07th week of 2016 patent applcation highlights part 54 |
Patent application number | Title | Published |
20160050165 | QUICK NAVIGATION OF MESSAGE CONVERSATION HISTORY - A messaging application running on a computing device utilizes a navigation model that exposes user interfaces (UIs) which implement a messaging conversation history in a minimized form so that a user can quickly jump to a desired conversation displayed on a chat card without having to toggle back and forth between a conventional messaging list view and chat card views. The minimized conversation history can be implemented using a scrollable carousel of images that is persistently displayed on the UI. The images represent messaging participants (i.e., contacts) that are arranged in an ordered display according to conversation history. The particular contact that is associated with the currently displayed chat card is highlighted in the carousel using color and/or other graphic treatments. As messaging activities occur and new messages come in and are sent out, the carousel is dynamically updated to show the contacts in the appropriate sorted historical order. | 2016-02-18 |
20160050166 | EXPRESSING STATEMENTS IN MESSAGES WITH PERSONALIZED EXPRESSION STYLE - Many computing scenarios enable a user to send a message to a user expressing a statement, such as a “happy birthday” message or a “let's meet for lunch” message, and may seek assistance in composing the message. Some services may suggest stock messages, which the user may browse and select, but the generic, impersonal style of the messages may be apparent to the recipient. Presented herein are techniques for composing a message from a user to a recipient expressing a selected statement in the personalized style of the user. Such techniques involve evaluating an expression set (e.g., a mailbox or text message set) of the user to identify an expression style of the user when expressing such statements to such recipients, and composing a message that expressing the statement in the expression style of the user. | 2016-02-18 |
20160050167 | MATCHING CONVERSIONS FROM APPLICATIONS TO SELECTED CONTENT ITEMS - Matching conversions from within applications on a client device to interactions with content items presented with resources may include receiving first data associated with an interaction with a content item displayed with a resource. The first data includes an application identifier for an application associated with the content item and an account identifier. The matching may also include receiving second data from the client device associated with a conversion using the application. The second data includes the application identifier and a device identifier for the client device. The matching may further include receiving third data from the client device that includes the account identifier and the device identifier. The conversion can be determined as associated with the interaction with the content item displayed with the resource based on matching the second data with the first data based on the third data. | 2016-02-18 |
20160050168 | SYNCHRONIZED SINGLE-ACTION GRAPHICAL USER INTERFACES FOR ASSISTING AN INDIVIDUAL TO UNIFORMLY MANAGE COMPUTER-IMPLEMENTED ACTIVITIES UTILIZING DISTINCT SOFTWARE AND DISTINCT TYPES OF ELECTRONIC DATA, AND COMPUTER-IMPLEMENTED METHODS AND COMPUTER-BASED SYSTEMS UTILIZING SUCH SYNCHRONIZED SINGLE-ACTION GRAPHICAL USER INTERFACES - An inventive exemplary graphical user interface which includes a visual display component specifically programmed with a plurality of actionable features allowing a user to perform at least the following: moving to and from the visual display component at least the following items: a first object corresponding to a first native application; a second object corresponding to a second native application, where the first native application is distinct from the second native application; a first data item of a first data type; and a second data item of a second data type, where the first data type is distinct from the second data type; where each of such items is moved by utilizing a single action while each item is in an active form or an inactive form; tracking such items based on timing of actions involving such items; and interacting as if each item being in a native computing environment. | 2016-02-18 |
20160050169 | Method and System for Providing Personal Emoticons - The present invention relates to a method of providing personal emoticons by applying one or more image processing filters and/or algorithms on a self-portrait image for performing at least one of the following tasks: enhancing said provided image, recognizing the face expression, and/or emphasizing the face expression represented by the provided image, and converting said process image into one or more emoticon/s format such that the image file is standardize into a pixel array of uniform dimensions to be used as personal emoticons in one or more applications and/or operating system based platforms by a software component that allows a user to enter characters on a computer based device. | 2016-02-18 |
20160050170 | TERNIMAL DEVICE, METHOD AND RECORDING MEDIUM CONTAINING PROGRAM FOR MESSAGE PROCESSING - The present disclosure provides a terminal device. The terminal device includes: a communication unit configured to transmit or receive a message containing at least one of text, video and audio, through a communication network; a memory unit configured to store a plurality of message processing applications, and a message database (DB); and a control unit configured to perform a first delivering of the message, received through the communication unit, to the plurality of message processing applications through a first transmission path, and a second delivering, after a first predetermined time from said first delivering, of the received message again to a first message processing application among the plurality of message processing applications through a second transmission path. | 2016-02-18 |
20160050171 | SYSTEMS AND METHODS FOR SENDING DIGITAL IMAGES - Facial recognition algorithms may identify the faces of one or more people in a digital image. Multiple types of communication may be available for the different people in the digital image. A user interface may be presented indicating recognized faces along with the available forms of communication for the corresponding person. An indication of the total number of people available to be communicated with using each form of communication may be presented. The user may have the option to choose one or more forms of communication, causing the digital image to be sent to the recipients using the selected forms of communication. An individual may have provided information for facial recognition of the individual to a service. Based on the information, the service may recognize that the individual is in an uploaded picture and send the digital image to the user account of the individual. | 2016-02-18 |
20160050172 | DIGITAL MEDIA MESSAGE GENERATION - A method of generating a digital media message includes receiving a first digital content segment via an electronic device, associating the first digital content segment with a first position in a play sequence, receiving a second digital content segment different from the first digital content segment, and receiving a third digital content segment different from the first and second digital content segments. The method also includes adding the second and third digital content segments to the play sequence such that the second digital content segment is presented simultaneously with at least one of the first and third digital content segments when the digital media message is played. Such a method further includes providing the digital media message for sharing with a remote electronic device. | 2016-02-18 |
20160050173 | INFORMATION PROCESSING APPARATUS WHICH COOPERATE WITH OTHER APPARATUS, AND METHOD FOR CONTROLLING THE SAME - An information processing apparatus is configured to transmit transmission target data to another information processing apparatus. The information processing apparatus includes a display control unit configured to display at least one object corresponding to the transmission target data together with a live view image on a display screen, and a receiving unit configured to receive an association operation for associating any one of the objects with any one of photographic subjects included in the live view image on the display screen. The information processing apparatus includes an identifying unit configured to identify another information processing apparatus associated beforehand with the photographic subject to be subjected to the association operation received by the receiving unit as a transmission destination to which the transmission target data corresponding to the object associated with the photographic subject is transmitted. | 2016-02-18 |
20160050174 | Profile-Based Message Control - A computer system includes a profile associated with one or more logic modules. Each logic module specifies a condition and a corresponding action. The profile may be applied to context data, such as messages transmitted over a network, to perform the actions specified by the logic modules in response to detecting that the context data satisfies the conditions specified by the logic modules. The profile may have an activation state, in which case the logic modules may be applied to the context data only if the profile's activation state indicates that the profile is active. One application of the system is to perform different actions (such as blocking, forwarding, deferring, and allowing) in connection with messages transmitted via different modes of communication (such as one or more of email communication, text messaging communication, and live voice call communication). | 2016-02-18 |
20160050175 | ALERTING A MEETING PARTICIPANT TO REJOIN A VIDEOCONFERENCE - Meeting participants of a videoconference can be enabled to alert the other meeting participants that they are going to be away from or inattentive during a portion of the videoconference. For example, each meeting participant can be presented with a user interface element, such as a button, that the meeting participant can select to alert the other meeting participants that the meeting participant will be away or inattentive during a portion of the videoconference. The meeting participants can also be enabled to alert an away meeting participant to rejoin the videoconference. For example, meeting participants can be presented with a user interface element, such as a button, that can be selected to send an alert to an away meeting participant to rejoin the teleconference. A meeting participant can also select to be alerted when a specified alert trigger occurs, such as when a specified word or phrase is used. | 2016-02-18 |
