16th week of 2016 patent applcation highlights part 65 |
Patent application number | Title | Published |
20160112431 | METHOD AND APPARATUS FOR PRIVACY POLICY MANAGEMENT - Various methods are provided for determining run-time characteristics of an application at the time of installation and/or modification. Based on the determined run time characteristics, various methods control the installation and/or modification of the application based on a user privacy profile. One example method may comprise receiving a request to modify an application. A method may further comprise determining whether a conflict is present between the application and a user privacy profile. A method may further comprise causing the determined conflict and at least one conflict resolution to be displayed in an instance in which a conflict is determined. A method additionally comprises causing a user privacy profile to be modified in an instance in which an indication of acceptance is received in response to the displayed at least one conflict resolution. | 2016-04-21 |
20160112432 | IMPOSTER ACCOUNT DETECTION AND REMEDIATION IN A SOCIAL NETWORKING SYSTEM - When a request to connect a requesting user to a target user is received by the social networking system, information associated with the requesting user and with users connected to the target user is retrieved. A fraud probability score indicating a probability that the requesting user is impersonating a user connected to the target user is determined based on the information associated with the requesting user and with users connected to the target user. Based on the fraud probability score, a determination is made whether the requesting user is a suspected imposter and remedial action is taken if imposter is suspected. | 2016-04-21 |
20160112433 | TERMINAL FOR INTERNET OF THINGS AND OPERATION METHOD OF THE SAME - An example terminal includes a communication circuitry configured to communicate with a server; and a data processor configured to request the server to include a second user in a relationship group of a first user and to extend, to the relationship group, a range of authorization for an Internet of Things (IoT) apparatus registered as an apparatus of the first user. | 2016-04-21 |
20160112434 | TERMINAL FOR INTERNET OF THINGS AND OPERATION METHOD OF THE SAME - An example terminal includes a communication circuitry configured to communicate with a server; and a data processor configured to request the server to include a second user in a relationship group of a first user and to extend, to the relationship group, a range of authorization for an Internet of Things (IoT) apparatus registered as an apparatus of the first user. | 2016-04-21 |
20160112435 | SYSTEMS AND METHODS FOR FILE LOADING - The application describes systems and methods for preventing the distribution of large volumes of electronic data by loading selected sensitive files with pad data to increase the size of the files such that file transfer, distribution, or downloading to removable media storage devices is more cumbersome. In one aspect, a file loading system comprises a datastore for storing a plurality of data files where each of the plurality of data files includes information and a processor arranged to: access the plurality of data files in the datastore, and load a data pad into one or more of the plurality of data files to increase the size of the one or more of the plurality of data files. | 2016-04-21 |
20160112436 | A METHOD, A SERVER AND A CLIENT PROVIDING SECURED COMMUNICATION IN A POWER DISTRIBUTION COMMUNICATION NETWORK - A technique is provided that addresses how to provide secured communication in a power distribution communication network. Specifically, upon receipt of a request for an insertion of a new device to the power distribution communication network, checking a unique identifier of the new device received in the request against a list of stored new devices or suppliers stored in a data storage. Upon finding a matching entry, evaluating a predetermined device or supplier certificate against a certificate of the new device received in the request. Upon validation of the received certificate, checking to determine if the new device will fit into a predetermined network topology or relation table that indicates which messages are authorized messages. Configuring the power distribution communication network to include the new device in case the new device fits into the predetermined network topology or the relation table. | 2016-04-21 |
20160112437 | Apparatus and Method for Authenticating a User via Multiple User Devices - A method includes forming, during access to a site, an association between a user and a first device. Contact information for a second device associated with the user is obtained. During a subsequent access to the site the first device is recognized. The user is prompted to authenticate without inputting identifying information. The user is authenticated at the site relying upon the association and a positively acknowledged message from the second device. | 2016-04-21 |
20160112438 | SECURE MESSAGING IN MESSAGE-ORIENTED SYSTEMS - Implementations of the present disclosure include methods, systems, and computer-readable storage mediums for providing secure messaging in message-oriented systems. Actions can include: receiving, by the one or more processors, one or more subscribe requests from one or more subscriber devices; receiving, by the one or more processors, at least one publish request from at least one publisher device, the publisher and subscriber devices being loosely coupled through the broker device on a shared cloud platform; validating, by the one or more processors, the at least one publish request and the one or more subscribe requests to provide validation results; and determining, by the one or more processors, a message routing schedule based at least in part on the validation results. | 2016-04-21 |
20160112439 | HUMAN USER VERIFICATION OF HIGH-RISK NETWORK ACCESS - Systems and methods for performing a human user test when a high-risk network access is captured by an intermediary security device are provided. According to one embodiment, network security application includes a network traffic control module, a human user test engine and a risk management module. The network traffic control module identifies a high-risk network access initiated by a device associated with a private network protected by the network security appliance. The human user test engine (i) sends a human user test message to the human user of the device to verify that the high-risk network access was initiated by or is otherwise authorized by the human user of the device; receives a response to the human user test message; and (iii) determines whether the response is a correct response to the human user test message. The risk management module allows the high-risk network access when the response is correct. | 2016-04-21 |
20160112440 | METHODS AND DEVICES FOR IDENTIFYING THE PRESENCE OF MALWARE IN A NETWORK - A device and a method for identifying whether a network node is infected by malware, including identifying indicator events for each of a plurality of anomaly indicators, by counting the number of occurrences of an anomaly indicator in at least one of a network node and an entire network during a predetermined time duration and if the number of occurrences of the anomaly indicator during the predetermined time duration is greater than a predetermined event threshold, identifying an indicator event associated with the anomaly indicator during the predetermined time duration and assigning an expiration duration for the indicator event, determining whether the identified indicator events fulfill at least one predetermined infection rule, and if the indicator events fulfill the at least one predetermined infection rule, identifying the network node as infected by malware. | 2016-04-21 |
20160112441 | FILE SECURITY MANAGEMENT APPARATUS AND MANAGEMENT METHOD FOR SYSTEM PROTECTION - A file security management apparatus and method which protect various types of systems for executing files, entering from the outside, from malicious code, and which prevent data from being divulged from the systems and also prevent the systems from operating erroneously, thereby ultimately protecting the systems. The file security management apparatus includes a conversion module configured to convert an incoming file, received by a system, into a monitoring target file; a search module configured to identify a selection for the execution of the monitoring target file, and to output incoming files, configured in the monitoring target file, into a search window; and a security module configured to decrypt the monitoring target file to the incoming file, and to perform processing so that the incoming file is executed via a corresponding application program in an isolated drive set as an isolated environment. | 2016-04-21 |
20160112442 | EVENTS FROM NETWORK FLOWS - In one embodiment, a system includes a processor to receive network flows, for each of one of a plurality of event-types, compare each one of the network flows to a flow-specific criteria of the one event-type to determine if the one network flow satisfies the flow-specific criteria, for each one of the event-types, for each one of the network flows satisfying the flow-specific criteria of the one event-type, assign the one network flow to a proto-event of the one-event type, test different combinations of the network flows assigned to the proto-event of the one event-type against aggregation criteria of the one event-type to determine if one combination of the network flows assigned to the proto-event of the one event-type satisfies the aggregation criteria for the one event-type and identifies an event of the one event-type from among the network flows of the proto-event. Related apparatus and methods are also described. | 2016-04-21 |
