16th week of 2015 patent applcation highlights part 58 |
Patent application number | Title | Published |
20150106801 | RECOMMENDING APPLICATIONS TO PORTABLE ELECTRONIC DEVICES - Various embodiments of systems and methods for recommending applications to portable electronic devices are described herein. Initially a context change of an application identification parameter is detected. Based on the detected context change, a target application, from a plurality of applications, may be identified. A similarity value is then computed between the identified target application and another application. Finally, an application to be recommended to a portable electronic device is determined based on the computed similarity value and a rate value of another application. | 2015-04-16 |
20150106802 | REPLICATING VIRTUAL MACHINES ACROSS DIFFERENT VIRTUALIZATION PLATFORMS - A first virtual machine executing in a first computer server is replicated to a second virtual machine executing in a second computer server, where the first computer server and the second computer server are connected over a network and are each connected to one or more disk storage units capable of storing files in a file system. Virtual disks of the first virtual machine on the first server are transmitted to the second server, where each transmitted virtual disk is stored as a file in a storage unit connected to the second server and corresponds to one of a plurality of virtual disks of the second virtual machine running in the second server, and where the virtual disks of the first virtual machine have a first format and the virtual disks of the second virtual machine have a second format that is different from the first format. A plurality of updates to the virtual disks of the first virtual machine is captured, and contiguous data blocks from the virtual disks of the first virtual machine that are subject to the captured updates are identified. The identified contiguous data blocks are then transmitted to the second server for storage in the virtual disks of the second virtual machine. | 2015-04-16 |
20150106803 | Richer Model of Cloud App Markets - In a cloud app market, a cloud infrastructure customer can purchase apps for performing services such as rootkit detection and network security for a customer virtual machine run by the cloud infrastructure customer. A cloud infrastructure provider executes a provider virtual machine monitor or hypervisor on cloud infrastructure. The cloud app is provided with a customer virtual machine monitor nested on the provider virtual machine monitor. The customer virtual machine, together with a nested management domain of the customer, execute on the customer virtual machine monitor. | 2015-04-16 |
20150106804 | Logical Router - Some embodiments provide a system that includes several host machines for hosting several virtual machines and a physical network for interconnecting the host machines. Each host machine includes a managed physical switching element (MPSE) including several ports for performing link layer forwarding of packets to and from a set of virtual machines running on the host machine. Each port is associated with a unique media access control (MAC) address. Each host machine includes a managed routing element (MPRE) for receiving a data packet from a port of the MPSE and performing network layer routing in order to forward the received data packet from a first virtual machine of a first network segment to a second virtual machine of a second network segment. | 2015-04-16 |
20150106805 | ACCELERATED INSTANTIATION OF CLOUD RESOURCE - The subject disclosure relates to a method for instantiating cloud resources that are provided as service virtual machines. In one embodiment, a cloud service management system maps each one of the multiple abstraction layer slots to a virtual context of a logical resource. The virtual context is hosted by a respective virtual machine that is part of a pool of virtual machines. The system identifies an available abstraction slot from the multiple abstraction layer slots and reserves the slot so that the corresponding virtual context of the logical resource can be served to a requesting device. The system then marks the available abstraction layer slot as unavailable. Systems and computer readable media are also provided. | 2015-04-16 |
20150106806 | METHODS AND APPARATUS TO MANAGE VIRTUAL MACHINES - Methods and apparatus to manage virtual machines are disclosed. An example method includes determining that a deployment of a first virtual machine has halted because the first virtual machine is dependent on a second virtual machine that has not been fully deployed and in response to detecting that the second virtual machine has been deployed, notifying, via a processor, the first virtual machine that deployment of the first virtual machine may continue. | 2015-04-16 |
20150106807 | METHODS AND APPARATUS TO MANAGE VIRTUAL MACHINES - Methods and apparatus to manage virtual machines are disclosed. An example method includes determining that a deployment of a first virtual machine has halted because the first virtual machine is dependent on a parameter of a second virtual machine, detecting that the second virtual machine has been deployed and has caused configuration information to be stored in a repository, retrieving, via a processor, the configuration information, including the parameter, from the repository, and transmitting, via the processor, the parameter to the first virtual machine to cause the first virtual machine to resume deployment. | 2015-04-16 |
20150106808 | METHODS AND APPARATUS TO MANAGE VIRTUAL MACHINES - Methods and apparatus to manage virtual machines are disclosed. An example method includes deploying a virtual machine, storing deployment information about the virtual machine, including an associated workload, in a database, retrieving configuration information, including the deployment information from the database, and displaying, via a processor, the configuration information including an indication that the virtual machine is associated with other virtual machines that are associated with the workload. | 2015-04-16 |
20150106809 | METHODS AND APPARATUS TO MANAGE VIRTUAL MACHINES - Methods and apparatus to manage virtual machines are disclosed. An example method includes storing an indication that a first system resource is associated with a first service level, storing an indication that a second system resource is associated with a second service level, during deployment of a virtual machine, determining that the virtual machine is associated with the first service level, and in response to the determining, deploying the virtual machine utilizing the first resource. | 2015-04-16 |
20150106810 | Distribution of a Service Implemented by Intra-Connected Virtual Machines - A mechanism is provided for distributing a service implemented by a plurality of infra-connected source virtual machines on a source computing environment. Characteristic information of the service comprising an indication of the intra-connected source virtual machines and of each intra-connection between the intra-connected source virtual machines is discovered. The source virtual machines are copied into corresponding target virtual machines on a target computing environment. Reconfiguration information of at least one selected target virtual machine of the target virtual machines is saved that has a source identity of the corresponding source virtual machine in the source computing environment being reconfigured into a target identity of the at least one selected target virtual machine in the target computing environment. Each communication, addressed to each source identity by each target virtual machine intra-connected to a corresponding selected target virtual machine, is redirected to the corresponding target. | 2015-04-16 |
20150106811 | SYSTEM AND METHOD FOR MANAGING A VIRTUALIZED COMPUTING ENVIRONMENT - A technique for predictive distributed resource scheduling and distributed power management includes analyzing patterns in the workload, predicting future workloads, and making recommendations for changes to the virtual computing environment. In addition, a cost-benefit analysis can be performed to determine whether the recommended change would likely result in improved performance. | 2015-04-16 |
20150106812 | CLOUD GATEWAY, CLOUD GATEWAY MANAGEMENT DEVICE, AND METHOD THEREOF - A cloud gateway management method includes: receiving a creation request for creating a cloud gateway from a user; creating a cloud gateway when the request receiving module receives the creation request, wherein the cloud gateway is a format of a virtual machine; generating a plurality of virtual network cards in the cloud gateway, each virtual network card being used to connect to a corresponding network; assigning a corresponding network address for each virtual network card; and configuring the cloud gateway according to network configuration information including the network address of each virtual network card. | 2015-04-16 |
20150106813 | METHOD AND APPARATUS FOR PROVISIONING OF RESOURCES TO SUPPORT APPLICATIONS AND THEIR VARYING DEMANDS - Embodiments of the present invention provide a method for allowing efficient allocation of data center resources in a virtualized data center. In one step, network information is obtained from a network using an application resource broker (ARB). In another step, data center information is obtained from a virtual center server using the ARB. In another step, a set of application traffic metrics and a set of virtualized infrastructure metrics are determined using the ARB based on the obtained network information and data center information respectively. The ARB is implemented on a computer system. | 2015-04-16 |
