18th week of 2015 patent applcation highlights part 78 |
Patent application number | Title | Published |
20150121400 | MANAGING PRIVATE USE OF PROGRAM EXECUTION CAPACITY - Techniques are described for managing execution of programs, including using excess program execution capacity of one or more computing systems. For example, a private pool of excess computing capacity may be maintained for a user based on unused dedicated program execution capacity allocated for that user, with the private pool of excess capacity being available for priority use by that user. Such private excess capacity pools may further in some embodiments be provided in addition to a general, non-private excess computing capacity pool that is available for use by multiple users, optionally including users who are associated with the private excess capacity pools. In some such situations, excess computing capacity may be made available to execute programs on a temporary basis, such that the programs executing using the excess capacity may be terminated at any time if other preferred use for the excess capacity arises. | 2015-04-30 |
20150121401 | GRAPH BASED DATA MODEL FOR API ECOSYSTEM INSIGHTS - An embodiment of the invention comprising a method captures information for a data structure, the information pertaining to Web APIs and Web API users. The method includes identifying a first set of relationships, wherein an identified relationship can be at least a relationship between a Web API and a Web API user, between different Web API users, or between different Web APIs. The method further includes furnishing the first set of relationships to the data structure as first captured information, and using the first captured information to perform a specified analysis operation. Prior to or during performance of the specified analysis operation, second information is added to the data structure wherein the added second information includes at least one of a user, a Web API, or a relationship that is not included in the first captured information, and the added second information does not affect performance of the specified analysis operation. | 2015-04-30 |
20150121402 | METHOD, SYSTEM AND AN EXECUTABLE PIECE OF CODE FOR CONTROLLING THE USE OF HARDWARE RESOURCES OF A COMPUTER SYSTEM - The invention relates to a method for controlling the use of hardware resources of a computer system by an application that is executed on an operating system comprising at least one application programming interface (API) that is executed on this computer system, using an executable piece of code adapted for being injected into a process belonging to the application. The method comprises: redirecting an API service to a corresponding service comprised in the piece of code; intercepting the call from the process to the API service; and acting on a software entity belonging to the process being executed on the basis of the interception of the call from the process to the API service. | 2015-04-30 |
20150121403 | PRINTED COIL SUBSTRATE FOR OPTICAL DISC ACTUATOR, OPTICAL DISC PICKUP, AND OPTICAL DISC DRIVE DEVICE - The present invention provides a printed coil substrate for an optical disc actuator so that the sensitivity will change as little as possible when shifting in a focal direction and a tracking direction. Although the coil patterns laminated at a corresponding position have approximately same shape, center locations in shape of the tracking coil and the focus coils are displaced between the neighboring substrate layers, and the center locations in shape are displaced by a predetermined distance toward a direction of driving the movable portion driven by the coils. Even when the coil pattern of the first layer is moved in a direction of leaving from the position where magnetic force of the magnet is strong, the coil pattern of the second layer is simultaneously moved into the position where magnetic force of the magnet is strong. Therefore, the change of the sensitivity can be relatively compensated. | 2015-04-30 |
20150121404 | OPTICAL DISC DEVICE AND FOCUS CONTROL METHOD THEREOF - The present invention aims for shortening a time required before the focus control is started. The initial focus position is detected, while the optical disc is not rotated, by making the objective lens approach to the optical disc from the first separation position farther from the optical disc than the focus position. The focus control is performed so that the objective lens tracks the focus position of the data recording layer, while the optical disc is rotated, by making the objective lens approach to the optical disc after the objective lens is returned to the second separation position farther from the optical disc than the first separation position. The initial focus position can be focus position of the data recording layer. The second separation position can be a position farther from the optical disc by a predetermined distance than the initial focus position. | 2015-04-30 |
20150121405 | SYSTEM AND METHOD FOR DISSEMINATING FUNCTIONALITY TO A TARGET DEVICE - A method of disseminating a digital wallet to a target device is described. The method comprises searching, with a searching device, on a local network for the target device, and pushing the digital wallet to the target device. | 2015-04-30 |
20150121406 | SMART MEDIA SELECTION BASED ON VIEWER USER PRESENCE - In various exemplary embodiments, a system and method to provide smart media selection to a set of one or more individuals at a location associated with a display device of a receiver system is provided. In example embodiments, an indication of a presence change at the location is received. User specific information associated with the set of the one or more individuals identified as being at the location is accessed. A recommendation playlist based on the user specific information is generated. | 2015-04-30 |
20150121407 | CREDIT/PENALTY-BASED NETWORK-GUIDANCE OF BITRATES FOR CLIENTS - A method, a device, and a non-transitory storage medium having instructions to obtain network state information pertaining to at least a portion of a network that provides an adaptive bitrate streaming service; generate a recommended bitrate for delivery of a program based on the network state information; transmit the recommended bitrate to user devices; monitor a compliance and a non-compliance of the recommended bitrate by the user devices; and assign a credit commensurate with the compliance of the recommended bitrate to each of the user devices that complied with the recommended bitrate and a penalty commensurate with the non-compliance of the recommended bitrate to each of the user devices that did not comply with the recommended bitrate. | 2015-04-30 |
20150121408 | RECOMMENDATION OF TELEVISION CONTENT - A method for recommending television content is provided, including the following operations: identifying available television channels for a television device; determining a current date and time; identifying a plurality of content items broadcast on the available television channels at approximately the current date and time; determining a device profile associated with the television device, the device profile being time-dependent; determining recommended content items from the plurality of content items based on the device profile of the television device. | 2015-04-30 |
20150121409 | TV PROGRAM IDENTIFICATION METHOD, APPARATUS, TERMINAL, SERVER AND SYSTEM - A method for retrieving and playing a TV program uses a mobile terminal. The mobile terminal obtains one or more images of a TV program currently played on a TV using the image sensor and sends the images to a remote server. The remote server determines an identity of the TV program using the images by comparing them with images in an image library and then generates an information record for the TV program and returns the TV program information record to the mobile terminal, the TV program information record including a hyperlink to the TV program. After receiving the TV program information record from the remote server, the mobile terminal displays the hyperlink on the display of the mobile terminal. In response to a user selection of the hyperlink, the mobile terminal plays the TV program on the display. | 2015-04-30 |
20150121410 | METHOD AND A NETWORK FOR DETERMINING USER BEHAVIOR DURING DELIVERY OF VIDEO CONTENT - For allowing an intelligent and/or resource efficient delivery of video content and/or determining of video content popularity and/or user behavior a method for determining user behavior during delivery of video content is claimed, wherein a user is requesting a delivery of a video content from a provider via a network. The method is characterized in that the provider exploits information transmitted between the user and the provider due to the execution of a trick play function by the user for scheduling the delivery and/or determining video content popularity and/or user behavior. Further, an according network is claimed, preferably for carrying out the above mentioned method. | 2015-04-30 |
20150121411 | SYSTEM AND METHOD FOR FACILITATING INTERACTION VIA AN INTERACTIVE TELEVISION - A method of providing interaction options to a user of a device is described. The device is capable of receiving broadcast content from a broadcaster and content via a network. The method comprises receiving, at the device, both broadcast content and a call-to-action related to the broadcast content. The call-to-action is received via a network. The method includes presenting the broadcast content and the call-to-action to the user, receiving a trigger signal from the user in response to the call-to-action, and initiating, in response to the trigger signal, an interaction over the network between the user and a call-to-action party associated with the call-to-action. The method enables an interaction to be established between the user and the call-to-action party regardless of whether the call-to-action party is the same entity as or a different entity to the broadcaster. | 2015-04-30 |
