18th week of 2014 patent applcation highlights part 75 |
Patent application number | Title | Published |
20140123156 | Screen Timeout Duration - In one embodiment, a method includes determining for each of multiple countdowns to an automatic screen timeout of a computing device whether the countdown was too long or too short. The countdown is too short if user interaction with the computing device occurred within a first pre-determined amount of time after the automatic screen timeout. The countdown is too long if user interaction with the computing device turned off a screen of the computing device prior to a second pre-determined amount of time before the automatic screen timeout. The method includes determining an underage of each of one or more of the countdowns that was too short; determining an overage of each of one or more of the countdowns that was too long; and adjusting a countdown length of the automatic screen timeout based at least in part on the underages or overages. | 2014-05-01 |
20140123157 | METHOD AND APPARATUS FOR PROVIDING APPLICATION NOTIFICATIONS - An approach is provided for distributing notifications from developers to installed applications via a notification enabler separate from the applications. The notification platform determines at least one application installed on at least one device. Then, the notification platform causes, at least in part, a subscription via at least one notification enabler to one or more notification channels associated with the at least one application, wherein the at least one notification enabler is a separate component from the at least one application. | 2014-05-01 |
20140123158 | MOLD FOR TAPE-SHAPED OPTICAL RECORDING MEDIUM, TAPE-SHAPED OPTICAL RECORDING MEDIUM, AND CUTTING DEVICE THEREFOR - There is provided a mold for a tape-shaped optical recording medium with which precise cutting can be performed along a cutting guide groove, the mold forming a recording groove in a tape-shaped optical recording medium, and having a plurality of recording and reproduction bumps that form a recording and reproduction groove, and a guide whose shape is different from that of the recording and reproduction bumps. | 2014-05-01 |
20140123159 | Providing Content On Demand - A method of providing content on demand is provided. Content corresponding to multiple video assets having multiple content owners is received. Content metadata definitions that are associated with the video assets is received. The content metadata definitions including billing data corresponding to an access fee for accessing ones of the video assets. The video assets are encrypted and the encrypted video assets are published. Metadata corresponding to each of the video assets is published. The metadata includes payment delivery data corresponding to the access fee for accessing respective ones of the video assets. | 2014-05-01 |
20140123160 | VIDEO PRESENTATION INTERFACE WITH ENHANCED NAVIGATION FEATURES - A system and technique for simultaneously presenting multiple, content object data streams on a user interface in a manner which encourages multidimensional browsing using directional navigation commands from a traditional remote control allows a viewer to select from live broadcast content, previously recorded content, and content which has yet to be recorded. According to another aspect of the disclosure, a viewer may view in a time shifted manner, not only previously recorded content, but any advertisements or commercials contained in, including possibly skipping an advertisement, if the profile associated with the viewer has earned enough viewing credit to perform such activity. | 2014-05-01 |
20140123161 | VIDEO PRESENTATION INTERFACE WITH ENHANCED NAVIGATION FEATURES - A system and technique for simultaneously presenting multiple, content object data streams on a user interface in a manner which encourages multidimensional browsing using directional navigation commands from a traditional remote control allows a viewer to select from live broadcast content, previously recorded content, and content which has yet to be recorded. According to another aspect of the disclosure, a viewer may view in a time shifted manner, not only previously recorded content, but any advertisements or commercials contained in, including possibly skipping an advertisement, if the profile associated with the viewer has earned enough viewing credit to perform such activity. | 2014-05-01 |
20140123162 | EYE TRACKING BASED DEFOCUSING - Described herein are techniques and mechanisms for eye tracking based defocusing. According to various embodiments, video content may be transmitted from a server for presentation at a remote computing device in communication with the server via a network. Eye tracking information identified via an optical sensor at the client machine may be received from the remote computing device. The eye tracking information may describe a state of one or both eyes of an individual located proximate to the remote computing device. A first portion of the video content on which the eyes are more focused relative to a second portion of the video content may be identified. The video content may be updated based on the received eye tracking information. The second portion of the video content may be defocused relative to the first portion of the video content in the updated video content. | 2014-05-01 |
20140123163 | MANAGING DISPLAY OF CONTENT IN A CONTENT FEED - A method and a computer program product are disclosed for managing the display of content from a content feed. In one embodiment, a content feed includes a dynamically-generated set of content items electronically fed to one or more device. A priority content item is identified along with a plurality of other content items related by subject matter to each other and to the priority content item. A display status of the priority content item is then monitored, indicating whether the priority content item has been displayed for a user. The visibility of the related content items on the one or more device is controlled according to the display status of the priority content item. | 2014-05-01 |
20140123164 | MANAGING DISPLAY OF CONTENT IN A CONTENT FEED - A method includes generating a content feed, wherein the content feed includes a dynamically-generated set of content items electronically fed to one or more device for selectively displaying on the one or more device. A priority content item and a plurality of related content items in the content feed are identified, wherein the plurality of related content items include subject matter that is common with the priority content item. A display status of the priority content item is monitored indicating whether the priority content item has been displayed for a user. The visibility of the related content items on the one or more device is then controlled according to the display status of the priority content item. | 2014-05-01 |
20140123165 | METHOD AND SYSTEM FOR CONTEXT-AWARE RECOMMENDATION - A context aware recommendation system and method for recommending at least one program to the user responsive to dynamically varying user preferences, learned user behavior and contextual information is described. The recommended program is a television program, radio program or music file. The system and method further alert the user about change in user's preferences and guides the user to change stated preferences. | 2014-05-01 |
20140123166 | LOUDNESS LOG FOR RECOVERY OF GATED LOUDNESS MEASUREMENTS AND ASSOCIATED ANALYZER - Embodiments of the invention include a system for evaluating loudness data. The system includes an audio input to receive an audio signal, a loudness measurer structured to continuously measure a loudness of the audio signal, and a data logger structured to record the measured loudness data in a loudness data log. Other embodiments may also include a log analyzer to receive the logged loudness data and make evaluations based on the data. The log analyzer includes a log input structured to receive the loudness data log and a violation module structured to determine if data in the loudness data log indicates a loudness violation occurred. Methods are also described. | 2014-05-01 |
20140123167 | SYSTEM FOR PROVISIONING MEDIA SERVICES - A system for monitoring order fulfillment of telecommunication services is disclosed. An apparatus that incorporates teachings of the present disclosure may include, for example, a monitoring system having a controller element that submits a correlation ID to a service orchestration system (SOS) that manages one or more order fulfillment systems (OFSs) that collectively fulfill a select one of a plurality of telecommunication service orders according to a plurality of intermediate fulfillment steps, receives from the SOS information associated with the plurality of intermediate fulfillment steps tagged with the correlation ID, records said information according to the correlation ID, and collects correlated fulfillment activity for the plurality of telecommunication service orders from a plurality of iterations of the foregoing steps. Additional embodiments are disclosed. | 2014-05-01 |