20150106814 | Systems and Algorithm For Interfacing with a Virtualized Computing Service Over a Network Using a Lightweight Client - Systems and algorithm for providing a service to a client includes defining a virtual infrastructure in which a plurality of virtual machines are running on a virtualization layer with at least one of the virtual machine executing an image processor algorithm. The image processor algorithm is configured to access framebuffer data of a specific virtual machine that includes the service to be controlled, process the framebuffer data to generate image data packets with contextual information by scanning the framebuffer data to discern the image of the virtual machine display, evaluate the framebuffer data to identify contiguous areas of activity, extract data related to the contiguous areas of activity and package the extracted data into image data packets. The image data packets are transmitted to the client for presenting on a display device of the client. | 2015-04-16 |
20150106815 | APPLICATION-SPECIFIC DATA IN-FLIGHT SERVICES ALONG A COMMUNICATION PATH SELECTED BASED ON A DIF SERVICES POLICY ASSOCIATED WITH A VM - Embodiments provide data in-flight (DIF) services to software applications such as virtual machines (VMs) at an application level without requiring modification to established storage protocols. In exemplary embodiments, a software application is associated with a DIF services policy indicating one or more DIF services to apply to the software application. Data transmitted by the software application to a destination is tagged based on the DIF services policy associated with the software application and transmitted to the destination. | 2015-04-16 |
20150106816 | PERFORMANCE MEASUREMENT OF HARDWARE ACCELERATORS - Performance measurement of hardware accelerators, where one or more computer processors are operably coupled to at least one hardware accelerator, and a computer memory is operatively coupled to the one or more computer processors, including operating by the one or more processors the accelerator at saturation, submitting data processing tasks by the processors to the accelerator at a rate that saturates the data processing resources of the accelerator, causing the accelerator to decline at least some of the submitted tasks; and while the accelerator is operating at saturation, measuring by the processors accelerator performance according to a period of time during which the accelerator accepts a plurality of submitted tasks. | 2015-04-16 |
20150106817 | MOBILE APPARATUS FOR EXECUTING SENSING FLOW FOR MOBILE CONTEXT MONITORING, METHOD OF EXECUTING SENSING FLOW USING THE SAME, METHOD OF CONTEXT MONITORING USING THE SAME AND CONTEXT MONITORING SYSTEM INCLUDING THE SAME - A mobile apparatus includes a sensing handler and a processing handler. The sensing handler includes a plurality of sensing operators. The sensing operator senses data during a sensing time corresponding to a size of C-FRAME and stops sensing during a skip time. The C-FRAME is a sequence of the sensed data to produce a context monitoring result. The processing handler includes a plurality of processing operators. The processing operator executes the sensed data of the sensing operator in a unit of F-FRAME. The F-FRAME is a sequence of the sensed data to execute a feature extraction operation. | 2015-04-16 |
20150106818 | DYNAMICALLY LOADING GRAPH-BASED COMPUTATIONS - Processing data includes: receiving units of work that each include one or more work elements, and processing a first unit of work using a first compiled dataflow graph ( | 2015-04-16 |
20150106819 | TASK SCHEDULING METHOD FOR PRIORITY-BASED REAL-TIME OPERATING SYSTEM IN MULTICORE ENVIRONMENT - Disclosed herein is a task scheduling method for a priority-based real-time operating system in a multicore environment, which solves problems occurring in real-time multicore task scheduling which employs a conventional decentralized scheme. In the task scheduling method, one or more scheduling algorithm candidates for sequential tasks are combined with one or more scheduling algorithm candidates for parallel tasks. Respective task scheduling algorithm candidates generated at combining, are simulated and performances of the candidates are evaluated based on performance evaluation criteria. A task scheduling algorithm exhibiting best performance is selected from among results obtained at evaluating the performances. | 2015-04-16 |
20150106820 | METHOD AND APPARATUS FOR PROVIDING ALLOCATING RESOURCES - Various embodiments provide a method and apparatus for allocating resources to processes by using statistical allocation based on the determined maximum average resource demand at any time across all applications (“ | 2015-04-16 |
20150106821 | APPARATUS AND METHOD FOR ALLOCATING MULTIPLE TASKS - An apparatus and method for allocating multiple tasks are disclosed. The apparatus for allocating multiple tasks includes a clustering unit and an allocation unit. The clustering unit clusters tasks, generated when application software (SW) operates in an SW platform, based on the application SW. The allocation unit allocates the clustered tasks to a cluster core corresponding to the application SW and allocates the clustered tasks to a core having a distance of one hop from the cluster core. | 2015-04-16 |
20150106822 | METHOD AND SYSTEM FOR SUPPORTING RESOURCE ISOLATION IN MULTI-CORE ARCHITECTURE - Embodiments of the present invention provide a method and a system for supporting resource isolation in a multi-core architecture. In the method and system for supporting resource isolation in a multi-core architecture provided by the embodiments of the present invention, manners of inter-core operating system isolation, memory segment isolation, and I/O resource isolation are adopted, so that operating systems that run on different processing cores of the multi-core processor can run independently without affecting each other. Therefore, the present invention fully uses the advantages high integration level and low comprehensive costs of the multi-core processor, it is achieved that a failure domain of the multi-core processor remains in a single hard disk, and the multi-core processor has high reliability. | 2015-04-16 |
20150106823 | Mobile Coprocessor System and Methods - Embodiments include apparatuses, systems, and methods mobile coprocessing. A connection is established between a mobile device and an auxiliary computing device. The mobile device implements a CPU abstraction layer and a virtual CPU between a software stack and a CPU of the mobile device. The abstraction layer allows for the mobile device to offload tasks to the auxiliary computing device while the software stack interacts with the abstraction layer as if the tasks are being executed by the CPU of the mobile device. The mobile device of allocates tasks to the auxiliary computing device based on various parameters, including properties of the auxiliary computing device, metrics of the connection, and priorities of the tasks. | 2015-04-16 |
20150106824 | METHOD FOR COUPLING A CAD SYSTEM TO A DATABASE AND PLANNING SYSTEM FOR INTERCHANGING DATA BETWEEN BOTH SYSTEMS - The invention which relates to a method for coupling a CAD system to a database and planning system for interchanging data between both systems is based on the problem of specifying a method for coupling CAD systems to different database and planning systems, which method reduces the outlay in the event of changes and adaptations to different systems. According to the present invention, the problem is solved by virtue of the fact that the conversion between the communication protocols takes place in two substeps in such a manner that the data are converted from the first communication protocol into a third communication protocol in a CAD abstraction layer and are then converted from this third communication protocol into the second communication protocol in a useful layer or vice versa. | 2015-04-16 |
20150106825 | DURABLE EXECUTION OF LONG RUNNING APPLICATIONS - Executing a long running application while maintaining state of the application. A method includes identifying that a new event has taken place with respect to an execution of an orchestration. The method includes establishing the state of the orchestration by replaying the execution of the orchestration by replaying any previous state from a history of the execution of the orchestration. The method further includes executing a next instruction of the execution of the orchestration. The next instruction is an instruction coded in the orchestration to execute after items in the history have been replayed. | 2015-04-16 |
20150106826 | APPARATUS FOR SERVICING AT LEAST ONE FIELD DEVICE OF AUTOMATION TECHNOLOGY - An apparatus for servicing at least one field device of automation technology by means of a servicing unit connected or connectable with the field device, wherein a server arranged outside of the field device is associated with the servicing unit, wherein the server provides field device type specific web pages for the respective field devices, and wherein there is associated with the servicing unit a servicing program, which provides a browser, in order to present the field device type specific web pages on a display unit and which provides a communication link between the server and the field device for the purpose of servicing the field device. | 2015-04-16 |
