09th week of 2015 patent applcation highlights part 63 |
Patent application number | Title | Published |
20150058865 | MANAGEMENT OF BOTTLENECKS IN DATABASE SYSTEMS - Management is provided for threads of a database system that is subject to a plurality of disparate bottleneck conditions for resources. A monitor thread retrieves, from a first thread, first monitor data for first bottleneck condition of a first type. The monitor thread compares the first monitor data to a trigger level for the first bottleneck condition and then determines, in response to the comparison of the first monitor data to the trigger level, a potential source of the first bottleneck condition. A potential blocker thread is identified based upon the potential source of the first bottleneck condition. The monitor thread retrieves, from the potential blocker thread, second monitor data for a second type of bottleneck condition that is different from the first type of bottleneck condition. Based upon monitor data, a blocking thread is identified, and a particular blocking solution is applied to the blocking thread. | 2015-02-26 |
20150058866 | CALIBRATED TIMEOUT INTERVAL FOR CONCURRENT SHARED INACTIVITY TIMER - A processor-implemented method for implementing a shared counter architecture is provided. The method may include receiving, by a worker thread, an application request; recording, by a common timer thread, a shared timer value and acquiring, by the worker thread, the shared timer value. The method may further include recording, by the common timer thread, a shared calibration factor; acquiring, by the worker thread, a configuration value corresponding to the application request and generating, by the worker thread, a calibrated timeout interval for the application request based on the shared calibration factor, the shared timer value, and the configuration value. The method may further include registering, by the worker thread, the calibrated timeout interval for the application request on a current timeout list; determining, by the common timer thread, a timeout occurrence for the application request based on the registered calibrated timeout interval; and releasing resources based on the timeout occurrence. | 2015-02-26 |
20150058867 | METHOD, AN ELECTRONIC DEVICE, AND A STORAGE MEDIUM FOR AUTO-CLEANING UP APPLICATIONS IN A BACKGROUND - A method for auto-cleaning up applications in a background of an electronic device system is provided, comprising the steps of: acquiring an occupancy rate of a CPU or a memory, and determining periodically whether the occupancy rate exceeds a preset threshold; querying all applications running in the background of the electronic device system, and identifying all non-system applications if the occupancy rate exceeds the preset threshold; and calling a common interface to close the non-system applications. An electronic device and a storage medium for auto-cleaning up applications in a background are also provided. | 2015-02-26 |
20150058868 | TECHNIQUES FOR A COMMON OBJECT MODEL - Techniques for a common object model are described. In one embodiment, for example, an apparatus may comprise a common controller object and a first plugin. The common controller object may be operative to receive a standardized command from a module and to generate a first standardized plugin command based on the standardized command, the standardized command and first standardized plugin command conforming to a common object model. The plugin may be operative to execute the first standardized plugin command. Other embodiments are described and claimed. | 2015-02-26 |
20150058869 | REVERSE LAUNCH PROTOCOL - One or more techniques and/or systems are provided for implementing a reverse protocol launch. For example, the reverse protocol launch may be implemented between apps (e.g., as an app-to-app protocol) such that a user may navigate between apps in a contextually relevant manner using the reverse protocol launch. In an example, a search app may display vacation search results based upon a search query. Responsive to a selection of a vacation movie search result, a transition to a movie app may occur. A context, specifying a contextual state of the search app (e.g., information regarding the vacation search results, the search query, etc.), may be sent to the movie app. The movie app may implement a reverse protocol launch using the context to transition from the movie app back to the search app in the contextual state (e.g., the search app may be repopulated with the vacation search results, etc.). | 2015-02-26 |
20150058870 | FACILITATING PURCHASE FROM VIDEO ADVERTISEMENTS - A purchase code, such as a web address indicating a webpage of a product at a merchant's website, may be embedded into a video advertisement by steganography. The video advertisement embedding the purchase code may be displayed to consumers on televisions or on display kiosks installed at a merchant's storefront. A consumer, who is viewing the video advertisement and is interested in purchasing the product being advertised, may point a mobile device with a camera, e.g., a smart phone, to scan the video advertisement with the camera. The mobile device may decode the video advertisement to capture the purchase code embedded in the video advertisement. The purchase code may automatically direct the mobile device to visit the product web page at the merchant's web site. Thus, the consumer may purchase the product immediately at the merchant's web site. | 2015-02-26 |
20150058871 | Distance-Based Rendering of Media Files - A rendering device dynamically varies how audio and visual information is rendered by a rendering device responsive to changes in distance between the rendering device and a mobile device carried by a user. As the user moves about, the distance between the rendering device and the mobile device carried by the user will vary. As the distance between the mobile device and the rendering device changes, the rendering system can dynamically adapt how the audio and visual information is rendered. For example, the rendering device can increase or decrease the volume of an audio output, depending on changes in the distance. Also, the rendering device can change how visual information is rendered on a display responsive to changes in distance. In some embodiments, when the distance between the mobile device and rendering device exceeds a predetermined distance, the audio and/or visual information may be sent to the mobile device. | 2015-02-26 |
20150058872 | METHOD AND SYSTEM FOR DELIVERING VIDEO CONTENT FROM MULTIPLE PLATFORMS TO SUBSCRIBERS - An integrated content delivery interface enables a user to access content from a multi-channel service provider (such as a cable television service) and over-the-top sources. The system displays a set of cable channels and over-the-top channels based on a combination of the user's subscription status for the various services, personalization criteria, and device type. The system may provide the user with a playlist of available videos for each channel. For videos from over-the-top sources, when a user selects the video for on-demand play the user's device will directly access the video as served by the over-the-top source. Before including any video in the playlist, the system will ensure that the video is available to the user based on subscription status and/or device type, and it will ensure that the over-the-top source serves the video in a format that is compatible with the user's device. | 2015-02-26 |
20150058873 | CUSTOMIZED CONTENT CALENDAR - A customized content calendar may include reminders or invitations to access particular media content, where the reminders or invitations may be pushed to the content calendar based on user-specific preferences. | 2015-02-26 |
20150058874 | Method and Device for Setting Properties - The disclosure provides a method and a device for setting properties. The method comprises: analyzing and counting one or more program sources selected by a user through an Internet Protocol Television (IPTV) program system; determining program IDs corresponding to the program sources selected by the user according to a analysis and statistics result to acquire the merchandise corresponding to the program IDs in the IPTV merchandise system; and setting the properties of the merchandise, wherein the merchandise properties set are used for indicating how to display the merchandise in the IPTV merchandise system. The problem caused by the identical merchandise recommended to all the users in the IPTV online shopping system in the related art is solved, consequently, personalized services are implemented for different users and the user experience is improved. | 2015-02-26 |
20150058875 | RECEIVING DEVICE AND METHOD, TRANSMITTING DEVICE AND METHOD, AND PROGRAM - The present disclosure provides a receiving device including, a receiver that receives AV content, a detector, an acquirer, a tentative reservation registering part, and a definitive reservation registering part. | 2015-02-26 |
20150058876 | AUDIENCE-MEASURING METHOD - A method for measuring an audience of peers of a television channel streamed over a peer-to-peer network includes connecting at least one monitored peer to the peer-to-peer network and sending by the at least one monitored peer a request to at least one neighboring peer of the peer-to-peer network. There is an identifier of the at least one neighboring peer contained in its own list of neighboring peers. In reply to the request, receiving by the at least one monitored peer a list of neighboring peers receiving the television channel streamed over the peer-to-peer network and containing for this purpose, in their respective buffer memory, chunks of the television channel likely to be downloaded by any one of the peers of the peer-to-peer network. The method also includes updating by the at least one monitored peer of its own list of neighboring peers by adding to this list the identifiers of neighboring peers present in the list received and which were not already present in its own list of neighboring peers. The method further includes constructing the audience measurement from the list of neighboring peers of the at least one monitored peer. | 2015-02-26 |
20150058877 | CONTENT-BASED AUDIO/VIDEO ADJUSTMENT - Embodiments are disclosed for methods and systems for adjusting audio/video data. In some embodiments, a method for performing adjustments includes receiving audio content and video content and analyzing the video content to identify image data indicating a channel generating the audio and video content. The method further includes adjusting the audio data of the audio content responsive to a type of content on the channel. | 2015-02-26 |