20140123168 | METHOD AND APPARATUS FOR BROWSING USING ALTERNATIVE LINKBASES - Systems and methods for navigating hypermedia using multiple coordinated input/output device sets. Disclosed systems and methods allow a user and/or an author to control what resources are presented on which device sets (whether they are integrated or not), and provide for coordinating browsing activities to enable such a user interface to be employed across multiple independent systems. Disclosed systems and methods also support new and enriched aspects and applications of hypermedia browsing and related business activities. | 2014-05-01 |
20140123169 | SIMULCASTING CONDITIONAL ACCESS CHANNEL SERVICE OFFERINGS FOR VIDEO DELIVERY IN A TELECOMMUNICATIONS NETWORK - A telecommunications system utilizes switched video technologies to deploy video programming over a second conditional access system (CAS) in parallel with video programming broadcast over an incumbent CAS. The programming content is switched onto the second CAS only when requested by a subscriber, thus the content deployed over the second CAS occupies a fraction of the transport channels the first CAS occupies. A full channel lineup can be simulcast using a fraction of the traditional CAS bandwidth. This arrangement permits subscriber set top boxes to be configured for either the traditional CAS protocol or the second CAS protocol. In one embodiment, the second CAS programming content is simulcast in parallel with the traditional programming content using spare transport channels in the existing RF spectrum. Thus, the cable television operator can incorporate the SDV technology and second CAS without replacement of or disruption to the traditional CAS equipment. | 2014-05-01 |
20140123170 | SYSTEMS AND METHODS FOR SECURELY PROVIDING STREAMING MEDIA CONTENT ON-DEMAND - A system for securely providing streaming media content on-demand may include a plurality of receiving devices in which each receiving device may request the same or different streaming media content (e.g., stored at a content storage system of a content delivery network) on-demand using VOD or other available on-demand services and/or applications associated with, in communication with or running on the respective receiving devices. In response, the content storage system of the content delivery network will encrypt the requested content uniquely for each received request (e.g., according to an encryption key that is unique for each or virtually each request) and deliver the encrypted requested content to the appropriate respective receiving device of the receiving devices. The respective receiving devices will then each decrypt the streaming content as it is being received according to the corresponding decryption key communicated from a respective individual secure remote to the respective receiving device. | 2014-05-01 |
20140123171 | BROADCASTING SIGNAL RECEIVING APPARATUS AND CONTROL METHOD THEREOF - A broadcasting signal receiving apparatus and a control method thereof, the broadcasting signal receiving apparatus including: a signal receiver which receives a broadcasting signal; a signal processor which processes the received broadcasting signal; an interface to which a conditional access module (CAM) that descrambles a scrambled broadcasting signal is connected; and a controller which, if the connection of the CAM through the interface is detected, monitors the broadcasting signal transmitted by the CAM, and if a noise occurs from the broadcasting signal transmitted by the CAM, controls the signal processor to adjust a timing of at least one of a clock signal and a data signal included in the broadcasting signal. Thus, the noise due to the CAM may automatically be compensated and prevent performance of unnecessary compensation process. | 2014-05-01 |
20140123172 | CHALLENGE-RESPONSE CABLE SET-TOP-BOX SYSTEM TO SECURELY AUTHENTICATE SOFTWARE APPLICATION PROGRAM INTERFACES (APIs) - A system for securely authenticating software Application Program Interfaces (APIs) includes a handshake protocol provided between a Conditional Access System (CAS) and Middleware running on a Set-Top-Box. The handshake is a Challenge-Response protocol that includes several steps. The CAS or the Middleware can either act as a Claimant or Verifier in Challenge-Response process. First, a Claimant sends a request to a Verifier requesting access to a function F through the API. The Verifier reacts to the request by outputting a Challenge that is sent to the Claimant The Challenge is also retained by the Verifier for use in its internal calculation to verify the Claimant's response. The Claimant next processes the Challenge using components under a patent License Agreement, known as Hook IP, and issues a Response to the Verifier. The Verifier can then verify the Response to allow the Claimant access to the API. | 2014-05-01 |
20140123173 | PACING AD SERVICE WITH ADJUSTABLE GRANULARITY - In a streaming video system with included video ad breaks, a pacing component allocates ads to particular ad breaks so as to pace the distribution of ads over a defined ad campaign period according to a pacing protocol using discrete time bins. A curve fitting algorithm may be used to provide increased or adjustable granularity of time bins used in the pacing protocol. | 2014-05-01 |
20140123174 | METHOD FOR PROCESSING ADDITIONAL INFORMATION RELATED TO AN ANNOUNCED SERVICE OR CONTENT IN AN NRT SERVICE AND A BROADCAST RECEIVER - A method of processing additional information related to an announced service or content in a Non-Real Time (NRT) service and the broadcast receiver are disclosed herein. A method of providing a Non-Real Time (NRT) service in a broadcasting receiver includes receiving a service map table (SMT) and a first descriptor through a service signaling channel, identifying an image identifier and an image type of an image for an NRT service based upon the first descriptor, receiving the image via a flute session and displaying the image when corresponding service is played, wherein the image is logo or icon data for the NRT service. The method may further include connecting a service signaling channel, parsing the received SMT and the first descriptor, determining whether a service is the NRT service based upon the parsed SMT and storing the received image. | 2014-05-01 |
20140123175 | SESSION BASED ADVERTISING - A method, apparatus, and computer program product provide the ability to select and display advertisements. A media content viewing session is commenced. During the session, media content is displayed on a display/media content viewing device (e.g., a television or monitor). A set of advertisements are maintained in an advertisement selection receiver. During the session, the advertisement selection receiver determines, selects, and displays advertisements from the set of advertisements. | 2014-05-01 |
20140123176 | Direct Marketing Interface for Network Television - A method of communicating targeted advertising to media reception devices of individual consumers, receiving electronic signals of said media from broadcasters through communication to a local system provider such as a cable or satellite television system provider. The system allows a single broadcaster to disseminate targeted advertising throughout multiple connected system providers to allow centralized target marketing to consumers. | 2014-05-01 |
20140123177 | PRE-ENCODED USER INTERFACE VIDEO - In at least one example embodiment, in connection with a device having a user interface (UI), a method may include transmitting a request for VOD (video on demand) content to a content provider; receiving, from the content provider, a UI stream and the requested VOD content, the UI stream including a VOD header and a plurality of UI videos corresponding to the VOD content; playing a first UI video from among the plurality of UI videos; receiving a first user input; selecting a second UI video from among the plurality of UI videos based at least in part on the first user input; and playing the second UI video. | 2014-05-01 |
20140123178 | Self-learning methods, entity relations, remote control, and other features for real-time processing, storage, indexing, and delivery of segmented video - Self-learning systems process incoming data from sources such broadcast, cable, or IP-driven television and can discover topics that broadly describe the incoming data in real-time. These topics can be used to gather and store metadata from various metadata sources such as social networks. Using the metadata, content delivery systems working in parallel with the self-learning systems can deliver highly contextualized supplementary content to client applications, such as mobile devices used as “second screen” devices. | 2014-05-01 |