20150106827 | RPC ACCELERATION BASED ON PREVIOUSLY MEMORIZED FLOWS - Techniques for acceleration of remote procedure calls are disclosed. Such techniques include steps of receiving a content request, the content request including at least one data request for information from a database; analyzing the received content request; and determining whether the analyzed content request includes at least one data request that can be separately executed in parallel with execution of the received content request. In response to a determination that at least one data request that can be separately executed in parallel, initiating the execution of the parallel data request; receiving the requested data in response to that data request; locally storing the received requested data; and providing the stored received requested data in response to execution of the received content request. | 2015-04-16 |
20150106828 | METHOD AND APPARATUS FOR IDENTIFYING POINT OF INTEREST AND INSERTING ACCOMPANYING INFORMATION INTO A MULTIMEDIA SIGNAL - An apparatus arranged to insert accompanying information into a multimedia signal, the apparatus constituted of: a multimedia receiver; a point of interest (POI) identifier arranged to identify a POI in the received multimedia signal responsive to content of the received multimedia signal; an inserter arranged to insert accompanying information into the received multimedia signal responsive to an output of the POI identifier; an output device arranged to transmit the output of the inserter to a display device, the identification, insertion and output being contemporaneous with the receiving; a server; a user gesture signal receiver arranged to receive a signal responsive to a user gesture; and a communication device, wherein the inserted accompanying information encourages a user to perform a gesture with a device in communication with the user gesture signal receiver, and wherein the communication device is arranged to transmit the received signal responsive to the user gesture. | 2015-04-16 |
20150106829 | METHODS AND SYSTEMS FOR COMPENSATING FOR DISABILITIES WHEN PRESENTING A MEDIA ASSET - Methods and systems are disclosed herein for supplementing media assets in order to compensate for a particular disability of a user. Specifically, a media guidance application determines whether or not a user can comprehend a media asset based on the particular disability of the user. Upon determining that the user cannot comprehend the media asset, the media guidance application supplements the media asset with supplemental data, which compensates for the particular disability of the user. | 2015-04-16 |
20150106830 | METHODS AND APPARATUS TO MONITOR MEDIA EXPOSURE - Methods and apparatus to monitor media exposure are disclosed. An example implementation includes accessing a meter identifier and first audio received from a wearable bracelet meter, the meter identifier uniquely associated with the wearable bracelet meter. Whether the first audio substantially matches second audio received at a second meter is determined. In response to determining that the first audio and the second audio substantially match, the meter identifier associated with the wearable bracelet meter and at least one of the first audio or the second audio are stored. | 2015-04-16 |
20150106831 | ADVERTISING METRICS SYSTEM AND METHOD - The present disclosure relates to a system and method for monitoring audio-video (AV) streams transported over a network. The system may include an AV probe deployed between an AV tuner and AV destination customer premise equipment. The AV probe may receive an incoming AV stream. The AV probe may generate a thumbnail stream by capturing thumbnails of the incoming AV stream. The AV probe may transmit, substantially in real-time, the thumbnail stream to a monitoring engine and the incoming AV stream to the AV destination customer premise equipment. | 2015-04-16 |
20150106832 | CONTENT PLAYBACK DEVICE AND MOBILE TERMINAL - An authenticated mobile terminal | 2015-04-16 |
20150106833 | MOBILE TERMINAL, DISPLAY APPARATUS AND CONTROLLING METHODS THEREOF - A mobile terminal, a display apparatus, and their associated controlling methods are provided to control a display mode of the display apparatus in a general mode, which displays a content shareable with a third party, and in a security mode, which displays a content non-shareable with the third party, according to a user's security level. The mobile terminal includes a communicator to communicate with an external display apparatus to provide a personalization function; a sensor to sense a position of the mobile terminal, and a controller to determine the display mode of the display apparatus based on the position of the mobile terminal sensed by the sensor, and transmit display mode instruction information including the determined display mode to the display apparatus through the communicator. | 2015-04-16 |
20150106834 | PROCESSING METHOD FOR CONTROL MESSAGES AND SECURITY MODULE TO CARRY OUT SAID METHOD - The present invention concerns a method for processing messages intended to allow the access to conditional access content and to a security module arranged for implementing this method. The method comprises the steps of receiving by a security module comprising at least one decryption module, a plurality of messages, these messages belonging to at least two different categories; assigning a different priority level to messages from each different category, one of said priority level being defined as high and another priority level, lower that the high priority level, being defined as the standard priority level; associating a value to the messages to which the standard priority level has been assigned; assigning at least one threshold value for the value associated with messages having a standard priority level; and comparing between the threshold value for a determined message and the value associated with said message. If no value associated with said message having standard priority level exceeds the corresponding threshold value, processing the messages according to their priority level, a message to which the high priority level has been assigned being processed before a message to which a lower priority level has been assigned, and change of the value associated with the messages having a standard priority level according to said predefined rule. If the value associated with one of said messages having a standard priority level exceeds the threshold value for the corresponding message, processing one of the messages having a standard priority level before processing a message having a higher priority level, and change of the value associated with the messages having a standard priority level according to said predefined rule. | 2015-04-16 |
20150106835 | Providing Parental Control Using a Playlist - A method includes receiving a playlist at a network device from a client device in communication with the network device over a network. In response to receiving the playlist, the method also includes disabling channel changes not associated with the playlist from executing during times indicated in the playlist. The method further includes transmitting a control message from the network device to the client device that requests the client device to tune to a channel conforming to the playlist when the network device receives a channel change request not associated with the playlist from the client device. | 2015-04-16 |
20150106836 | GLOBAL SPEECH USER INTERFACE - A global speech user interface (GSUI) comprises an input system to receive a user's spoken command, a feedback system along with a set of feedback overlays to give the user information on the progress of his spoken requests, a set of visual cues on the television screen to help the user understand what he can say, a help system, and a model for navigation among applications. The interface is extensible to make it easy to add new applications. | 2015-04-16 |
20150106837 | SYSTEM AND METHOD TO DYNAMICALLY SYNCHRONIZE HIERARCHICAL HYPERMEDIA BASED ON RESOURCE DESCRIPTION FRAMEWORK (RDF) - Various disclosed embodiments include methods and apparatus for dynamically synchronizing hypermedia based on Resource Description Framework (RDF). A method for hypermedia synchronization within a session hosted by a server includes establishing a communications link between the server and a first user device during the session, and generating a first identifier associated with a first uniform resource identifier (URI) that identifies first hypermedia. The method includes receiving, at the server, a request from the first user device including a second URI that identifies second hypermedia to be added to the session, and generating synchronization information providing a temporal relationship between the first URI and the second URI, where the synchronization information includes an RDF triple. | 2015-04-16 |
20150106838 | DIGITAL BROADCAST RECEIVER DEVICE AND DIGITAL BROADCAST RECEIVING METHOD - A digital broadcast receiver device ( | 2015-04-16 |