20150058878 | RECEIVING AUDIO/VIDEO CONTENT - An audio/video content receiver configured to receive media content by a broadcast data path, the media content includes a host module having a tuner configured to assign logical channel indices to media channels to allow selection, at the host module, of the media channels for reproduction by selecting the corresponding logical channel index, the host module storing channel association data associating the logical channel indices with the received media channels. A removable conditional access module (CAM) includes an access controller decoding access-controlled encoded broadcast content, the host module and the removable CAM to provide an encrypted communication link for decoded access-controlled encoded broadcast content between the CAM and the host module. The host module includes a detector configured to detect a conflict of logical channel index between the channel association data acquired by the host from the broadcast data path and the channel association data provided by the CAM. | 2015-02-26 |
20150058879 | DIGITAL BROADCASTING RECEIVER AND METHOD FOR CONTROLLING THE SAME - A method of processing broadcast data includes: performing RS encoding and CRC encoding on mobile service data to generate an RS frame belonging to an ensemble including a signaling information table including access information of the mobile service data and identification information for identifying a stream where keys to decrypt the mobile service data are obtained; mapping a portion of data in the RS frame to a group including known data sequences, FIC data, and TPC data, wherein the FIC data includes information for rapid mobile service acquisition, and the TPC data includes FIC version information for indicating an update of the FIC data; and transmitting a broadcast signal including the group. The group further includes data blocks. First, fourth, fifth and sixth known data sequences are inserted into third, fifth, sixth and seventh data blocks, respectively. Second and third known data sequences are inserted into a fourth data block. | 2015-02-26 |
20150058880 | METHOD AND SYSTEM FOR CREATING VIDEO CHANNELS FOR DELIVERY OF CONTENT FROM MULTIPLE PLATFORMS - A system for managing delivery of content from multiple platforms maintains data for various video channels. Some of the video channels are television channels, while others are over-the-top (OTT) video content sources such as video streaming websites. The system includes a package generation module by which a service provider may define a package of both traditional and OTT channels to offer to subscribers in a unified programming interface. When a user uses the interface to select a set of video channels, the system compiles the set of the video channels in a subscriber package of both television and OTT channels. The system assigns a name to the subscriber package, and it stores the defined package and name, along with other information about the package, in a data storage facility for offering to a subscriber of content from the service provider. | 2015-02-26 |
20150058881 | SYSTEM AND METHOD FOR PROMOTING MARKETABLE ITEMS - A system that incorporates teachings of the present disclosure may include, for example, a media processor having a controller to receive from a media communication system metadata describing one or more marketable items depicted in a media program supplied by the media communication system, present images of the media program at a media presentation device without highlighting the one or more marketable items, present an icon at least at one of a remote controller managing operations of the media processor or the media presentation device to indicate a presence of the one or more marketable items in one or more of the images presented at the media presentation device, detect a selection of the icon, and highlight the one or more marketable items. Other embodiments are disclosed. | 2015-02-26 |
20150058882 | METHOD AND APPARATUS FOR DETECTING AND DISPLAYING AN ALERT DURING PLAYBACK OF A RECORDED SIGNAL - A method of displaying an alert from a broadcast source in an electronic device while the electronic device is not playing back a currently received broadcast signal is disclosed. The method comprises steps of playing back a signal recorded in a first device connected to the electronic device responsive to a user command; detecting an alert from a broadcast source while playing back the recorded signal; and presenting the alert responsive to detecting the alert. | 2015-02-26 |
20150058883 | METHODS AND APPARATUS FOR TARGETED SECONDARY CONTENT INSERTION - Methods and apparatus for identification and insertion of content targeted to a particular audience within a content-based network, such as a cable television or satellite network. In one embodiment of the invention, audience qualities are identified and distributed to an advertisement decision maker, which uses the information to fulfill advertisement placement opportunities. Qualifiers about an existing or projected audience are classified utilizing an algorithm for qualifier weight and variance in order to determine the proximity any given qualifier may be to a target audience for an advertisement. Subscriber privacy and anonymity is also optionally maintained via e.g., hashing or encrypting data relating to the CPE and/or subscriber, thus ensuring that audience data is not traceable to a specific user account. Business methods are also disclosed. | 2015-02-26 |
20150058884 | TARGETING ADS TO SUBSCRIBERS BASED ON PRIVACY PROTECTED SUBSCRIBER PROFILES - Monitoring subscriber viewing interactions, such as television viewing interactions, and generating viewing characteristics therefrom. Generating at least one type of subscriber profile from at least some subset of subscriber characteristics including viewing, purchasing, transactions, statistical, deterministic, and demographic. The subscriber characteristics may be generated, gathered from at least one source, or a combination thereof. Forming groups of subscribers by correlating at least one type of subscriber profile. The subscriber groups may correlate to elements of a content delivery system (such as head-ends, nodes, branches, or set top boxes (STBs) within a cable TV system). Correlating ad profiles to subscriber/subscriber group profiles and selecting targeted advertisements for the subscribers/subscriber groups based on the correlation. Inserting the targeted ads in place of default ads in program streams somewhere within the content delivery system (head-end, node, or STB). Presenting the targeted ads to the subscriber/subscriber group via a television. | 2015-02-26 |
20150058885 | DISPLAY APPARATUS AND CONTROL METHOD THEREOF - A display apparatus and a method of controlling a display apparatus are disclosed. The display apparatus includes: a display configured to display an image based on a video signal; a sound output section configured to output a first sound based on a sound signal; a first sound receiver configured to receive a first mixed sound including the first sound and a second sound of a user; a second sound receiver which is spaced apart at a distance from the first sound receiver and is configured to receive a second mixed sound comprising the first sound and the second sound; and a controller configured to perform control in accordance with the second sound of the user, the second sound being acquired based on the first mixed sound and the second mixed sound. | 2015-02-26 |
20150058886 | DEVICE AND METHOD FOR OUTPUTTING DATA OF A WIRELESS TERMINAL TO AN EXTERNAL DEVICE - An apparatus is provided. The apparatus includes a communication unit configured to communicate with a first electronic device, and a control unit operatively coupled with the communication unit, the control unit configured to receive, from the first electronic device via the communication unit, information associated with a playback location of multimedia data, the multimedia data to be presented at a second electronic device operatively coupled with the apparatus, based at least in part on the information, and transmit at least one portion of the multimedia data, to the second electronic device. | 2015-02-26 |
20150058887 | MULTIMEDIA ARRANGEMENT - The invention relates to a multimedia arrangement comprising a remote control having a keypad with only six control buttons. All functions of the multimedia device can be controlled via three menu levels, an object group being selectable in the first menu level, an object being selectable in the second menu level, and an action to be performed with the object being selectable in the third. Elements of the object groups, objects, and actions are displayed in fields on the display device in a vertical column and a horizontal line, the column and the line intersecting in a focus field. The elements of the fields can be moved by the control buttons in the fixed focus field, and can be activated there by a selection button. Selection and arrangement of the elements is done by a user database in the multimedia device depending on data determined by an identification device of the remote control. | 2015-02-26 |
20150058888 | METHOD FOR CONTROLLING VIDEO SYSTEM INCLUDING A PLURALITY OF DISPLAY APPARATUSES - A method for controlling a video system wherein the nearest display apparatus is selected by detecting a distance to each of a plurality of display apparatuses and information regarding the nearest display apparatus is transmitted to another video apparatus allowing a user apparatus to select the nearest display apparatus without additional input. | 2015-02-26 |
20150058889 | SYSTEM AND METHOD OF PROVIDING ACCESS TO CONTENT OF AN INTERRUPTED DIGITAL BROADCAST SIGNAL - A method includes receiving a first message at a receiver from a digital broadcast provider, where the first message is received in response to a digital broadcast connection being reestablished between the receiver and the digital broadcast provider after interruption of the digital broadcast connection during receipt by the receiver of content corresponding to a digital broadcast signal. The method also includes sending a notification from the receiver to a display device, where the notification includes information corresponding to the interruption, and where the notification enables access to an interface for responding to the first message. The method further includes sending the interface to the display device, wherein the interface includes a list of interrupted programs available from the digital broadcast provider, where the interrupted programs include programs that were being received by the receiver when the interruption occurred, and where the list includes an entry associated with the content. | 2015-02-26 |