20150121412 | Muting Notification System - A television and remote control system, where the television receives data over a channel and produces outputs that create a television display. The television also receives notifications over a data connection indicating events that are other than the television display, like emails, alerts and the like. The television displays visual and audible notifications and mutes those notifications based on commands from a remote control. | 2015-04-30 |
20150121413 | METHOD AND APPARATUS FOR CONTENT DISTRIBUTION OVER A NETWORK - A method that incorporates teachings of the subject disclosure may include, for example performing, by a wireless communication device comprising a processor, wireless telephony communications via a first wireless interface, transmitting information associated with media-related activities to a server, receiving from the server a media recommendation that is generated according to the information associated with media-related activities, initiating communications with a network via a second wireless interface, downloading a media content item of the media recommendation from a content provider via the second wireless interface, and presenting the media content item at a display. Other embodiments are disclosed. | 2015-04-30 |
20150121414 | MOVIE SHOWING MANAGEMENT APPARATUS AND MOVIE SHOWING MANAGEMENT METHOD - [Object] To unify the management of an access authority to contents in a theater not depending on a wide variety of complicated OS protocols. | 2015-04-30 |
20150121415 | Mobile to Hardware Device Linking - Allowing a user of a mobile computing device to link the mobile computing device and its associated network or system to a subject piece of hardware operating via a second network or system is provided. After the mobile computing device is linked to a given hardware device, functional operation of the hardware device and access to accounts associated with the hardware device may be provided to the linked mobile computing device. | 2015-04-30 |
20150121416 | VIDEO DISPLAY DEVICE, TERMINAL DEVICE, AND METHOD THEREOF - A video display apparatus pairs with a first terminal device. The video display apparatus receives an audio-visual content, and displays the audio-visual content. The video display apparatus acquires enhanced service information on an available enhanced service for the audio-visual content, and notifies an occurrence of the available enhanced service to the first terminal device. | 2015-04-30 |
20150121417 | Mediaword Compression for Network Digital Media Recorder Applications - In response to receiving from a subscriber both a request to record content and a unique requester key, a network DVR identifies an asset associated with the request. The network DVR segments the asset in to a series of segments, assigns a mediaword to each segment for compression, encrypts each of the segments using an encryption key, and records the encrypted asset segments in an encrypted dictionary storage as definitions, i.e., dictionary entries. The encrypted key and the mediaword are forwarded to a requester handler flow in the network DVR that generates requester-specific encrypted copies using the requester key received from the subscriber. The mediaword, encrypted encryption key, and the encrypted asset segments are stored in and retrievable for the corresponding requester. | 2015-04-30 |
20150121418 | FORECASTING-BASED MANAGEMENT OF ADVERTISEMENT DELIVERY AND INVENTORY - Methods and systems for managing advertisement (ad) delivery and ad inventory for advertisements (ads) placed in video content are provided. An exemplary method receives campaign criteria for a new advertising campaign, the campaign criteria including at least a desired date range. The method then retrieves indications of unsold ad space inventory. In response to determining, based at least in part on the unsold ad space inventory in the desired date range, that the campaign criteria cannot be satisfied, the method: renders, in a user interface, an interactive ad delivery and distribution report indicating forecasted ad distribution and ad delivery for at least part of the desired date range during which the campaign criteria cannot be satisfied; and redistributes ad delivery by adjusting an ad delivery plan based on adjusted report parameters received via the interface in order to accommodate the new advertising campaign. | 2015-04-30 |
20150121419 | CONCEPTS FOR PROVIDING AN ENHANCED MEDIA PRESENTATION - Computer program products, methods, systems, apparatus, and computing entities are provided for providing an enhanced media presentation. In one embodiment, an enhanced media presentation is provided. To provide the enhanced media presentation, one or more content items associated with subject matter associated with a segment of an enhanced media presentation are identified. Each content item may be associated with at least one uniform resource identifier. Then, a content object based at least in part on at least one content item is created. The content object is an abstract representation of the content item. The content object can be associated with the segment and provided for simultaneous displayed simultaneously with at least a portion of the segment. | 2015-04-30 |
20150121420 | CONCEPTS FOR PROVIDING AN ENHANCED MEDIA PRESENTATION - Computer program products, methods, systems, apparatus, and computing entities are provided for providing an enhanced media presentation. In one embodiment, an enhanced media presentation is provided. To provide the enhanced media presentation, one or more content items associated with subject matter associated with a segment of an enhanced media presentation are identified. Each content item may be associated with at least one uniform resource identifier. Then, a content object based at least in part on at least one content item is created. The content object is an abstract representation of the content item. The content object can be associated with the segment and provided for simultaneous displayed simultaneously with at least a portion of the segment. | 2015-04-30 |
20150121421 | VIDEO FRAME SELECTION FOR TARGETED CONTENT - Systems, methods, and computer-readable storage media are provided for providing target content, such as advertisements, based on one or more selected video frames. A set of video frames and target content is received. The target content is to be presented upon detection of a playback of the set of video frames. The playback of the set of video frames is detected. In response to the detection of the playback of the set of video frames, the target content is communicated for presentation. | 2015-04-30 |
20150121422 | METHOD FOR CREATING NEW DISTRIBUTION CHANNELS FOR TARGETED, AUTOMATED, CONTEXT AND RELEVANCE DRIVEN ENGAGEMENT, INTERACTION, COMMUNICATION, COMMUNITY BUILDING, COOPERATION, AND PERSONALIZED, DEDICATED INFORMATION, DATA, AND MEDIA CONTENT DISTRIBUTION, AND CONSUMPTION - A method for targeted, relevance driven, communication, interaction, engagement, community building, and personalized media content distribution, and consumption on a mobile telephone or television comprising detecting and interpreting a signal that previously has been given one or more functional contexts in order to display one from a plurality of performances contained within a single broadcast signal according to predefined specifications defined for the signal. The signal is digitally detecting the face of a person or an object, detecting a bar code, and/or detecting a sound. At least one predetermined advertisement or message is broadcast to a recipient based on the signal. | 2015-04-30 |
20150121423 | VIEWER-AUTHORED CONTENT ACQUISITION AND MANAGEMENT SYSTEM FOR IN-THE-MOMENT BROADCAST IN CONJUNCTION WITH MEDIA PROGRAMS - A method, apparatus, and system for providing viewer-derived content for broadcast presentation in conjunction with a broadcast of a media program by a provider of the media program is disclosed. The disclosed system and method (1) simplifies the process for viewers to provide viewer-authored media to broadcasters, while minimizing the data transmission requirements between portable viewer devices and the broadcaster, (2) allows advance approval for the broadcasters to use that viewer-generated content to generate and disseminate viewer-authored-content and (3) provides for management of viewer-generated content (4) integrates with social networks that can be used to at least preliminarily assess the popularity and suitability of the viewer-generated content for broadcast to other viewers. | 2015-04-30 |
20150121424 | CONCEPTS FOR PROVIDING AN ENHANCED MEDIA PRESENTATION - Computer program products, methods, systems, apparatus, and computing entities are provided for providing an enhanced media presentation. In one embodiment, an enhanced media presentation is provided. To provide the enhanced media presentation, one or more content items associated with subject matter associated with a segment of an enhanced media presentation are identified. Each content item may be associated with at least one uniform resource identifier. Then, a content object based at least in part on at least one content item is created. The content object is an abstract representation of the content item. The content object can be associated with the segment and provided for simultaneous displayed simultaneously with at least a portion of the segment. | 2015-04-30 |
20150121425 | REMOTE CONTROL SYSTEM, REMOTE CONTROL COMMANDER, REMOTE CONTROL SERVER - An information processing apparatus and server apparatus are disclosed. In one example, the information processing apparatus is configured to display content on a first display and transmit an instruction to display the content, which is being displayed on the first display, on a second display of a first external device. This instruction causes a displaying of the content at a specified playback start point on the second display. | 2015-04-30 |