20160112443 | CYBERSECURITY SYSTEM - A cybersecurity system for processing events to produce scores, alerts, and mitigation actions. The system includes sensors for receiving and processing data to form events, distributed analytic platform for processing events to form analytic workflows, and scoring engines for processing events using analytic workflows to produce scoring engine messages. The system also includes real time analytic engine for processing scoring engine messages and distributed analytic platform messages using the analytic workflows and analytic workflow and event processing rules to form and transmit a threat intelligence message. Threat intelligence messages include broadcast messages, mitigation messages, and model update messages. The system also includes logical segments which associate an analytic model, a set of analytic models, or an analytic workflow; one or more sources of inputs about activity within the logical segment, and a set of actions for mitigating an impact of the anomalous activity occurring within the logical segment. | 2016-04-21 |
20160112444 | Malware Detection Method - A method of detecting malware on a client computer, the method including generating a hash of an entity at the client computer, whereby the entity is suspected to be malware, sending the hash to a network server, considering the reputation of the hash at the network server by comparing the hash to a database of hashes of known reputation, returning the results of said considering to the client computer, and, if the reputation is not known at the server, sending instructions to the client computer for obtaining further information about the entity at the client computer, wherein said further information is obtained by executing code at the client computer sent by the server to the client computer after said considering the reputation if said code is not stored at the client computer before said generating a hash. | 2016-04-21 |
20160112445 | JOINED AND COORDINATED DETECTION, HANDLING, AND PREVENTION OF CYBERATTACKS - Methods, devices, systems and computer program products enable monitoring and responding to cyber security attacks. One such system relates to a consortium of monitoring companies and an infrastructure including one or more central monitoring stations or local handling stations for a monitoring company are provided. A central monitoring station of a monitoring company detects a cyberattack that has been launched against a client computer system, and requests a local station to respond to the cyberattack via onsite visits or requests additional resources from other monitoring companies through the consortium system. The central monitoring station also sends to the consortium system updates on a cyberattack that is detected or mitigated by a central monitoring station or local handling station of the monitoring company. The monitoring consortium enables stronger capabilities than any individual monitoring company can offer by the combination and coordination of the efforts and resources of the members. | 2016-04-21 |
20160112446 | DETECTING A HEAP SPRAY ATTACK - Various techniques for exploit detection based on heap spray detection are disclosed. In some embodiments, exploit detection based on heap spray detection includes executing a program in a virtual environment, monitoring a heap of a memory while executing the program in the virtual environment, and detecting a potential heap spray attack based on detecting a burst allocation of a first plurality of blocks in the heap of the memory, in which each of the first plurality of blocks is stored in the predefined address range of the memory. | 2016-04-21 |
20160112447 | METHOD AND SYSTEM FOR PROVIDING SECURITY AWARE APPLICATIONS - Instructions for monitoring and detecting one or more trigger events in assets used to implement an application are generated. Instructions for implementing at least one responsive action associated with each of the one or more trigger events is generated. At least part of instructions for monitoring and detecting the one or more trigger events is provided to an asset used to implement the application. The at least part of the instructions for monitoring and detecting the one or more trigger events are used by the asset to detect a trigger event. The instructions for implementing the at least one responsive action associated with each of the one or more trigger events is then used to automatically implement the at least one responsive action associated with the detected trigger event. | 2016-04-21 |
20160112448 | SYSTEM FOR TRACKING MEDIA CONTENT TRANSACTIONS - A system that incorporates teachings of the present disclosure may include, for example, a web server having a controller adapted to manage an archive of media content for a subscriber, and record a transaction description and a corresponding tracking identifier for a transaction that manipulates the archive. Other embodiments are disclosed. | 2016-04-21 |
20160112449 | ELECTRONIC APPARATUS AND METHOD - According to one embodiment, an electronic apparatus includes a memory and a hardware processor. The hardware processor is configured to store a log of a received packet in the memory, set a transmission delay time for the log stored in the memory, and transmit the log in accordance with the transmission delay time of the log. | 2016-04-21 |
20160112450 | MOBILE RISK ASSESSMENT - A query is received from a particular endpoint device identifying a particular wireless access point encountered by the particular endpoint device. Pre-existing risk assessment data is identified for the identified particular wireless access point and query result data is sent to the particular endpoint device characterizing pre-assessed risk associated with the particular wireless access point. In some instances, the query result data is generated based on the pre-existing risk assessment data. In some instances, pre-existing risk assessment data can be the result of an earlier risk assessment carried-out at least in part by an endpoint device interfacing with and testing the particular wireless access point. | 2016-04-21 |
20160112451 | SYSTEMS AND METHODS FOR APPLICATION SECURITY ANALYSIS - Systems and methods for analyzing applications for risk are provided. In the example method, the applications reside on a mobile device that is configurable to access an enterprise system. The example method includes evaluating each of a plurality of applications variously for privacy, data leakage, and malicious behavior. The example method also includes calculating a risk score for each of the plurality of applications based on the evaluating; and automatically remediating (e.g., quarantining) the applications, of the plurality of applications, for which the risk score meets or exceeds a risk score threshold. The method may evaluate all of the applications residing on a mobile device. The method may include grouping application behaviors, for each of the applications, that indicate an increased risk into groups comprising various combinations of a privacy risk, a data leakage risk, an account takeover risk, a device takeover risk, and a malware risk. | 2016-04-21 |
20160112452 | NETWORK ACCESS CONTROL USING SUBNET ADDRESSING - A server responds to a DHCP request for an IP address by setting a subnet in accordance with whether the client's MAC address is recognized as previously having been authenticated or otherwise associated with a policy. If the client has not been authenticated, the server provides a captive portal to enforce authentication. A routing device positioned in the network between clients and the server controls access to network resources by routing communications from clients in accordance with subnet addressing, where each subnet is associated with a policy. | 2016-04-21 |
20160112453 | SYSTEM AND METHOD FOR A CLOUD COMPUTING ABSTRACTION LAYER WITH SECURITY ZONE FACILITIES - In embodiments of the present invention improved capabilities are described for a virtualization environment adapted for development and deployment of at least one software workload, the virtualization environment having a metamodel framework that allows the association of a policy to the software workload upon development of the workload that is applied upon deployment of the software workload. This allows a developer to define a security zone and to apply at least one type of security policy with respect to the security zone including the type of security zone policy in the metamodel framework such that the type of security zone policy can be associated with the software workload upon development of the software workload, and if the type of security zone policy is associated with the software workload, automatically applying the security policy to the software workload when the software workload is deployed within the security zone. | 2016-04-21 |
20160112454 | ELECTRONIC DEVICE AND METHOD FOR DATA COMMUNICATION - Disclosed herein is an electronic device and method for data communication. The electronic device includes a communication unit for communicating with a counterpart device through a communication network, and at least one processor, which may execute the method, including negotiating via the communication unit with the counterpart device for a security layer to perform security processing of data, determining at least one layer as the security layer based on a result of the negotiation outcome, and communicating with the counterpart device using the security layer. | 2016-04-21 |