20150058890 | TELEVISION RECEIVER ENHANCEMENT FEATURES - One or more of a system, method, apparatus, and computer-program product to enable implementation of one or more features that together or separately enhance Quality of Experience or Quality of Service as a particular user interacts with a television receiver. | 2015-02-26 |
20150058891 | SYSTEMS AND METHODS FOR PROVIDING A CUSTOMIZED PROGRAM LINEUP - Systems and methods for delivering content according to a customized program lineup are provided. A content source transmits a plurality of media assets in a first schedule according to scheduled transmission times. A processing device may receive a user input to receive the media assets in a second schedule different from the first schedule. When a request to access the content source is received, the processing device may automatically determine, based on the second schedule, whether the user has requested a different media asset than the originally-scheduled asset at the time of the request. If the user has requested a different media asset, the processing device may automatically receive and provide the different media asset instead of the originally-scheduled asset. | 2015-02-26 |
20150058892 | METHOD OF PROCESSING EGP METADATA IN NETWORK DEVICE AND THE NETWORK DEVICE FOR CONTROLLING THE SAME - A method of processing EPG metadata in a network according to one embodiment of the present invention includes the steps of performing a services discovery procedure utilizing multiple service discovery metadata components supplied by a service provider and processing an EPG metadata. Moreover, the performing step includes the steps of receiving a master SI table which locates in a master SI table location in provisioning information, the provisioning information including multiple elements, an EPG provider information element in the multiple elements having both a first delivery layer element and an EPG data locator element, the first delivery layer element giving a type of delivery layer that is delivered by at least one of an EPG metadata provider's EPG data sources, receiving a virtual channel map table which locates in virtual channel map locations in the received master SI table, receiving a virtual channel description table which locates in virtual channel description table locations in the received virtual channel map table, and receiving a source table which locates in source table locations in the received virtual channel description table. | 2015-02-26 |
20150058893 | DIGITAL BROADCASTING RECEIVER FOR MAGIC REMOTE CONTROL AND METHOD OF CONTROLLING THE RECEIVER - The present invention relates to a digital broadcasting receiver for a magic remote control and a method of controlling the receiver. The digital broadcasting receiver for the magic remote control according to an embodiment of the present invention may include: a receiving unit receiving a control signal, wherein the control signal includes a first signal representing that a button of the magic remote control is pressed, a second signal representing the drag state of the magic remote control while the button of the magic remote control is pressed, and a third signal representing that the button of the magic remote control is released; a display unit; a processor; and a platform. | 2015-02-26 |
20150058894 | ELECTRONIC PROGRAM GUIDE FOR INDICATING AVAILABILITY OF PAST PROGRAMS - A system and method for providing an electronic program guide for television or radio programs includes presenting listings of present or future programs on-screen, presenting listings of past programs on-screen and indicating whether the past program is available again at a future time. Also, a system and method for handling information controllable from an electronic program guide for television or radio programs comprises receiving information in a user's system, storing the received information in the user's system, displaying access to the stored information by means of a user interface and enabling the user to select one of a plurality of management options for controlling the operation of the stored information through the user interface. | 2015-02-26 |
20150058895 | DIGITAL BROADCAST RECEIVER AND METHOD FOR PROCESSING CAPTION THEREOF - A digital cable broadcast receiver and a method for automatically processing caption data of various standards and types, is disclosed. The digital broadcast receiver includes: a demultiplexer for dividing a received broadcast stream into video data, audio data, supplementary information; a controller for determining whether caption data included in the video data is digital caption data or analog caption data on the basis of caption information included in the supplementary information, and outputting a control signal according to a result of the determining; a digital caption decoder for extracting and decoding digital caption data from the video data according to the control signal; and an analog caption decoder for extracting and decoding analog caption data from the video data according to the control signal. | 2015-02-26 |
20150058896 | INFORMATION PROCESSING SYSTEM AND MEDIA SERVER - In a media server, a storage unit | 2015-02-26 |
20150058897 | ELECTRONIC DEVICE AND METHOD FOR INFORMATION ABOUT SERVICE PROVIDER - A method of providing information about a service provider by using an electronic device displaying contents is described. Information corresponding to first service providers which are able to provide a service to a specific electronic device regardless of a location of the specific electronic device is displayed. The information corresponding to the first service providers is displayed enabled. Information corresponding to second service providers which are able to provide a service to a specific electronic device in a certain region is displayed. The information corresponding to the second service providers is displayed disabled. Regional information of the electronic device is set based on regional information received through a user interface unit or location information obtained by a location information module. The set regional information is transmitted to a server. Information about service providers related to the transmitted regional information and unrelated to the set regional information is received. | 2015-02-26 |
20150058898 | SYSTEMS AND METHODS FOR DISPLAYING AND INTERACTING WITH INTERACTION OPPORTUNITIES ASSOCIATED WITH MEDIA CONTENT - Methods to present video and purchasing function content embedded in the video in a single user interface. The user interface may be configured to allow the user watching the video to take an action with respect to the video content, which may include items for purchase, and to allow the user to both watch the video content, and select the item for purchase in one transaction step. In other embodiments, the video content is segmented such that a user is provided the ability to select one or more objects in the video. In other embodiments, the user interface provides a dynamic message such as a “call to action” to a user. The call to action may be timed with the video and/or with the user viewing selections in order to urge a user to take a pre-determined action such as purchase a product, make a donation, and the like. | 2015-02-26 |
20150058899 | SYSTEM AND METHOD OF DELIVERING VIDEO CONTENT - A method includes receiving, at a server, a retry request from a media device. The retry request requests a data packet associated with video content and includes an overhead bandwidth factor corresponding to a ratio between an overhead bandwidth to be used to send the data packet in response to the retry request and a nominal bandwidth used to send video content to the media device. The method further includes, in response to the retry request, sending the data packet to the media device based on the overhead bandwidth factor. | 2015-02-26 |
20150058900 | IMAGE COMMUNICATION APPARATUS AND CONTROL METHOD THEREFOR - An image communication apparatus has a function of outputting a shot image obtained by imaging an object, a function of displaying at least the shot image, a function of generating a captured image by capturing a displayed image, a function of encoding an image and decoding an encoded image, a function of writing the encoded shot image in a memory and reading out a recorded image stored in the memory, and a function of communicating with another apparatus through a network. The image communication apparatus switches the mode of video to be transmitted to the other apparatus by controlling these functions based on a control event. | 2015-02-26 |
20150058901 | APPARATUS AND METHOD FOR MANAGING MEDIA CONTENT FOR MOBILE DEVICES - A system that incorporates teachings of the present disclosure may include, for example to access a broadcast of media content in response to a request to record the media content from a mobile communication device, and adjust a format of the media content based at least in part on a user profile associated with the mobile communication device where the user profile comprises device format preferences. Other embodiments are disclosed. | 2015-02-26 |
20150058902 | SYSTEM AND METHOD FOR DELIVERING EXTENDED MEDIA CONTENT - A system and method for identifying and delivering extended media content. An extended content system receives requests to record or play identified broadcast content. The extended content system automatically obtains or preserves extended media content related to the identified broadcast content. In some instances, the system informs a subscriber that extended media content is available. If requested by the subscriber, the extended content system obtains the identified broadcast content and extended media content and provides the same to the subscriber in either a Set-Top-Box format or an Over-The-Top format. | 2015-02-26 |
20150058903 | GEOGRAPHIC CONTENT RECOMMENDATION - Geographic context may be used to recommend media content items for consumption by users of a media content management system. A request for a media content recommendation may be associated with a content management account and a geographic location. The media content management system may determine whether the geographic location includes individuals who are not associated with the content management account. If the geographic location includes such individuals, the system may recommend content suitable for sharing such as games, music playlists, movies, or television programs. | 2015-02-26 |