20150121426 | CONCEPTS FOR PROVIDING AN ENHANCED MEDIA PRESENTATION - Computer program products, methods, systems, apparatus, and computing entities are provided for providing an enhanced media presentation. In one embodiment, an enhanced media presentation is provided. To provide the enhanced media presentation, one or more content items associated with subject matter associated with a segment of an enhanced media presentation are identified. Each content item may be associated with at least one uniform resource identifier. Then, a content object based at least in part on at least one content item is created. The content object is an abstract representation of the content item. The content object can be associated with the segment and provided for simultaneous displayed simultaneously with at least a portion of the segment. | 2015-04-30 |
20150121427 | INFORMATION PROCESSING APPARATUS AND PROGRAM TABLE DISPLAYING METHOD - A program information acquisition unit | 2015-04-30 |
20150121428 | SET-TOP BOX PROXIMITY DETECTION - A first location of a user in a customer premises may be determined. A display is provided of a user interface that includes an adjustable element. A determination is made that the user has moved to a second location in the customer premises. The display of the user interface is adjusted such that the adjustable element is adjusted. | 2015-04-30 |
20150121429 | ELECTRONIC PROGRAM GUIDE WITH BLACKOUT FEATURES - An interactive television program guide for supporting programming blackouts is provided. In some embodiments, the interactive television program guide may unschedule the reminding and recording of blacked-out programs that have been scheduled by a user for reminding or recording. In some embodiments, the interactive television program guide may prevent a user from scheduling blacked-out programs for reminding and recording. In some embodiments, the interactive television program guide may prevent a user from ordering blacked-out pay-per-view programs. In some embodiments, the interactive television program guide may provide blackout information in information displays. In some embodiments, the interactive television program guide may provide replacement media for blacked-out programs. | 2015-04-30 |
20150121430 | EPG REALIGNMENT - Arrangements detailed may cause a television channel received via the tuner to be recorded for a period of time to create a channel-specific file. The channel-specific file may include multiple television programs. User input that requests playback of a first television program of the plurality of television programs from the channel-specific file may be received. A front-end adjustment time period for playback of the first television program may be determined. A start time from which playback commences in the channel-specific file may be at least partially based on the front-end adjustment time period and a scheduled start time of the television program. | 2015-04-30 |
20150121431 | CROSS-PLATFORM INTERFACE FOR A TELEVISION DEVICE - A method for providing a cross-platform interface for a television device is provided, including the following method operations: identifying available services for consumption on a television device, wherein the available services include two or more of a broadcast television service, an on-demand video service, and an internet content service; determining a current date and time; determining content items available for consumption from each of the available services at the current date and time; determining an allocation of display locations in a cross-platform interface for content items from each of the available services, the allocation defining a relative amount of display locations for each of the available services based on a device profile associated with the television device; assigning content items to the display locations in accordance with the determined allocation. | 2015-04-30 |
20150121432 | SUPPLEMENTAL CONTENT FOR A VIDEO PROGRAM - A method includes identifying a video service device that receives a video service. The video service includes video content provided by a video service provider, and the video service device is associated with a customer premises network. The method includes identifying a first video program displayed by the video service device. The method also includes identifying a personal device that accesses other content via another communication channel. The method includes identifying a user account associated with the personal device, identifying preferences associated with the user account, and determining cross channel content based on the video content, the first content and the preferences associated with the user account. The method includes integrating the cross channel content and the first content to form integrated content, and providing the integrated content at the personal device coordinated with the receipt of the first video program at the video service device. | 2015-04-30 |
20150121433 | Media Sharing System - A media sharing system includes a television system and at least a first set of smart phone and smart watch owned by a first user and a second set of smart phone and smart watch owned by a second user. Smart watches are connectable to the television system. One of the smart phones is employed as a remote control device. The media sharing system can access media assets stored in all of the smart watches using the smart phone as the remote control. In one implementation, the users need to play a game and the winner will use his or her smart phone to control the media item delivery. | 2015-04-30 |
20150121434 | Electronic Device, Electronic Device System, and Electronic Device Control Method - An electronic device ( | 2015-04-30 |
20150121435 | METHOD AND APPARATUS FOR LOCAL DISTRIBUTION OF MULTIPLE MULTIMEDIA CHANNELS FROM MULTIMEDIA SERVICE PROVIDER - A set top box (STB) for local distribution of multiple multimedia channels from a multimedia service provider is provided. The STB includes a receiver, a multimedia signal processor, an audio signal processor, and a wireless transmitter. The user can access a plurality of multimedia channels carrying a multimedia signal with audio and video content. The receiver selects first and second multimedia channels for local distribution based on channel selection criteria. The STB distributes the first multimedia channel via a multimedia output path to a multimedia device. The STB distributes the second multimedia channel via an audio output path to an audio device. The wireless transmitter may include an FM transmitter. A media distribution unit for local distribution of multiple multimedia channels from a multimedia service provider and a method associated therewith are also provided. | 2015-04-30 |
20150121436 | PRESENTATION TIMELINE SYNCHRONIZATION ACROSS AUDIO-VIDEO (AV) STREAMS - A system for presentation timeline synchronization across audio-video (AV) streams associated with a common event may include memory and a processor. The processor may be configured to receive metadata items from a user device during a live event, the metadata items corresponding to points-in-time marked by the user while being presented with an audio-video (AV) stream associated with the live event. The metadata items may include timing indicators that are indicative of the marked points-in-time relative to the start of the live event. The processor may be configured to provide to the user device with other AV streams associated with the live event that were available at one of the points-in-time marked by the user. The processor may be configured to provide the other AV streams to the user device beginning with a frame that corresponds to the one of the points-in-time marked by the user. | 2015-04-30 |
20150121437 | MULTI-PERSPECTIVE GAME BROADCASTING - Methods, systems, and computer program products for providing multi-perspective broadcasting of multiplayer computer games are described. A computer-implemented method may include receiving a request to broadcast a match of an online multi-player game, generating the requested broadcast using available video streams from at least two participants in the match, and transmitting the generated broadcast to a display interface to allow a viewer to observe the match from one or more of the available video streams. | 2015-04-30 |
20150121438 | CACHING CONTENT - A method and apparatus for downloading content within a video-on-demand system is provided herein. During operation a Video Home Office (VHO) will cache a subset of the Video Service Office (VSO) content. When a user requests content that is not stored on the VHO, the VHO will request that content from another VHO or the VSO. In order to reduce the additional network load imposed during item forwarding while attempting to balance the total load on all the links interconnecting the VSO and VHOs, recorded traffic history metrics are used to predict their future or current traffic. A VHO or VSO is chosen for fetching the content that will result in the lowest predicted traffic on the interconnecting links. | 2015-04-30 |
20150121439 | CONCEPTS FOR PROVIDING AN ENHANCED MEDIA PRESENTATION - Computer program products, methods, systems, apparatus, and computing entities are provided for providing an enhanced media presentation. In one embodiment, an enhanced media presentation is provided. To provide the enhanced media presentation, one or more content items associated with subject matter associated with a segment of an enhanced media presentation are identified. Each content item may be associated with at least one uniform resource identifier. Then, a content object based at least in part on at least one content item is created. The content object is an abstract representation of the content item. The content object can be associated with the segment and provided for simultaneous displayed simultaneously with at least a portion of the segment. | 2015-04-30 |