20140123179 | ZOOMABLE CONTENT RECOMMENDATION SYSTEM - A method is provided for a content recommendation module. The method includes receiving a user input related to viewing contents from a user and determining whether a recommendation pool containing a plurality of selected recommendation candidates has been changed corresponding to the input. The method also includes, when the recommendation pool has been changed, mapping the plurality of selected recommendation candidates in the changed recommendation pool into a hierarchical data structure with a plurality of levels such that each of the plurality of levels acts as a stage of a zoom operation on the selected recommendation candidates. Further, the method includes rendering mapped recommendation candidates from the plurality of levels to be displayed to the user. | 2014-05-01 |
20140123180 | Methods and Systems for Facilitating Remote Control of a Television by a Support Technician - An exemplary method includes a remote support management system 1) receiving a television support request from a user of a television, 2) generating, in response to the television support request, a ticket identifier associated with the television support request, and 3) facilitating, in accordance with the ticket identifier, remote control of the television by a support technician by way of a computing device associated with the support technician. Corresponding methods and systems are also disclosed. | 2014-05-01 |
20140123181 | Web TV Based Information Browsing Method and System - A web TV based information browsing method includes receiving, by a web TV, information on the Internet sent by an information server, classifying the received information, and setting an information tag for the classified information, and displaying, on a display interface currently displayed on the web TV, an information interface for a user to read information corresponding to the information tag with a window according to a size of the display interface, wherein the window is smaller than the display interface. Accordingly, the user can watch TV and read information at the same time, thereby bringing better use experience to users. | 2014-05-01 |
20140123182 | VIDEO CONTENT PLAYING SCHEME - In one example embodiment, a system includes a first device configured to: play video content, display a progress bar to represent playing progress of the video content, display, on the progress bar, a first image to represent a current playing time of the video content played by the first device, and display, on the progress bar, a second image to represent a final stop time of the video content that was previously played by a second device; and a server configured to transmit, to the first device, the video content and information including the final stop time of the video content played by the second device. | 2014-05-01 |
20140123183 | MENU SCREEN DISPLAY CONTROL METHOD AND DISPLAY CONTROL DEVICE - According to a method of the present invention for controlling display of a menu screen, content is displayed in a content display region located in a central part of a display screen in a size smaller than the display screen, and a plurality of icons are displayed in a circle around the content display region so that the plurality of icons sequentially move to a specific position in accordance with a user's selecting operation while moving around the content display region without overlapping the content display region. | 2014-05-01 |
20140123184 | METHOD AND APPARATUS FOR BROWSING USING ALTERNATIVE LINKBASES - Systems and methods for navigating hypermedia using multiple coordinated input/output device sets. Disclosed systems and methods allow a user and/or an author to control what resources are presented on which device sets (whether they are integrated or not), and provide for coordinating browsing activities to enable such a user interface to be employed across multiple independent systems. Disclosed systems and methods also support new and enriched aspects and applications of hypermedia browsing and related business activities. | 2014-05-01 |
20140123185 | BROADCAST RECEIVING APPARATUS, SERVER AND CONTROL METHODS THEREOF - A broadcasting receiving apparatus is provided. The broadcasting receiving apparatus includes a storage unit which is configured to store information in which broadcasting channel information and user uttered channel names are mapped, a voice receiver which is configured to receive a user uttered voice, including a channel name, a first communicator configured to transmit the received user uttered voice to a first server, and a controller which is configured to search the user uttered channel name corresponding to text information from the storage unit when the text information corresponding to the user uttered voice is received from the first server, and control channel switching to a channel corresponding to the broadcasting channel information mapped with the searched user uttered channel name. | 2014-05-01 |
20140123186 | METHOD AND APPARATUS FOR BROWSING USING ALTERNATIVE LINKBASES - Systems and methods for navigating hypermedia using multiple coordinated input/output device sets. Disclosed systems and methods allow a user and/or an author to control what resources are presented on which device sets (whether they are integrated or not), and provide for coordinating browsing activities to enable such a user interface to be employed across multiple independent systems. Disclosed systems and methods also support new and enriched aspects and applications of hypermedia browsing and related business activities. | 2014-05-01 |
20140123187 | METHOD AND APPARATUS FOR BROWSING USING ALTERNATIVE LINKBASES - Systems and methods for navigating hypermedia using multiple coordinated input/output device sets. Disclosed systems and methods allow a user and/or an author to control what resources are presented on which device sets (whether they are integrated or not), and provide for coordinating browsing activities to enable such a user interface to be employed across multiple independent systems. Disclosed systems and methods also support new and enriched aspects and applications of hypermedia browsing and related business activities. | 2014-05-01 |
20140123188 | Method and Apparatus for Channel Prioritization - A method includes detecting a client device, determining a maximum number of channels based on the client device and selecting different targeted channels from a set of available channels. At least one of the different targeted channels is selected to form a preloaded channel. | 2014-05-01 |
20140123189 | Data Structure and Methods for Providing an Interactive Program Guide - A program guide in which a video layer includes a plurality of video objects including title objects, each title object having associated with it a channel and at least one time slot, the video layer being formed in response to a received video stream; and a graphics layer comprising a plurality of graphics objects including title overlay objects, each of the title overlay objects selectively imparting at least a visual de-emphasis to a respective title object in the video layer, the visual de-emphasis being imparted to title objects not being associated with a desired time slot. | 2014-05-01 |
20140123190 | CONTENT BASED USER INTERFACE - In one example embodiment, a mobile device includes a data receiving unit configured to receive metadata regarding television content that is played by a television device; an icon displaying unit configured to: display a plurality of icons that are associated with the television content based at least in part on the metadata, and receive a touch input via at least one icon from among the plurality of icons; and a signal generating unit configured to generate a control signal regarding an operation of the television device based at least in part on the received touch input. | 2014-05-01 |
20140123191 | METHOD FOR DISPLAYING ELECTRONIC PROGRAM GUIDE OPTIMIZED FOR USER CONVENIENCE - A method for displaying an electronic program guide (EPG), which includes one or more pages divided into a plurality of program name display regions, provides a list of names of currently-broadcast programs through each of the program name display regions such that a user may search all currently-broadcast programs. TV viewers may determine information on currently-broadcast programs through an effective display method with classification criteria, and quickly change a page screen through movement between columns. TV viewers may select a desired broadcasting program from the channels through a minimum key manipulation of a remote control. Program names are classified according to the classification criteria such as genres, recently watched channels, and favorite channels in the EPG. The classification criteria may be set by each user, or a separate item may be added, so that a user may easily acquire broadcasting program information. | 2014-05-01 |
20140123192 | USER INTERFACE TO RECOMMEND VIDEOS - In at least one example embodiment, a computer-readable storage medium having thereon computer-executable instructions that, in response to execution, cause a device to perform operations may include displaying a plurality of viewer profile options; receiving a first user input that selects at least one viewer profile option from among the plurality of viewer profile options; displaying, on a first area, the at least one selected viewer profile option and at least one non-selected viewer profile option; and displaying, on a second area, a first recommendation video list corresponding to the at least one selected viewer profile option and at least one second recommendation video list corresponding to a part of the at least one selected viewer profile option and a part of the at least one non-selected viewer profile option. | 2014-05-01 |