20160112455 | Public and Private Hybrid Distributed Cloud Storage System and Cloud Storage Method - Public and private hybrid distributed cloud storage system and cloud storage method including an application system, a segmentation aggregation system, a public storage system and a private storage system. The application system provides original complete data and initiates an access request to the segmentation aggregation system. The segmentation aggregation system divides original complete data into data fragments and distributes to said public storage system and private storage system according to a preset storage proportion and receives the fragments returned by the public and private storage systems and aggregates them into the complete data, and transfers to said application system. The public storage system manages, authenticates and stores fragments. The private system manages, authenticates, counts, controls and stores fragments. The method, based on the cloud storage system, includes logging data and reading data. This invention solves problems of limited capacity private storage systems, inadequate bandwidth and security vulnerable public storage system. | 2016-04-21 |
20160112456 | POLICY-BASED DATA MANAGEMENT - Compliance to a policy about how to treat data in a computer network environment is ensured by checking that conditions in the policy are satisfied by the entity before access to the data is provided. | 2016-04-21 |
20160112457 | METHOD AND SYSTEM FOR DYNAMIC AND COMPREHENSIVE VULNERABILITY MANAGEMENT - One or more relevant scanners used to identify asset vulnerabilities are identified, obtained, and logically arranged for deployment on an asset in accordance with a vulnerability management policy and a scanner deployment policy such that the relevant scanners are deployed at, or before, a determined ideal time to minimize the resources necessary to correct the vulnerabilities, if found. The relevant scanners are then automatically deployed in accordance with the scanner deployment policy and, if a vulnerability is identified, one or more associated remedies or remedy procedures are applied to the asset. At least one of the one or more relevant scanners are then re-deployed on the asset to determine if the identified vulnerability has been corrected and, if the vulnerability is not corrected at, or before, a defined time, protective measures are automatically taken. | 2016-04-21 |
20160112458 | ESTABLISHING TRUST BETWEEN APPLICATIONS ON A COMPUTER - Systems, methods and machine-readable media for providing a security service are disclosed. The methods include receiving a modification of the application object code to allow the software application to transmit a request for the security service; retrieving the modified application object code corresponding to the software application from memory; receiving, via a processor, the request for the security service from the modified application object code; and providing, via the processor, the security service. The systems and machine-readable media performing operations according to the methods disclosed. | 2016-04-21 |
20160112459 | IMAGE PROCESSING APPARATUS THAT OPERATES ACCORDING TO SECURITY POLICIES, CONTROL METHOD THEREFOR, AND STORAGE MEDIUM - An image processing apparatus which is capable of restraining operation that does not comply with security policies even in a case where security policies are changed through setting of user modes. The security policies are set in advance in the image processing apparatus. The image processing apparatus has a UI operation unit that enables operation on the image processing apparatus. When settings of the image processing apparatus are changed via the UI operation unit, it is verified whether or not the changed settings match the security policies. Operation of the image processing apparatus is restrained until it is verified that the changed settings match the security policies. | 2016-04-21 |
20160112460 | CONFLICT DETECTION AND RESOLUTION METHODS AND APPARATUSES - Conflict detection and resolution methods and apparatuses relate to the field of communications technologies. The conflict detection method includes: acquiring, by a controller, a flow path of a data flow on a network, where the flow path is used to indicate a path along which the data flow reaches an address in a destination address range from an address in a source address range through at least two intermediate nodes on the network, a first flow table rule is added to or deleted from flow tables of the at least two intermediate nodes, and the first flow table rule is any flow table rule; and determining, by the controller, whether a conflict exists according to an address range of the flow path and an address range of a security policy. | 2016-04-21 |
20160112461 | COLLECTION AND USE OF CAPTURED VEHICLE DATA - In an example embodiment, a method of reporting observation data includes receiving, at a vehicle, a request from a server for observation data associated with at least one of an area of interest, a time period of interest, or an object of interest. The method also includes outputting a message to a user of the vehicle to request authorization to grant the server access to observation data of the vehicle. The method also includes receiving a reply to the message from the user. The method also includes, in response to the reply authorizing the server to access the observation data of the vehicle, providing the server with access to the observation data of the vehicle. | 2016-04-21 |
20160112462 | System and method for executing originating services in a terminating network for IMS and non-IMS applications - A mobile application gateway for connecting devices on a cellular network with individual networks, such as enterprise voice and data networks and/or residential networks. The effects of the present invention are far reaching in terms of transferring effective call control from the cellular network into the control of the individual network such as the enterprise, and enabling new business models for the purchase of cellular service from a public cellular carrier by an enterprise. The invention may consist of a primarily of core network and services components based on the IMS network architecture, and is backward compatible to support legacy systems in place in current telecom and data networks. | 2016-04-21 |
20160112463 | SYSTEMS AND METHODS FOR ESTABLISHING A TELEPHONE CONNECTION - Systems for and methods of delivering telephone calls from a VoIP platform to an Internet enabled telecommunication device are disclosed. The VoIP platform may cause a push notification to be sent to the second telecommunication device in order to initiate an active Internet session for connection of a VoIP call to a virtual number associated with the second telecommunication device. | 2016-04-21 |
20160112464 | SESSION TRANSFER PROTOCOL BETWEEN DIFFERENT BROWSERS ON DIFFERENT DEVICES - A device may be configured to establish a session for communicating data between a first user device and a server device. The device may monitor the data communicated via the session. The device may store session information based on monitoring the session. The session information may include information for transferring the session with the server device to a second user device. The device may receive a request to transfer the session from the second user device. The device may send the session information to the second user device causing the session to be transferred from the first user device to the second user device. The device may establish the same session for communicating the data between the second user device and the server device. | 2016-04-21 |
20160112465 | TRANSMISSION SYSTEM, COMMUNICATIONS CONTROL APPARATUS, COMMUNICATIONS CONTROL METHOD, COMMUNICATIONS METHOD, AND RECORDING MEDIUM - A transmission system having a first transmission terminal and a second transmission terminal includes a first communications connector to connect first data communications between the first transmission terminal specified by first identification information and the second transmission terminal specified by second identification information, an identification information creating part to create fourth identification information of the second transmission terminal when receiving a request for connecting second data communications between the first transmission terminal and the second transmission terminal, and a second communications connector to acquire third identification information in association with the first identification information by referring to registration information registering the third identification information in association with the first identification information of the first transmission terminal, and connect the second data communications between the first transmission terminal specified by the third identification information and the second transmission terminal specified by the fourth identification information. | 2016-04-21 |
20160112466 | DISTRIBUTED CONNECTIVITY POLICY ENFORCEMENT WITH ICE - Instead of utilizing a centralized server or hardware (routers/gateways) to enforce connectivity policy restrictions, the policy connectivity restrictions for media session traffic are enforced by an endpoint that is involved in the media communication. Based on the policy requirements, the client enforces the policy restrictions by restricting the candidates that may be selected for the establishment of the media path. For example, the enforcement may result in the client selecting a path from available candidates that avoids congested Wide Area Network (WAN) links, avoiding a low bandwidth link, or possibly even failing the communication completely. The clients may also provide periodic updates to the policy server to allow tracking of the utilization of managed WAN links. | 2016-04-21 |