20150121440 | Method and Apparatus for Synchronizing Paused Playback Across Platforms - A media server receives a first request to transmit the media program to the first device and streams the media program to the first device. The method monitors the streaming of the media program to the first device to generate media program streaming information and transmits the media program streaming information to a media program provider. A second request is received to resume transmission of the media program from a second device where the request includes a temporal location within the media program that was received from the media program provider. The media program provider determined the temporal location from the streaming information transmitted from the media server to the media program provider. The media server resumes transmission of the media program to the second device from the temporal location received from the media program provider. | 2015-04-30 |
20150121441 | SYSTEMS AND METHODS FOR EMBEDDING MULTIMEDIA DATA IN SURGICAL FEEDS - Systems and methods for embedding and sharing video feeds captured during a surgery, to users, in real-time, including video receivers for receiving video feed from video recording equipment, a video stream distribution server receiving the video feed, a relay transferring the video feed to users by rendering the video feed in relation to bandwidth available to each of the users and selecting a protocol of RTP, RTSP, and RTMP and selecting transmission parameters of video bit rate parameters, frames per second parameters, window size(s) parameters, buffer size parameters, key frame interval parameters. Systems and methods create and transmit video feeds with full duplex communication, viewing options, and surgery-performable video frame sequence transmission at substantially reduced bandwidth between origin and end user. | 2015-04-30 |
20150121442 | SYSTEM AND METHOD FOR TAGGING VIDEO CONTENT - Aspects of the subject disclosure may include, for example, a system for determining a tag based on an interaction of a mobile device with a media processor. The tag is associated with a number of options of video content received at the media processor. A request is determined from the media processor for the number of options of video content associated with the tag. A transfer of the plurality of options of video content is initiated from a video source to the media processor. Other embodiments are disclosed. | 2015-04-30 |
20150121443 | METHOD, CONTROL POINT, AND MEDIA RENDERER FOR DISPLAYING PICTURE - An embodiment method includes: acquiring a uniform resource identifier URI of a first picture selected by a user; acquiring a URI of a picture to be buffered in accordance with the URI of the first picture; and sending the URI of the first picture and the URI of the picture to be buffered to a media renderer, so that the media renderer acquires the first picture according to the URI of the first picture, and displays the first picture, and acquires, the picture to be buffered in accordance with the URI of the picture to be buffered, and buffers the picture to be buffered. | 2015-04-30 |
20150121444 | Systems And Methods For Remote Web Query And Image Selection Exchange To VideoScreen - Systems and methods are disclosed for receiving a request to display, on an first communications device, media content, where the request comprises a first logical address for accessing the media content at a first storage location, transmitting to a second communications device, a second logical address for accessing a copy of the media content at a second storage location, where the second logical address differs from the first logical address, and where the second storage location differs from the first storage location. Other embodiments are disclosed. | 2015-04-30 |
20150121445 | APPARATUS AND METHOD FOR TRANSMITTING AND RECEIVING BROADCASTING - A broadcasting transmitting apparatus configures one broadcasting channel as at least two video streams, generates a program map table (PMT) representing configuration information of a stream included within the broadcasting channel, sets a program type provided through the corresponding broadcasting channel within the PMT, multiplexes the at least two video streams and signaling information, and transmits the multiplexed two video streams and signaling information through a broadcasting network. | 2015-04-30 |
20150121446 | ACCESSING PROTECTED CONTENT FOR ARCHIVING - According to one embodiment of the present invention, a system for accessing protected content includes a first computing device with at least one processor. The system determines one or more users associated with information required to access content of a protected document based on a set of rules. A request is generated and sent to at least one second computing device associated with the one or more determined users to retrieve and utilize the required information to access the content of the protected document. Embodiments of the present invention further include a method and computer program product for accessing protected content in substantially the same manner described above. | 2015-04-30 |
20150121447 | METHOD AND APPARATUS FOR OPTIMIZING HYPERTEXT TRANSFER PROTOCOL (HTTP) UNIFORM RESOURCE LOCATOR (URL) FILTERING - A method for handling hyper-text transfer protocol (“HTTP”) requests from client devices is disclosed. The method comprises receiving an HTTP request from a client device to connect to a destination server. It further comprises extracting a plurality of HTTP headers from the HTTP request using a gateway device in accordance with a user defined configuration to create a subset of the request. Next, it comprises forwarding the subset to an external security device from the gateway device to perform URL policy processing using the request. Finally, it comprises based on a received result of the URL policy processing, transmitting the client request to the destination server. | 2015-04-30 |
20150121448 | MOBILE AND DESKTOP COMMON VIEW OBJECT - In a computing system environment for viewing, accessing, and executing computing resources on one or more computing devices of a user, methods and apparatus include creating an object configured to provide at least one navigational aid for display on at least one of the computing devices. The object allows a user to view, navigate to, and access the computing resource. The object further includes one or more computing policies defining access rights for the computing resource and a listing of one or more other computing resources required for loading and/or executing the computing resource. Other computing resources necessary for loading and/or executing the computing resource are held separate from the object, thus providing information needed to execute the computing resource to the user while abstracting methods and resources required to build and use the computing resource. | 2015-04-30 |
20150121449 | AGENT ASSISTED MALICIOUS APPLICATION BLOCKING IN A NETWORK ENVIRONMENT - Embodiments are configured to receive metadata of a process intercepted on an end host when attempting to access a network. The metadata includes a hash of an application associated with the process and an endpoint reputation score of the application. Embodiments are configured to request a threat intelligence reputation score based on the hash of the application, to determine an action to be taken by the end host based, at least in part, on one or more policies and at least one of the threat intelligence reputation score and the endpoint reputation score, and to send a response indicating the action to be taken by the end host. Further embodiments request another threat intelligence reputation score based on another hash of a dynamic link library module loaded by the process on the end host, and the action is determined based, at least in part, on the other threat intelligence score. | 2015-04-30 |
20150121450 | METHOD AND SYSTEM FOR DEFENDING AGAINST MALWARE AND METHOD FOR UPDATING FILTERING TABLE THEREOF - A method and a system for defending against malware and a method for updating a filtering table thereof are provided. The method for defending against malware includes: receiving a network packet by an electronic device, which stores a filtering table; determining whether the network packet conforms to a specific filtering rule of the filtering table by the electronic device; if the network packet conforms to the specific filtering rule, performing a specific operation on the network packet by the electronic device according to the specific filtering rule; and if the network packet does not conform to the specific filtering rule, uploading characteristic information of the network packet to a malware analyzing device by the electronic device. | 2015-04-30 |
20150121451 | Distance-Modified Security And Content Sharing - In one aspect of the invention, a system for sharing resources in an ad-hoc peer-to-peer network is presented. The ad-hoc peer-to-peer network includes a host device that is associated with a resource. A security application of the host device allows the user of the host device to share the resource with other devices in the network. The security application also allows the user to establish access policies for certain known devices within the network. An access policy established for a known device specifies what rights the known device has with respect to accessing the resource. The access policy has the characteristics of inheritance. Thus, when a device requests to access the resource, the security application of the host device determines an access policy for the device based on access policies of one or more of the known devices. | 2015-04-30 |