20150106839 | Systems, Methods, and Apparatus for Delivering Content - Systems, methods, and apparatus for delivering content are provided. A request for desired content may be received by a content management server from a customer device associated with a customer. The content management server may include one or more computers. Additionally, the content management server may determine whether the customer device is in communication with one or more additional devices associated with the customer. Based at least in part upon the communication determination, the content management server may determine whether the customer device is located within a subscription area for the customer. Based at least in part upon the determination of whether the customer device is located within the subscription area, the content management server may determine access rights to the desired content. | 2015-04-16 |
20150106840 | Methods And Systems For Logging Information - Methods and systems for providing data such as content are disclosed. A method can comprise selecting a closed caption buffer and storing a service trace in the selected closed caption buffer. The closed caption buffer comprising the stored service trace can then be activated to provide service information. | 2015-04-16 |
20150106841 | Dynamic Advertisement During Live Streaming - Disclosed is a configuration for inserting an advertisement (ad) break into a live stream by a server. One example embodiment includes a system (and method) that receives index files periodically from a media encoder of a live stream. Each index file comprising pointers to current segments of the live stream encoded in real-time. The system sets a status of the live stream to a live status and determines whether an indicator for ad break is included in a received index file. If there is no indicator for the ad break in the received index file, the system transmits the received index file to one or more client computers. If there is an indicator for the ad break in the received index file, the system processes the received index file by removing segments following the indicator from the index file, updates the status of the live stream to an ad-break status, and transmits the processed index file to the one or more client computers. | 2015-04-16 |
20150106842 | CONTENT SUMMARIZATION SERVER, CONTENT PROVIDING SYSTEM, AND METHOD OF SUMMARIZING CONTENT - A content summarization server, a content providing system and a method for summarizing a content are provided. The method for summarizing a content in a content summarization server includes receiving information regarding a content for which a content summary request is received from a display apparatus in response to a content summary request being input from a user, acquiring caption information related to a content for which the content summary request is input based on the received content information, extracting a summarized image of the content according to a rule which corresponds to the content by analyzing the caption information, and transmitting the summarized image of content to the display apparatus. | 2015-04-16 |
20150106843 | METHOD AND SYSTEM FOR POSITIONING ROW ADVERTISING IN A PROGRAM GUIDE - A method of arranging row ads system within a program guide includes communicating row ad metadata to a user device and communicating program guide information to a user device. The program guide information defines a plurality of rows, wherein at least a first row is associated with a first channel. The method includes associating positioning information with the row ad relative to the first row, populating a second row from the plurality of rows in response to the metadata and displaying the row ad and displaying the first row associated with the first channel within a program guide structure on a display associated with the user device in response to the positioning information. | 2015-04-16 |
20150106844 | VIDEO DISPLAY SYSTEM, EXTERNAL UNIT, AND METHOD OF DISPLAYING VIDEO - A video display system includes a video display unit, and an external unit configured to be communicatable with the video display unit. The video display unit includes a display panel and is configured to transmit specific information to the external unit. The specific information includes display panel information related to the display panel. The external unit is configured to derive a parameter from the specific information received from the video display unit and to transmit, to the video display unit, one of the derived parameter and related data related to the derived parameter. The parameter determines image quality. | 2015-04-16 |
20150106845 | PROCESS AND APPARATUS FOR ADVERTISING COMPONENT PLACEMENT - A method of digital advertising, comprising: receiving a plurality of video material sources; optionally converting video material from a format of said sources into one or more placement operating formats; placing a digital advertising component into video material; and outputting the video material with the digital advertising component integrated within it for distribution. Preferred embodiments of the invention involve generating a market for placement zones suitable for receiving digital advertising components, wherein a market is generated by for example a bidding process against one or more available placement zones or offering one or more available placement zones with an indication its value/price. Also disclosed are computer apparatus and systems for performing the above-mentioned methods and related methods, and a system and method for management and manipulation of digital assets. | 2015-04-16 |
20150106846 | METHOD AND APPARATUS FOR CONFIGURING AN ELECTRONIC DEVICE - An electronic device including a peripheral device connection unit configured to connect to a display interface of a peripheral device and to receive identification data for the peripheral device, and a controller. The controller is configured to determine configuration information, wherein the configuration information is based at least on one of the identification data for the peripheral device or geographic location data for the electronic device, obtain a user interface selected from a plurality of user interfaces based at least partly on the configuration information, and automatically configure the electronic device based on the obtained user interface. | 2015-04-16 |
20150106847 | CONTENT PROVIDING APPARATUS, SYSTEM, AND METHOD FOR RECOMMENDING CONTENTS - A content providing apparatus, system, and method for recommending content. The method includes: receiving user information from a display apparatus; determining whether a terminal apparatus of a user is registered, based on the received user information; when the terminal apparatus is determined to be registered, determining whether recommended content for the user exists, based on pattern information about content usage of the user and content information; and when the recommended content for the user is determined to exist, transmitting a notification message for the recommended content to the terminal apparatus. Therefore, utilization of a notification service for recommended content is further improved. | 2015-04-16 |
20150106848 | Application Gadgets and Electronic Program Guides - Application gadget techniques are described. In an implementation, a remote control device includes a display device and one or more modules. The one or more modules are configured to initiate one or more control functions related to control of a display of content by a client. The one or more modules also provide an environment to execute one or more application gadgets such that an output of the one or more application gadgets is displayable on the display device. | 2015-04-16 |
20150106849 | System and Method for Automatic Video Program Channel Generation - System and method for delivering video programs from a cloud to an electronic terminal is disclosed. Channels may be generated based upon personal data of a user. Channels may also be generated by the user's inputs through a user input device of the terminal. The user may select to access video programs in the cloud either through generated channels or through a search engine. Advertising messages can also be delivered based upon disclosed system. | 2015-04-16 |
20150106850 | PROGRAM GUIDE SYSTEM WITH VIDEO-ON-DEMAND BROWSING - An interactive television program guide system is provided in which a viewer may direct a television to simultaneously display a selected television program and a program guide display. A viewer may use the program guide display to browse available video-on-demand (VOD) while continuing to view a previously selected program in the background. The viewer may browse through video-on-demand programs on the program guide display using a variety of keys on a remote control unit. The viewer may direct the program guide to order a given video-on-demand program, and set a desired broadcast time for that program. | 2015-04-16 |
20150106851 | CONTROLLING A GRAPHICAL USER INTERFACE - Controlling device, multimedia device, and corresponding method for controlling a graphical user interface, comprising a receiving unit for receiving a user's intention for navigating through a three-dimensional menu structure, a computing unit for computing a menu structure seen from a point of view of the user onto a target menu bullet and a display interface unit being adapted for outputting a computational result of the illustration of the menu structure. | 2015-04-16 |