20160112467 | Method and System for Enabling a Communication Device to Remotely Execute an Application - A communication system capable of enabling one or more communication devices to remotely execute one or more applications includes one or more communication devices that are coupled to a data connection. At least one of the one or more communication devices is operable to communicate a request to establish a communication session over the data connection. The system also includes one or more application servers that are coupled to the data connection. At least one of the one or more application servers is adapted to execute an application to establish the requested communication session with the at least one communication device. The at least one application server resides at a location remote from the at least one communication device. The at least one application server communicates a request for processing service to the at least one communication device. The request for processing service is communicated to the at least one communication device over the data connection. | 2016-04-21 |
20160112468 | Real-Time Media Optimization Over Remoted Sessions - Real-time media optimization may be provided. First, a remote session may be established with a remote computing device. Then, during the remote session, non-real-time media data may be exchanged with the remote computing device over a server path. Moreover, real-time media data may be exchanged with the remote computing device over a media path during the remote session. | 2016-04-21 |
20160112469 | Unified Communications-Based Video Conference Call Method, Device and System - A unified communications (UC)-based video conference call method and system, and a device, where receiving, by a first UC client, a request for querying call information of a second video conference terminal (VCT), where the request includes an identifier of a called contact; sending the query request to a UC server, and receiving the call information of the second VCT; and sending, by the first UC client, the call information of the second VCT to a first VCT, hence the first VCT initiates a video conference call to the second VCT according to the call information of the second VCT. By integrating a personal computer (PC)-based UC system with a hardware video conference system that is based on a digital signal processor (DSP) and embedded software, a high-quality video conference can be initiated and held using a UC client, thereby boosting user experience and enhancing product competitiveness. | 2016-04-21 |
20160112470 | APPLICATIONS IN A FLEXIBLE REGISTRATION FRAMEWORK - A processing device executing an application that is logged in to a user account recognized by a registration service receives information identifying a device that has not been bound to any user account, wherein the application supports a plurality of registration techniques. The processing device identifies a registration technique supported by the device that is to be used for registration of the device. The processing device performs at least one of sending information associated with the registration technique to the device or receiving the information associated with the registration technique. The processing device sends the information associated with the registration technique to the registration service, and then receives a message from the registration service, wherein the message indicates that the information satisfied a criterion of the registration technique and comprises a notification that the device is bound to the user account. | 2016-04-21 |
20160112471 | METHOD AND APPARATUS FOR DYNAMIC DEVICE PAIRING - A communication system, method, and components are described. Specifically, a communication system that supports dynamic device pairing of communication devices is described. Such pairing is accomplished using a feature or pairing server, without requiring modification to associated communication endpoints. Moreover, sequenced applications can be applied for all communication endpoints when pairing is in effect. | 2016-04-21 |
20160112472 | SYSTEM AND METHOD FOR MANAGING COMMUNICATION SESSIONS - A conference managing computer system for managing one or more communication sessions is disclosed. The conference managing computer system includes a monitoring module for monitoring one or more requests from one or more user devices to remotely access the communication session. The conference managing computer system further includes a detection module for detecting presence of the one or more user devices based on proximity. The conference managing computer system further includes a connection module for establishing one or more real time communication sessions with one or more detected user devices. The conference managing computer system further includes a conferencing module for managing the one or more communication sessions to enable the one or more detected user devices to join the communication session. | 2016-04-21 |
20160112473 | METHOD FOR REAL-TIME COMMUNICATION BETWEEN WEB BROWSERS - The invention relates to a real-time communication method using WebRTC type technology between web browsers on an Internet type communications network, the method comprising: a first web browser of a first terminal associated with a first user previously loading (S | 2016-04-21 |
20160112474 | METHOD FOR PROVIDING CONTENT AND ELECTRONIC DEVICE THEREOF - A method of providing a content in an electronic device is provided. The method includes include detecting a mapping event associated with a content of the electronic device, in response to detecting the mapping event, confirming the content, determining a contact point for mapping the content, and mapping the content to the contact point for mapping. | 2016-04-21 |
20160112475 | SYSTEM AND METHOD FOR PROVIDING A MICRO-SERVICES COMMUNICATION PLATFORM - A multi-tenant media communication platform system and methods. The platform system includes media communication micro-services and micro-service configuration for a plurality of entities configured for use of the platform system. Enrolling an entity in the platform system includes setting entity configuration for use of the platform system by the entity. A micro-service request is processed according to the entity configuration. The micro-service request is a request for use of at least one micro-service of the platform system on behalf of the entity. Use of each micro-service is accounted for on behalf of the entity. Billing information for the entity is generated based on the accounting for the use of each micro-service on behalf of the entity. Entity configuration includes micro-service configuration, and micro-service configuration specifies at least one of: an endpoint mapping to at least one application logic URI, an event callback URI, and an event application logic URI. | 2016-04-21 |
20160112476 | INTEGRATED REAL TIME COLLABORATION EXPERIENCES WITH ONLINE WORKSPACE - Online meeting experience is integrated with online and/or offline collaborative workspace(s). Documents and other content generated through team collaboration and managed by a content management system are automatically made available during the meeting, updated, and stored in collaborative workspace linked to a particular meeting. Newly generated content during the meeting is also added to the workspace. As a result, online meetings become part of the collaborative workspace rendering reusable and searchable data through meeting content and updates to associated documents. | 2016-04-21 |
20160112477 | METHOD AND APPARATUS FOR PROVIDING A COLLABORATIVE WORKSPACE - A method and apparatus for providing collaborative workspace are disclosed. The method receives a request to establish a video conference for two or more participants, and obtains information from historical information on the two or more participants to be used with the collaborative workspace. The method determines preferences for each of the two or more participants as to a presentation of the collaborative workspace. The method receives one or more live images of the two or more participants and presents the collaborative workspace to each of the two or more participants in accordance with the preferences for each of the two or more participants. | 2016-04-21 |
20160112478 | VOICE CONFERENCE CALL USING PSTN AND INTERNET NETWORKS - A system and method for supporting a multi-participant voice conference call using PSTN and Internet networks is described. The method for supporting a multi-participant voice conference call includes receiving voice from a PSTN client. The method also includes receiving voice data from a moderator and from at least one remote client connected to the Internet. The method then proceeds to mix the voice data from the PSTN client with the voice data from the moderator into a first mixed voice data that is transmitted to the remote client that is connected to the Internet. The method also mixes the voice data from the moderator with the voice data from the remote client connected to the Internet into a second mixed voice data that is transmitted to the PSTN client. | 2016-04-21 |
20160112479 | SYSTEM AND METHOD FOR DISTRIBUTED AUGMENTED REALITY - Systems and methods for distributed augmented reality are described herein. In one example, the method comprises receiving at least one of source data and augmented reality (AR) data from at least one of data source, identifying objects of interest present in at least one of the source data and the AR data based on analysis of the at least one of the source data and the AR data, and generating enhanced AR data, based on the outcome of identification of at least one of the objects of interest and AR enhancement rules. The method further comprises modifying at least one of the source data and the AR data based on the generation and transmitting at least one of the modified source data and the modified AR data to at least one of the one or more clients systems. | 2016-04-21 |