20150121452 | SECURITY DESIGN DEVICE AND SECURITY DESIGN METHOD - The invention provides a security design device that, even when a core configuration element implementing a security function has become unusable, enables maintenance of security that existed before the loss of the core configuration element. The security design device: in correspondence with a configuration change of a first configuration element, extracts a security requirement model; and if the first configuration element is the core configuration element, for a second configuration element for which the security function was implemented by means of the first configuration element, generates the security requirement model without using the first configuration element, said security requirement model implementing the same security function as when the first configuration is used. | 2015-04-30 |
20150121453 | SYSTEM AND METHOD FOR NEW DATABASE PERMITTING - The design and implementation of databases within enterprises is a crucial process, but is often resource intensive and often times unnecessary as existing databases may be utilized to serve the same goals. Tracking existing databases and assessing the design specifications of proposed databases is a complex decision making process. Disclosed is a system and computer-based method for systematically controlling the approval, creation and modification of databases. The system provides a policy for enterprise governance control for database proliferation and a tool for comparing database requests to and against existing database assets. | 2015-04-30 |
20150121454 | VOIP AND UNIFIED COMMUNICATION AUTHENTICATION MECHANISM USING COMPONENTS OF THE SUBSCRIBER IDENTITY MODULE (SIM) AND RELATED HARDWARE AND FIRMWARE EQUIVALENTS IN MOBILE DEVICES. - The invention solves the problems associated with existing authentication and cryptographic systems used by Voice over IP (VoIP) and Unified Communication (UC) applications by providing a mechanism to enable VoIP and Unified Communication applications running on mobile devices, smart phones and tablets, to utilize software interfaces provided by the invention to perform the critical functions needed to authenticate and secure a VoIP or UC session. The invention performs these functions in a secure processing environment provided by the mobile device. Depending on the device type, the secure processing environment will be provided by the Secure Element component of a Subscriber Identify Mobile (SIM), by the Open TrustZone implemented on ARM chips, or by firmware included in the device. In each case the invention will interface with the secure processing environment using a published API providing low level access functions. | 2015-04-30 |
20150121455 | Methods and Systems for Selectively Obtaining End User Authentication Before Delivering Communications - Methods of operating a communications service are provided in which a communication that is addressed to a user of a communication service is received. A determination is made that end user authentication is required before the communication may be delivered to a first recipient electronic device. A request for end user authentication may then be forwarded to the first recipient electronic device in response to determining that end user authentication is required. End user authentication information may be received from the first recipient electronic device. The received end user authentication information may be compared to stored end user authentication information for the user. The communication may be forwarded over a network to the first electronic device in response to determining that the received end user authentication information matches the stored end user authentication information for the user. | 2015-04-30 |
20150121456 | EXPLOITING TRUST LEVEL LIFECYCLE EVENTS FOR MASTER DATA TO PUBLISH SECURITY EVENTS UPDATING IDENTITY MANAGEMENT - System, method, and computer program product to exploit trust level lifecycle events for master data to publish security events updating identity management, assigning, in a master data management (MDM) system, an initial trust level, to a first individual based on a level of association of the first individual with an entity owning the MDM system, the initial trust level corresponding to access rights in the MDM system, collecting data about the first individual from one or more social networking sites, computing a trust score for the first individual based on data pertaining to the first individual from the MDM system and the collected data, and updating the trust level for the first individual based on the trust score. | 2015-04-30 |
20150121457 | PROGRAMMING VEHICLE MODULES FROM REMOTE DEVICES AND RELATED METHODS AND SYSTEMS - Methods, apparatus and systems are provided for programming a vehicle module. An exemplary vehicle includes a first module, an authentication module communicatively coupled to the first module, and an update module communicatively coupled to the first module and the authentication module. The update module is configured to obtain a programming update for the first module that includes an authentication portion and a programming data portion. The update module provides the programming data portion to the first module and provides the authentication portion to the authentication module. The authentication module provides the authentication portion to the first module after the authentication portion is authenticated. | 2015-04-30 |
20150121458 | METHOD AND SYSTEM FOR WRITING, UPDATING AND READING STATIC AND DYNAMIC IDENTIFICATION DATA FOR AN AERONAUTICAL APPLIANCE - A system and method for writing, updating and reading the static and dynamic identification data for an aeronautical appliance, which is secure, of low weight and simple to implement. The system for writing, updating and reading the static and dynamic identification data includes a data collection device for collecting and storing static and dynamic identification data for an aeronautical appliance, the collection device integrated into the aeronautical appliance and coupled to a computing unit of the aeronautical appliance according to a master-slave communication model, the computing unit always being master of the communication with the collection device, and a reading device for remotely reading at least part of the identification data stored on the collection device. | 2015-04-30 |
20150121459 | System and Method for Authentication for Wireless Emergency Services - A method of authenticating a user device includes transmitting a request, the request including a query for information, and receiving an identifier, the identifier being associated with one or more authentication mechanisms for obtaining access to emergency services. | 2015-04-30 |
20150121460 | TRUST-INTERACTIVE COMMUNICATION APPLICATIONS - A communication software module executing on a computerized appliance from a machine-readable medium includes functionality enabling a user to direct a communication event to a particular destination by an address of the destination, functionality for transmitting the destination address to a remote trust authority, functionality for initiating the communication event, and functionality for receiving trust information from the remote trust authority, the trust information associated with an enterprise or a person associated with the destination address. Various communication modules are provided, such as email clients, instant messaging systems, chat systems, and voice communication systems. | 2015-04-30 |
20150121461 | METHOD AND SYSTEM FOR DETECTING UNAUTHORIZED ACCESS TO AND USE OF NETWORK RESOURCES WITH TARGETED ANALYTICS - Methods and systems are disclosed for detecting improper, and otherwise unauthorized actions, associated with network resources, the actions including access to the resource and activity associated with the resource. The unauthorized actions are detected by analyzing action data of user actions employing accounts managed by a privileged access management system and associated with a network resource against profiles and rules to discover anomalies and/or deviations from rules associated with the network resource or accounts. | 2015-04-30 |
20150121462 | IDENTITY APPLICATION PROGRAMMING INTERFACE - A method includes receiving a packaged application's request for access to a user's cloud- or network-based account. The packaged application runs outside a web browser on a computing device. If there is an outstanding user consent to access by the packaged application to the user's cloud- or network-based account, the method includes returning an access token to the packaged application. The access token gives the packaged application access to the user's cloud- or network-based account. If there is no outstanding user consent to access by the packaged application to the user's cloud- or network-based account, the method includes presenting a web-based user consent dialog in a webview container in an identity component application installed on the computing device. | 2015-04-30 |
20150121463 | AUTHORIZING A CHANGE WITHIN A COMPUTER SYSTEM - Program code generates on a first computer within a computer system a unique key for a computer software application, wherein the computer software application is on a second computer within the computer system. The program code generates on the first computer an authorization code that grants a designated end user access to implement a change to a configuration item on a second computer during a configurable time period. The program code verifies the authorization code inputted into the second computer to determine if the end user has authority to implement the change on second computer, wherein the authorization code is separated into a first string and a second string each having a fixed number of bits. The program code grants access to the end user to implement the change to the configuration item on the second computer if the end user has the authority to implement the change. | 2015-04-30 |