20150106852 | PERSONALIZED CATEGORIZATION OF TELEVISION PROGRAMMING - A method, system, and computer program product for personalized categorization of television content are provided in the illustrative embodiments. A subset of bookmarks is selected from a set of bookmarks saved in a browser application. The subset of bookmarks is analyzed according to a specification for constructing a categorization rule, to find information of a type corresponding to the bookmark. The categorization rule is constructed, to personalize a categorization of TV content according to a custom-categorization, by using the information as a component in the categorization rule according to the specification. The specification specifies the type, which is a type of information that can participate in the categorization rule. The rule is sent to a TV content provider system, wherein the sending causes the TV content to be organized and presented according to the custom-categorization. | 2015-04-16 |
20150106853 | GRAPHICS HANDLING FOR ELECTRONIC PROGRAM GUIDE GRAPHICS IN AN RVU SYSTEM - A network device includes an electronic program guide (EPG) component configured to receive EPG data associated with an EPG from an external EPG server. The network device further includes a manager component comprising a pre-loader configured to pre-render and send first EPG images, associated with the EPG, that are frequently re-used to multiple client devices; a graphics interceptor configured to generate one or more second EPG images based on a graphics call, wherein the graphics call causes a first one of multiple client devices to display the one or more second EPG images; and a window manager configured to track changes in the one or more second EPG images and send a modified EPG image that includes the changes, or a modified portion of an EPG image that includes the changes, to the first one of the multiple client devices. | 2015-04-16 |
20150106854 | SYSTEMS AND METHODS FOR PROVIDING AUDIO-BASED GUIDANCE - Systems and methods for providing audio-based guidance features are provided. A guidance application may provide listings displays having listings for audio-friendly content. The listings may be indicated as listings for audio-friendly content. The guidance application may provide displays dedicated to listings for audio-friendly content. The guidance application provides audio-prompts describing display screens. The guidance application may determine a user's identity from a voice command and provide personalized guidance features. | 2015-04-16 |
20150106855 | SYSTEM AND METHOD FOR MULTI-CHANNEL WIFI VIDEO STREAMING - A video or multimedia distribution system receives multiple video streams and transcodes them into a single stream of UDP packets with each of the plurality of video data packets for respective ones of the video streams being assigned a port number corresponding to the respective video stream. The UDP packets are routed to a plurality of Access Points (APs) for transmission. A User Equipment (UE) communicates with the APs and selects one or more of the video streams for viewing on the UE by selecting the port number corresponding to the desired video streams. The UE can “change channels” to view other video streams by changing the port number to the port number of the desired video stream. | 2015-04-16 |
20150106856 | MEDIA PLAYER SYSTEM FOR PRODUCT PLACEMENTS - A media player system for product placements, including: a controller; a computer-readable non-transitory memory in communication with the controller including instructions that when executed by the controller cause it to: display a user interface including a video frame and a product information area, wherein the product information area is adjacent or overlaps the video frame; display contents of a video in the video frame, wherein the video includes corresponding video metadata; receive a current location of a cursor; and when the current location of the cursor is within a product hotspot, display product information associated with the product hotspot in the product information area, wherein the product hotspot is defined by the video metadata as a location within the video frame, at one or more points in time, that is associated with the product information. | 2015-04-16 |
20150106857 | System And Method For Generating Screen Pointing Information In A Television Control Device - A system and method, in a television control device, for generating screen pointing information, substantially as shown in and/or described in connection with at least one of the figures, as set forth more completely in the claims. | 2015-04-16 |
20150106858 | METHODS AND SYSTEMS FOR CREATING AND MANAGING MULTI PARTICIPANT SESSIONS - A method of creating a multi participant session among a plurality of viewers of media content. The method comprises automatically identifying which media content is currently presented on a plurality of client terminals of a plurality of subscribers, receiving, from a first subscriber, a first selection indicative of a template of a multi participant session object and a second selection indicative of a group from the plurality of subscribers, creating a multi participant session object adapted for simultaneous presentation with the media content according to first and second selections and establishing a multi participant session among at least one member of the group and the first subscriber using the multi participant session object. | 2015-04-16 |
20150106859 | Selection of a Proxy Device for a Network - Multiple devices in a user's premises may each be configured to separately communicate with an external network, but the signal strength available to each may vary significantly depending on the wiring of the premises. The disclosure provides methods wherein the various devices may coordinate with one another, and determine which among them has the best signal connection and the most available capacity, and a subset of the devices may be chosen to act as network proxies to relay communications to/from the other devices in the premises. | 2015-04-16 |
20150106860 | Method and System for Trick Play in Over-the-Top Video Delivery - A method for trick play (fast forward, rewind, etc.) in video streams using adaptive bitrate HTTP delivery protocols includes playing only portions of a video at a current bitrate to achieve the initial trick play functionality. A new trick play bitrate is selected based on a trick play playout rate, the trick play bitrate for the duration of the trick play is retrieved, and operation is switched back to a previous bitrate when normal playback resumes. A system is also specified for implementing a client and server infrastructure in accordance with the method. | 2015-04-16 |
20150106861 | Interactive Intelligent Set-Top Box and Systems and Methods Thereof - An interactive intelligent set-top box electrically connected to a television, the set-top box comprising a control chip, an audio processing chip, a memory, a network interface, a camera electrically connected to the control chip, at least one loudspeaker, at least one microphone wherein the microphone and the loudspeaker electrically connected to the audio processing chip, and a housing containing at least the control chip, audio processing chip, memory, network interface, and camera, wherein the housing is removably couplable to a bracket shaped to removably attach the housing to a television. The network interface is electrically connected to a network by which it receives live video and audio data from at least one remote location. The camera and the microphone capture live video and audio data from the environment local to the interactive set-top box. The control chip and the audio processing chip process the received and captured live video and audio data and output the processed video and audio data through the at least one loudspeaker and the television in real time. | 2015-04-16 |
20150106862 | DISTRIBUTION DEVICE, REPRODUCTION DEVICE, DATA STRUCTURE, DISTRIBUTION METHOD, CONTROL PROGRAM, AND RECORDING MEDIUM - A distribution server ( | 2015-04-16 |
20150106863 | METHOD AND SYSTEM FOR IMPLEMENTING INTERACTIVE TELEVISIONS THROUGH NEAR FIELD COMMUNICATION TECHNOLOGIES - Interactive data, audio data, and video data are respectively encoded and packaged, and then an interactive television program is produced by multiplexing them. A receiving terminal receives the interactive television program and performs unpacking and decoding. The unpacked interactive data are transmitted by a near field communication module. An operating terminal receives the unpacked interactive data by a near field communication module thereof, parses out corresponding participatory information, and carries out the interaction with the content of the present television program. | 2015-04-16 |
20150106864 | SOFTWARE DEFINED JOINT BANDWIDTH PROVISIONING AND CACHE MANAGEMENT FOR MBH VIDEO TRAFFIC OPTIMIZATION - A method includes provisioning joint bandwidth in a software defined passive optical network PON based mobile backhaul MBH and cache management on base stations for video delivery across the network, the provisioning in each time unit includes grouping bandwidth utilization in the network into a first category used to support video requests which cannot directly be served by caches on base stations, the first category video requests being high priority, and if bandwidth remains after the high priority requests remaining bandwidth being used to deliver some videos that are low priority to caches. | 2015-04-16 |