20150058904 | INTERACTIVE GUIDE WITH RECORDING - An interactive television program guide system is provided. An interactive television program guide provides users with an opportunity to select programs for recording on a remote media server. Programs may also be recorded on a local media server. The program guide provides users with VCR-like control over programs that are played back from the media servers and over real-time cached copies of the programs. The program guide also provides users with an opportunity to designate gift recipients for whom programs may be recorded. | 2015-02-26 |
20150058905 | APPARATUS AND METHOD FOR PROCESSING AN INTERACTIVE SERVICE - A method of processing an interactive service and an apparatus thereof are disclosed. The present invention includes sending a discovery message to a second screen application, receiving a request for descriptions of the second screen support services, sending a response with the descriptions, receiving a trigger, and delivering the trigger to the second device using a trigger service. | 2015-02-26 |
20150058906 | RECEPTION APPARATUS, RECEPTION METHOD, PROGRAM, AND INFORMATION PROCESSING SYSTEM - Disclosed herein is a reception apparatus including: a reception portion configured to receive audio video content; a trigger extraction portion configured to extract trigger information for operating an application program transmitted along with the audio video content and executed in interlocked relation to the audio video content; a table acquisition portion configured to acquire a correspondence table for associating the trigger information with commands for controlling the operation of the application program; a command determination portion configured such that, based on the acquired correspondence table, the command determination portion determines the commands associated with the extracted trigger information; and a control portion configured to control the operation of the application program in response to the determined commands. | 2015-02-26 |
20150058907 | PEER-ASSISTED VIDEO DISTRIBUTION - A solution for peer-assisted distribution of video content over a broadband network is disclosed. A video file is segmented into segments and segmentation metadata is generated. The segments are converted to media stream segments with counter/timestamp consistency. The video file and the segmentation metadata are injected into a peer-assisted video delivery system. The segmentation metadata are then used for initializing download of offsets of the video file that are required for generating segments of the video file at a client. | 2015-02-26 |
20150058908 | BROADCASTING SIGNAL TRANSMISSION DEVICE, BROADCASTING SIGNAL RECEPTION DEVICE, AND METHOD FOR TRANSMITTING/RECEIVING BROADCASTING SIGNAL USING SAME - Disclosed is a broadcasting signal transmission device, a broadcasting signal reception device, and a method for transmitting/receiving a broadcasting signal using same. The method for receiving the broadcasting signal comprises the following steps: receiving the broadcasting signal, which includes a transmission frame, wherein the transmission frame includes a plurality of PLPs, which transmit components that constitute a broadcasting service, first signaling information and second signaling information, which include the signaling information of the plurality of PLPs, a first preamble signal, which has been signaled with a preamble format, and a second preamble signal, which has been signaled with pilot pattern information, wherein one of the plurality of PLPs is a base PLP, which includes a program number that corresponds to the broadcasting service and program map table information, which has been signaled with identifying information for each of the PLPs; demodulating the broadcasting signal based on the first and the second preamble signals; FEC decoding the demodulated broadcasting signal; and identifying a PLP group that includes the plurality of PLP from the FEC decoded broadcasting signal based on the first and the second signaling information, decoding at least one PLP of the identified PLP group, and providing the broadcasting service. | 2015-02-26 |
20150058909 | Set-top Box with Technical Configuration and System and Method for Use of Same - A set-top box with a technical configuration and system and method for use of the same are disclosed. In one embodiment of the set-top box, the set-top box executes an technical protocol to make the set-top box and an associated television ready for use. During the installation, maintenance, or repair, a human-readable visual label and a machine-readable optical label are generated that contain information about the status of the technical protocol. The labels are forwarded, via the television output, to the television. The set-top box dynamically updates the human-readable visual label and the machine-readable optical label as the status of the technical protocol changes. | 2015-02-26 |
20150058910 | BTV BOX AND METHOD FOR WIRELESS COMMUNICATION OF TELVISION AUDIO - An integrated audio transmission system for receiving television audio signals from their source and transmitting them to a wireless remote receiver wearable by a user. The integrated audio transmission system comprises a device box and headset receiver, wherein the device box can be configured to receive audio signals directly from a television or from a television converter box (or set top box). Regardless of the source, the device box receives audio signals from either HDMI or RCA wires and once audio signals are received by the device box, the audio signals are isolated and prepared to be broadcast by a near field wireless transmitter, and then broadcast. The broadcast audio signals are picked up by the paired headset receiver. The headset receiver processes the audio signal and broadcasts the audio signal over earpiece speakers. | 2015-02-26 |
20150058911 | RECEPTION APPARATUS, TERMINAL APPARATUS, CONTROL METHOD, PROGRAM, AND COMMUNICATION SYSTEM - Disclosed herein is a reception apparatus including: a reception portion configured to receive AV content being transmitted; a command execution portion configured to execute a first application program in response to a first command for controlling the operation of the first application program executed in interlocked related to the AV content; a command transmission portion configured to transmit to an external terminal apparatus a second command for controlling the operation of a second application program that can be executed by the terminal apparatus in interlocked relation to the AV content when the terminal apparatus is connected to the reception apparatus; and a command reception portion configured to receive the first command transmitted from the terminal apparatus executing the second application program. The command execution portion executes the first application program in response to the received first command. | 2015-02-26 |
20150058912 | METHOD AND APPARATUS FOR SECURING COMPUTER INTERFACES - The present invention relates to methods and apparatuses for securing otherwise unsecured internal and external computer communications. According to one aspect, the invention relates to methods and apparatuses for implementing device gatekeeping. According to another aspect the invention relates to methods and apparatuses for encrypting and decrypting data sent over an external or internal interface. According to another aspect, the invention relates to methods and apparatuses for implementing device snooping, in which some or all traffic passing between a host and a connected device is captured into memory and analyzed in real time by system software. In embodiments, the software can also act upon analyzed information. According to certain additional aspects, the security functions performed by methods and apparatuses according to the invention can be logically transparent to the upstream host and/or to the downstream device. | 2015-02-26 |
20150058913 | Context Awareness during First Negotiation of Secure Key Exchange - Techniques are presented for establishing context awareness during first negotiation of secure key exchange. These techniques may be embodied as a method, apparatus or instructions in a computer-readable storage media. At a first network device, a message is received from a second network device as part of an initial exchange of information of a secure key exchange, the message containing information indicating one or more secure key exchange policies acceptable to the second network device and defining one or more associated security parameters. The message further contains context-specific information identifying a context of the second network device. The first network device selects a secure key exchange policy for communicating with the second network device based upon the context-specific information and sends a response message to the second network device containing the selected secure key exchange policy. If the context was understood, the response message also includes context-specific information. | 2015-02-26 |
20150058914 | INTEGRATED NETWORK INTRUSION DETECTION - Intrusion preludes may be detected (including detection using fabricated responses to blocked network requests), and particular sources of network communications may be singled out for greater scrutiny, by performing intrusion analysis on packets blocked by a firewall. An integrated intrusion detection system uses an end-node firewall that is dynamically controlled using invoked-application information and a network policy. The system may use various alert levels to trigger heightened monitoring states, alerts sent to a security operation center, and/or logging of network activity for later forensic analysis. The system may monitor network traffic to block traffic that violates the network policy, monitor blocked traffic to detect an intrusion prelude, and monitor traffic from a potential intruder when an intrusion prelude is detected. The system also may track behavior of applications using the network policy to identify abnormal application behavior, and monitor traffic from an abnormally behaving application to identify an intrusion. | 2015-02-26 |