20150121464 | SYSTEMS AND METHODS FOR GEOLOCATION-BASED AUTHENTICATION AND AUTHORIZATION - Systems and methods are provided for controlling the authentication or authorization of a mobile device user for enabling access to the resources or functionality associated with an application or service executable at the user's mobile device. The user or user's mobile device may be automatically authenticated or authorized to access application or system resources at the device when the current geographic location of the user's mobile device is determined to be within a preauthorized zone, e.g., based on a predetermined geo-fence corresponding to the preauthorized zone. A security level or amount of authorization credentials required to authorize a user for data access may be varied according any of a plurality of security levels, when the current or last known geographic location of the user's mobile device is determined to be outside the preauthorized zone. | 2015-04-30 |
20150121465 | LOCATION BASED ACCESS - A non-transitory computer readable medium for location based access includes instructions which, when executed by one or more devices, causes performance of operations including identifying a physical location of a client device, determining that the physical location of the client device meets a criterion for allowing access through an entryway, identifying a permission level associated with the client device, determining that the permission level associated with the client device meets a criterion for allowing access through the entryway, and, responsive at least to determining that the criterion have been met, allowing access through the entryway. | 2015-04-30 |
20150121466 | ELECTRONIC TOOL AND METHODS FOR MEETINGS - An electronic meeting tool and method for communicating arbitrary media content from users at a meeting. These can include a node configuration device adapted to operate a display node of a communications network, the display node being coupled to a first display. The node configuration device is adapted to receive user selected arbitrary media content and to control display of the user selected arbitrary media content on the first display. At least one peripheral device adapted to communicate the user selected arbitrary media content via the communications network is provided, where the peripheral device is a connection unit including: (e) a connector adapted to couple to a port of a processing device having a second display, a memory and an operating system; and (f) a transmitter for communicating with the communications network. | 2015-04-30 |
20150121467 | Method and System for Protecting a Password During an Authentication Process - A system for providing security for a personal password during an authentication process. The system combines the use of representative characters to disguise the characters of the password and the use of a separate verification code sent to the user for use in the authentication process. A server generates and sends both a set of representative characters and a verification code to a client device. The user then inputs a mixed string having the password and verification code interspersed in order using the representative characters in place of the characters of the password and verification code. The server then receives the input and determines whether the string of representative characters includes the password and verification code characters in the proper order. | 2015-04-30 |
20150121468 | PHYSICAL LAYER SECURITY METHOD IN WIRELESS LAN AND WIRELESS COMMUNICATION SYSTEM USING THE SAME - A security method in a physical layer and a wireless communication system using the same are provided. A wireless communication Access Point (AP) whose security has been enhanced in the physical layer includes a storage unit that manages channel bandwidth pattern data, a controller for sequentially acquiring channel bandwidth data from the channel bandwidth pattern data, a PLL controller for changing a channel bandwidth based on the acquired channel bandwidth data, and a wireless interface unit for performing wireless communication with a wireless communication terminal using the changed channel bandwidth. The channel bandwidth pattern data is identical to channel bandwidth pattern data stored in the wireless communication terminal, and the wireless communication terminal and the wireless communication AP are synchronized with each other such that the wireless communication terminal and the wireless communication AP perform wireless communication using the same channel bandwidth. | 2015-04-30 |
20150121469 | METHOD AND DEVICE FOR INFORMATION TRANSMISSION - A method and device for transmitting product information using ultrasonic signals are disclosed. The device detects local availability of ultrasound-encoded product information while the device is at a location in proximity to an ultrasound transmitter. In response to detecting the local availability of the ultrasound-encoded product information, the device requests a user permission from a user of the device to capture the ultrasound-encoded product information. Upon obtaining the user permission to capture the ultrasound-encoded product information, the device receives, from the ultrasound transmitter, an ultrasonic signal encoded with a message containing respective information associated with a respective product. The device decodes the ultrasonic signal to obtain the message in a human-perceivable form. | 2015-04-30 |
20150121470 | PEER-TO-PEER ONBOARDING OF INTERNET OF THINGS (IOT) DEVICES OVER VARIOUS COMMUNICATION INTERFACES - The disclosure generally relates to apparatus and method for setting up or onboarding a first Internet of Things (IoT) device that has limited or no interfacing capability itself to connect to a network through a second IoT device in communication with the network, by sending a request to a second device in communication with the network and receiving permission to initiate communication with the network. | 2015-04-30 |
20150121471 | System and Method for Providing Access to a Proximate Accessory Device for a Mobile Device - Systems and methods are shown for providing access to proximate accessory devices for a mobile client. The mobile client directly physically scans a physical device identifier of a proximate accessory device to obtain a device identifier value. In one approach, a message is transmitted to an accessory access service that includes the scanned device identifier value and a task to be performed by the proximate accessory device and the service sends the task to the proximate accessory device. In another approach, a message that includes the scanned device identifier value is sent to an accessory access service, which obtains a network address corresponding to the scanned device identifier value and returns the network address to the mobile client, and the mobile client sends a task to the proximate accessory identifier value. | 2015-04-30 |
20150121472 | NAVIGATION SERVER AND NAVIGATION CLIENT - Provided is a navigation server and a navigation client capable of protecting information specific to each user that is transmitted from the navigation client to the navigation server securely without degrading user-friendliness. A navigation server | 2015-04-30 |
20150121473 | METHOD AND SYSTEM FOR PROVIDING MULTIPATH TCP PROXY SERVICES - In the method an Access Point comprises aggregating spare bandwidth of at least another Access Point and capturing data traffic from at least one user computing device, said user computing device taking benefit of said aggregated spare bandwidth. The method: requesting, by said Access Point admission to a MPTcp server including proxy control functions or services, to make use of the latter; checking, by a control module of said MPTcp server, credentials information of said Access Point to allow the latter said admission; and upon said admission being authorized, checking, by said MPTcp server through a connection with a service subscription repository module, if at least one origin server is authorized for accessing said proxy control functions or services. | 2015-04-30 |
20150121474 | PROCESSOR SECURITY AUTHENTICATION AREA - Disclosed herein are a method and electronic device for enhancing the security of sensitive operations. Control is switched from a first driving area to a second driving area of at least one processor. Security authentication is performed by the second driving area and a result of the authentication is output. | 2015-04-30 |
20150121475 | SYSTEM FOR PROVIDING DYNAMIC PORTAL TRANSACTION AUTHENTICATION AND AUTHORIZATION - Systems and methods are disclosed herein for managing electronic access from remote devices to a plurality of computer platforms. The system includes a processor, a network interface, and a memory. The network interface is configured to receive a user identity provided by a device remote to the system and an access request from the device to access a selected computer platform from the plurality of computerized platforms. The memory stores computer executable instructions which, when executed by the processor, cause the system to determine a set of access rights for the device based on the user identity and a role associated with the user identity, as related to the selected computerized platform. The computer executable instructions, when executed by the processor, further cause the system to allow the user to access the selected platforms according to the access request only if the access requested is included in the determined set of access rights. | 2015-04-30 |
20150121476 | Service Processing Method, Device, and System - Embodiments of the present invention relate to the field of communications technologies and provide a service processing method, device, and system, where service expansion can be performed without changing an original device of an operator. The embodiments of the present invention include: acquiring business service information corresponding to a to-be-processed service flow, where the business service information includes a service flow identifier of the to-be-processed service flow and a service label corresponding to the service flow identifier; and sending the business service information corresponding to the to-be-processed service flow to a service router, so that the service router processes, according to the business service information, the to-be-processed service flow. | 2015-04-30 |