20160050176 | SYSTEMS AND METHODS FOR ESTABLISHING OR MAINTAINING A PERSONALIZED TRUSTED SOCIAL NETWORK - Automated systems and methods are provided for establishing or maintaining a personalized trusted social network for a community of users, with little or no input from any given user. To establish the personalized trusted social network, one or more trusted sources are identified for a given user. The identified trusted sources are added to a user profile for the given user. Also, identified are any annotations, bookmarks, or the like that the identified trusted sources have associated with any shared content. These annotations provide access to microcontent items that the identified trusted sources have integrated with the shared content to thereby enhance or enrich its context. One or more profiles are constructed or updated to track the associations between the identified trusted sources and their annotations. The profile information can be applied to enhance and personalize search and browsing experiences for the given user. | 2016-02-18 |
20160050177 | MANAGING DRAFTS OF ELECTRONIC DOCUMENTS ACROSS CLIENT DEVICES - Techniques are described for managing drafts of an electronic document (e.g., an electronic note, an electronic message, an electronic calendar invitation, and/or other types of electronic documents) between client devices. Such an electronic document can be composed using different clients, such that composing the document can be continued using different clients. A draft of an electronic document can be stored by clients and/or the message management service as a metadata. A message management service can be implemented as an intermediary computing system to manage a current version of a draft in local storage when a draft is composed using a client device. The message management service can manage version information of a draft that is exists, if any, on each of the client devices. The message management service can synchronize a draft of the message with client devices when a draft is composed using a client device. | 2016-02-18 |
20160050178 | METHODS CIRCUITS DEVICES SYSTEMS AND ASSOCIATED COMPUTER EXECUTABLE CODE FOR PROVIDING CONDITIONAL DOMAIN NAME RESOLUTION - Disclosed are methods, circuits, devices, systems and associated computer executable code for providing Domain Name Resolution functionality to a data client device accessing a networked data resource through an access point of a data communication network. According to some embodiments, an access point or node of a data communication network may be integral or otherwise functionally associated with a conditional domain name system (CDNS), which CDNS may include a local cache of conditional DNS records. | 2016-02-18 |
20160050179 | METHOD AND APPARATUS FOR PROVISIONING TRAVERSAL USING RELAYS AROUND NETWORK ADDRESS TRANSLATION (TURN) CREDENTIAL AND SERVERS - Various disclosed embodiments include methods and systems for provisioning traversal using relays around network address translation (TURN) credentials and servers for network address translation/firewall (NAT/FW) traversal via a Voice-over-Internet-protocol/Web Real-Time Communication (VoIP/WebRTC) signaling channel. The method comprises receiving, at a signaling gateway, a signaling message from a first electronic device (ED) when the first electronic device registers with the signaling gateway or sends other signaling messages for requesting a TURN credential. The signaling message comprises one or more signaling message parameters. The signaling message further comprises a request that the signaling gateway generate a TURN credential for the first electronic device, the TURN credential associated with the one or more signaling message parameters. The method comprises sending, from the signaling gateway, the TURN credential to the first electronic device. | 2016-02-18 |
20160050180 | PROXY DEVICE FOR A NETWORK OF DEVICES - A proxy device for a network of devices may include memory, a device status module, a data intercept module, a network interface, and an emulation module. The memory may be configured to store an emulation policy for emulating a device in a network, where the policy includes a status criterion that indicates a status of the device for which the policy applies. The device status module may be configured to monitor the status of the device. The data intercept module may be configured to intercept action requests directed to the device. The network interface may be configured to forward the intercepted action requests to the device when the status of the device fails to satisfy the status criterion. The emulation module may be configured to emulate the device, and respond to the action request without accessing the device, when the status of the device satisfies the status criterion. | 2016-02-18 |
20160050181 | INFORMATION SECURITY THREAT IDENTIFICATION, ANALYSIS, AND MANAGEMENT - A method and systems for information security threat identification, management, and analysis, including identifying and managing threats posed by senders of unsolicited e-mail, pirates, hackers, and virus-spreaders. Methods are provided for identifying and facilitating legal action against a sender of unsolicited e-mail. A secure evidence repository can be used for storing copies of and information regarding unsolicited e-mails in a forensically sound manner. A relational knowledge database can be used for storing copies of and information regarding unsolicited e-mails such that the information can be queried, manipulated, or analyzed. | 2016-02-18 |
20160050182 | Diverting Traffic for Forensics - In one embodiment of a method, system and apparatus for diverting anomalous traffic from a host, the method, system and apparatus are described including detecting malicious traffic and communications by an endpoint agent included in a network host, the malicious traffic and communications directed from the network host to an IP address, the IP address being stored in a reputation database, sending a signal to a central server by a signaling mechanism included in the endpoint agent, the signal indicating detection of traffic directed from the network host to the IP address, the signal triggering creation of a split tunnel virtual private network (VPN) policy on a VPN server controlled by the central server, and receiving instructions at a receiver included in the endpoint agent from the VPN server to join a VPN group. | 2016-02-18 |
20160050183 | METHOD AND APPARATUS FOR PROVIDING PRIVACY ADAPTATION BASED ON RECEIVER CONTEXT - An approach is provided for determining a communication session established between at least one first device of at least one first user and at least one second device of at least one second user, wherein the at least one first device and the at least one second device are in a collaborative context detection relationship. The privacy platform causes, at least in part, a detection of a presence of at least one third user within a proximity threshold of the at least one first device, the at least one second device, the at least one first user, the at least one second user, or a combination thereof, wherein the detection is performed via the collaborative context detection relationship. The privacy platform also determines one or more modifications to one or more privacy profiles for information exchanged over the communication session based, at least in part, on the detection of the presence of the at least one third user. | 2016-02-18 |
20160050184 | METHOD FOR SECURE E-MAIL EXCHANGE - The invention relates to a secure telecommunication method for communicating information in an e-mail between a telecommunication device of a first user and a telecommunication device of a second user. The method comprises the steps of:
| 2016-02-18 |
20160050185 | SYSTEMS AND METHODS FOR PROTECTING INTERNET ADVERTISING DATA - Systems and methods are disclosed for protecting user privacy in, for example, online advertising environments. The method includes receiving data related to a user in a first communication session between a host server and a client device, and generating a user profile associated with the user. The method further may include encrypting the user profile to produce encrypted user profile data and generating a decryption key for decrypting the encrypted user profile data. Thereafter, either the decryption key or a portion of the encrypted user profile data may be transmitted to the client device and then deleted from host server before ending the first communication session. The method further may include establishing a second communication session between the host server and the client device and retrieving the transmitted content. Then targeted advertising may be provided by decrypting the encrypted user profile data. | 2016-02-18 |
20160050186 | Method and Apparatus for Diverse Security Handling in an Enhanced Local Area Network - A method for diverse security handling may comprise: maintaining a first connection between a user equipment and a first network node, and a second connection between the user equipment and a second network node which has a third connection with the first network node; setting an indicator in a packet to indicate whether a destination of user data in the packet is the first network node or the second network node; and transmitting the packet from the user equipment to the first network node via the first connection. | 2016-02-18 |
20160050187 | METHODS AND APPARATUSES TO TRACK INFORMATION USING CALL SIGNALING MESSAGES - Methods and systems to facilitate real time communications via a telephonic apparatuses that support data communications. In one embodiment, a telephonic apparatus includes: a network interface to submit a query over a data communication network and to receive a listing with embedded information about the query; and a call module coupled to the network interface, the call module to embed the information about the query in a call signaling message for a telephonic connection according to the listing. | 2016-02-18 |
20160050188 | SYSTEMS AND METHODS FOR PROTECTING INTERNET ADVERTISING DATA - Systems and methods are disclosed for protecting user privacy in, for example, online advertising environments. The method includes receiving data related to a user in a first communication session between a host server and a client device, and generating a user profile associated with the user. The method further may include encrypting the user profile to produce encrypted user profile data and generating a decryption key for decrypting the encrypted user profile data. Thereafter, either the decryption key or a portion of the encrypted user profile data may be transmitted to the client device and then deleted from host server before ending the first communication session. The method further may include establishing a second communication session between the host server and the client device and retrieving the transmitted content. Then targeted advertising may be provided by decrypting the encrypted user profile data. | 2016-02-18 |