20150058915 | ELECTRONIC DEVICE AND METHOD FOR UNLOCKING OBJECTS OF ELECTRONIC DEVICE - In a method for unlocking an object of an electronic device, an unlocking rule is preset to unlock the object. After movement signals are received from a touch screen of the electronic device, a quantity of segments displayed on the touch screen generated by the movement signals and a quantity of areas of the touch screen partitioned by the obtained segments are obtained. When a touch signal on one area of the obtained areas is received, a sequence number of the area from which the touch signal is received is calculated. The object of the electronic device is unlocked when the object is authorized to be unlocked according to the preset unlocking rule, the quantity of the obtained segments, the quantity of the obtained areas, and the sequence number of the area from which the touch signal is received. | 2015-02-26 |
20150058916 | DETECTING ENCRYPTED TUNNELING TRAFFIC - Techniques for detecting encrypted tunneling traffic are disclosed. In some embodiments, detecting encrypted tunneling traffic includes monitoring encrypted network communications between a client and a remote server, in which the encrypted network communications are encrypted using a first protocol (e.g., Secure Shell (SSH) protocol or another protocol for encrypted network communications); and determining if the client sends a request to create a tunnel using the first protocol with the remote server. In some embodiments, detecting encrypted tunneling traffic further includes performing an action in response to determining that the client sent a request to create a tunnel using the first protocol with the remote server. | 2015-02-26 |
20150058917 | CLOUD-BASED SECURITY POLICY CONFIGURATION - Systems and methods for configuring security policies based on security parameters stored in a public or private cloud infrastructure are provided. According to one embodiment, a first network appliance logs into a cloud account. One or more security parameters of the first network appliance are synchronized, by the first network appliance, with corresponding security parameters shared by a second network appliance to the cloud account. A security policy that controls a connection between the first network appliance and the second network appliance is automatically created, by the first network appliance, based at least in part on the one or more security parameters. | 2015-02-26 |
20150058918 | SECURE END-TO-END PERMITTING SYSTEM FOR DEVICE OPERATIONS - A permitting system for controlling devices in a system includes a permit issuing agent that receives a command to be sent to a device. Based upon at least one attribute of the command, the permit issuing agent identifies one or more business logic modules that is pertinent to the command. Each business logic module has a respectively different set of business rules associated with it. Each identified business logic module determines whether the command complies with the business rules associated with that module. If the command is determined to comply with the business rules of all of the identified business logic modules, the agent issues a permit for the command, and the permit is sent to the device for execution of the command. | 2015-02-26 |
20150058919 | SYSTEM AND METHOD TO CONTROL SENDING OF UNSOLICITED COMMUNICATIONS - A system and method to control sending of unsolicited communications over a network is provided. Typically, the network is the Internet and the system defines a SPAM prevention tool for users of an on-line service, such as an on-line bidding service. Users may contact an intended recipient with a contact form, which is forwarded to the recipient's e-mail address by an on-line service provider. A link accessible from a Web site allows recipients of unsolicited e-mail to complain to the on-line service provider. Sanctions are implemented against the sender of unsolicited e-mail based on the frequency of complaints. When the complaint level against a sender reaches a certain threshold, the sender is unable to use the contact form for a predetermined time period. | 2015-02-26 |
20150058920 | METHOD AND APPARATUS FOR PROVIDING DISTRIBUTED POLICY MANAGEMENT - An approach is provided for distributed policy management and enforcement. A policy manager determines one or more domains of an information system. The one or more domains are associated at least in part with respective subsets of one or more resources of the information system. The policy manager also determines one or more respective access policies local to the one or more domains. The one or more respective access policies configured to enable a determination at least in part of access to the respective subsets, the one or more resources, or a combination thereof. At least one of the one or more respective access policies is configured to operate independently of other ones of the one or more respective schemas. | 2015-02-26 |
20150058921 | APPLICATION ACCELERATION AS A SERVICE SYSTEM AND METHOD - Disclosed are systems and methods to provide application acceleration as a service. In one embodiment, a system includes a head office to serve an enterprise application comprised of a collaborative document. The system also includes a branch office to request the collaborative document from the head office. The enterprise application may also include a computed document and/or a static document. In addition, the system also includes a set of Point of Presence (POP) locations between the head office and the branch office to communicate the collaborative document, the computed document and the static document on behalf of the head office from a closest POP location to the head office to a closest POP location to the branch office and then onward to the branch office. | 2015-02-26 |
20150058922 | METHOD AND APPARATUS FOR CONTROLLING NETWORK DEVICE - The present invention relates to the field of communications and discloses a method and an apparatus for controlling a network device. An open service platform intercepts an instruction packet sent to a network device, identifies authority of the instruction packet and judges whether the instruction packet is in conflict with a previous instruction, and sends the instruction packet to the network device if the instruction packet has the authority and is not in conflict with the previous instruction. The method and apparatus can ensure correct and lawful control caused by the instruction packet on the network device. | 2015-02-26 |
20150058923 | Secure web container for a secure online user environment - Disclosed herein are systems and methods that allow for secure access to websites and web-based applications and other resources available through the browser. Also described are systems and methods for invocation of a secure web container which may display data representative of a requesting party's application at a user's machine. The secure web container is invoked upon receipt of an API call from the requesting party. Thus, described in the present specification are systems and methods for constructing and destroying private, secure, browsing environments (a secure disposable web container), insulating the user and requesting parties from the threats associated with being online for the purposes of providing secure, policy-based interaction with a requesting party's online services. | 2015-02-26 |
20150058924 | Security Model for a Layout Engine and Scripting Engine - Various embodiments provide an interface between a Web browser's layout engine and a scripting engine. The interface enables objects from the layout engine to be recognized by a memory manager in the scripting engine and interact in a streamlined, efficient manner. In accordance with one or more embodiments, the interface allows browser layout engine objects to be created as objects that are native to the scripting engine. Alternately or additionally, in some embodiments, the native objects are further configured to proxy functionality between the layout engine and the scripting engine. | 2015-02-26 |
20150058925 | SECURE ONE-WAY INTERFACE FOR OPC DATA TRANSFER - A system for transmitting OPC information from a first network in a first security domain to a second network in a second security domain. A first stand-alone server within the first security domain retrieves information via the first network from a first OPC server in the first security domain and forwards the retrieved information to a send server coupled to the first network. The send server forwards the received information received to a receive server via a one-way data link. The receive server receives the information from the send server and forwards the received information to a second stand-alone server via the second network. The second stand-alone server receives the information from the receive server and forwards the information to one or more OPC clients in the second security domain. | 2015-02-26 |
20150058926 | Shared Page Access Control Among Cloud Objects In A Distributed Cloud Environment - A management system in a distributed cloud environment that includes a plurality of cloud object, may administer shared page access control among cloud objects. Such shared access control includes: receiving, by the management system from a requesting cloud object, a request to access a shared page; discovering, by the management system, one or more page attributes of the shared page, where the one or more page attributes of the shared page include attributes specified by one or more cloud objects of the distributed cloud environment; identifying, by the management system in dependence upon the page attributes, one more access control measures to perform; performing, by the management system in dependence upon the page attributes, the access control measures; and determining, by the management system, whether to grant the requesting cloud object access to the shared page. | 2015-02-26 |
20150058927 | SECOND SCREEN MEDIATION - A system authenticates a first session for a first application running on a workstation and a second session for a second application running on a second screen device. The system links the first application to the second application when the first session matches the second session. The system receives data indicating the linked first application was changed at the workstation and provides update data to the second application corresponding to the change in the linked workstation application, causing a display of the second screen device to update based on the update data. | 2015-02-26 |