20150121477 | TEXT SUGGESTIONS FOR IMAGES - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for receiving image data corresponding to an image, processing the image data to identify one or more features within the image, generating one or more keywords based on each of the one or more features, transmitting the one or more keywords to a computing device for displaying a list of the one or more keywords to a user, receiving text, the text comprising at least one keyword of the one or more keywords, that at least one keyword having been selected by the user from the list, and transmitting the image and the text for display, the text being associated with the image. | 2015-04-30 |
20150121478 | Permission Management Method, Apparatus, and Terminal - A permission management method, apparatus, and terminal. The permission management method includes obtaining an installation package of a first application program, where the installation package carries a first certificate and permission request information of the first application program; next, determining, according to the permission request information, a first permission that the first application program requires during running, where the first permission is a system administrator permission of a system; and then, granting the first permission to the first application program according to the first certificate of the first application program. In this way, the first permission that the first application program requires during running is granted to the first application program. | 2015-04-30 |
20150121479 | IDENTITY MANAGEMENT VIA CLOUD - A system and method of maintaining a user profile for a handheld computer in a shared, scalable computing resource is described. The method includes receiving user profile data from the handheld computer at the shared, scalable computing resource, the user profile data comprising a user security factor. The user profile data is received via a secure wireless communication protocol having authentication of an identity of the handheld computer. The method includes storing the user profile data on the shared, scalable computing resource as a portion of a user profile, the user profile further comprising user preference data. The method further includes receiving the user security factor from a second computing device. The user security factor is received via a secure wireless communication protocol having authentication of an identity of the second computing device. The method further includes downloading user preference data to the second computing device. | 2015-04-30 |
20150121480 | System and Method to Prevent Spoofed Communication Through Out-Of-Band Verification - The disclosed subject matter addresses the problem of spoofing by directly and transparently communicating with the apparent sender of the potentially spoofed incoming message or with the communications network handing the communication of the potentially spoofed incoming message. The address of the recipient device of the potentially spoofed incoming message is compared with addresses of communication sent from the apparent sender. As a result of this comparison, it may be determined whether the phone call or message was sent from the apparent source or was spoofed. The times associated with messages sent from the indicated sender and times associated with the incoming message may also be used to determine the authenticity of the apparent sender. The recipient is of the incoming message is notified of a spoofed message. | 2015-04-30 |
20150121481 | APPLICATION AUTHENTICATION USING NETWORK AUTHENTICATION INFORMATION - In general, in one aspect, embodiments relate to receiving, by a system of one or more network devices from a client device, a request to access one or more applications, determining, by the system, that the client device has already been authenticated to access a network, and based on determining that the client device has already been authenticated to access the network, causing authenticating of the client device for accessing the one or more applications. | 2015-04-30 |
20150121482 | MOBILE BASED LOGIN VIA WIRELESS CREDENTIAL TRANSFER - Systems and methods for mobile-based login via wireless credential transfer are disclosed. In some implementations, a proxy server receives a registration request for a receiver device for accessing a secure resource. The proxy server registers the receiver device in response to the registration request. The proxy server receives, from a transmitter device, information identifying the transmitter device along with authentication credentials for authenticating the receiver device to access the secure resource. The proxy server identifies the receiver device based on the information identifying the transmitter device. The proxy server forwards, to the receiver device, the authentication credentials for authenticating access of the receiver device to the secure resource. | 2015-04-30 |
20150121483 | SYSTEM AND METHOD FOR IDENTITY MANAGEMENT PROVIDERS IN A CLOUD PLATFORM ENVIRONMENT - Described herein is a system and method for supporting an identity management provider in a cloud computing environment. In accordance with an embodiment, an identity management (IDM) provider can provide an identity store (e.g., LDAP directory) configuration for use by a cloud platform (e.g., CloudLogic) service. In accordance with an embodiment, the IDM provider can centrally manage one or more identity store configurations, and supply a particular configuration to the orchestration engine when a service is being provisioned, so that the service can then be launched with an appropriate identity store. This allows a platform administrator to specify identity store configurations once and in one place, instead of having to create an identity store configuration for each service. | 2015-04-30 |
20150121484 | SYSTEM AND METHOD FOR SIGNALING AND VERIFYING URL SIGNATURES FOR BOTH URL AUTHENTICATION AND URL-BASED CONTENT ACCESS AUTHORIZATION IN ADAPTIVE STREAMING - Signaling and verifying URL signatures for accessing URL addressable content in adaptive streaming. A plurality of URL authentication and URL authorization descriptors are provided for a plurality of URLs, wherein each URL authentication descriptor comprises information for verification key acquisition and for accessing an authentication tag for authenticating a given URL in the plurality of URLs according to an associated URL authentication scheme. Each URL authorization descriptor is for verification key acquisition and for accessing an authorization tag for authorizing access to content addressable by a given URL in the plurality of URLs according to an associated URL authentication scheme. A plurality of URL authentication and URL authorization descriptors for the plurality of URLs are communicated and each descriptor is verified in the communicated plurality of URL authentication and URL authorization descriptors for its given URL in the plurality of URLs according to its associated scheme. | 2015-04-30 |
20150121485 | CONFIGURATION OF NETWORK DEVICES - According to examples described herein computer devices coupled to a network can be automatically configured. Systems information is gathered from a plurality of computer devices by way of one or more of an agent and a scout. This information is standardised and stored in one or more databases. A program function is determined from the standardised information. This program function is used to identify two different sets of computer programs installed on a set of networked computer devices. This configuration is then replaced by a configuration where only a single common computer program is used to perform the program function. | 2015-04-30 |
20150121486 | AUTHENTICATION FOR APPLICATION - The present disclosure provides a method, terminal, and system for authentication with respect to an application. The present techniques may be applicable at a terminal with near-field communication function. When a particular operation of the application is triggered, a near-field device within a certain distance of a terminal is detected. An identification of the near-field device is obtained. The identification is sent to a server to request the server to determine whether the near-field device is a particular near-field device corresponding to the particular operation. A result of authentication performed by the server according to the identification is obtained. A following processing is applied to the particular operation according to the result of authentication. The present techniques ensure safety of operations of the application operated at the terminal. | 2015-04-30 |
20150121487 | APPARATUS AND METHOD FOR SECURELY MANAGING THE ACCESSIBILITY TO CONTENT AND APPLICATIONS - A system that incorporates the subject disclosure may perform, for example, receive secret information and non-secret information from a secure download application function, provide a request for a first verification to a secure element where the first verification is associated with access to content and/or an application that is accessible via the secure download application function, receive the first verification which is generated by the secure element based on the secret information without providing the secret information to the secure device processor, receive the non-secret information from the secure element, and generate a second verification for the access based on the non-secret information, where the content and/or application is accessible from the secure download application function responsive to the first and second verifications. Other embodiments are disclosed. | 2015-04-30 |