20160050189 | END POINT SECURED NETWORK - The disclosed embodiments include a method for receiving data packets at a host system. In one embodiment, the method includes the steps of: intercepting a data packet, at a data link layer, that is being sent to an input/output (I/O) port of the host system using a hardware device that is located between a hardware network interface and the input/output port of the host system; reading, using the hardware device, at least one parameter from the data packet; determining, by the hardware device using instructions written in memory of the hardware device, whether the at least one parameter meets an authentication criteria, wherein the host system is unable to write to the memory of the hardware device; and in response to determining that the at least one parameter meets an authentication criteria, forwarding, by the hardware device, the data packet to the input/output port of the host system. | 2016-02-18 |
20160050190 | ENABLING A CONTENT RECEIVER TO ACCESS ENCRYPTED CONTENT - There is described a method of enabling a content receiver to access encrypted content, the content receiver forming part of a home network. The method comprises executing, on a device that also forms part of the home network, a key provisioning application. The method further comprises the key provisioning application receiving a key provisioning message and, based on the key provisioning message, providing to the content receiver via the home network one or more content decryption keys for decrypting the encrypted content. There is also described a device arranged to carry out this method. In addition, there is described a content receiver arranged to (a) receive from the aforementioned device, via a home network, one or more content decryption keys for accessing encrypted content; and (b) decrypt encrypted content using the one or more content decryption keys. Related computer programs and computer readable mediums are also described. | 2016-02-18 |
20160050191 | INTELLIGENT DELIVERY SYSTEM - An access control system includes a plurality of containers. Each container comprises a container identification feature, an interior space, a locking device which can be selectively released to access the interior space, and a security module. The security module comprises an authorization module, and a security key generator which generates a security key. An authorization key supply device comprises a storage device and a communication module which directly or indirectly supplies an authorization key to the authorization module. A remote computer system comprises an authorization key generator. The remote computer system communicates with the authorization key supply device to transmit the authorization key thereto. The authorization module compares the security key with the authorization key and generates a signal to release the locking device if the security key matches the authorization key. | 2016-02-18 |
20160050192 | MULTI-DIMENSIONAL FRAMEWORK FOR DEFINING CRITERIA THAT INDICATE WHEN AUTHENTICATION SHOULD BE REVOKED - Methods and systems are presented for defining criteria that indicate when authentication for an identified client device should be revoked based on rules associated with interested parties. Authentication information is stored that indicates that an identified client device is authenticated. Rules that are associated with a plurality of interested parties and include rules of different rule types may also be stored. Criteria may be defined based on the rules and the authentication information, the criteria indicating when authentication of the identified client device should be revoked. Authentication of the identified client device may be revoked based on the criteria. | 2016-02-18 |
20160050193 | SYSTEM AND METHODS FOR SECURE COMMUNICATION IN MOBILE DEVICES - A system and a method for secure communication in a mobile computing device involve obtaining, by a first program installed on the mobile computing device, an access credential from an authentication server on behalf of a second program installed on the mobile computing device. The second program submits the access credential to a remote resource as proof that the second program has been authenticated by the authentication server. Upon successful verification of the access credential, the remote resource allows the second program to access data. | 2016-02-18 |
20160050194 | WEB-BASED GOVERNANCE OF MESSAGING SERVICES - A system for messaging application governance including an application server computer configured to provide an application service, an administration module, and a communication module. The application service accesses data indicative of user-specific rules for a user account. The user-specific rules govern usage of a messaging application by a messaging user associated with the user account. The administration module is configured to provide an administration interface. The administration interface is configured to allow an administrator user associated with the user account to specify the user-specific rules for the user account. The communication module is configured to support messaging services between client instances of the messaging application. The communication module is communicatively coupled to the application service to provide the messaging services for the user account in accordance with the user-specific rules. | 2016-02-18 |
20160050195 | System and Method for Limited Records Access for Event Scheduling - The longstanding problems of user password management and security, and user authentication are addressed. Disclosed is a system and method for providing a means for a user to identify themselves with configurable levels of authentication in order to receive limited access or services while protecting user privacy. As a user inputs information related to their identity into an interface, the system searches an indexed database which may include both registered users and/or unregistered customers indexed from disparate data sources. The system presents the user matching results from the search in an obscured form from which the user selects and authenticates his or her identity. Unregistered users identified during the process may be automatically registered in certain embodiments, or no account may be needed in other embodiments. | 2016-02-18 |
20160050196 | Control Device and Method for Electronic Atomization Device Based on Mobile Terminal - Disclosed are a control device and a control method for electronic atomization device based on mobile terminal. The device includes a Bluetooth control module, a matching module and an authentication module. The control method includes steps of: building a Bluetooth connection between battery and mobile terminal; sending atomizer identification information stored in atomizer to the mobile terminal and then carrying out a match by comparing the atomizer identification information and original identification information; and searching corresponding user identification information according to serial number of the battery, receiving authentication information entered by user and then carrying out an authentication by comparing the authentication information entered by user and the user identification information. By using authentication device and powerful computing ability of the mobile terminal directly, both of authentication for the electronic atomization device and match between the battery of electronic atomization device and atomizer can be achieved on the mobile terminal. | 2016-02-18 |
20160050197 | AUDIO AUTHENTICATION SYSTEM - According to one embodiment, an apparatus is provided that comprises a memory, an interface, and a processor communicatively coupled to the memory and to the interface. The memory can store a conversion rule. The interface can receive an audio signal and receive a file. The file indicates a start time, an end time, a key, and a password. The processor can clip the audio signal from the start time to the end time to produce a portion of the audio signal. The processor can convert, based at least in part upon the conversion rule, the portion of the audio signal using the key to form a converted portion of the audio signal. The processor can determine that the converted portion of the audio signal matches the password. The interface can communicate a response indicating that the converted portion of the audio signal matches the password. | 2016-02-18 |
20160050198 | METHOD AND SYSTEM OF PROVIDING A PICTURE PASSWORD PROOF OF KNOWLEDGE AS A WEB SERVICE - A server provides a picture password proof of knowledge. The server includes a processor creating a user identifier when communicating with a relying party (RP) server, sending the identifier to the RP server, creating a login token in response to a user authentication request originating from a client browser (CB), sending a web address containing the login token to the RP server, receiving and authenticating actions from the CB regarding the proof of knowledge, generating and sending an authentication token to the CB responsive to the received and authenticated actions, receiving from the RP server a request for an identification token, the request including the authentication token, and generating and sending the identification token to the RP server to enable the user at the CB to be verified and logged-in to the RP server. | 2016-02-18 |
20160050199 | KEY MANAGEMENT USING QUASI OUT OF BAND AUTHENTICATION ARCHITECTURE - A portable apparatus is removably and communicatively connectable to a network device to communicate authentication or authorization credentials of a user in connection with the user logging into or entering into a transaction with a network site. The apparatus includes a communications port to connect and disconnect the apparatus to and from the network device and to establish a communication link with the network device when connected thereto. A processor receives a secure message from the network security server via the port. The message has a PIN for authenticating the user to the network site, and is readable only by the apparatus. The processor either transfers, via the port, the received PIN to an application associated with the network site that is executing on the network device or causes the apparatus to display the received PIN for manual transfer to the application associated with the network site. | 2016-02-18 |