20140123193 | Overlay of Visual Representations of Captions on Video - In one embodiment, a method receiving a request for a media program from a user device. The method then determines a set of visual representations of captions for the media program and determines video information for the media program. Visual representations from the set of visual representations of captions are sent with the video information over a network to the user device where text for the captions has been pre-rendered in the sent visual representations before sending of the visual representations to the user device. Also, the user device is configured to directly render and overlay a visual representation of a caption from the visual representations over a portion of the video information without rendering of the text for caption on the portion of the video information at the user device. | 2014-05-01 |
20140123194 | SINGLE-CABLE AUTOMATIC IRD INSTALLATION PROCEDURE - A method, apparatus, system, and computer program product for auto-installing an integrated receiver/decoder (IRD) includes issuing an auto-installation command from the IRD to an outdoor unit (ODU) and receiving a plurality of tones from the ODU in response to the auto-installation command, each tone representing a center frequency of available user bands (UBs). The auto-installation also includes acquiring a UB center frequency by the IRD, requesting the ODU to confirm a UB number corresponding to the acquired UB center frequency, and receiving confirmation from the ODU that a UB number corresponds to the acquired UB center frequency. The auto-installation also includes sending an acceptance of the assigned UB number from the IRD to signal the ODU that it may mark the assigned UB as assigned. | 2014-05-01 |
20140123195 | CONTROL VIDEO CONTENT PLAY SPEED - In one example embodiment, a system includes a content provider configured to transmit video content including a plurality of scenes; and an apparatus configured to: receive an input including a target playing time of the video content and a condition for changing a playing speed, determine a priority value for each of the scenes based at least in part on the condition for changing the playing speed, and determine a playing speed of each of the scenes based at least in part on the determined priority value and the target playing time of the video content. | 2014-05-01 |
20140123196 | BROADCAST RECEIVING APPARATUS FOR PROVIDING A TIME SHIFT FUNCTION, AND METHOD THEREOF - A broadcast receiving apparatus which provides a time shift function and a method thereof are provided. The broadcast receiving apparatus includes: a receiver which receives a broadcast signal; a signal processor which processes the broadcast signal to output broadcast data; a storage which includes a minimum storage area allocated to a time shift function and a recording area allocated to a recording function; and a controller which, in response to the time shift function being executed, sequentially stores broadcast data from the minimum storage area and, in response to the minimum storage area being filled, additionally designates a time shift area up to the recording area to store the broadcast data. | 2014-05-01 |
20140123197 | IPTV SERVICE DEVICE AND METHOD FOR PROVIDING CONTINUOUS SERVICE - The present invention relates to an IPTV service device and method for providing continuous service. The method according to one embodiment of the present invention comprises: a service-request receiving step of receiving an IPTV service request from a user of an IPTV terminal; a service-confirming step of confirming whether or not the IPTV service has previously been stopped in response to the IPTV service request; and an IPTV-service providing step of providing the IPTV service to the IPTV terminal from the point at which service was stopped if the IPTV service has previously been stopped. | 2014-05-01 |
20140123198 | BROADCASTING RECEIVING APPARATUS AND METHOD - According to one embodiment, a broadcasting receiving method includes: informing a server storing content data of data related to a display size of a screen and acquiring the content data according to the display size; generating display data obtained by combining the contents data with a moving image, with a display size based on layout information included in the acquired contents data; and performing image processing on the display data for being displayed on the screen to output the display data on which the image processing is performed, wherein when a ratio of a display area of the moving image with respect to the screen is a predetermined value or more based on the display size of the moving image based on the layout information, downscaling an image based on the content data to generate display data obtained by combining the moving image with the downscaled image. | 2014-05-01 |
20140123199 | CONTENT RELAYING SCHEME - In one example embodiment, a system includes an internet protocol television server configured to transmit a first-internet protocol multicast stream of internet protocol television content; a wireless router configured to: receive, from the internet protocol television server, the first-internet protocol multicast stream, convert the first-internet protocol multicast stream into a second-internet protocol unicast stream, and transmit the second-internet protocol unicast stream via a wireless network; and an end device configured to: transmit a request for the internet protocol television content to the wireless router, and receive the second-internet protocol unicast stream from the wireless router. | 2014-05-01 |
20140123200 | DEVICE HOSTING WEB-BASED APPLICATIONS - In at least one example embodiment, there is a device that displays television content on a display. The device may include a web browser engine configured to host a plurality of web-based applications; at least one web socket configured to provide each of the plurality of web-based applications with at least one respective TCP connection; and a service management unit configured to transmit data packets from at least one of the plurality of web-based applications to an external device via the at least one web socket. | 2014-05-01 |
20140123201 | APPARATUS FOR RECEIVING BROADCAST AND METHOD OF MANAGING FILE USED FOR TIME SHIFT - An apparatus for receiving a broadcast and a method of managing a file used for a time shift are provided. The apparatus includes: a receiver which receives a broadcast signal; a signal processor which processes the broadcast signal to output broadcast data; a storage which stores the broadcast data; and a controller which, if a time shift function is executed, controls the signal processor to divide the broadcast data into a plurality of files and store the plurality of files, and, if a size of a storage area reaches a threshold value allocated to the time shift function, sequentially deletes the plurality of files to secure an additional storage area. | 2014-05-01 |
20140123202 | METHOD FOR DOWNLOADING CONTENT ACCORDING TO COMMUNICATION PARAMETERS, AND ASSOCIATED CONTENT RECEIVER - A method for downloading multimedia contents is disclosed. The multimedia contents exists in at least two versions. Each of the versions corresponds to a different required transmission bit rate and each of the versions is temporally divided into chunks corresponding to a determined duration, one chunk being identified by an item of information representative of a temporal position i and by an item of information representative of a version j. A content receiver implementing this method is also described. | 2014-05-01 |
20140123203 | METHOD AND SYSTEM FOR LOCATING INGRESS UTILIZING CUSTOMER PREMISES EQUIPMENT - Unlike conventional methods and systems for locating ingress, which only monitor the upstream path, a method and system of locating ingress by monitoring the downstream path is provided. A test system measures the signal quality in the upstream path and in dependence upon a noise level being above a predetermined limit, polls a plurality of terminal equipment devices to return a downstream signal quality measurement. The test instrument analyzes the downstream signal quality measurements to locate an ingress source contributing to the noise. | 2014-05-01 |
20140123204 | VIDEO DISPLAY APPARATUS AND OPERATING METHOD THEREOF - Provided are a video display device and a method of operating the same. The method includes: executing an enhanced service playing application not dependent on any single channel; obtaining an uncompressed audio video (AV) content; playing the uncompressed AV content through the display unit; attempting to obtain contents information on the uncompressed AV content on the basis of a part of the uncompressed AV content; transmitting an enhanced service request message to an enhanced service providing server not dependent on any single channel by the enhanced service; receiving an enhanced service from the enhanced service providing server; and playing the enhanced service through the display unit by the enhanced service playing application. | 2014-05-01 |