20150121488 | MULTI-FACTOR AUTHENTICATION BASED ON IMAGE FEEDBACK LOOP - Methods and apparatus relating to multi-factor authentication based on image feedback are described. In an embodiment, authentication logic, at a first computing device, authenticates a second computing device based at least partially on a comparison of a unique identifier, to be generated for the second computing device and to be displayed on a display device of the first computing device, and a detected unique identifier to be received from the second computing device. Other embodiments are also claimed and described. | 2015-04-30 |
20150121489 | Icon Password Setting Apparatus and Icon Password Setting Method Using Keyword of Icon - Disclosed is an icon password setting apparatus and an icon password setting method, which provide a keyword of an icon for an icon password to be set. The icon password setting apparatus according to the present invention enables password setting using an icon image and an associated keyword, the apparatus comprising: a password management unit for generating or inquiring an icon password; a keyword phrase management unit for generating or inquiring a keyword phrase of the icon password; a password list generating unit for generating a list having each icon password and corresponding keyword phrases; and a user password setting unit for receiving a request for setting the password for the icon password in the list and setting a user password. According to the present invention, a user may easily remember an icon password using the keyword phrase provided when setting the icon password. | 2015-04-30 |
20150121490 | KEY DERIVATION METHOD AND APPARATUS FOR LOCAL ACCESS UNDER CONTROL OF A CELLULAR NETWORK - A method for key derivation may comprise: generating a second key based at least in part on a first key for a first connection between a user equipment and a first network node, in response to a decision to enter an idle mode; releasing the first connection to enter the idle mode; providing an identity of the user equipment to the first network node via a second network node, in response to initiating a setup procedure for a second connection between the user equipment and a second network node; and using the second key for the second connection, in response to receiving from the second network node an indication that the identity of the user equipment is successfully verified at the first network node. | 2015-04-30 |
20150121491 | SYSTEM AND METHOD OF AUTHENTICATING USER ACCOUNT LOGIN REQUEST MESSAGES - A computer server receives a login request message sent by a remote terminal to access a user account. If the message includes a first login key, the server then generates a second login key and executes a user account login process after confirming that the second login key corresponds to the first login key. If the message includes no login key, the server generates a verification code and returns the verification code to the remote terminal. The remote terminal then prompts a user to return the verification code to the computer server in a predefined format. If the returned verification code corresponds to the server-generated verification code, the server then executes the user account login process. The server also generates a third login key and returns the third login key to the remote terminal. The remote terminal then stores a correspondence relationship between the username and the third login key. | 2015-04-30 |
20150121492 | METHOD AND SYSTEM FOR AUTHENTICATING SERVICE - Embodiments of the present application relate to a method, a system, and a computer program product for authenticating a service. A method for authenticating a service is provided. The method includes receiving a first service request from a first terminal, generating a first link address that is used to link to an access location based on the received first service request, determining a preset terminal identifier corresponding to a second terminal, the preset terminal identifier being a terminal identifier preset by the user, sending the first link address to the second terminal, receiving a first link request, determining an issued terminal identifier based on the first link request, comparing the determined issued terminal identifier with the preset terminal identifier of the second terminal, and performing a next processing operation on the first service request based on the comparison result. | 2015-04-30 |
20150121493 | Method and Computer System for Dynamically Providing Multi-Dimensional Based Password/Challenge Authentication - Providing multi-dimensional password/challenge authentication for a computer device includes, in response to a login request, sending a login webpage, the webpage at least comprising a set of randomly generated icons with graphical attributes for sequentially selecting; and, determining whether each icon choice entered by a user complies with at least a dimensional option preset for each digit of a preset password according to at least a dimensional option of the digit. | 2015-04-30 |
20150121494 | CONFIGURATOR FORCED CLIENT NETWORK REJOINING - A collocated device functioning as a configurator can use short and long button activations to enter a configuration state, open a timing window, and force client devices currently joined to a network to rejoin the network. If the collocated device functioning as a configurator is unconfigured, a short (or long) button activation can initiate a configuration sequence. A short button activation on that same collocated device, once configured, can cause the device to open a configurator timing window, during which one or more devices can be provided the information necessary to securely communicate on a network. A long (or short) button activation can be used to force all currently connected client devices, or rejoin the network using a new Service Set Identifier (SSID) or passphrase. | 2015-04-30 |
20150121495 | Method and Device for Switching Subscription Manager-Secure Routing Device - The present invention provides a method and a device for switching a subscription manager-secure routing device. The method includes: acquiring, by a second SM-SR from a first SM-SR, a PIC corresponding to an eUICC; acquiring, by the second SM-SR from a second SM-DP, a second PP that is encrypted by using the PIC; generating, by the second SM-SR, a key pair including a public key and a private key; sending, by the second SM-SR, the second PP and the public key to the eUICC through the first SM-SR, so that the eUICC accesses the second SM-SR after deactivating a first PP and activating the second PP; and encrypting, by the second SM-SR, a second PMC by using the private key, and sending an encrypted second PMC to the eUICC, so that the eUICC accesses the mobile network through the second SM-SR. | 2015-04-30 |
20150121496 | REMOTE AUTHENTICATION USING MOBILE SINGLE SIGN ON CREDENTIALS - Systems and methods for remote authentication using mobile single sign on credentials are disclosed. In some implementations, a proxy server receives, from a web access device, a request to access a secure online resource via the web access device. The proxy server receives, from a mobile device different from the web access device, one or more credentials for accessing the secure online resource. The proxy server determines that a geographic distance between the web access device and the mobile device is less than a geographic distance threshold. Upon determining that the geographic distance between the web access device and the mobile device is less than the geographic distance threshold, the proxy server enables the web access device access to the secure online resource. | 2015-04-30 |
20150121497 | Method For Securing Access To A Computer Device - The invention relates to a method for securing access to a computer device, that includes the step of establishing a secured connection and authentication of said computer device and the user of the computer device with a remote server, wherein the steps of establishing the secured connection and authentication are carried out upon the execution of commands included in a data set adapted for implementing the pre-start of the computer device before triggering the execution of the boot loader of the computer device operating system. | 2015-04-30 |
20150121498 | REMOTE KEYCHAIN FOR MOBILE DEVICES - An app of a mobile device registers the mobile device for a remote credential server (RCS) and receives a device token. When a credential for a remote asset is supplied on the mobile device it is routed to the RCS and stored external to the mobile device but referenced on the mobile device via an asset token. When the credential is needed, the device token and the asset token permit the RCS to authenticate and return the credential to or on behalf of the mobile device so that the mobile device can authenticate to and access the remote asset. | 2015-04-30 |
20150121499 | METHOD OF OPERATING A SECURITY TOKEN, COMPUTER PROGRAM PRODUCT AND SECURITY TOKEN - There is provided a method of operating a security token, said security token comprising a secure element and a microcontroller unit being coupled to said secure element, wherein: the secure element receives an authentication command from a host device while the microcontroller unit is in a first sleep state; the secure element decodes the authentication command, sends a corresponding authentication request to the microcontroller unit and subsequently enters into a second sleep state; the microcontroller unit wakes up upon receiving the authentication request and subsequently determines an amount of available power; the microcontroller unit processes the authentication request only if the amount of available power exceeds a threshold. Furthermore, a corresponding computer program product and a corresponding security token are provided. | 2015-04-30 |