20160050200 | Network Identity Certificate Pinning - Systems, methods and apparatuses for ensuring that a computing device is attempting to connect to a network, such as a wireless network, provided by an expected or trusted entity. For instance, a certificate may be generated for a network and/or associated with the network. The certificate may then be transmitted to one or more computing devices that may be authorized to access the network. Accordingly, when the computing device selects the network for connection, the system may determine whether the certificate associated with the network is paired with the certificate provided on the computing device. If so, the computing device may be permitted to transmit data over the network. Alternatively, if the network certificate is not paired with the certificate provided on the computing device, the computing device may be prevented from transmitting data over the network. | 2016-02-18 |
20160050201 | METHOD FOR AUTHENTICATING USERS AND DEVICES ON A COMPUTING NETWORK - A method for authenticating users and devices on a computing network is disclosed. The method includes authenticating a user and a user's device with a computing network based upon received authentication data from the user's device. A session-associated security code having an end-of-session expiration and a task-associated security code having an end-of-task expiration are required for executing task-based requests over the network. The task-based request required to be transmitted in a predefined protocol. In operation, the computing network receives a computing task request for a user's device as a string having a predetermined sequence commensurate with the predefined protocol. The computing network executes the computing task. The method further includes terminating the task-associated security code upon concluding the executing, generating a second task-associated security code and a second session-associated security code based upon usage metrics. | 2016-02-18 |
20160050202 | IDENTITY CARD HOLDER AND SYSTEM - An identity card holder with a processor, a memory, an antenna, an interface for communicating with an identity card, positioning circuitry for obtaining position data of the identity card holder and communications circuitry for communicating with a remote server apparatus. The processor being configured to receive identification data from the identity card via the interface to identify a user, to cause a credential of the user associate with the identity card to be determined, to obtain position data of the identity card holder from the positioning circuitry and to cause restricted information related to a location to be provided to the user, where the restricted information has an access requirement related to the credential of the user and wherein the restricted information is provided to the user only if the user credential meets the access requirement and the position of the identity card holder is proximate the location. | 2016-02-18 |
20160050203 | Environment-Based Two-Factor Authentication without Geo-Location - The invention provides a method and system for accomplishing two-factor authentication for internet transactions, wherein the user of the device through which the transaction is negotiated needs to give only a single yes/no verification to the system. In some embodiments, the second factor authentication is automated without any action on the part of the user. The method calls on the user's wireless voice device for the detection of environmental wireless signals (“Short Distance Wireless Information” or “SDWI”), and uses these signals collectively as a “fingerprint” that uniquely identifies the wireless signals near the wireless voice device. The system stores these SDWI fingerprints, and later uses the stored information to establish whether or not the user's wireless voice device is near a previously-recognized SDWI. | 2016-02-18 |
20160050204 | TECHNIQUES AND SYSTEM FOR EXTENDED AUTHENTICATION - An apparatus may include a memory to store authentication information for authenticating to a device group and a wearable device identifier for an unauthenticated device, a communications interface to transmit a probe signal over a local communication path and receive a reply message to the probe signal, and a device authentication module. The device authentication module may be to monitor the reply message, and schedule transmission of the authentication information over the local communication path when the reply message comprises the device identifier and a proximity indicator that identifies a local origin of the reply message. | 2016-02-18 |
20160050205 | PREVENTING UNAUTHORIZED ACCESS TO AN APPLICATION SERVER - A method and platform for preventing unauthorized access to an application server comprises collecting access data associated with an organization, anonymizing the access data, creating identifying keys which allow the anonymized access data to be matched to its associated users, storing the identifying keys at a secure location associated with the organization, transferring the anonymized access data to an access data warehouse, and performing an analysis on the anonymized access data. The access data warehouse can be maintained in a cloud computing environment, and may aggregate anonymized access data from a plurality of organizations. An organization may detect abnormal usage patterns by analyzing its usage data and the anonymized usage data of further organizations, and may use the abnormal usage patterns to predict future events, for example intrusion attempts. An organization can automatically generate protective measures against potential threats associated with abnormal usage patterns. | 2016-02-18 |
20160050206 | ACCESS TO A SUBSET OF INFORMATION RELATIVE TO A USER - One embodiment described herein is a method comprising obtaining at least one sharing rule, each sharing rule associated with at least one subset of information and defined by at least one criterion to be verified in order to authorize making available to a consulter the associated subset of information, at least one criterion specifying at least one place of publication where the publisher—must be situated and/or at least one place of consultation where a consulter must be situated. It may include obtaining a location of the publisher user and/or a location of the consulter, identification on the basis of the location or locations obtained of at least one information subset for which all the criteria of at least one associated sharing rule are satisfied, making available—via a terminal of at least one consulter of at least one identified subset of information. | 2016-02-18 |
20160050207 | APPARATUS, AND ASSOCIATED METHOD, FOR CONTROLLING CONNECTIVITY OF A COMPUTER DEVICE WITH A COMPUTER NETWORK - A computer device can include a plurality of network adapters each operable to connect the computer device with a network, such as a private wired local area network (LAN) or a wireless local area network (WLAN). The computer device can include a controller to detect and select a first network of the plurality of networks. The controller can further enable a first network adapter of computer device to connect the computer device with the first network. In response to enabling the first network adapter, the controller can disable the other network adapter(s) to prevent connectivity with the other network(s). | 2016-02-18 |
20160050208 | MOBILE DEVICE ENABLED TIERED DATA EXCHANGE VIA A VEHICLE - A mobile device enabled tiered data exchange via a vehicle is disclosed. A mobile device can access profile information related to a tiered-data sharing profile. The tiered-data sharing profile can associate data with a sharing tier designating security, privacy, or authorization constraints on sharing the associated data. A sharing tier can further designate obfuscation of the data as a constraint on sharing the data. The mobile device can enable access to the data subject to the constraints of the tiered-data sharing profile. In an embodiment, tiered data can be shared from the mobile device to an external service device via vehicle device. In another embodiment, tiered data can be shared from the mobile device to a service device of the vehicle. | 2016-02-18 |
20160050209 | ACCESS CONTROL BASED ON AUTHENTICATION - Systems and methods for granting access to different applications and/or functionalities on a user device based on at least a length of authentication provided by a user are described. A user preconfigures an authentication control program by establishing two or more authentications that are of different length or type from each other, and associates each authentication with a level of access. When the user provides a valid authentication for full access to unlock the user device, the user is granted access to all applications on the user device. When the user enters a valid authentication for partial access, the user is granted varying levels of access to applications on the user device depending on the length or type of the authentication. | 2016-02-18 |
20160050210 | METHOD AND SYSTEM FOR MAINTAINING PRIVACY IN A MACHINE DIRECTED WORKFLOW FOR THE PURPOSE OF CREATING A SET OF AUTHORIZED USERS - Various of the disclosed embodiments concern methods and systems for maintaining privacy in a machine directed workflow for the purpose of creating a set of authorized users. According to one embodiment, the system maintains privacy by dividing information associated with a user into three privacy tiers. First privacy tier is configured to authorize access to all users. Second and third privacy tiers are configured to limit access to a subset of users. Once the system matches the users and receives authorization from the users, the system creates a set of authorized users, which can freely send messages to each other, and share first, second and third privacy tiers of information with each other. | 2016-02-18 |
20160050211 | ACCESS MANAGEMENT USING ELECTRONIC IMAGES - Techniques are described for an access management system to manage access to a service (e.g., a message management service). A client can receive a message including an electronic image from a messaging service. The electronic image can include access information for obtaining access to a message management service. Input is received that indicates interaction with the electronic image in an interface. The client can send, to the access management system, the electronic image to request access to the message management service based on the access information. Authorization is received from the access management system indicating that the account can access the message management service. The client displays an interface to provide access to the message management service. The access to the message management service can be based on the authorization. | 2016-02-18 |