20150058928 | APPLYING CIRCUIT DELAY-BASED PHYSICALLY UNCLONABLE FUNCTIONS (PUFS) FOR MASKING OPERATION OF MEMORY-BASED PUFS TO RESIST INVASIVE AND CLONE ATTACKS - One feature pertains to generating a unique identifier for an electronic device by combining static random access memory (SRAM) PUFs and circuit delay based PUFs (e.g., ring oscillator (RO) PUFs, arbiter PUFs, etc.). The circuit delay based PUFs may be used to conceal either a challenge to, and/or response from, the SRAM PUFs, thereby inhibiting an attacker from being able to clone a memory device's response. | 2015-02-26 |
20150058929 | SYSTEM AND METHOD FOR TRUSTED MOBILE COMMUNICATIONS - Systems and methods for trusted mobile communications are described. A network system provisions a mobile client system with a collection of security parameters on a per application basis and a per device basis. The airplane system provides access to the mobile client system based on the established chain of trust without previously having information about the mobile client system even when the mobile client system and the airplane system are offline with respect to the network system. | 2015-02-26 |
20150058930 | METHOD AND APPARATUS FOR ENABLING AUTHORISED USERS TO ACCESS COMPUTER RESOURCES - An authentication system is disclosed for use in authenticating an entity to a relying party, to enable the entity to access a protected resource provided by the relying party via a web page, comprising an authentication component installable in a web browser used by the entity to access the web page, the authentication component comprising (a) a page scanner component which is operable when the entity accesses the web page to scan the web page (and/or to ask the entity) to identify a plurality of authentication systems supported by the web page; and (b) an activator component which is operable when the entity accesses the web page to install an identity system selector component in the web page which is operable to interact with the entity to enable the entity to select which of the plurality of authentication systems to use. | 2015-02-26 |
20150058931 | System and Method for Identity Management - Some implementations may provide a machine-assisted that includes: receiving, from a participant entity, a request to determine a trustworthiness of a transaction request, the transaction request being submitted by a user to access data managed by the participant entity; submitting a first inquiry at an authentication verification engine to determine an authenticity of a purported identity of the user submitting the transaction request; receiving a response from the authentication verification engine, the response including a computed authenticity score quantitatively attesting to the purported identity of the user submitting the transaction request; based on the computed authenticity score, determining the trustworthiness of the transaction request being submitted by the user; and notifying the participant entity of the determined trustworthiness of the transaction request to access data managed by the participant entity. | 2015-02-26 |
20150058932 | VISUALIZATION OF ACCESS PERMISSION STATUS - Queries regarding access permissions of users and rights to directories in a complex enterprise are executed in near real-time, using lookups to tables that form a condensed database maintained for each file server. User information is condensed by arranging users in user groups having common data access rights. Directory permissions storage is condensed by showing only distinctive permissions to a directory in a table entry, and referencing inherited permissions of parent directories. The tables indicate recursive and ancestral relationships among the user groups and directories. They are developed and updated in advance of any queries. A consolidated view of the query results is presented on a single display screen. Using the tables results can be obtained without exhaustive searches of large file system tables. | 2015-02-26 |
20150058933 | METHOD FOR ESTABLISHING SECURE COMMUNICATION LINK BETWEEN COMPUTERS OF VIRTUAL PRIVATE NETWORK - A technique is disclosed for establishing a secure communication link between a first computer and a second computer over a computer network. Initially, a secure communication mode of communication is enabled at a first computer without a user entering any cryptographic information for establishing the secure communication mode of communication. Then, a secure communication link is established between the first computer and a second computer over a computer network based on the enabled secure communication mode of communication. The secure communication link is a virtual private network communication link over the computer network in which one or more data values that vary according to a pseudo-random sequence are inserted into each data packet. | 2015-02-26 |
20150058934 | METHOD AND SYSTEM FOR PROVIDING WI-FI SERVICE BY WI-FI DEVICE - A method and a system for providing a Wireless Fidelity (Wi-Fi) service, in which when multiple counterpart devices are selected based on manufacturer information and support information on supported functions and capability defined in a service information field of each beacon message or each probe response message, a final device is determined by checking multiple pieces of signal information of the selected counterpart devices, are provided. The method includes receiving messages from multiple counterpart devices, selecting one or more counterpart devices, each of which supports a requested service, from an identical manufacturer when the messages are received, checking multiple pieces of signal information of the selected counterpart devices when the number of the selected counterpart devices is greater than one, and determining a device having the signal information satisfying set conditions as a final device. | 2015-02-26 |
20150058935 | Out-of-Path, Content-Addressed Writes with Untrusted Clients - A method in data storage involves receiving at a metadata server from a client device a BEGIN_WRITE request identifying data to be written by hashes, consulting, by the metadata server a deduplication table to determine historical nature of the data determined to be written, determining that the data was never previously written, was previously written by another client, or was previously written but failed a verification, sending to the client device write locations with tokens for the data, starting an authentication timer, and authorizing the client device to write directly to the data server using the authentication tokens and the authenticated write locations, determining that the data was previously written by the same client, or that the data was previously written and passed the verification test, notifying the client of this circumstance, and receiving from the client device an END_WRITE request. | 2015-02-26 |
20150058936 | SYSTEM, APPARATUS, AND METHOD FOR SHARING ELECTRONIC DEVICE - A system, apparatus, and method for sharing content in an electronic device behaving as a cloud electronic device are provided. An electronic device behaving as a guest electronic device includes a controller to detect an input of account information associated with a manager electronic device. The controller of the guest electronic device transmits account information associated with the manager electronic device and accesses the cloud electronic device when the manager electronic device acknowledges the request. | 2015-02-26 |
20150058937 | STREAMING VIDEO TO CELLULAR PHONES - A method, system, and computer program product for deploying data to a web server for streaming video to a mobile device. The method can include receiving a request for streaming video from a mobile device upon the resolving of the request by a DNS. The method can further include simultaneously sending both a request to a database for the video requested and a playlist for the video to the mobile device. The method can then include receiving the video from the database. The video received is sent as a sequence of blocks, where each block can further be comprised of a sequence of chunks. The method can even further include decompressing each block and storing each chunk on a web server. The method can further include an exchange of a security credential. | 2015-02-26 |
20150058938 | Integrated IP Tunnel and Authentication Protocol based on Expanded Proxy Mobile IP - A gateway is preconfigured to establish an Internet Protocol (IP) tunnel with a default local mobility anchor on behalf of a mobile node. The gateway receives from the mobile node an Internet access request including a mobile identifier and authorization and authentication protocol information, and sends to the default local mobility anchor an IP tunnel request to establish an IP tunnel. The gateway receives from the default local mobility anchor a tunnel redirect message to redirect the IP tunnel from the default local mobility anchor to a serving local mobility anchor and, responsive to the tunnel redirect message, authenticates the mobile node and establishes an IP tunnel with the serving local mobility anchor through which the mobile node communicates. | 2015-02-26 |
20150058939 | SYSTEM AND A METHOD FOR LOCATION BASED ANONYMOUS COMMUNICATION OVER A NETWORK - Disclosed is a system and method of location based anonymous communication in between plurality of users over a communication network. The system includes a registration module, a tapping module, a proximity module, an invitation module and a connection module. The registration module registers the credentials of the users. The tapping module receives touch gesture from the user in order to transmit a connection request. The proximity module displays a list of proximal users on receiving the connection request simultaneously from at least two users. The invitation module sends an invitation request to atleast one of the displayed proximal users for initiating the communication. The connection module establishes an anonymous connection for communication in between two users on receiving the invitation acceptance from one of proximal user. | 2015-02-26 |
20150058940 | Automatic Context Aware Preloading of Credential Emulator - Implementations of the present disclosure provide systems and methods for automatically preloading data pertaining to credentials determined to be likely to be used during a particular time interval into a memory utilized by a credential emulator. The systems and methods described herein contemplate identifying a particular time interval by identifying events that may designate the beginning and end of that particular time interval, identifying contextual information relevant to the client device or a user account affiliated with the client device during the time interval, identifying a set of credentials available for loading into the memory utilized by the credential emulator, determining from the set of credentials, a subset composed of individual credentials that are likely to be used during the time interval, and loading data pertaining to individual credentials in the subset into the memory utilized by the emulator. | 2015-02-26 |