20150106865 | METHOD FOR MAPPING BETWEEN SIGNALING INFORMATION AND ANNOUNCEMENT INFORMATION AND BROADCAST RECEIVER - A method for mapping signaling information to announcement information and a broadcast receiver are disclosed herein. A method of providing a Non-Real-Time (NRT) service, the method comprises extracting identification information of first signaling information and second signaling information based upon a program specific information/program and system information protocol (PSI/PSIP) table, receiving the first signaling information and second signaling information based upon the extracted identification information, constructing and displaying a service guide using the received first signaling information, acquiring first content identification information as a content selected from the displayed service guide, accessing a File Delivery over Unidirectional Transport (FLUTE) session using the received second signaling information, acquiring second content identification information matched with the acquired first content identification information from the accessed FLUTE session and receiving and storing one or more file constructing corresponding content based upon the acquired second content identification information. | 2015-04-16 |
20150106866 | DISPLAY DEVICE - A display device includes a communication component configured to communicate with an electronic device with an electronic device-side display screen, the electronic device having a content reproduction function, a display component configured to display an electronic device-side display image that is displayed on the electronic device-side display screen of the electronic device, and a controller configured to acquire the electronic device-side display image via the communication component. The controller is further configured to acquire first information related to a change in at least one of position and orientation of the electronic device, and further configured to perform control to display the electronic device-side display image on the display component based on the first information. | 2015-04-16 |
20150106867 | SECURITY INFORMATION AND EVENT MANAGEMENT - Systems and methods for conducting correlation analysis for security events with assets attributes of a network by a SIEM device to enable more efficient reporting are provided. According to one embodiment, when a SIEM device obtains a security event, a risk level of the security event is calculated based on at least a correlation of the security event with one or more asset attributes of a network that is managed by the SIEM device. When the risk level meets a predetermined or configurable threshold, the SIEM device causes the security event to be reported to an administrator of the network. | 2015-04-16 |
20150106868 | SUPERVISORY CONTROLS USING CONTEXTUAL AWARENESS - Methods and systems for supervisory control using contextual awareness on an information handling system may involve receiving policy rules and selection of endorsed activities for supervised users from a primary user. When a supervised user attempts to perform activities on an information handling system, access to the activities may include restricting access until a time budget for endorsed activities has been satisfied. The policy rules may depend upon a usage context for a supervised user, such as location, other users nearby, activity history, user behavior, and/or user physical activity. | 2015-04-16 |
20150106869 | METHOD AND SYSTEM FOR DISTRIBUTING SECRETS - Secrets data representing one or more secrets required to access associated resources is provided along with secrets distribution policy data representing one or more secrets distribution factors used to control the distribution of the secrets. When a requesting virtual asset submits secrets request data, virtual asset profile data associated with the requesting virtual asset is obtained. The requesting virtual asset profile data is then analyzed using at least one of the secrets distribution factors to authenticate the requesting virtual asset. The requesting virtual asset profile data is then analyzed using one or more of secrets distribution factors to determine what secrets the requesting virtual asset legitimately needs. Authorized secrets data for the requesting virtual asset representing one or more authorized secrets is then generated. The requesting virtual asset is then provided access to the authorized secrets data. | 2015-04-16 |
20150106870 | ANOMALY DETECTION ON WEB CLIENT - Embodiments for anomaly detection on a web client are generally described herein. A processor on the web client is monitored, where a web browser is installed on the web client, with the web browser arranged to render a web page, the web page including content originating from a plurality of origins. A request from the web page to store data on the web client is intercepted, with the request originating from a particular origin of the plurality of origins. The request is analyzed and approved or denied based on the particular origin. | 2015-04-16 |
20150106871 | SYSTEM AND METHOD FOR CONTROLLING ACCESS TO SECURITY ENGINE OF MOBILE TERMINAL - Provided is a system for controlling access to a security engine of a mobile terminal including a basic operating system and a security engine in which an app ID and user authentication information are transmitted to the security engine in order to execute a reliable app installed in the basic operating system and use a security function of the security engine, and the security engine performs authentication of whether an app is the reliable app or whether a user executing the reliable app is an owner of the mobile terminal based on the app ID transmitted from the basic operating system and the user authentication information and then permits access to the security engine. | 2015-04-16 |
20150106872 | METHOD OF INSTRUCTION LOCATION RANDOMIZATION (ILR) AND RELATED SYSTEM - A method and system for relocating executable instructions to arbitrary locations are disclosed. The instruction relocation may be arbitrary or random, and may operate on groups of instructions or individual instructions. Such relocation may be achieved through hardware or software, and may use a virtual machine, software dynamic translators, interpreters, or emulators. Instruction relocation may use or produce a specification governing how to relocate the desired instructions. Randomizing the location of instructions provides defenses against a variety of security attacks. The disclosed embodiments provide many advantages over other instruction relocation techniques, such as low runtime overhead, no required user interaction, applicability post-deployment, and the ability to operate on arbitrary executable programs. | 2015-04-16 |
20150106873 | Systems And Methods For Implementing Modular Computer System Security Solutions - In some embodiments, an apparatus includes a control chain generation module is configured to receive, from a control database, a security guideline control to be implemented with respect to a hardware asset. The control chain generation module is configured to select, based on requirements to satisfy the security guideline and attributes of the hardware asset, a security implementation control. The control chain generation module is configured to select a control assessor to monitor the compliance of the hardware asset with the security guideline and is configured to define a control chain including the security guideline control, the security implementation control, and the control assessor. The control chain generation module is configured to send an instruction to apply the control chain to the hardware asset such that the control assessor monitors the hardware asset for compliance with the security guideline. | 2015-04-16 |
20150106874 | MASTER SECURITY POLICY SERVER - A master policy server manages security polices for client computers through a network of local policy servers. Each local policy server is responsible for the security policies on a group of clients and maintains a data store containing the security policies and security information pertaining to the clients. Periodically, the master policy server and the local policy server synchronize, at which time the master policy server replicates updated policies to the local policy servers and the local policy servers upload client security statistics to the master policy server for consolidation into a global status. | 2015-04-16 |
20150106875 | SYSTEM AND METHOD FOR DATA MINING AND SECURITY POLICY MANAGEMENT - A method is provided in one example and includes generating a query for a database for information stored in the database. The information relates to data discovered through a capture system. The method further includes generating an Online Analytical Processing (OLAP) element to represent information received from the query. A rule based on the OLAP element is generated and the rule affects data management for one or more documents that satisfy the rule. In more specific embodiments, the method further includes generating a capture rule that defines items the capture system should capture. The method also includes generating a discovery rule that defines objects the capture system should register. In still other embodiments, the method includes developing a policy based on the rule, where the policy identifies how one or more documents are permitted to traverse a network. | 2015-04-16 |