20160050212 | METHOD AND APPARATUS FOR ASSIGNING DEVICES TO A MEDIA SERVICE - A user interface is used to assign different devices and device types to media services where the number of different devices and device types that are capable of being assigned is determined by access privilege information corresponding to such media services. When a number of devices of a specific type are assigned where such a number exceeds a limit specified in the access privilege information, the assignment of additional devices of that specific type is halted. | 2016-02-18 |
20160050213 | SYSTEM, METHOD, COMPUTER PROGRAM AND DATA SIGNAL FOR THE PROVISION OF A PROFILE OF IDENTIFICATION - In one aspect, the invention provides a method for the provision of a profile, comprising the steps of receiving information relevant to an individual, formatting the information into a format suitable for use in an identification situation, and storing the information in the format. | 2016-02-18 |
20160050214 | METHOD FOR AUTOMATICALLY APPLYING ACCESS CONTROL POLICIES BASED ON DEVICE TYPES OF NETWORKED COMPUTING DEVICES - Techniques for managing access control policies are described herein. According to one embodiment, access control policies (ACPs) and access control rules (ACRs) are downloaded from a management server to a network access device (NAD) over the Internet, where the network access device is one of a plurality of network access devices managed by the management server over the Internet. In response to a request from a network client device for entering a network, a device type of the network client device is detected and an ACP identifier is determined based on the device type using the ACRs An ACP is selected from the ACPs based on the ACP identifier and enforced against the network client device. At least the selected ACP is reported to the management server to distribute the selected ACP to other network access devices. | 2016-02-18 |
20160050215 | PLATFORM TRUST EXTENSION - A system and method of providing a platform trust extension for an information handling system is disclosed herein. The platform trust extension receives a notification that an application is selected for installation or execution on an information handling system. The identify of the application or the source of the application is identified based upon a signature of the application. The platform trust extension determines whether the application or the source of the application is semi-trusted based upon the signature of the application. If the application is semi-trusted, the platform trust extension permits the application to run at an additional trust level. | 2016-02-18 |
20160050216 | CLOUD-BASED GATEWAY SECURITY SCANNING - Some embodiments of cloud-based gateway security scanning have been presented. In one embodiment, some data packets are received sequentially at a gateway device. The data packets constitute at least a part of a file being addressed to a client machine coupled to the gateway device. The gateway device forwards an identification of the file to a remote datacenter in parallel with forwarding the data packets to the client machine. The datacenter performs signature matching on the identification and returns a result of the signature matching to the gateway device. The gateway device determining whether to block the file from the client machine based on the result of the signature matching from the datacenter. | 2016-02-18 |
20160050217 | System, Method And Authorization Device For Biometric Access Control To Digital Devices - A system and method for authenticating and continuously verifying authorized users of a digital device includes an authentication device attached to an arm or wrist of authorized users. The authentication device has an accelerometer, digital radio, a processor configured to provide identity information over the radio, and to transmit motion data. The motion data is received by the digital device and the identity transmitted is verified as an identity associated with an authorized user. Input at a touchscreen, touchpad, mouse, trackball, or keyboard of the digital device is detected, and correlated with the motion data. Access to the digital device is allowed if the detected input and the detected motion data correlate, and disallowed otherwise. | 2016-02-18 |
20160050218 | Anonymous Server Based User Settings Protection - Systems and methods for verifying an application data modification are described herein. In one example, a method includes detecting modified application data in a computing device and determining the modified application data did not originate from an automatic program. The method also includes sending an identifier and the modified application data to a signing server. Furthermore, the method includes receiving encrypted data comprising the identifier and the modified application data from the signing server. Additionally, the method includes storing the encrypted data in the computing device. | 2016-02-18 |
20160050219 | BLUETOOTH BEACON PROTOCOL - Beacon devices may transmit beacon messages to alert an application on a mobile phone of the beacon device's proximity. An encrypted authorization may be used to prevent malicious attacks. Unfortunately, some operating systems, e.g., the iOS™ operating system, strip data fields in service Universally Unique Identifiers (UUIDs) from a received beacon message before the message is passed to the application. Various embodiments provide a protocol wherein the beacon device successively transmits a first beacon message (e.g., an iBeacon™ message) and a second Bluetooth® Low Energy broadcast message. The first beacon message alerts the application of the beacon device's proximity and identity while the second message contains the encrypted authorization and possibly any additional information relevant to the application. | 2016-02-18 |
20160050220 | Detection of Webcam Abuse - A method of detecting unauthorised use of a webcam or a microphone on a computer system, the method including, at the computer, identifying a process that is using the webcam or the microphone, determining whether information is visibly displayed by the computer system to indicate to a user the use of the webcam or the microphone by the process; and using a result of the step of determining to identify said process as malware or potential malware. | 2016-02-18 |
20160050221 | ELECTRONIC MESSAGE BOARD FACT CHECKING - A fact checking system is able to verify the correctness of information and/or characterize information by comparing the information with one or more sources. The fact checking system automatically monitors, processes, fact checks information and indicates a status of the information. Fact checking results are able to be validated by re-fact checking the fact check results. | 2016-02-18 |
20160050222 | Modification of Computing Resource Behavior Based on Aggregated Monitoring Information - A computer system deploys monitoring agents that monitor the status and health of the computing resources. An analysis engine aggregates and analyzes event information from monitoring agents in order to support self-configuration, self-healing, self-optimization, and self-protection for managing the computer resources. If the analysis engine determines that a computing resource for a software application is approaching a critical status, the analysis engine may issue a command to that computing resource in accordance with a selected policy based on a detected event pattern. The command may indicate how the computing resource should change its behavior in order to minimize downtime for the software application as supported by that computing resource. The computer system may also support a distributed approach with a plurality of servers interacting with a central engine to manage the computer resources located at the servers. | 2016-02-18 |
20160050223 | SECURING OF SOFTWARE DEFINED NETWORK CONTROLLERS - Methods and arrangements for securing a software defined network. One or more control messages are intercepted. Information is extracted from the one or more control messages to create a global network state model, and there is determined, from the extracted information, presence of at least one prospective modification to the global network state model. Thereupon, a determination is made as to whether the at least one prospective modification presents a threat to security of the software defined network. Other variants and embodiments are broadly contemplated herein. | 2016-02-18 |
20160050224 | UNWANTED TUNNELING ALERT SYSTEM - Various systems and methods are provided that detect malicious network tunneling. For example, VPN logs and data connection logs may be accessed. The VPN logs may list client IP addresses that have established a VPN connection with an enterprise network. The data connection logs may list client IP addresses that have requested connections external to the enterprise network and remote IP addresses to which connections are requested. The VPN logs and the data connection logs may be parsed to identify IP addresses that are present in the VPN logs as a client IP address and in the data connection logs as a remote IP address. If an IP address is so present, user data and traffic data associated with the IP address may be retrieved to generate a risk score. If the risk score exceeds a threshold, an alert to be displayed in a GUI is generated. | 2016-02-18 |
20160050225 | ANALYZING CYBER-SECURITY RISKS IN AN INDUSTRIAL CONTROL ENVIRONMENT - A method of analyzing cyber-security risks in an industrial control system (ICS) including a plurality of networked devices includes providing a processor and a memory storing a cyber-security algorithm. The processor runs the cyber-security algorithm and implements data collecting to compile security data including at least vulnerability data including cyber-risks (risks) regarding the plurality of networked devices by scanning the plurality of devices, processing the security data using a rules engine which associates a numerical score to each of the risks, aggregating data including ranking the risks across the plurality of networked devices and arranging the risks into at least one logical grouping, and displaying the logical grouping(s) on a user station. | 2016-02-18 |