20140123205 | SYSTEM FOR PRESENTING MEDIA PROGRAMS - A system that incorporates the subject disclosure may use, for example, a method for sending a set-top box an identification of the media player, receiving operational instructions from the set-top box according to the emulator executed by the set-top box that emulates a user interface of the media player by presenting a representation of the media player in a graphical user interface, and transmitting media content to the set-top box according to the operational instructions. The emulator can be supplied to the set-top box by way of a multimedia system communicatively coupled to the set-top box. The user interface presented by the set-top box by way of the emulator substantially mimics functions of the media player. Additional embodiments are disclosed. | 2014-05-01 |
20140123206 | SYSTEM AND METHOD FOR WRITING TO REMOVABLE MEDIA - The invention provides a system and method for writing data to a removable media device in accordance with a security policy. According to a method of the invention a request to write data to a first file on the removable media device is detected. Dummy data is written to the first file instead of writing the requested data. The requested data is written instead to a corresponding second file on a fixed media device. The corresponding second file is compared to a security policy. Response to the write request is based on the results of the comparison. | 2014-05-01 |
20140123207 | KEYSTORE ACCESS CONTROL SYSTEM - A keystore access system is provided that controls access to a keystore. The keystore access control system receives a request to access content of the keystore from a software application component. The keystore access control system applies a stored authorization policy to the request to determine whether access to the content of the keystore is granted. The keystore access system further grants the software application component access to the content of the keystore when it is determined that access to the content of the keystore is granted. The keystore access system further denies the software application component access to the content of the keystore when it is determined that access to the content of the keystore is not granted. | 2014-05-01 |
20140123208 | PRIVACY AWARE CAMERA AND DEVICE STATUS INDICATOR SYSTEM - A privacy indicator is provided that shows whether sensor data are being processed in a private or non-private mode. When sensor data are used only for controlling a device locally, it may be in a private mode, which may be shown by setting the privacy indicator to a first color. When sensor data are being sent to a remote site, it may be in a non-private mode, which may be shown by setting the privacy indicator to a second color. The privacy mode may be determined by processing a command in accordance with a privacy policy of determining if the command is on a privacy whitelist, blacklist, greylist or is not present in a privacy command library. A non-private command may be blocked. | 2014-05-01 |
20140123209 | INPUT/OUTPUT GATEKEEPING - Disclosed are various embodiments providing a portable wireless communication device that includes a secure element configured to route a set of input/output (I/O) channels to host processing circuitry of a mobile communication device. The secure element includes an application executable by the secure element, the application being configured to obtain a policy via an I/O channel of the set of I/O channels. The application is further configured to prevent the host processing circuitry from accessing data corresponding to at least a portion of the set of I/O channels according to the policy. | 2014-05-01 |
20140123210 | APPARATUS CONNECTING TO NETWORK, CONTROL METHOD FOR APPARATUS, AND STORAGE MEDIUM - An apparatus verifies whether a setting value is set correctly according to a security policy, and controls a screen to shift to a screen indicating a correction method if there is any incorrect setting. | 2014-05-01 |
20140123211 | System And Method For Securing Virtualized Networks - A method and apparatus that secures a dynamic virtualized network is described. In an exemplary embodiment, a device learns a current network policy of the dynamic virtualized network, where the dynamic virtualized network is a virtualized layer 2 network that is overlaid on a layer 3 physical network. In addition, the current network policy includes multiple network policy elements, where each of the multiple network policy elements identifies an authorized endpoint in the dynamic virtualized network. Furthermore, the layer 3 physical network includes multiple network access devices. The device further determines a network security policy for the dynamic virtualized network from the current network policy. The network security policy includes one or more second network policy elements that are a different network policy element than one of the multiple network policy elements of the current network policy. In addition, each of the one or more second network policy network elements adds an additional policy on how network traffic is processed in the dynamic virtualized network by a port of one of the plurality of network access devices. The device further applies the network security policy to each network access device that is affected by the network security policy. | 2014-05-01 |
20140123212 | System And Method For Securing Virtualized Networks - A method and apparatus that secures a dynamic virtualized network is described. In an exemplary embodiment, a device learns a current network policy of the dynamic virtualized network, where the dynamic virtualized network is a virtualized layer 2 network that is overlaid on a layer 3 physical network. In addition, the current network policy includes multiple network policy elements, where each of the multiple network policy elements identifies an authorized endpoint in the dynamic virtualized network. Furthermore, the layer 3 physical network includes multiple network access devices. The device further determines a network security policy for the dynamic virtualized network from the current network policy. The network security policy includes one or more second network policy elements that are a different network policy element than one of the multiple network policy elements of the current network policy. In addition, each of the one or more second network policy network elements adds an additional policy on how network traffic is processed in the dynamic virtualized network by a port of one of the plurality of network access devices. The device further applies the network security policy to each network access device that is affected by the network security policy. | 2014-05-01 |
20140123213 | ENABLING DYNAMIC AUTHENTICATION WITH DIFFERENT PROTOCOLS ON THE SAME PORT FOR A SWITCH - The invention enables a client device that does not support IEEE 802.1X authentication to access at least some resources provided through a switch that supports 802.1X authentication by using dynamic authentication with different protocols. When the client device attempts to join a network, the switch monitors for an 802.1X authentication message from the client device. In one embodiment, if the client fails to send an 802.1X authentication message, respond to an 802.1X request from the switch, or a predefined failure condition is detected the client may be deemed incapable of supporting 802.1X authentication. In one embodiment, the client may be initially placed on a quarantine VLAN after determination that the client fails to perform an 802.1X authentication within a backoff time limit. However, the client may still gain access to resources based on various non-802.1X authentication mechanisms, including name/passwords, digital certificates, or the like. | 2014-05-01 |
20140123214 | Establishing and Maintaining an Authenticated Connection Between a Smart Pen and a Computing Device - A system and method establishes a connection between a smart pen and a computing device, and establishes a privilege level that regulates data requests for specific data from the smart pen. The smart pen determines whether a connection should be established between the smart pen and a computing device, based on device information received from the computing device. If a connection is established, a privilege level is established for an application executing on the computing device based on the device information, which determines whether a request from the application for specific data from the smart pen is allowed or denied. | 2014-05-01 |