20160112480 | STREAMING DATA ON DATA PROCESSES - A method, system and computer program product for servicing media content. In one embodiment, the media content is processed by having each of a group of services process increments of the media content, one increment at a time; and the order in which the services process these increments is orchestrated to process all of the media content in accordance with a defined procedure. In one embodiment, the increments of the media content are passed, one increment after another, to at least a plurality of the services in a defined order. In an embodiment, each time one of the plurality of services passes one of the increments of the media content to a subsequent one of the services in the defined order, the one of the plurality of services requests another increment of the media content from a preceding one of the services in the defined order. | 2016-04-21 |
20160112481 | TRACEROUTE IN VIRTUAL EXTENISBLE LOCAL AREA NETWORKS - An inner packet configured with a multicast address and configured to perform a traceroute operation through a network is encapsulated to form an encapsulated packet. The encapsulated packet is sent into a network, the encapsulated packet being forwarded along a multicast tree of the network for the multicast address. A plurality of responses are received from a plurality of network nodes comprising the multicast tree, wherein each response comprises an indication of a node of the plurality of nodes that sends the response and an indication of a node from which the node sending the response received the encapsulated packet. | 2016-04-21 |
20160112482 | CAMERA CAPTURE FOR CONNECTED DEVICES - Techniques and mechanisms described herein facilitate the capture and coordination of audio and/or video data across connected devices in a communications system. The communications system may include at least two media devices in communication via a network. One of the media devices may be a media application device configured to provide one or more media applications. Another of the media devices may be a media input device configured to capture video and/or audio data. Coordination between a media application and a media input device may be facilitated by a driver layer configured to communicate with the applications. | 2016-04-21 |
20160112483 | ADAPTIVE BIT RATES DURING BROADCAST TRANSMISSION IN DISTRIBUTED CONTENT DELIVERY NETWORKS - The disclosed embodiments provide a system that facilitates broadcast transmission in a distributed content delivery network. The system includes a node in the distributed content delivery network that plays a content stream received over the distributed content delivery network. The node includes a leadership-management apparatus that identifies the node as a peer leader in a local network of the distributed content delivery network. The node also includes a broadcasting apparatus. Upon identification of the node as the peer leader, the broadcasting apparatus obtains the content stream from a content source, broadcasts the content stream to other nodes in the local network, and adjusts a bit rate of the content stream based on one or more attributes associated with obtaining the content stream from the content source. | 2016-04-21 |
20160112484 | Live Manifest Update - Live manifest update techniques are described. In one or more implementations, data streams of media content are provided to computing devices by a service provider. During playback of the data streams, a manifest associated with the data streams is updated by the service provider effective to cause the computing devices to transition to playing back the data streams using the updated manifest without restarting playback of the data streams. In one or more implementations, a data stream of media content is played back at a computing device. During playback of the data steam, a manifest monitoring module at the computing device monitors for updates to a manifest associated with the data stream. Responsive to detecting an update to the manifest, the computing device seamlessly transitions to playing back the data stream using the updated manifest without restarting playback of the data stream. | 2016-04-21 |
20160112485 | STREAMING DATA ON DATA PROCESSES - A method, system and computer program product for servicing media content. In one embodiment, the media content is processed by having each of a group of services process increments of the media content, one increment at a time; and the order in which the services process these increments is orchestrated to process all of the media content in accordance with a defined procedure. In one embodiment, the increments of the media content are passed, one increment after another, to at least a plurality of the services in a defined order. In an embodiment, each time one of the plurality of services passes one of the increments of the media content to a subsequent one of the services in the defined order, the one of the plurality of services requests another increment of the media content from a preceding one of the services in the defined order. | 2016-04-21 |
20160112486 | OPTIMIZED IMAGE DELIVERY OVER LIMITED BANDWIDTH COMMUNICATION CHANNELS - Large-scale images are retrieved over network communications channels for display on a client device by selecting an update image parcel relative to an operator controlled image viewpoint to display via the client device. A request is prepared for the update image parcel and associated with a request queue for subsequent issuance over a communications channel. The update image parcel is received from the communications channel and displayed as a discrete portion of the predetermined image. The update image parcel optimally has a fixed pixel array size, is received in a single and or plurality of network data packets, and were the fixed pixel array may be constrained to a resolution less than or equal to the resolution of the client device display. | 2016-04-21 |
20160112487 | DATA ANNOTATION AS A SERVICE FOR IOT SYSTEMS - Disclosed herein are a variety of entities, methods, and systems for annotating data in a data stream. Annotation concepts may be applied to individual data items within a stream, data windows within the stream, an entire stream, and/or a portion of a stream that may include several items and windows. Annotation concepts may be based on data received from other entities and may be performed automatically or in response to an annotation request received from an entity. | 2016-04-21 |
20160112488 | Providing Information of Data Streams - Methods and apparatuses for processing information of data streams in a data network are provided. In accordance with a method comprising at least one first stream of data is determined in accordance with a first protocol. A second stream of data is then generated in accordance with a second protocol, wherein the second protocol is a lower layer protocol than the first protocol. The generating comprises including at least a portion of the determined at least one first stream of data in the second stream of data and encoding into a predefined control information field of the second stream of data information associated with the at least one first stream of data for use in processing the at least one first stream of data. The recipient can then use the encoding in processing the at least one data stream. | 2016-04-21 |
20160112489 | STREAMING THE VISIBLE PARTS OF A SPHERICAL VIDEO - In a general aspect, a method includes determining a tile position in a frame of a spherical video based on a view perspective, selecting a portion of the frame of the spherical video as a two dimensional tile based on the tile position, encoding the two dimensional tile at a first quality, mapping the frame of the spherical video to a two dimensional representation of the spherical video based on a two dimensional projection algorithm, and encoding the two dimensional representation of the spherical video at a second quality. | 2016-04-21 |
20160112490 | Method and Apparatus for Content Distribution Via Non-Homogeneous Access Networks - A method and apparatus for streaming content to an access network in an interactive information distribution system. The method encapsulates the content in accordance to an Internet Protocol (IP). The content is then transcoded into a format supported by the access network, and streamed over a distribution network to a remote server or to a subscriber terminal that is coupled to the access network. The apparatus is embodied as stream caching server for streaming the content encapsulated within the packet to access networks via a stream distribution network in response to a request for content. A packet processor is coupled to the stream server for processing the encapsulated content within the IP packets into a format native to the access network. | 2016-04-21 |
20160112491 | METHOD AND DEVICE FOR IDENTIFYING ENCODING OF WEB PAGE - A method for a device to identify encoding of a web page, includes: loading web page data including a web page resource; detecting whether the web page resource is a HyperText Markup Language (HTML) resource and whether the web page resource specifies an encoding mode; if the web page resource is an HTML resource and the web page resource does not specify an encoding mode, identifying the encoding mode of the HTML resource; and decoding the HTML resource with a decoding mode corresponding to the identified encoding mode. | 2016-04-21 |