20160050226 | IN-LINE FILTERING OF INSECURE OR UNWANTED MOBILE DEVICE SOFTWARE COMPONENTS OR COMMUNICATIONS - Techniques for in-line filtering of insecure or unwanted mobile components or communications (e.g., insecure or unwanted behaviors associated with applications for mobile devices (“apps”), updates for apps, communications to/from apps, operating system components/updates for mobile devices, etc.) for mobile devices are disclosed. In some embodiments, in-line filtering of apps for mobile devices includes intercepting a request for downloading an application to a mobile device; and modifying a response to the request for downloading the application to the mobile device. In some embodiments, the response includes a notification that the application cannot be downloaded due to an application risk policy violation. | 2016-02-18 |
20160050227 | OUT OF BAND END USER NOTIFICATION SYSTEMS AND METHODS FOR SECURITY EVENTS RELATED TO NON-BROWSER MOBILE APPLICATIONS - A cloud based security method includes authenticating a mobile device through a cloud based security system; associating the mobile device with a user of the cloud based security system based on the authenticating; monitoring user requests from the mobile device by the cloud based security system; detecting security threats based on the monitoring; and sending an out of band end user notification to the mobile device responsive to detecting a security threat, wherein the out of band end user notification comprises information for the user related to the security threat. | 2016-02-18 |
20160050228 | ENABLING CUSTOM COUNTERMEASURES FROM A SECURITY DEVICE - A security device may receive information identifying a set of conditions for providing countermeasure code to a client device. The security device may receive information identifying an action to be performed when the countermeasure code is executed by the client device, and may determine the countermeasure code to be provided to the client device when the set of conditions is satisfied. The security device may receive a request from the client device, and may determine a response to the request. The response may include response code for serving content of a web page to the client device. The security device may determine that the set of conditions has been satisfied, and may insert the countermeasure code into the response code. The security device may provide the response code and the countermeasure code to the client device, and the countermeasure code may cause the client device to perform the action. | 2016-02-18 |
20160050229 | VOIP DENIAL-OF-SERVICE PROTECTION MECHANISMS FROM ATTACK - A system and method for providing advanced voice services in a wireless communications network. The system also interfaces to an Internet Protocol (IP) network to perform the advanced voice services for mobile units in the IP network and includes a protection mechanism against Voice-over-IP (VoiP) Denial-of-Service (DoS) attacks utilizing Advanced Group Services (AGS). | 2016-02-18 |
20160050230 | METHOD AND SYSTEM FOR RESTORING WEBSITES - A method for restoring a website in the event of a hack or defacement is disclosed. The method comprises the step of copying the at least one webpage of the website with at least one functional element to create a replicated website on a restorer server, the at least one functional element of the replicated website capable of accepting user input to trigger an event. The method further comprises the steps of creating at the restorer server, a secure website replica from the replicated website by deactivating the at least one functional element such that the secure website replica is incapable of accepting user input to trigger the event, and presenting the secure website replica in place of the website once the hack or the defacement of the website has been detected. | 2016-02-18 |
20160050231 | SELECTIVELY PROTECTING VALID LINKS TO PAGES OF A WEB SITE - In an embodiment, a method comprises intercepting, using a server computer, a first set of instructions that define a user interface and a plurality of links, wherein each link in the plurality of links is associated with a target page, and the plurality of links includes a first link; determining that the first link, which references a first target page, is protected; in response to determining the first link is protected: generating a first protected link that is different than the first link and includes first data that authenticates a first request that has been generated based on the first protected link and that references the first target page; and generating a first decoy link that includes second data that references a first decoy page and not the first target page; rendering a second set of instructions comprising the first protected link and the first decoy link, but not the first link, and which is configured to cause a first client computer to present the first protected link in the user interface and hide the first decoy link from the user interface; sending the second set of instructions to the first client computer. | 2016-02-18 |
20160050232 | SECURITY INFORMATION INTERACTION SYSTEM, DEVICE AND METHOD BASED ON ACTIVE COMMAND OF SECURE CARRIER - The invention proposes a security information interaction system, apparatus and method based on security carrier's active command. The method comprises: an information interaction terminal, based on a user's command, establishes a security dialogue channel between the information interaction terminal and a security carrier so as to perform a security information interaction process, wherein the user's command indicates a target application associated with the security information interaction process; and the security carrier activates the target application during the establishment of the security dialogue channel and then executes the security information interaction process based on the security dialogue channel. In the security information interaction system, apparatus and method based on security carrier active command disclosed in the invention, the security carrier can initiate an active command to the information interaction terminal. | 2016-02-18 |
20160050233 | APPLYING SECURITY POLICY TO AN APPLICATION SESSION - Applying a security policy to an application session, includes: recognizing the application session between a network and an application via a security gateway; determining by the security gateway a user identity of the application session using information about the application session; obtaining by the security gateway the security policy comprising network parameters mapped to the user identity; and applying the security policy to the application session by the security gateway. The user identity may be a network user identity or an application user identity recognized from packets of the application session. The security policy may comprise a network traffic policy mapped and/or a document access policy mapped to the user identity, where the network traffic policy is applied to the application session. The security gateway may further generate a security report concerning the application of the security policy to the application session. | 2016-02-18 |
20160050234 | SEAMLESS AUTHENTICATION ACROSS MULTIPLE ENTITIES - A user may be authenticated by an identity provider (IdP) and an authentication agent (AA), producing a result. Proof of the authentication, such as a ticket for example, may be provided to the SP. The UE may be authenticated with another IdP and another authentication agent, producing an associated result. Proof of the authentication, such as another ticket for example, may be provided to the SP. One or more of the authentication agents may reside on an authentication entity besides the UE. A multi-factor authentication proxy (MFAP) may trigger the authentication agents to nm authentication protocols and the MFAP may provide tickets to a client agent of the UE. A user may seamlessly transition between client agents on the same UE or between client agents on different UEs by leveraging authentications. | 2016-02-18 |
20160050235 | Flexible Server Architecture With Ability To Dynamically Change Gateway Communication Channels - This disclosure relates to systems, methods, and computer readable media for allowing users or systems to change the gateway for particular channels of communication in an on-demand fashion, i.e., with the “flick of a switch.” More particularly, but not by way of limitation, this disclosure relates to systems, methods, and computer readable media which, by default, directly interact with each channel of communication and then funnel messages to the appropriate connected clients. Moreover, according to the techniques disclosed herein, each user may choose which device becomes the entry and/or exit point (i.e., gateway) for each communication channel, and that device may instantly become the “master” for those messages arriving via that communication channel. The improved centralized server then knows where to automatically route such messages for each communication channel. Also disclosed herein is a novel “common message object” format for storing and searching through messages in an improved fashion. | 2016-02-18 |
20160050236 | DATA RECEIVING DEVICE, DATA RECEIVING METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM - There is provided a data receiving device including a reception controller and a read controller. The reception controller controls an access processing device to write data received through a session established with a communication device on a network to a file on a storage. The read controller manages registration information indicating association between the file and the session, and upon receiving a data reception request specifying a session from an application, outputs a read request for data of the file associated with a specified session to the storage and receive the data read from the storage. | 2016-02-18 |
20160050237 | METHOD AND DEVICE FOR ACQUIRING MULTIMEDIA DATA STREAM - A method for acquiring a multimedia data stream includes establishing, by a terminal, a socket connection with a target camera device when a preset trigger event is triggered in the terminal and sending a transfer command to the target camera device through the socket connection when an event of starting preview is detected. The transfer command instructs the target camera to transfer the multimedia data stream. The method further includes receiving the multimedia data stream transferred by the target camera device and displaying the multimedia data stream in a specified preview interface. | 2016-02-18 |