20140123215 | COMMUNICATION CONTROL APPARATUS, COMMUNICATION CONTROL METHOD, AND PROGRAM - A communication control apparatus controls communication between a first apparatus and a second apparatus connected to the first apparatus via a plurality of relay apparatuses. The communication control apparatus comprises: a communication path generation unit that refers to a control policy including access control and supplementary control that is other than the access control from the first apparatus to the second apparatus and refers to network configuration information about a network configuration among the first apparatus, the second apparatus, and the plurality of relay apparatuses and generates a communication path that matches the control policy from the first apparatus to the second apparatus and goes through at least one of the plurality of relay apparatuses; and a communication path control unit that instructs a relay apparatus(es) on the communication path among the plurality of relay apparatuses to execute the access control and the supplementary control included in the control policy. | 2014-05-01 |
20140123216 | METHOD OF GENERATING SECURITY RULE-SET AND SYSTEM THEREOF - There are provided a method of generation of a security rule-set and a system thereof. The method includes: obtaining a group of log records of communication events resulting from traffic related to the security gateway; generating a preliminary rule-set of permissive rules, said set covering the obtained group of log records; generating, with the help of mapping the generated preliminary rule-set to the obtained group of log records, a rule-set of non-overlapping rules covering the group of log records; and generating an operational rule-set by processing the generated rule-set of non-overlapping rules, said processing including mapping the generated rule-set of non-overlapping rule to the obtained group of log records. | 2014-05-01 |
20140123217 | PROVISIONING LAYER THREE ACCESS FOR AGENTLESS DEVICES - A method may include obtaining a layer two identification of an endpoint that is seeking access to a network, the endpoint omitting an agent to communicate a layer three address of the endpoint to a policy node, applying one or more authentication rules based on the layer two identification of the endpoint, assigning the layer three address to the endpoint, learning, by the policy node, the layer three address of the endpoint, and provisioning layer three access for the endpoint to the network based on the learned layer three address. | 2014-05-01 |
20140123218 | SYSTEM FOR CONTROLLING ACCESS AND DISTRIBUTION OF DIGITAL PROPERTY - Digital data protection is provided by a processor running an operating system programmed to generate one or more interrupts; an access mechanism detects one or more interrupts at or below a BIOS level, a given detected interrupt being associated with an operating system request to access protected portions of the data, and restricts access to the protected portions of the data by the operating system in accordance with at least one rule; a tamper detecting mechanism prevents access to the data in an unprotected form has means for destroying data stored in the access mechanism when tampering is detected. | 2014-05-01 |
20140123219 | POLICY-BASED SERVICE MANAGEMENT SYSTEM - A policy-based management mechanism is provided, whereby the mechanism provides for at least the controlling of access to network resources, the integration of different frameworks into a common open standard, and modular components for assembling integrated date and voice services. The mechanism accomplishes this by using an access management component that checks for access credentials, a service management component that identifies which resources are available to a requestor of resources, and a resource management component that manages the requested resources. In one exemplary implementation, a fourth component, the policy management component links the first three components such that a resource request gains access to resources based on policy decisions determined by the fourth component for the first three components. | 2014-05-01 |
20140123220 | BUSINESS METHOD INCLUDING CHALLENGE-RESPONSE SYSTEM TO SECURELY AUTHENTICATE SOFTWARE APPLICATION PROGRAM INTERFACES (APIs) - A system for securely authenticating software Application Program Interfaces (APIs) includes a handshake protocol that is provided to validate whether the parties involved are licensed to use the system which includes rights to Intellectual Property (IP) and corresponding obligations. The handshake is a Challenge-Response protocol that includes several steps. First, a Claimant sends a request to a Verifier requesting access to a function through an API. The Verifier reacts to the request by outputting a Challenge that is sent to the Claimant. The Challenge is also retained by the Verifier for use in its internal calculation to verify the Claimant's response. The Claimant next processes the Challenge using components under the license, known as Hook IP, and issues a Response to the Verifier. The Verifier compares the possibly-correct Candidate Response from the Claimant to the known-correct Target Response and if a match occurs the Verifier allows the Claimant access to the API. | 2014-05-01 |
20140123221 | SECURE CONNECTION FOR A REMOTE DEVICE THROUGH A VIRTUAL RELAY DEVICE - Virtual machines in a network may be isolated by encrypting transmissions between the virtual machines with keys possessed only by an intended recipient. Within a network, the virtual machines may be logically organized into a number of community-of-interest (COI) groups. Each COI may use an encryption key to secure communications within the COI, such that only other virtual machines in the COI may decrypt the message. Remote devices may gain access to virtual machines in a network through a virtual device relay. The virtual device relay receives data from the remote device, such as a tablet or cellular phone, and forwards the data to one of the virtual machines, when the virtual device relay shares a COI with the destination virtual machine. | 2014-05-01 |
20140123222 | METHOD AND SYSTEM FOR FACILITATING CONTROLLED ACCESS TO NETWORK SERVICES - An approach for enabling controlled access to a limited set of remote services associated with a device is described. A controlled access platform determines one or more network access descriptors to associate with a calling application of a device configured to access a remote service via a communication network. The controlled access platform initiates a limiting of the calling application to one or more allowed network interaction types with a remote service or a network access component associated with the device based on a profile for defining one or more allowed network interaction types between the calling application and the remote service. | 2014-05-01 |
20140123223 | Resilient Device Authentication System - A resilient device authentication system comprising: one or more verification authorities (VAs) including a memory loaded with a complete verification set that includes hardware part-specific data, and configured to create a limited verification set (LVS) therefrom; one or more provisioning entities (PEs) each connectable to at least one of the VAs, including a memory loaded with a LVS, and configured to select a subset of data therefrom so as to create an application limited verification set (ALVS); and one or more device management systems connectable to at least one of the PEs, including a memory loaded with an ALVS, and configured to manage device security-related applications through the performance of security-related functions on devices associated with the hardware part-specific data. | 2014-05-01 |
20140123224 | METHOD AND APPARATUS FOR A PORTABLE WIRELESS SECURITY DEVICE - A portable wireless security device (WSD) along with methods of use for providing a multi-factor authentication process for authorizing RFID payment transactions, online processes and email correspondences made by a mobile device. | 2014-05-01 |
20140123225 | REMOTE ACCESS TO RESOURCES OVER A NETWORK - Systems and techniques are provided for controlling requests for resources from remote computers. A remote computer's ability to access a resource is determined based upon the computer's operating environment. The computer or computers responsible for controlling access to a resource will interrogate the remote computer to ascertain its operating environment. The computer or computers responsible for controlling access to a resource may, for example, download one or more interrogator agents onto the remote computer to determine its operating environment. Based upon the interrogation results, the computer or computers responsible for controlling access to a resource will control the remote computer's access to the requested resource. | 2014-05-01 |