20150058941 | SYSTEMS AND METHODS FOR LOCATION-BASED DEVICE SECURITY - A device may collect environmental information surrounding the device. Based on the collected environmental information, the device may automatically identify a potentially secured location that has lower security risk. When a potentially secured location is identified, the device may prompt the user to setup a security profile having reduced security requirement for the secured location. The device may store and associate the security profile with the secured location. The device may activate the security profile with reduced security requirement when the device is in the secured area. Further, the security profile may require that certain features of the device be disabled when the device is in the secured location. | 2015-02-26 |
20150058942 | Accessing a Primary Device Using a Wearable Device and a Wireless Link - A method of operation includes detecting that a wearable device is being worn, receiving a certificate from a primary device over a secure wireless link where the wearable device is paired to the primary device using the secure wireless link, storing the certificate in memory of the wearable device, and sending the certificate, over the secure wireless link, to the primary device to unlock the primary device. The method may further include detecting that the wearable device is no longer being worn, and eradicating the certificate from memory of the wearable device in response to detecting that the wearable device is no longer being worn. In some embodiments, the method may also include detecting that the secure wireless link is disconnected, and eradicating the certificate from memory of the wearable device in response to detecting that the secure wireless link is disconnected. The present disclosure also provides a wearable device. | 2015-02-26 |
20150058943 | INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, AND COMPUTER PROGRAM - Provided is an information processing device including a program execution unit that loads, interprets, and executes a computer program code created by a first procedural language. The program execution unit opens a communication channel in response to a communication connection request from an external unit, and returns to each communication channel a result for a processing request sent from an external unit on the opened communication channel. | 2015-02-26 |
20150058944 | SOCIAL DRIVEN PORTAL USING MOBILE DEVICES - The present disclosure describes methods, systems, and computer program products for measuring strength of a unit test. One computer-implemented method includes receiving a login request for a portal user from a mobile device, exposing one or more available widgets based, at least in part, on credentials associated with the portal user, determining that a widget identified in a received widget selection is a mobile-aware widget (MAW), receiving mobile device data responsive to a query to select a specific action associated with the MAW, the mobile device data associated with the specific action, and transmitting the received mobile device data to the MAW. | 2015-02-26 |
20150058945 | SYSTEM AND METHOD FOR ACCEPTING USER INPUT USING ASYNCHRONOUS AUTHENTICATION - A method and system for accepting user inputs over a network. The user is provided with an input widget on a client system to collect and send an input and user identity information to a server system, without the requirement to authenticate the user identity on the client system upfront. The server stores the user input and the user identity information, and associates the user input information with the user identity information. The server system sends to the user identity URL a message comprising of the user input information and an indication of action such as a link that the user is to perform to confirm the authenticity of the input. In response to the indicated action being performed, the server system processes the user input as authenticated input. | 2015-02-26 |
20150058946 | CONNECTIVITY SERVICES APPLICATION PROGRAMMING INTERFACE - Systems and methods are disclosed herein to method comprising: providing a first system; generating data to be sent over a network link; determining a transport protocol that will be used to transmit data over the network communication link; negotiating connection services to be performed on data that will transmitted over the network communication link; sending a request to open a network communication link; sending a request to the connectivity services of the second system for credentials of the second system; receiving the credentials from the connectivity services module of the second system; verifying that the credentials match an authenticated computer system; opening a network connection between the first system and the second system when the second system's credentials have been verified by the connectivity services module of the first system; and transmitting the data to the second system according to the determining network protocol and negotiated connection services. | 2015-02-26 |
20150058947 | MOBILE DEVICE AUTHENTICATION - One aspect of the invention is a system for mobile device authentication. The system includes a public-facing server configured to interface with a mobile device. The system also includes a secure server configured to interface with the public-facing server and an authorization station. The authorization station includes processing circuitry configured to establish authorization limits for the mobile device and generate an authentication key associated with the authorization limits. The processing circuitry is further configured to provide the authentication key and an identifier of the mobile device to the secure server, and generate an authorization code including an encoded version of the authentication key and an address of the public-facing server. The processing circuitry is also configured to provide the authorization code to the mobile device to establish authentication for the mobile device to receive data from a control system network as constrained by the authorization limits. | 2015-02-26 |
20150058948 | CONTENT SHARING SYSTEM, CONTENT SHARING METHOD, AND INFORMATION COMMUNICATION APPARATUS - A content sharing system includes: a server; a first information communication apparatus; and a second information communication apparatus, in which the first information communication apparatus includes a reserve requesting unit which sends to the server a reserve request message for requesting to reserve a sharing space to be newly generated, the reserve request message including first identification information for identifying the second information communication apparatus or the user using the second information communication apparatus, and the server includes: a first storage; and a sharing space generating unit which, upon receiving the reserve request message, generates the sharing space in the first storage, and stores in the first storage the first identification information included in the reserve request message. | 2015-02-26 |
20150058949 | METHOD AND SYSTEM FOR COMPUTING CODE MANAGEMENT PLATFORM - A method for authenticating a computing device includes: storing an account profile, the profile including data related to a service account including an alphanumeric code; generating a session identifier and a seed value; computing a first hash using the session identifier; computing a second hash using the session identifier and the alphanumeric code; computing a third hash using the second hash and a utilized seed value; transmitting the session identifier to a computing device via a first communication protocol; transmitting the session identifier and first hash to a remote notification service for transmission to the computing device via a second communication protocol; receiving a fourth hash and the session identifier from the computing device via the first communication protocol; validating the fourth hash based on a comparison of the fourth hash and the computed third hash; and transmitting a validation result to the computing device based on the validation step. | 2015-02-26 |
20150058950 | System and method for identity management - Some implementations may provide a machine-assisted method that includes: receiving, from a relying party, a request to determine a trustworthiness of a particular transaction request, the transaction request initially submitted by a user to access data managed by the relying party; based on the transaction request, summarizing the particular transaction request into transactional characteristics, the transactional characteristics devoid of source assets of the transaction; generating first machine-readable data encoding transactional characteristics of the underlying transaction as requested, the transactional characteristics unique to the particular transaction request; submitting a first inquiry at a first engine to determine an access eligibility of the user submitting the transaction request, the first inquiry including the credential information of the submitting user, as well as the summarized transactional characteristics that is applicable only once to the underlying transaction request; and receiving the access eligibility determination from the first engine. | 2015-02-26 |
20150058951 | Distribution of Content Document to Varying Users with Security, Customization and Scalability - A system and method for receiving a request for a container document, determining whether the request is for a container document associated with a user group, determining whether a requestor of the request is associated with a level of status within the user group among a plurality of levels of status within the user group, determining the level of status of the requestor based on a determination that the requestor is associated with a level of status within the user group, requesting configuration information based on a determination that the container document is associated with a user group and the level of status, receiving the configuration information, and serving the container document using the configuration information. | 2015-02-26 |