20160050238 | CONSOLIDATED PEER-TO-PEER MEDIA SESSIONS FOR AUDIO AND/OR VIDEO COMMUNICATIONS - System, methods, and non-transitory computer-readable media storing computer-executable instructions for performing the methods are provided for facilitating electronic audio and/or video communications between multiple parties over a consolidated peer-to-peer media session. The peer-to-peer media session is consolidated in the sense that at least one of the two communications systems of the peer-to-peer media session performs media data relaying functions for at least one other communications system that is also a communications participant. | 2016-02-18 |
20160050239 | AUTOMATIC REGISTRATION OF DEVICES - Exemplary methods, computer systems, and computer program products for automatic registration of devices in a computer environment are provided. In one embodiment, the computer environment is configured for monitoring a fibre channel. In response to one of a fabric login (FLOGI) and a fixed disk (Fdisk) received from one of an initiator and a target disk, executing each of an automatic name server registration, a state change registration, and a management server registration to identify at least one of the plurality of devices, and signing up one of the initiator and the target disk for the automatic name server registration, the state change registration, and the management server registration, wherein port initialization is eliminated for the initiator. | 2016-02-18 |
20160050240 | SYSTEM AND METHOD FOR ENTITY STATUS - An entity status system for a marketplace communication comprising a client device and a computational device communicatively connected to the client device through a network. The computational device has a data store and an executing unit including a processor. The executing unit is configured to provide a user interface on the client device, allow an entity user or an administrator to upload updates related to a business life cycle of the entities and a marketplace information through the user interface to the data store and enables retrieval of the updates and the marketplace information from the data store for sharing with the customer users wherein the updates related to the business life cycle of the entities or the marketplace information enable the customer users to get the marketplace communication in real time. | 2016-02-18 |
20160050241 | Multi-Hypothesis Rate Adaptation For HTTP Streaming - A multi-hypothesis rate adaptation technique may be performed for one or more wireless multimedia streaming scenarios. Managing a multi-media streaming session may involve sending, by a client, a request for a first portion of content to a server. A response may be received from a proxy. The response may comprise the first portion of content and information associated with a second portion of content available via the proxy. A request may be sent to the proxy for the proxy to deliver the second portion of content to the client. A change in a parameter associated with the multimedia streaming session may be determined based on data received from the proxy. It may be determined to change a rate adaptation. A Wireless Transmit/Receive Unit (WTRU) may be configured to perform the rate adaptation. | 2016-02-18 |
20160050242 | METHODS AND DEVICES FOR PLAYING STREAMING MEDIA DATA - The present disclosure provides methods and devices for playing streaming media data. The method includes: obtaining a playing address of a smart camera by a first terminal device; displaying a list of playback devices, in which the list includes device information of at least one terminal device, and the at least one terminal device has a function of playing the streaming media data; sending the playing address to a second terminal device if an instruction to select the second terminal device is received, such that the second terminal device obtains the streaming media data based on the playing address, and converts the streaming media data into an image for playing, the second terminal device being any terminal device of the at least one terminal device. | 2016-02-18 |
20160050243 | METHODS AND DEVICES FOR TRANSMISSION OF MEDIA CONTENT - Embodiments relate to a method for transmission of media content ( | 2016-02-18 |
20160050244 | Systems and Methods for Shared Media Streaming - Systems and methods for shared media streaming are disclosed. The input stream of media may be received at a server from a client device connected to the server via a network and provided to a display device connected to the network for playback over a media output system. Based upon a set of rules, the server may switch between input streams provided by other client devices connected to the server. | 2016-02-18 |
20160050245 | Region on Interest Selection - In one implementation, a presentation includes multiple regions of interest or multiple views. The presentation is viewed by local users at the same location as the presentation and remote users at locations different from the presentation. A device receives orientation data from one or more local users that indicates the viewing angle of the one or more local users. The device selects a view including one of plurality of regions of interest based on the orientation data and sends a media stream including the view to the one or more remote users. | 2016-02-18 |
20160050246 | QUALITY-AWARE RATE ADAPTATION TECHNIQUES FOR DASH STREAMING - A quality-aware rate adaptation algorithm is described to optimize the quality of experience (QoE) for a DASH client. Requesting media at a bitrate higher than the available network bandwidth can lead to re-buffering events that disrupt user experience, while requesting media at lower bitrates may lead to sub-optimum streaming quality. The quality-aware algorithm tries to optimize the QoE of a DASH client by maintaining a better trade-off between buffer levels and quality fluctuations. | 2016-02-18 |
20160050247 | SORTING INFORMATION BY RELEVANCE TO INDIVIDUALS WITH PASSIVE DATA COLLECTION AND REAL-TIME INJECTION - In one aspect, data, such as information articles, is sorted and prioritized based on a plurality of factors, such as user interest and popularity of data with respect to other users. The data is sorted by initial personal (i.e., user) data, sorted by the most relevant to the user, while passive interaction data is used to continually reorder the articles in real-time, while new stories are being injected into the stream in real time, all while other articles are increasing/decreasing in stature based on popularity with regard to other users and time decay. As such, the system provides that the information is fed to users in an efficient manner, in a manner based on time relevance, assumed interest with regard to that given user based on past actions by that user or information otherwise known about that user, as well as interest in the articles demonstrated by other users. | 2016-02-18 |
20160050248 | DATA-STREAM SHARING OVER COMMUNICATIONS NETWORKS WITH MODE CHANGING CAPABILITIES - Systems and methods are provided for allowing mobile device to switch modes from stream controllers to listeners/receivers. In stream controller mode a mobile device may control numerous data streams from local and remote locations in a network and manipulate the streams before multicasting or broadcasting them to listeners/receivers. Listeners/receivers may be able to choose from numerous stream controllers when more than one are available on a particular network. | 2016-02-18 |
20160050249 | METHOD, APPARATUS, AND COMPUTER PROGRAM PRODUCT FOR CONTROLLING CONTENT DISTRIBUTION - The method, apparatus, and computer program product provided herein provide for distribution of customized content to displays in a network. A display may receive video content for display from a transceiver device. Channel configurations may be user-configured to include content from any number of sources. Channel content may be generated based on a channel configuration to incorporate identified content and the channel content may be provided to transceiver devices. Alert messages may be pushed to channels, and takeovers of transceiver devices to stream a particular channel may be performed. | 2016-02-18 |
20160050250 | MEMORY MANAGEMENT OF DIGITAL AUDIO DATA - A system, method and computer-readable code for the management of digital media on a device with memory and storage restrictions. As with any device, memory and storage is limited. With the ultimate goal of providing a user with a hands-off literary experience involving multiple media types, it is necessary to automate the clean-up of unneeded content that has previously been transferred to the device. Utilizing bookmark information that describes various positions in one or more media streams, time information that describes the various media streams and related content used to integrate various types of content for each media stream, content and storage can be managed such that the user never has to interact directly with stored content beyond the controls provided with a basic media player. The user still experiences a completely automated and seamless literary experience regardless of the number of open media streams, bookmarks and various related content the user has. The result is a fully automated context aware memory and content manager. | 2016-02-18 |
20160050251 | Mobile Web-Based Interpreter - A Mobile Internet Device (“MID”) includes an operating system and a framework. The operating system includes a first web server configured for use at the operating system level, wherein the first web server includes a script interpreter and is connectable to an Internet browser via the Internet for receiving requests from the browser. The framework includes a second web server configured to operate at the framework level and adapted for communication with the first web server, wherein the second web server further includes methods dedicated to encapsulating framework functions. | 2016-02-18 |
20160050252 | METHOD, DEVICE, AND SYSTEM FOR ACQUIRING A WEB PAGE - A technique for acquiring a web page includes: receiving, at a client, a user instruction; obtaining from the instruction a page number of a web page that a user desires to access; searching for web page data in a hidden form that is cached in advance at the client, the search being based at least in part on the page number and the hidden form comprising web page data for a plurality of page numbers and in the event that web page data is found in the hidden form, generating, by the client, the web page using the web page data. | 2016-02-18 |
20160050253 | Asynchronous Message Passing - This specification describes technologies relating to software execution. A computing device includes a processor. An operating system includes an execution environment in which applications can execute computer-specific commands. A web-browser application includes a scripting environment for interpreting scripted modules. The web-browser application further includes a native environment in which native modules can execute computer-specific commands. The web-browser application further includes an interface between the scripting environment and the native environment. The interface includes functions to asynchronously pass data objects by value, from one of the scripting environment and the native environment, to the other of the scripting environment and the native environment. | 2016-02-18 |