20160112492 | METHOD AND APPARATUS FOR PROVIDING NETWORK RESOURCES AT INTERMEDIARY SERVER - A method for providing access to web content by an intermediary server is provided. The method comprises: receiving, from a mobile terminal, a loading request for a web page; receiving, from a content server, document data of the web page after forwarding the web page loading request to the content server; dividing the received document data into a plurality of document data segments; identifying sub-resources included in the web page; associating the sub-resources with the document data segments; transmitting requests sequentially for the identified sub-resources to a resource server to start transmissions of at least some of the identified sub-resources from the resource server to the intermediary server; and transmitting, to the mobile terminal, a first document data segment of the plurality of document data segments after the transmissions of all of sub-resources associated with the first document data segment from the resource server to the intermediary server have completed. | 2016-04-21 |
20160112493 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING APPARATUS CONTROL METHOD, AND STORAGE MEDIUM STORING PROGRAM - An information processing apparatus capable of requesting a server to execute an application on the server acquires user information, and determines whether execution of the application by a user corresponding to the user information is permitted. The information processing apparatus controls display of a screen for instructing execution of the application to, when it is determined that execution of the application is permitted, display the screen on a display unit, and when it is determined that execution of the application is inhibited, restrict an instruction to execute the application. | 2016-04-21 |
20160112494 | Remote Automated Updates for an Application - In one embodiment, a method updates a media program streaming application. The method includes running an update application to determine when the streaming application on the computing device needs to be updated based on update information from a remote server and reviewing the update information to determine when the media program streaming application needs to be updated. When the media program streaming application needs to be updated, the method loads a set of updateable core files in a plurality of updateable core files from a core memory into an application execution memory. Then, the method sends a request for a set of remote core files to the remote server, receives the set of remote core files, and loads the set of remote core files into the application execution memory. The set of updateable core files and the set of remote core files in the application execution memory are executed. | 2016-04-21 |
20160112495 | SECURE REMOTE COMPUTER NETWORK - A method of distributing data over multiple Internet connections is provided. The method includes the steps of: (a) providing a client computer with access to a plurality of Internet connections; and (b) providing a host computer for determining the allocation of data to be sent to the client computer over each of the plurality of Internet connections using at least one of (i) predetermined criteria and (ii) dynamically changing criteria. | 2016-04-21 |
20160112496 | Onboard Electronic Distribution System - A computer implemented method, apparatus, and computer program product for transferring information with an aircraft. A connection is established between an onboard electronic distribution system executing in an aircraft data processing system in the aircraft and an on ground component. Responsive to a request for a command from the on ground component, the command for execution is identified. The identified command is sent to the onboard electronic distribution system from an on ground component. A transaction identifier is assigned to the command. A transaction associated with the command is maintained on the onboard electronic distribution system and the on ground component using the transaction identifier. An uplink is initiated by the on ground component. An aircraft software part is sent to the onboard electronic distribution system from the on ground component to perform the uplink. A status of a transfer of the aircraft software part on ground component is stored. | 2016-04-21 |
20160112497 | ON-DEMAND DELIVERY OF APPLICATIONS TO VIRTUAL DESKTOPS - A service provider system may include an application fulfillment platform that delivers desktop applications on demand to desktops on physical computing devices or virtual desktop instances. The applications may be selected for delivery from a catalog of applications, and may be required to be installed on the destination computing resource instance, or may be assigned to a customer's end user on whose behalf the resource instance was provisioned. A workflow for deploying a selected application may invoke services implemented on the platform. The desktop application may be delivered as a virtualized application package that is subsequently executed by a runtime engine installed on the end user's resource instance, without installing the selected application itself on the computing resource instance. A customer's IT administrators may create and populate the catalog, add customer-generated or customer-licensed applications, assign applications to users, apply constraints on application use, and monitor application usage. | 2016-04-21 |
20160112498 | METHODS AND DEVICES FOR ACQUIRING USER INFORMATION - The present disclosure relates to a method for acquiring user information in a terminal device for acquiring user information and a terminal device thereof, and a method for acquiring user information in a server and a server thereof. The method includes: receiving acquisition information uploaded by a first wearable device bound. Herein the acquisition information comprises an identifier for identifying a second wearable device detected by the first wearable device; uploading the acquisition information to a server; receiving the user information pushed by the server. Herein the user information is obtained by the server according to the identifier and is associated with the acquisition information; and performing a processing operation according to the user information. | 2016-04-21 |
20160112499 | HARDWARE RESOURCE ACCESSING SYSTEMS AND METHODS FOR ACCESSING HARDWARE RESOURCES IN BROWSER-BASED OPERATING SYSTEMS AND MACHINE-READABLE STORAGE MEDIUM THEREOF - Methods for accessing hardware resources in an electronic device with a browser-based operating system (OS) which includes a user interface running in a browser are provided. A local server is first provided on the electronic device, wherein the local server has a corresponding URL and a dedicated network port. Then, upon receiving a service request from the client-side web application, the local server analyzes a service type of the service request and performs an operation to at least one of the hardware resources corresponding to the service type, wherein the service request is generated and directed to the local server according to the URL and the dedicated network port of the local server by the client-side web application on the electronic device. | 2016-04-21 |
20160112500 | GLOBAL SERVER LOAD BALANCER APPARATUS AND METHOD FOR DYNAMICALLY CONTROLLING TIME-TO-LIVE - Disclosed are a global server load balancer (GSLB) apparatus and a method for dynamically controlling cache time-to-live (TTL) in the GSLB apparatus. The GSLB apparatus which performs load balancing among a plurality of local servers includes a domain name system (DNS) query processor that receives a query message from a DNS server, a server selector that selects a local server among the plurality of local servers based on the received query message, a load calculator that collects state information of the GSLB apparatus, and calculates a load of the GSLB apparatus from the collected state information, and a TTL controller that updates a TTL of the GSLB apparatus based on the calculated load. | 2016-04-21 |
20160112501 | Transferring Device States Between Multiple Devices - Exemplary methods and systems relate to creating and loading a device-group snapshot, which allows the states of devices to be stored and restored by different devices. A hub system may create a device-group snapshot for a plurality of devices in a source device group and load the device-group snapshot to a target device group by: (a) receiving an instruction to load a device-group snapshot; (b) determining the target device group with devices that are available to load the device-group snapshot; (c) determining that there is a difference between device groups; (d) modifying the device-group snapshot based on the difference between device groups; and (e) communicating with devices in the target device group to load the corresponding device states from the modified device-group snapshot. | 2016-04-21 |
20160112502 | DISTRIBUTED COMPUTING BASED ON DEEP PACKET INSPECTION BY NETWORK DEVICES ALONG NETWORK PATH TO COMPUTING DEVICE - In one embodiment, a method comprises: determining application processing capabilities in one or more network devices, in a data network, for execution of at least a portion of a prescribed application on identifiable data packets from a requesting network device and destined for a computing device; and sending instructions to the one or more network devices, the instructions enabling the one or more network devices to execute at least the portion of the prescribed application, on behalf of the computing device, in response to detecting receipt of the identifiable data packets. | 2016-04-21 |