20150058952 | DIGITAL HANDSHAKE FOR AUTHENTICATION OF DEVICES - This is directed to a digital handshake for establishing a secure communications path between two electronic devices. Each device can capture an image of the other device using a camera (e.g., a front facing camera or a back facing camera) and extract, from the captured image, a key or seed associated with the other device. For example, each device can display a seed to be identified from an image taken by the other device. Using the extracted keys or seeds, each device can generate, using a same process, an identical digital handshake key. The digital handshake key can then be used to define a secure communications path between the two devices and share information securely. In some embodiments, a digital handshake key can be shared among several devices to create a multi-device secure communications path. Once a communications path has been established, the devices in the path can be identified and authenticated from the digital handshake key to receive access to secured goods, services or information. | 2015-02-26 |
20150058953 | IMAGE PROCESSING APPARATUS AND METHOD, INCLUDING USER AUTHENTICATION, AND STORAGE MEDIUM - An image processing apparatus which is capable of realizing security improvements without degrading the usability. A user is authenticated, and an operation screen accepting an operation input from the user is displayed. A job is executed according to an instruction of the user authenticated by the user authenticating unit. It is determined whether or not the job of which execution is instructed by the user, is being executed when the user authenticating unit authenticates the user. A first operation screen through which the user inputs an instruction for the job in execution is displayed when the job executing unit is executing the job, of which execution is instructed by the user, whereas another operation screen through which another user inputs an instruction for another job is displayed when not. | 2015-02-26 |
20150058954 | SECURE WIRELESS LOCAL AREA NETWORK (WLAN) FOR DATA AND CONTROL TRAFFIC - A device receives capability information associated with a next hop device of a wireless local area network (WLAN). The device also determines, based on the capability information, whether the next hop device is capable of implementing security for traffic, where the security includes a media access control (MAC) security standard and a layer 2 link security standard. The device further creates, via the MAC security standard, a secure channel with the next hop device when the next hop device is capable of providing security for traffic. | 2015-02-26 |
20150058955 | Cloud-Based Device Information Storage - Device information for each of multiple devices associated with a user account is maintained by a cloud service. The device information can include credential information allowing the device to be accessed by other ones of the multiple devices, remote access information indicating how the device can be accessed by other ones of the multiple devices on other networks, and property information including settings and/or device drivers for the device. The device information for each of the multiple devices is made available to other ones of the multiple devices, and can be used by the multiple devices to access one another and provide a consistent user experience across the multiple devices. | 2015-02-26 |
20150058956 | LOCATION BASED SHARING OF A NETWORK ACCESS CREDENTIAL - A network access credential can be shared among devices based on location information for a device. Location information can include timed fingerprint location information. In an aspect, location information can be associated with a location of user equipment. This location information can be correlated with network access credentials. Location information can be used to access a relevant network access credential. The relevant network access credential can be shared with other devices. In an embodiment, sharing a network access credential can be between mobile devices. In another embodiment, sharing a network access credential can be between a remote computing device and a mobile device. Sharing a credential can allow for access to a network without having to generate or input new credentials. | 2015-02-26 |
20150058957 | SYSTEMS AND METHODS TO PRESENT MESSAGES IN LOCATION-BASED SOCIAL NETWORKING COMMUNITIES - Systems and methods to let users connect authentically with new people anywhere nearby in homes, offices, classrooms, dorms, bars, etc., where the users can be who they really are, and also say what they want without fear, using periodic anonymized posting of expiring content from an otherwise attributed user profile. Users put out a broadcast message and get back personal communications. A one-to-many message from a user results in a one-to-one private communication, which feature may be referred to as “social to personal”. | 2015-02-26 |
20150058958 | SYSTEMS, METHODS, AND APPARATUS TO MONITOR MOBILE INTERNET ACTIVITY - Systems, methods, and apparatus to monitor mobile Internet activity are disclosed. An example method comprises determining if a media request originated from a desktop computer or a mobile device by inspecting a user agent identifier of the media request. The media request is blocked if the media request originated from the desktop computer, the blocking to prevent the media request originating from the desktop computer from affecting a media exposure monitoring result. If the media request originated from the mobile device, an identifier of the media requested by the media request in association with the mobile device is stored. | 2015-02-26 |
20150058959 | EFFICIENTLY THROTTLING USER AUTHENTICATION - In an embodiment, an administrative computer system receives user login credentials from a user and makes at least one of the following determinations: that the user identifier does not match any existing user account, that the user identifier matches at least one existing user account, but that the user's account is in a locked state, or that the user identifier matches at least one existing user account, but the user's password does not match the user identifier. The administrative computer system then returns to the user the same response message regardless of which determination is made. The response indicates that the user's login credentials are invalid. The response also prevents the user from determining which of the credentials was invalid, as the response message is the same for each determination and is sent to the user after a measured response time that is the same for each determination. | 2015-02-26 |
20150058960 | Elevating Trust in User Identity During RESTful Authentication and Authorization - Credentials sent over a back channel during the authentication of a user to a RESTful service can elevate the trust the recipient system can place in the user's identity. The addition of an identity credential of higher strength can increase confidence in user identities electronically presented with a lower strength credential. Attributes from either credential can be used to determine authorization to a protected resource. | 2015-02-26 |
20150058961 | AUTHENTICATING USERS BASED UPON AN IDENTITY FOOTPRINT - Disclosed are various embodiments of generating a user signature associated with a user and authenticating a user. At least one behavior associated with at least one sensor in a computing device is identified. A timestamp is generated and associated with the behavior. A user signature corresponding to a user based at least in part upon the behavior and the timestamp is generated and stored. | 2015-02-26 |
20150058962 | SYSTEM AND METHOD OF AUTHENTICATION OF A FIRST PARTY RESPECTIVE OF A SECOND PARTY AIDED BY A THIRD PARTY - A method and system of authenticating a service to access data respective of a user on a low-end mobile device are provided. The method includes receiving a request from a service to access data respective of the user device, wherein the user device is a low-end mobile device; sending the user device a first authentication token over a first communication path; receiving a second authentication token over a second communication path, wherein the second authentication token is received from a host server hosting the service; comparing the first authentication token to the second authentication token; and allowing access to the data upon determination that the first authentication token matches the second authentication token. | 2015-02-26 |
20150058963 | MANAGEMENT AND DELIVERY OF PROFILE DATA - Aspects of the invention relate to systems and methods for securely retaining profile data and the use of such data for the targeted delivery of content. In one embodiment, a unique profile that represents the user location and is keyed to profile attributes selected from both a first set of data collected from the user location and the second set of profile data collected from an external source, is generated. The key does not allow a third party to identify the end-user location or a user associated with the end-user location. Electronic content transmitted to end-user locations may be encoded such that it may only be accessed by an authorized user and/or on a specific electronic device at the user location. A graphical user interface may be utilized to allow a third-party to provide selection criteria for determining user locations to receive targeted content. Further aspects of the invention relate to an electronic device configured to present targeted content to a user at a user location. | 2015-02-26 |
20150058964 | Streaming Music Using Authentication Information - Systems and methods are provided for assisting a user with setting up an audio system with audio content services the user is already registered with. One method may involve receiving a list of a plurality of audio services supported by an audio system, selecting an audio service from the list of plurality of audio services, and determining whether a computing device application corresponding to the audio service is present on a computing device operated by the user and associated with the audio system. If the computing device application is present on the computing device operated by the user, the audio service may be set up with the audio system based on the user's registration information. In one case, the setup of the audio system with the audio service may require additional user input. In another case, the setup of the audio system with the audio service may be automatic. | 2015-02-26 |