20160050254 | CROSS-DEVICE INTEGRATION SYSTEM AND METHOD - A cross-device messaging integration capability is disclosed, which allows a user using a first device to indicate, using a first user computing device, an intent to perform one or more messaging actions at one or more second user computing device(s). The first and second devices may be different devices. The user may receive a reminder or other notification of the user's intent at the second device(s). | 2016-02-18 |
20160050255 | CONTROLLING CONTENT ON A DISPLAY DEVICE - According one aspect, there is provided a method for controlling content on a display device. The method comprises associating, with a server, an identifier with the display device; receiving, with the server, a connection request from a mobile device, the connection request comprising the identifier; associating, with the server, the connection request with the display device identified by the identifier; initiating, with the server, a transport protocol connection session with the mobile device, wherein the session assigns the mobile device control over content displayed on the display device during the transport protocol connection session; receiving, with the server, controlling instructions from the mobile device; and controlling, with the server, the content to be displayed on the display device in response to the controlling instructions received from the mobile device. | 2016-02-18 |
20160050256 | System and Method for Out-of-Band Communication Between a Remote User and a Local User of Server - A server chassis includes a server, a chassis management controller, and a local interface card. The server includes a controller that is configured to provide a remote user with access to a controller communication portal of the server via a remote access controller graphical user interface, and to send a message from the controller communication portal to a chassis management controller. The chassis management controller is configured to receive the message, to determine that the message is for a local interface card, and to send the message to the local interface card. The local interface card is configured to display the message on a screen connected to the local interface card, to detect a communication request, to display a communication interface at the screen, to receive a reply message via the communication interface, and to send the reply message to the chassis management controller. | 2016-02-18 |
20160050257 | INTERFACING WITH REMOTE CONTENT MANAGEMENT SYSTEMS - A content management system interface at a local computer device is configured to receive user file commands from a file manager and translate the user file commands into content management commands for sending to the remote content management system via a network interface. The content management system interface can further be configured to receive remote file information from the remote content management system via the network interface and translate the remote file information into user file information for the file manager. | 2016-02-18 |
20160050258 | Enveloping for Device independence - Data files with digital envelops may be used for many new applications for cloud computing which enables a user access all his or her applications and documents from anywhere in the world, freeing the user from the confines of the desktop. The accessibility anywhere in the world and anytime in a day among multiple user devices feature additional privacy and survivability on data storage and transport on cloud computing. Wavefront multiplexing/demultiplexing process (WF muxing/demuxing) embodying an architecture that utilizes multi-dimensional waveforms has found applications in data storage and transport on cloud. In addition, multiple data sets are preprocessed by WF muxing before stored/transported. WF muxed data is aggregated data from multiple data sets that have been “customized processed” and disassembled into any scalable number of sets of processed data, with each set being stored on a storage site. The original data is reassembled via WF demuxing after retrieving a lesser but scalable number of WF muxed data sets. A customized set of WF muxing on multiple digital files as inputs including at least a data message file and a selected digital envelop file in a digital audio format, is configured to guarantee at least one of the multiple outputs comprising a weighted sum of all inputs with an appearance to human natural sensors substantially identical to the appearance of the selected digital envelop in a same image, video or audio format. The output file is a file with enveloped or embedded messages. The embedded message may be reconstituted by a corresponding WF demuxing processor at destination with the known a priori information of the original digital envelope. In short, digital enveloping/de-enveloping can be implemented via WF muxing and demuxing formulations. WF muxed data featured enhanced privacy and redundancy in data transport and storage on cloud. On the other hand, data enveloping is an application in a different dimension for most of conventional WF muxing applications as far as redundancy is concerned. Enveloped data are intended only for limited receivers which has access to associated digital envelope data files with enhanced privacy but with minimized redundancy. | 2016-02-18 |
20160050259 | PROVIDING CUSTOMER INFORMATION OBTAINED FROM A CARRIER SYSTEM TO A CLIENT DEVICE - Methods and systems are presented for accessing customer relationship management (CRM) information stored in a carrier system associated with a user of an identified client device. A client device is identified based on client device identification information received from a carrier system. CRM information associated with the identified client device is received from the carrier system, and data corresponding to at least a subset of the CRM information is output to the client device. The client device may be configured to pre-populate data fields of a transaction based on the data corresponding to at least a subset of the CRM information. | 2016-02-18 |
20160050260 | METHOD, SYSTEM AND APPARATUS FOR CONTROLLING AN APPLICATION - A method, system and apparatus of controlling at least one application on an electronic device. Interfacing occurs between a context object and the at least one application. Context data is retrieved from the context object. At least one of the following further occurs: the context object is updated with new context data derived from interactions with the at least one application; the behaviour of the at least one application is modulated based on the context data; and at least one data field in the application is populated with the context data. | 2016-02-18 |
20160050261 | INTELLIGENT MESSAGING GRID FOR BIG DATA INGESTION AND/OR ASSOCIATED METHODS - Certain example embodiments relate to an intelligent messaging grid for Big Data ingestion and/or associated methods. Each node in a network of nodes is dynamically configurable to send and/or receive messages using one of brokered and brokerless communication models. At least some of the nodes have a complex event processing (CEP) engine deployed thereto, the CEP engines being configured to operate on messages received by the respective nodes and being classified as one of at least two different types of CEP engines. For each message received by a given node that is to be forwarded to a further node along one of multiple possible paths, the given node is configured to route the message to be forwarded to an intermediate node in one of the possible paths. The intermediate node is selected by the CEP engine of the given node based on metadata associated with the message to be forwarded. | 2016-02-18 |
20160050262 | SCALABLE FAULT RESILIENT COMMUNICATIONS WITHIN DISTRIBUTED CLUSTERS - Embodiments are directed to communicating between computing nodes in a cluster of nodes. In one scenario, a computer system receives a data packet from a worker node including the worker node's current workload identifiers and health status, where the data packet includes an associated version number. The computer system determines that the version number in the received data packet is different than a previously received data packet and evaluates the worker node's current workload configuration to determine whether workload changes are to be made on the worker node. Then, upon determining that workload changes are to be made on the worker node, the computer system selects a subset of workload changes to apply to the worker node, generates an indication of the selected subset of workload changes to the worker node and sends the generated indication of workload changes to the worker node. | 2016-02-18 |
20160050263 | CLOUD SYSTEM AND METHOD OF DISPLAYING, BY CLOUD SYSTEM, CONTENT - Provided is a cloud providing a cloud service for displaying content, the cloud including: a first server configured to receive a sharing request for content, from an electronic device; a second server configured to determine whether the content is displayable on a display device connected to the cloud, based on a type of a file format of the content; a third server configured to render the content and generate an image file from the rendered content, when it is determined that the content is not displayable; and a fourth server configured to control display of one of the content and the image file on the display device. | 2016-02-18 |
20160050264 | METHOD AND APPARATUS FOR AUTOMATION AND ALARM ARCHITECTURE - A method and system architecture for automation and alarm systems is provided. The system architecture is hierarchically organized, allowing devices to process system data differently at different levels of the hierarchy. Moreover, different devices at the same level of the hierarchy may employ different or custom configurations, allowing for context-dependent algorithms to be deployed in the system. The configuration of each device in the system is defined by a set of rules, filters, thresholds, and other criteria, which are pushed to a device from other devices in the hierarchy. Accordingly, the configuration of each device is dynamically updated as information is learned about the context in which the device is deployed, and as more advanced algorithms and configurations are developed. | 2016-02-18 |