20160112503 | LOAD SWITCH COMMAND INCLUDING IDENTIFICATION OF SOURCE SERVER CLUSTER AND TARGET SERVER CLUSTER - A software defined network (SDN) controller sends a load switch command to a network device. The load switch command includes identification of a source server cluster and identification of a target server cluster. | 2016-04-21 |
20160112504 | PROPOSED STORAGE SYSTEM SOLUTION SELECTION FOR SERVICE LEVEL OBJECTIVE MANAGEMENT - Described herein is a system and method for dynamically managing service-level objectives (SLOs) for workloads of a cluster storage system. Proposed states/solutions of the cluster may be produced and evaluated to select one that achieves the SLOs for each workload. A planner engine may produce a state tree comprising nodes, each node representing a proposed state/solution. New nodes may be added to the state tree based on new solution types that are permitted, or nodes may be removed based on a received time constraint for executing a proposed solution or a client certification of a solution. The planner engine may call an evaluation engine to evaluate proposed states, the evaluation engine using an evaluation function that considers SLO, cost, and optimization goal characteristics to produce a single evaluation value for each proposed state. The planner engine may call a modeler engine that is trained using machine learning techniques. | 2016-04-21 |
20160112505 | OPTIMIZED DATA STREAM UPLOAD - Systems and methods utilize a distributed server network to allow for the optimization of the upload of a data stream from a computing device. Performance metrics are estimated for different network paths from the computing device to a variety of entry servers in the distributed server network. Based on the estimated performance metrics, one or more entry servers are then selected to receive the data stream from the computing device. As a result, the systems and methods described herein allow for high quality upload performance which addresses the first mile vulnerability issues of the data stream. The distributed server network can then transmit copies of the data stream in real-time to other computing devices. | 2016-04-21 |
20160112506 | COMPUTER SYSTEM, PROCESSING METHOD, AND COMPUTER-READABLE RECORDING MEDIUM HAVING JOB PROCESSING PROGRAM - A computer system includes: a reference point determining unit that sets node allocation reference points for the job in association with job attribute information of the job, to node coordinate spaces where the plurality of computation nodes are arranged; and a node set searching unit that searches for a computation node set that is a set of computation nodes satisfying a predetermined condition related to a remote degree that is an estimate index of a communication time from the node allocation reference point in the node coordinate space. | 2016-04-21 |
20160112507 | Pointing Device Router for Smooth Collaboration Between Devices - The present disclosure relates to optimizing collaborative activities between computing devices (e.g., desktop computers, laptop computers, smart TV's, tablets, mobile devices), and more particularly to systems, methods, and computer products for inputting data or commands on a computing device, and for moving, sharing, and controlling files between computing devices through the use of a pointing device with a corresponding pointer that can be shared between āNā computing devices. | 2016-04-21 |
20160112508 | SYSTEM AND METHOD FOR CREATING, MANAGING, SHARING, AND PUBLISHING A HIERARCHICAL LIST STRUCTURE - Disclosed are systems, devices, and methods for creating, managing, sharing, and publishing a hierarchical list structure, an exemplary system comprising a server configured to host an application, and a first client device connected to the server via a network, the first client device configured to interface with the application hosted by the server to create a list including a sub-list, and associate one or more data elements with the sub-list, wherein the one or more data elements are entries of the sub-list, and the sub-list is an entry of the list, and wherein the list, the sub-list, and the data elements are stored on the server. | 2016-04-21 |
20160112509 | MULTICAST TRANSPORT - One or more techniques and/or systems are provided for multicast transport configuration, for multicast transport, and/or for fault policy implementation. In an example, a multicast component may receive a data copy request from an application to copy data to multiple destinations. A scheduler component may create a transport schedule specifying an order with which to facilitate data copy operations across transports, such as heterogeneous transports, to the destinations. A dispatcher component may apply application specified transport modifiers to the data copy operations (e.g., a modification to a quality of service for a transport). The dispatcher component may facilitate the data copy operations and provide operation result information to a policy agent. The policy agent may provide notifications of data copy operation statuses from the operation result information and/or may implement a fault policy (e.g., a retry on a different transport) for a data copy operation that experienced a fault. | 2016-04-21 |
20160112510 | MANAGING MIGRATION OF AN APPLICATION FROM A SOURCE TO A TARGET - Aspects of the disclosure relate to managing migration of an application. The managing migration of an application includes establishing a source dataset. The source dataset includes a set of source features. The source features relate to a source. The source includes the application. A determination of a first set of migration plans is made. The determination is made with an evaluation. The evaluation is made using the source dataset and a set of legacy features. The evaluation is performed with a cost measure. The application is migrated from the source to the target. The migration is based on the determined first set of migration plans. | 2016-04-21 |
20160112511 | PRE-FETCH CACHE FOR VISUALIZATION MODIFICATION - Various technologies pertaining to modifying visualizations are described herein. A client computing device requests a visualization from a server computing device, and the server computing device constructs the visualization responsive to receipt of the request. The server computing device further identifies anticipated transformations for the visualization, and transmits the visualization and the transformations to the client computing device. The client computing device displays the visualization, and responsive to receipt of a request to modify the visualization, executes a transformation provided by the server computing device to update the visualization. | 2016-04-21 |
20160112512 | NETWORK STORAGE SYSTEMS HAVING CLUSTERED RAIDS FOR IMPROVED REDUNDANCY AND LOAD BALANCING - A clustered network-based storage system includes a host server, multiple high availability system controller pairs, and multiple storage devices across multiple arrays. Two independent storage array subsystems each include a quorum drive copy and are each controlled by a HA pair, with remote volume mirroring links coupling the separate HA pairs. The host server includes a virtualization agent that identifies and prioritizes communication paths, and also determines capacity across all system nodes. A system storage management agent determines an overall storage profile across the system. The virtualization agent, storage management agent, quorum drive copies and remote volume mirroring link all operate to provide increased redundancy, load sharing, or both between the separate first and second arrays of storage devices. | 2016-04-21 |
20160112513 | VIRTUAL STORAGE APPLIANCE GETAWAY - A network connection is established between a virtual storage appliance (VSA) in a virtual machine and a storage server system. The virtual machine can run on a computing device remote to the storage server system. Access is provided to a second shared namespace of data at the VSA over the network connection. The second shared namespace is a policy defined subset of a first shared namespace of the storage server system. Data in the second shared namespace is accessible at the storage server system by at least one other computing device communicatively coupled to the storage server system. The data in the second shared namespace at the VSA is replicated to create a local copy at the computing device. Changes to the local copy are synchronized with the data in the second shared namespace at the storage sever system. | 2016-04-21 |
20160112514 | METHODS FOR MIGRATING DATA BETWEEN HETEROGENEOUS STORAGE PLATFORMS AND DEVICES THEREOF - A method, non-transitory computer readable medium, and storage controller computing device that establishes an application interface and a source interface to a programmable switch. A flow table of the programmable switch is updated to insert routing actions associated with the application and source interfaces. | 2016-04-21 |
20160112515 | OUTPUT DATA PROVIDING SERVER AND OUTPUT DATA PROVIDING METHOD - An input information reception unit | 2016-04-21 |
20160112516 | DISTRIBUTED STORAGE SYSTEM, CLUSTER NODE AND RANGE MANAGEMENT METHOD THEREOF - Disclosed are a distributed storage system, a cluster node, and a range management method thereof, including: partitioning, by the cluster node according to a configuration parameter, a range corresponding to a first routing table entry in a local routing table into at least two subranges, where the first routing table entry refers to a routing table entry in which information that indicates the cluster node is recorded in replica information; separately establishing, by the cluster node, a log queue for each of the subranges; determining, by the cluster node, a corresponding subrange according to a key field of a data operation request from a client; executing a corresponding data read/write operation according to the determined subrange; and updating, according to the data read/write operation, a log queue corresponding to the determined subrange. | 2016-04-21 |