20150106876 | ANTI-CYBER HACKING DEFENSE SYSTEM - Systems, devices, and methods for performing rate limiting on a received packet based on logged packet information and rules list determination where for each packet from a set of one or more packets, packet information is logged in a data store by comparing the received packet with previously received packets. Determining if the received packet is part of an established connection or if the received packet is part of a new connection and if determined that the packet is of an established connection, then performing a set of rules on a subset of packets, if however it is determined that the packet is of a new connection, then performing the set of rules on all the received packets. Additionally, determining whether the packet is part of a created rules list and if the packet is determined to be part of a created rules list, then bypassing filtering for the packet; if however the packet is determined to not be part of a created rules list, then assigning escalating time-based IP traffic blocks against the packet. | 2015-04-16 |
20150106877 | GRANTING PERMISSIONS TO AN OBJECT WHEN ADDING PEOPLE TO A CONVERSATION - A user generates a message by adding a recipient in order to send the message to the recipient. The message has a link to an attached object which is automatically detected and it is determined whether the recipient has rights to the object. If not, the recipient's rights are automatically modified so that the recipient has rights to the object, and the user is notified of the modified permissions. | 2015-04-16 |
20150106878 | System And Method For Providing A Content Delivery Network Via A Motor Vehicle - A cache server disposed in a motor vehicle receives and caches content from a content distribution network when a load of a cellular link to the content distribution network is low. The cache server determines that the motor vehicle is turned off, broadcasts a wireless signal as part of a wireless network when the motor vehicle is turned off, and provides a device access to the content cached in the cache server via the wireless network. | 2015-04-16 |
20150106879 | DATA RECOVERY METHOD, DEVICE AND SYSTEM USING SAME - The present disclosure relates to a filed of data processing technology. Disclosed are a data recovery method, a device and a system using the same. The data recovery method includes the following steps. A second client receives an identifying account associating with a first account and sends the identifying account to a server. The server receives the identifying account and sends a data recovery linkage to a verifying client. The verifying client responses to a connection request of the data recovery linkage and sends a data recovery confirming message to the server. The server receives the data recovery confirming message and copies the data stored in the first client to the second client according to the data recovery confirming message. The embodiments of present disclosure may recovery the data stored in the first client via the identifying account associating with the first account, when the first account is lost. | 2015-04-16 |
20150106880 | Authorized Document Distribution and Transmission Control By Groups of Categorized Clauses Apparatus and Method - A document is categorized according to clauses and groups of clauses. A distribution and transmission control system determines from a user login credential if the document may be stored to removable, transportable media or transmitted to an external server through network connections. A scoring system determines the level of sensitivity of the document according to its component clauses and resulting document category. Even if headers and footers are removed from a sensitive document, its component clauses flag the category and sensitivity. | 2015-04-16 |
20150106881 | SECURITY MANAGEMENT FOR CLOUD SERVICES - A cloud management node ( | 2015-04-16 |
20150106882 | METHOD AND DEVICE FOR IDENTITY AUTHENTICATION - Embodiments of the present invention provide a method and a device for identity authentication. The method for identity authentication includes: according to a selected user digital certificate, generating, by a browser kernel unit, a login request carrying a selected user digital certificate according to the selected user digital certificate, and sending the login request to an application server; receiving, by the browser kernel unit, a response indicating authentication success which is returned by the application server after performing identity authentication according to the selected digital certificate, extracting a webpage file from the response, parsing the webpage file, generating a webpage and sending the webpage to a browser interface unit; and displaying, by the browser interface unit, the webpage. The method and the device for identity authentication provided by embodiments of the present invention improve the convenience and security of identity authentication. | 2015-04-16 |
20150106883 | SYSTEM AND METHOD FOR RESEARCHING AND ACCESSING DOCUMENTS ONLINE - Implementations of the present disclosure disclose a system and method for researching and accessing document online comprising, an online system allowing a consumer to search for documents in various online locations, a method of allowing a consumer to purchase and retrieve those documents from the various location through one system, and a method and system of granting the consumer instant access to the documents. | 2015-04-16 |
20150106884 | MEMCACHED MULTI-TENANCY OFFLOAD - The present disclosure provides one or network devices having a shared resource that can be remotely accessed by multiple users, also referred to as tenants. The shared resource can be located within one network device or can be spread throughout multiple network devices. One or more resources from among the shared resource can be allocated to one or more corresponding tenants from among the multiple tenants. The one or more corresponding tenants can access their respective resources using one or more commands. The one or network devices can implement an authorization procedure to ensure that the one or more tenants can only access their respective resources. The authorization procedure represents an access control mechanism to grant access to the one or more tenants to only their respective resources. | 2015-04-16 |
20150106885 | SYSTEM AND METHOD FOR TRACKING THE COVERSION OF NON DESTRUCTIVE EVALUATION (NDE) DATA TO ELECTRONIC FORMAT - Systems and methods are disclosed for tracking the conversion of data from a hardcopy or physical format such as radiograph film to electronic format such as DICONDE format. The method provides the capability of automatic consistency checks of image quality generated by the digitizer as well as allows for process quality checks by users. Authentication and authorization is built into the digitization process to allow access to authorized users for a particular task. The system provides the capability to generate statistical process control (SPC) curves and reports of the consistency checks. Disaster recovery capability is built into the system. | 2015-04-16 |
20150106886 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR GATHERING AND DELIVERING PERSONALIZED USER INFORMATION - A system, method and computer program product for providing a secure data channel between a user and associates. The method may receive pushed information from an associate, including, e.g., an update to the user profile information, related information, or personalized content for the user. The method can convey to the user, personal information including a selectable union of the user profile information, the related information, and/or the personalized content. The method can further share access to the personal information to a family, where the family can include another user, users, or multiple related users. The pushed information can include textual, digitized audio, digitized video, graphical image, or other data, and can include prescription, automobile service, or purchased product information, or voicemail messages. | 2015-04-16 |
20150106887 | SYSTEMS AND METHODS FOR CONFIGURING AN ELECTRONIC DEVICE - A method for configuring a device is performed at a target device with a processor and memory storing instructions for execution by the processor. In some implementations, the target device is a media presentation device, such as a WiFi enabled speaker system. Connection information is received from a configuration device, such as a laptop computer or mobile telephone, via an analog audio interface. The connection information includes first account credentials. In some implementations, the connection information also includes network configuration data such as a name of wireless network and a security key. The target device connects to a server system remote from the target device using the first account credentials. | 2015-04-16 |
20150106888 | TRUST/VALUE/RISK-BASED ACCESS CONTROL POLICY - Generating a resource access control decision is provided. A user trust value associated with a user identifier of a user requesting access to a protected resource is modulated based on an estimated risk value associated with a context of a resource access request. The resource access control decision is generated based on the modulated user trust value associated with the user requesting access to the protected resource. | 2015-04-16 |