20140123226 | UNIFIED USER IDENTIFICATION WITH AUTOMATIC MAPPING AND DATABASE ABSENCE HANDLING - An identification system that may be used in heterogeneous computing environments provides a fail-free path to providing identifiers from a single canonical namespace. Objects or gateways requiring an identifier for access are accessed using an identifier for the canonical namespace. If an entity requests access using an identifier from another namespace, an external database is consulted to determine if a mapping exists for the identifier to another identifier the canonical namespace. If no mapping exists, or the external database is unavailable, then an identifier is automatically generated in the canonical namespace and is used for the access. An internal database is updated with the automatically generated identifier, providing a mechanism to add mappings without administrative intervention. To access resources requiring an identifier from another particular namespace, a canonical namespace identifier may be mapped to another identifier in the particular namespace, or a generic identifier may be used. | 2014-05-01 |
20140123227 | NETWORK WATERMARK - A network communications method utilizing a network watermark for providing security in the communications includes creating a verifiable network communications path of nodes through a network for the transfer of information from a first end node to a second end node; verifying the network communications path of nodes, by the first end node, before communicating by the first end node information intended for receipt by the second end node; and once the network communications path of nodes is verified by the first end node, communicating by the first end node, via the verified communications path of nodes, the information intended for receipt by the second end node; wherein the network watermark represents the verifiable network communications path of nodes. | 2014-05-01 |
20140123228 | Event Reporting and Handling - Particular embodiments may receive and log information related to one or more events occurring on one or more client computing devices associated with a user. An event may comprise a restriction of a user action on a social-networking system, the restriction comprising the social-networking system blocking the user from performing the user action. An event may comprise a login issue associated with logging in to the social-networking system. An event may comprise a system or device error. System errors may comprise events originating from a third-party system. For each event, an indication of the event and at least one user-activatable reference may be provided for display to the user. A control action may then be determined for the event in response to a user selection of the user-activatable reference. An interface may provide third parties with a view of a user's events as well as functionality to effect control actions. | 2014-05-01 |
20140123229 | ANTENNA/ACTUATION KEY ASSEMBLY - An apparatus and method for employing a token based arbiter. The apparatus includes a priority provider ( | 2014-05-01 |
20140123230 | VIRTUAL RELAY DEVICE FOR PROVIDING A SECURE CONNECTION TO A REMOTE DEVICE - Virtual machines in a network may be isolated by encrypting transmissions between the virtual machines with keys possessed only by an intended recipient. Within a network, the virtual machines may be logically organized into a number of community-of-interest (COI) groups. Each COI may use an encryption key to secure communications within the COI, such that only other virtual machines in the COI may decrypt the message. Remote devices may gain access to virtual machines in a network through a virtual device relay. The virtual device relay receives data from the remote device, such as a tablet or cellular phone, and forwards the data to one of the virtual machines, when the virtual device relay shares a COI with the destination virtual machine. | 2014-05-01 |
20140123231 | Extending authentication and authorization capabilities of an application without code changes - A generic approach to extending the authentication and authorization capabilities of a client-server application (e.g., a VPN) without any code changes. To this end, the application is augmented with an authentication mechanism comprising a pair of cooperating components: an authentication agent that is associated with (and hooks into) the client-side of the application, and an authentication server that is associated with the server-side. In operation, the authentication server issues commands to the authentication agent to acquire all required data from the user, device or host environment, and the authentication agent (hooked into the VPN client) scrapes requests originating from the authentication server and injects (e.g., by auto-fill) the appropriate responses into the VPN client UI for transmission back through the VPN server and to the authentication server. The commands and responses are communicated using a challenge-response protocol (e.g., RADIUS) implemented by the VPN client-server. | 2014-05-01 |
20140123232 | PROVIDING NETWORK ACCESS TO A DEVICE ASSOCIATED WITH A USER ACCOUNT - A system and method for registering a client device to obtain network access from a provider device. A server receives an authorization request for a user account to provide network access from provider devices associated with the user account to client devices associated with the user account. The server receives a unique identifier for each of the client devices, and provides the unique identifier for each of the client devices to each of the provider devices. The server provides an indication to at least one provider device to monitor for a request for network access from at least one client device, the request from the client device comprising the unique identifier of the client device. The provider device is configured to provide network access information to the client device in response to the request. | 2014-05-01 |
20140123233 | VERIFICATION OF NETWORK DEVICE POSITION - In one aspect of the invention, a method for verifying locations of devices is provided. The method is implemented in a system having at least a client device, a network device and a server (collectively the “endpoints”.) At least a first token, a device listing information and an authorization parameter are transmitted in the system via a browser or any web application, to enable endpoints to verify that the client device has logged in to the server and the client device and the network device are in a same network. In another embodiment, a method for verifying locations of devices implemented on a server is provided. In yet another embodiment, a method for verifying locations of devices implemented on a network device is provided. | 2014-05-01 |
20140123234 | USER TERMINAL, RELIABILITY MANAGEMENT SERVER, AND METHOD AND PROGRAM FOR PREVENTING UNAUTHORIZED REMOTE OPERATION - It is possible to effectively prevent an unauthorized remote operation of a terminal. A user terminal provides a user with higher precision information related to execution determination of a program to be executed, by detecting, from the program, a command for performing a remote operation with a remote operation terminal, temporarily stopping the execution of the program, and inquiring of a reliability management server about the reliability. | 2014-05-01 |
20140123235 | Allocating Memory Access Control Policies - Enabling access control caches for co-processors to be charged using a VMX-nonroot instruction. As a result a transition to VMX-root is not needed, saving the cycles involved in such a transition. | 2014-05-01 |
20140123236 | IMAGE FORMING APPARATUS, INFORMATION PROCESSING METHOD, AND STORAGE MEDIUM - An image forming apparatus that communicates with an external apparatus includes receiving local login information regarding a local login to the image forming apparatus, determining, if a request for a URL for authorization without web access authentication is received, whether an internal communication address is used, requesting, if it is determined that the internal communication address is used, authorization request for the external apparatus, and managing an authorization token acquired by requesting the authorization request and the local login information by associating the authorization token with the local login information. | 2014-05-01 |
20140123237 | SECURE CONTENT SHARING - Convenient sharing of information among authorized network users may be facilitated by allowing a user to send information originating from multiple applications in aggregate form to another user, e.g., using a secure messaging service. In scenarios where data access is restricted, a server may check the recipient's access privileges prior to forwarding the information to her. | 2014-05-01 |
20140123238 | ACCESSING PRIVILEGED OBJECTS IN A SERVER ENVIRONMENT - Accessing privileged objects in a server environment. A privileged object is associated with an application comprising at least one process resource and a corresponding semi-privileged instruction. The association is filed in an entity of an operating system kernel. A central processing unit (CPU) performs an authorization check if the semi-privileged instruction is issued and attempts to access the privileged object. The CPU executes the semi-privileged instruction and grants access to the privileged object if the operating system kernel has issued the semi-privileged instruction; or accesses the entity if a process resource of the application has issued the semi-privileged instruction to determine authorization of the process resource to access the privileged object. Upon positive authorization the CPU executes the semi-privileged instruction and grants access to the privileged object, and upon authorization failure denies execution of the semi-privileged instruction and performs a corresponding authorization check failure handling. | 2014-05-01 |