20160112517 | VEHICLE PERFORMANCE CUSTOMIZATION VIA DOWNLOADABLE APPLICATIONS - Methods, systems, and computer-readable medium for modifying vehicle operation. One system includes a controller installed in a vehicle. The controller is configured to receive a user-selected operating parameter obtained through a downloaded application, generate a message for at least one embedded vehicle controller based on the user-selected parameter, and transmit the message to the at least one embedded vehicle controller. The message causes the embedded vehicle controller to modify operation. | 2016-04-21 |
20160112518 | SYSTEMS AND METHODS FOR SMART DEVICE NETWORKING - A system for smart device networking includes an endpoint that enables communication with a connected device, a bridge that communicates with the endpoint over a PAN and relays PAN communications to a WAN, and a router that connects to the bridge through the WAN and routes communication to and from the endpoint. | 2016-04-21 |
20160112519 | FA NETWORK LSI AND COMMUNICATION DEVICE - An FA network LSI is provided in a communication device performing a communication process in a network layer or higher through a plurality of protocols. The FA network LSI includes a data-link layer processing unit that performs a process in a data link layer for control data, and a protocol processing unit that performs a process in the network layer or higher for the control data. The data-link layer processing unit includes a first data-link layer processing unit to process dedicatedly to correspond to a protocol required high speed processing, a second data-link layer processing unit to process in a standard data link layer, for a protocol other than the protocol required the high speed processing, and a data-link-layer-processing selection unit to select one of the two units mentioned-above. The data-link layer processing unit is formed by hardware. | 2016-04-21 |
20160112520 | METHOD AND SYSTEM FOR CLIENT ASSOCIATION MANAGEMENT BASED ON ESTIMATED SESSION DURATION - The present disclosure discloses a method and a network device for client association management based on estimated session duration. Specifically, a network device determines that a client device is on an active session. The client device is associated with a first access point of a plurality of access points. The network then estimates a remaining duration of the active session to obtain an estimated remaining duration. Responsive at least to the estimated remaining duration of the active session being greater than a threshold value, the network device causes the client device to associate with a second access point different than the first access point. Responsive at least to the estimated remaining duration of the active session being less than the threshold value, the network device refrains from causing the client device to associate with the second access point. | 2016-04-21 |
20160112521 | SYSTEM AND METHOD FOR PROVIDING A NETWORK DISCOVERY SERVICE PLATFORM - A multi-tenant media communication platform system and methods. The platform system includes media communication micro-services and micro-service configuration for entities configured for the platform system. Enrolling an entity in the platform system includes setting entity configuration for use of the platform system by the entity. A signaling micro-service request is processed according to the entity configuration. The signaling micro-service request is a request for use the signaling micro-service of the platform system on behalf of the entity. Use of the signaling micro-service is accounted for on behalf of the entity. Billing information for the entity is generated based on the accounting for the use of the signaling micro-service. Entity configuration includes micro-service configuration, and micro-service configuration of the signaling micro-service specifies at least one of: an endpoint mapping to at least one application logic URI, an event callback URI, and an event application logic URI. | 2016-04-21 |
20160112522 | METHODS AND APPARATUS TO CORRELATE A DEMOGRAPHIC SEGMENT WITH A FIXED DEVICE - Methods, apparatus, systems, and articles of manufacture to correlate a demographic segment with a fixed device are disclosed. An example method includes accessing a record indicating a public Internet Protocol (IP) address used by a fixed device. A monitoring data record received from a mobile device is accessed. A demographic segment of a user of the mobile device is determined. The mobile device is associated with the fixed device when an IP address of the mobile device from the monitoring data record matches the public IP address used by the fixed device. The demographic segment of the user of the mobile device is associated with the fixed device based on the association of the fixed device and the mobile device. | 2016-04-21 |
20160112523 | ASSOCIATING WEB PAGE REQUESTS IN A WEB ACCESS SYSTEM - A computer device may include logic configured to detect a plurality of Domain Name System (DNS) requests and to determine timestamps associated with the plurality of DNS requests. The logic may be further configured to determine that one or more of the plurality of DNS requests correspond to domain shard requests associated with a top DNS request based on the determined timestamps and report the one or more of the plurality of DNS requests as the top domain DNS request based on the one or more of the plurality of DNS requests corresponding to the domain shard requests associated with the top DNS request. | 2016-04-21 |
20160112524 | INFORMATION PROCESSING APPARATUS AND INFORMATION PROCESSING METHOD - [Object] To associate information generated on the basis of an activity that is carried out by a user with respect to a content with the content, thereby effectively using the information. | 2016-04-21 |
20160112525 | DISTRIBUTION CONTROL DEVICE AND METHOD FOR SAME, PUSH DISTRIBUTION SYSTEM, AND STORAGE MEDIUM - Provided are a distribution control device, etc., in which, when information is distributed, said distribution can be effectively controlled. The distribution control device ( | 2016-04-21 |
20160112526 | METHOD AND APPARATUS FOR OUTPUTTING NOTIFICATION EVENT - An electronic device is provided. The electronic device includes a receiving module configured to receive the notification event from an object and a processor configured to identify the receipt of the notification event, create attribute information based on the information provided by the object, configure background information of the notification event by using the attribute information, and to output the background information of the notification event. | 2016-04-21 |
20160112527 | MULTIMEDIA FILE PUSH METHOD AND APPARATUS - The present disclosure discloses a multimedia file push method and apparatus, and relates to the field of network technologies. The method includes: obtaining first visual feature information, where the first visual feature information is visual feature information of a to-be-pushed multimedia file; determining a first user identity according to the first visual feature information, where the first user identity is a push target user identity of the to-be-pushed multimedia file; and pushing the to-be-pushed multimedia file according to the first user identity. | 2016-04-21 |
20160112528 | Method and System for Serving a Virtual Desktop to a Client - A method and system for serving a virtual desktop to a client are introduced herein. In one embodiment, the method includes rendering and encoding an application frame on a first server, rendering and encoding a desktop frame that confines the application frame on a second server, communicating the application frame to the second server, and communicating the desktop frame and redirecting the application frame from the second server to the client. | 2016-04-21 |
20160112529 | INTERFACE GATEWAY AND METHOD OF INTERFACING A PROPERTY MANAGEMENT SYSTEM WITH A GUEST SERVICE DEVICE - An interface gateway interfaces between a first device and a second device serving a hospitality establishment. The first device is one of a property management system (PMS) and a guest service device, and the second device is the other of the property management system (PMS) and the guest service device. One or more communication ports perform data communications with the first device and the second device. One or more processors receive a message from the first device, determine that the message is in a first format, convert the message from the first format to an internal data structure, parse the message in the internal data structure to determine that the message is applicable to the second device, determine that the second device supports a second format, convert the message from the internal data structure to the second format, and send the message in the second format to the second device. | 2016-04-21 |
20160112530 | METHOD AND APPARATUS FOR ACCESSING AN ENTERPRISE RESOURCE PLANNING SYSTEM VIA A MOBILE DEVICE - A method and apparatus for accessing an enterprise resource planning system via a mobile device is described. In one embodiment, the method includes parsing data from a host application access application into at least one object in an application-specific format, converting the data into an intermediate format that is compatible with a mobile device and communicating the converted data to the mobile device. | 2016-04-21 |