Internet Radio/TV Networks
ms99-06-17 - “Lead Inventor: Henning Schulzrinne, Ph.D. Streaming Video/Audio from Internet Overload Server: Internet is an increasingly being used for delivering multimedia content, such as streaming...
View ArticleDynamically Addressing Circuit Network
m00-004 - Addressing Sources and Destinations of Information in Physical Data Network The network comprising the nodes is interconnected by links. Each Node in the network is assigned a set of...
View ArticleScheduling Interactive Audiovisual Presentations
m00-017 - “Name of the inventor: Hari Kalva Object-Based Audiovisual Presentation Scheduling Incorporated into Server A system and method for scheduling an object-based presentation that can be used as...
View ArticleData Sharing in Intermittently Connected Hosts
m00-018 - “Lead Inventor: Henning Schulzrinne, Ph.D. Wireless Networks with Sporadic Access in Buildings, Subways, Remote Areas Wireless networks may lack coverage inside a building, subways,...
View ArticleDynamic Provisioning for Differentiated Services (DiffServ)
m00-043 - “Lead Inventors: Raymond Rui-feng Liao; Andrew Campbell, Ph.D. Differentiated Services (DiffServ) for Quality-of-Service (QoS) Network Traffic requires Efficient Capacity Differentiated...
View ArticleDistributed Computer System using Graphical User Interface Toolkit
m00-070 - “Name of the inventor: Steven Feiner Computer Systems with Distributed User Interfaces Methods and systems for computer systems having distributed user interfaces are described. Interface...
View ArticleMalicious Software (Malware) Detection Using Byte Sequence Analysis
m01-039 - “Lead Inventor: Salvatore J. Stolfo, Ph.D. Malware and Viral Software Cause Disruption and Data Loss, Requiring Better Screening Strategies Malware and viral software is a serious problem in...
View ArticleComputer System Intrusion Detection by Monitoring Operating System Registry...
m02-018 - “Lead Inventors: Salvatore J. Stolfo Ph.D., Frank Apap, Andrew Honig, Shlomo Hershkop Ph.D., Eleazar Eskin, Ph.D. Windows Operating System Virus Scanners Unable to Detect New Malicious...
View ArticleAnomaly Detection and Adaptive Learning for Intrusion Detection Systems (IDSs)
m02-024 - “Lead Inventors: Salvatore J. Stolfo Ph.D., Wei Fan, Ph.D. Intrusion Detection Systems (IDSs) and Credit Card Fraud Detection Systems With increasingly critical data being stored on computer...
View ArticleIntrusion Detection and E-Mail Security
m02-030 - “Lead Inventor: Salvatore J. Stolfo Ph.D. STV Reference: IR M02-030 & M02-031 Cyber Attacks on Computer Systems on the Rise: The number and sophistication of intrusion attacks on computer...
View ArticleIntrusion Detection and E-Mail Security
m02-031 - “Lead Inventor: Salvatore J. Stolfo Ph.D. STV Reference: IR M02-030 & M02-031 Cyber Attacks on Computer Systems on the Rise: The number and sophistication of intrusion attacks on computer...
View ArticleAnomaly Identification for Intrusion Detection and Forensics
m02-032 - “Lead Inventors: Salvatore J. Stolfo, Ph.D.; Eleazar Eskin; Leonid Portnoy Intrusion Detection for Computer Networks Rely on Databases of Known Intrusion Signatures: Existing intrusion...
View ArticleMigrating Legacy and Networked Applications
m03-058 - “Lead Inventors: Jason Nieh, Ph.D., Dinesh K Subhraveti Improving Process Migration Expensive: Process migration, the ability to transfer a process from one computing device to another is a...
View Article"Call Routing in IP (Internet Protocol) Based Telephony Network as PBX...
m01-059 - Telephony services are migrating over an IP-based network. Such services include call routing, voicemail, call forwarding, conferencing. An organization planning to deploy IP-based services...
View ArticlePredictive Application Failures in Software Code Errors
m04-065 - “Lead Inventor: Angelos D. Keromytis, PhD. Tech Ventures Reference: IR M04-065, IR M05-081, IR M05-082 Intelligent software application instrumentation for code failure: Software applications...
View ArticleRuntime detection and deactivation of malicious software
m04-074 - To detect malicious software behavior, this technology intercepts calls to operating system services and libraries and determines from what locations in memory the call originated. Calls made...
View ArticleDetecting Targeted Attacks Using Shadow Honeypots in network security
m05-069 - “Lead Inventors: Angelos Keromytis, Ph.D.; Stylianos Sidiroglou; Kostas G. Anagnostakis Honeypots and anomaly detection systems capable of detecting new types of cumputer attacks: Intrusion...
View ArticleTracking Malicious Executables Using Unsupervised Online Learning
m05-075 - “Lead Inventors: Salvatore J. Stolfo, Ph.D.; Angelos D. Keromytis; Stylianos Sidiroglou Algorithm to detect viruses in email attachements removes vulnerability to zero-day malicious...
View ArticleAn encryption unit for IP protocol network security
m06-014 - “Lead Inventor: Angelos Keromytis, Ph.D. Problem or Unmet Need: IPsec provides a mechanism to establish a secure end-to-end channel between communicating parties. In an organization, such a...
View ArticleArchitecture to prevent denial-of-service attacks with stateless multipath...
m06-015 - “Lead Inventor: Angelos Keromytis, Ph.D. Websites and database security from denial-of-service attacks: Overlays networks can be used to mitigate the impact of denial-of-service attacks. They...
View Article