MPEG-4 standard. The system and method for communicating command information between a...
View ArticleNetwork Switch for Failure Restoration
ms98-03-26 - “Name of the inventor: Thomas Stern Restoring Network Switch Failures: A system and method for automatically restoring a network which contains a node with a failed switch are described....
View Article