20150106889 | POTENTIAL ATTACK DETECTION BASED ON DUMMY NETWORK TRAFFIC - A method, apparatus and product for potential attack detection based on dummy network traffic. One embodiment includes a method comprising analyzing an activity, wherein the activity is performed in response to a message, wherein the message is transmitted by a first application that is executed by a computing device, wherein the computing device is connected to a computerized network, wherein the first application is configured to transmit the message in order to induce a potential attacker to perform a malicious activity, wherein said analyzing comprises comparing the activity to a predetermined expected activity in response to the message; and determining, based on the analysis of the activity, that a second application is under a potential attack; whereby an operation of the first application is capable of exposing potential attacks on the second application without monitoring network traffic of the second application. | 2015-04-16 |
20150106890 | Automatic Multimedia Upload For Publishing Data And Multimedia Content - Disclosed herein is a method and system for utilizing a digital data capture device in conjunction with a Bluetooth (BT) enabled mobile device for publishing data and multimedia content on one or more websites automatically or with minimal user intervention. A client application is provided on the BT enabled mobile device. In the absence of inbuilt BT capability, a BT communication device is provided on the digital data capture device. The BT communication device is paired with the BT enabled mobile device to establish a connection. The client application detects capture of data and multimedia content on the digital data capture device and initiates transfer of the captured data, multimedia content, and associated files. The digital data capture device transfers the captured data, multimedia content, and the associated files to the client application. The client application automatically publishes the transferred data and multimedia content on one or more websites. | 2015-04-16 |
20150106891 | INFORMED IMPLICIT ENROLLMENT AND IDENTIFICATION - In one embodiment, a user login device may create a user identifier template | 2015-04-16 |
20150106892 | Method and Device for Credential and Data Protection - A security method and system that comprises capturing user specific binary information used to identify the user; using the user specific binary information to generate a secured primary code, generating strong user credentials for accessing web based or applications logins, intercepting credential requests from local applications or remote web sites, regenerating strong user credentials dynamically, using the secure primary code to generate encryption keys for protection of data inside or outside the machine of creation, and using secure primary code protection in conjunction with subsidiary key exchanges to allow data sharing while retaining data security. | 2015-04-16 |
20150106893 | SECURE REMOTE MODIFICATION OF DEVICE CREDENTIALS USING DEVICE-GENERATED CREDENTIALS - Methods, systems, and computer program products are provided that enable secure remote modification of device credentials using device-generated credentials. A plurality of credentials policies is stored by the user device. The credentials policies are merged to generate a merged credentials policy. An instruction is received by the user device from a trusted service to initiate a device credentials change. A new device credentials is generated on the user device based at least on the merged credentials policy. | 2015-04-16 |
20150106894 | RETURN MATERIAL AUTHORIZATION FULFULLMENT SYSTEM FOR SMART GRID DEVICES WITH CUSTOMER SPECIFIC CRYPTOGRAPHIC CREDENTIALS - A method for removing credentials from a smart grid device includes: receiving, by a receiving device, a removal request, wherein the removal request includes a device identifier associated with a smart grid device and is signed by an entity associated with a set of security credentials stored in a memory of the smart grid device, the set of security credentials restricting access to one or more components or operations of the smart grid device; extracting, by a processing device, the device identifier included in the received removal request; generating, by the processing device, a permit configured to remove the set of credentials from the smart grid device, wherein the generated permit includes the extracted device identifier; and transmitting, by a transmitting device, the generated permit to the smart grid device for removal of the set of credentials from the memory of the smart grid device. | 2015-04-16 |
20150106895 | DYNAMIC TRUST FEDERATION - Aspects of the present disclosure are directed to methods and systems dynamic trust federation. In one aspect, a computer implemented method may include a security token that enables sign-on into a group applications based on applicable trust criteria. In one aspect, when a user interacts with one application in the group, the trust is elevated through the application internal authentication application program interface (API). The trust may be included in the security token to make available to other applications in the group. Applications can be in multiple groups with variable level of authentication based on location and other transactions variables. | 2015-04-16 |
20150106896 | Method and System for Including Network Security Information in a Frame - A method and apparatus for including network security information in a frame is disclosed. Network security information is included in a secure portion of overhead of a frame. The network security information is configured to facilitate network security. A network device configured to process a frame is also disclosed. The frame includes frame security information and network security information. The frame security information is configured to facilitate securing a portion of overhead of the frame, and the network security information is located in the secure portion of the overhead of the frame and is configured to facilitate network security. | 2015-04-16 |
20150106897 | METHOD AND SYSTEM FOR IMPLEMENTING VIDEO TWO FACTOR AUTHENTICATION - A method for authentication includes receiving a log-in request at a first client computer, and capturing user information with the request. The method includes capturing an image of the user, and sending a request for authentication, including the user information and image, to an authentication server. The method includes determining a representative user based on the user information, and determining an authorizing agent responsible for authorizing the representative user. The method includes sending the authentication request to a client computer associated with the authorizing agent, and providing verified identification information of the representative user along with the request so that the authorizing agent can perform authentication of the requesting user based on the user information, the captured image, and the verified identification information. The method includes receiving a result of the authentication, and controlling access by the first client computer to a secure data center based on the result. | 2015-04-16 |
20150106898 | METHOD, DEVICE, AND SYSTEM FOR IDENTITY AUTHENTICATION - A method for identity authentication comprises: 1) a first authenticator transmitting to a second authenticator a first identity authentication message; 2) the second authenticator transmitting to the first authenticator a second identity authentication message; 3) the first authenticator transmitting to an authentication server a third identity authentication message; 4) the authentication server verifying the validity of a secure domain for the second authenticator on the basis of the third identity authentication message; 5) the authentication server transmitting to the first authenticator a fourth identity authentication message; and, 6) the first authenticator authenticating when the fourth identity authentication message is received. The identity authentication system mainly comprises: the first authenticator, the second authenticator, the secure domain for the second authenticator, and the authentication server. | 2015-04-16 |
20150106899 | SYSTEM AND METHOD FOR CROSS-CLOUD IDENTITY MATCHING - A system and method for cross-cloud identity matching are provided. The method includes receiving at least one user identifier of a user of a client node; determining at least one cloud-based resource accessed by the client node; selecting a cloud-based resource of the at least one accessed cloud-based resource; extracting at least one possible user identity of the user from the selected cloud-based resource; identifying at least one user identifier of the extracted at least one possible user identity; matching between each identified user identifier and the at least one received user identifier; determining whether each possible user identity is associated with the user respective of the matching; and upon determining that at least one possible user identity is associated with the user, storing each associated user identity respective of the client node. | 2015-04-16 |
20150106900 | MOBILE NETWORK-BASED MULTI-FACTOR AUTHENTICATION - Verification of a user login to a secure account from a mobile device occurs when the user provides login credentials and a hardware identifier (ID) corresponding to the mobile device. The provided login credentials and hardware ID are then verified against a registry. Further, the mobile device determines and provides a geographic location of the mobile device using a global positioning system (GPS) component installed therein. The location provided by the mobile devices is then matched with a location of a network element with which the mobile device is currently communicating. | 2015-04-16 |