20140123239 | SYSTEM, SERVICE PROVIDING DEVICE, AND SERVICE PROVIDING METHOD - A service providing device includes a requesting unit for receiving, from the device operated by a user, a request for a process of using a service providing system having a different authentication base, and making a request to acquire authorization information for using the service providing system; a substitute authentication unit for acquiring authentication information of the service providing system from a second storage when the authorization information associated with the user is not stored in a first storage, and acquiring the authorization information from the service providing system by using the authentication information; and a providing unit for providing the authorization information stored in the first storage when the authorization information associated with the user is stored in the first storage, and providing the authorization information acquired from the service providing system when the authorization information associated with the user is not stored in the first storage. | 2014-05-01 |
20140123240 | SYSTEM AND SERVICE PROVIDING APPARATUS - A disclosed system having a first service providing system providing a service to an apparatus and a second service providing system having an authentication infrastructure different from that of the first service providing system includes a connection destination changing unit receiving a permission request, from an apparatus operated by a first user, of requesting that a second user uses the second service providing system, changes a connection destination of the apparatus to the second service providing system, and causes the second service providing system to perform a permission process; an authority information acquiring unit receiving permission information indicating that the permission request is admitted from the apparatus and acquires post-permission authority information by using the permission information; and an authority information providing unit providing the post-permission authority information associated with the second user based on a request for a process received from another apparatus operated by the second user. | 2014-05-01 |
20140123241 | METHOD AND SYSTEM FOR ENABLING AND DISABLING EXECUTION OF COMPUTER INSTRUCTIONS - In a computer implemented method or system, users are enabled to associate usage rights with at least a first entity and a second entity. The first entity and second entity are selected from different ones of the module, a processing circuitry and the one or more files. Execution of the module is only enabled when the associated usage rights allow both use of the first entity by the second entity and use of the second entity by the first entity, i.e. mutual usage rights for at least two entities exist. Execution of the module is disabled when the associated usage rights prevent at least one of use of the first entity by the second entity and use of the second entity by the first entity. | 2014-05-01 |
20140123242 | BUSINESS METHOD INCLUDING HANDSHAKE PROTOCOL TO CONTROL ACTORS AND FUNCTIONS TO PROPAGATE ACCEPTANCE OF AN IP LICENSE TO SECURELY AUTHENTICATE SOFTWARE APPLICATION PROGRAM INTERFACES (APIs) - A system for securely authenticating software Application Program Interfaces (APIs) includes a handshake protocol that enables promulgation of licensing rights controlling Intellectual Property (IP) to multiple Actors. The handshake is a Challenge-Response protocol that includes a Challenge issued by one Actor who controls IP rights to verify a second Actor has Licensed IP rights when the second Actor Response includes use of a function IPF1. The function e.g. IPF1 is provided through the IP licensing agreement. Other Actors who wish to use software that the first Actor provides will be encouraged to acquire rights to the IP License to obtain the function IPF1 for access. Subsequent Actors who have IP rights controlled by another function IPF2 can be pulled into the same IP Licensing system, or another IP License that becomes part of the same ecosystem with the system controlled using function IPF1. | 2014-05-01 |
20140123243 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR AUTHENTICATING AND AUTHORIZING AN EXTERNAL ENTITY - In accordance with embodiments, there are provided mechanisms and methods for authenticating and authorizing an external entity. These mechanisms and methods for authenticating and authorizing an external entity can enable improved data security, more efficient data transfer, improved data access channels, etc. | 2014-05-01 |
20140123244 | AUTHENTICATING A DATA ACCESS REQUEST TO A DISPERSED STORAGE NETWORK - A method begins by a data accessing module of a dispersed storage network (DSN) sending a data access request to a data storage module. The method continues with the data storage module sending an authentication request to an authenticating module. The method continues with the authenticating module outputting a verification request destined for the data accessing module, wherein the verification request includes a verification code that is generated based on the authentication request. The method continues with the data accessing module outputting a verification response that includes a modified verification code that is generated based on the verification code and a credential. The method continues with the authenticating module outputting an authentication response to the data storage module, wherein the authentication response is generated based on the verification response. The method continues with the data storage module facilitating the data access request when the authentication response is favorable. | 2014-05-01 |
20140123245 | Security Configuration - An example embodiment of the present invention provides an apparatus including at least one processor; and at least one memory including executable instructions, the at least one memory and the executable instructions being configured to, in cooperation with the at least one processor, cause the apparatus to perform at least the following: retrieving, from a reputation server, reputation data of uniform resource locators (URL) of one or more web sites relating to one or more web site features that are available via the web site; and determining executable web site features on the basis of the retrieved reputation data. | 2014-05-01 |
20140123246 | MULTI-OCCUPANT STRUCTURE IN A GEO-SPATIAL ENVIRONMENT - A method, apparatus, and system of multi-occupant structure in a geo-spatial environment are disclosed. This embodiment includes a central module of a mapping server to determine, using a processor and a memory, that a marker is colliding with another marker simultaneously displayed in a map based on an overlap area of the marker with another marker, automatically create a group pointer that replaces the marker and another marker on the map, generate a view of the marker and the another marker when a user selects the group pointer, and generate a multiple-structure group pointer when the marker and the another marker are associated with adjacent structures which are not shared by occupants identified through the marker and another marker. | 2014-05-01 |
20140123247 | NEXTDOOR NEIGHBOR CONNECT - A method, apparatus and system of authenticating a particular user of a third-party application as being a verified user of a neighborhood communication system having a verified residential address in the neighborhood communication system are disclosed. In one embodiment a verification module of a privacy server authenticates a particular user of a third-party application as being a verified user of the neighborhood communication system having a verified residential address in the neighborhood communication system, communicates a social graph of the particular user based on the personal address privacy preference of the particular user to the third-party application, and provides the verified residential address to the third-party application based on the authentication of the particular user of the third-party application as being the verified user of the neighborhood communication system. | 2014-05-01 |
20140123248 | COMMUNICATION BETWEEN AUTHENTICATION PLUG-INS OF A SINGLE-POINT AUTHENTICATION MANAGER AND CLIENT SYSTEMS - Various arrangements for providing authentication information to a user are presented. A single-point authentication manager executed by a computer system may receive a request to access a resource from a remote client computer system. The single-point authentication manager may manage access to a plurality of resources including the resource. The single-point authentication manager may communicate with an authentication plug-in application that performs a type of authentication. Authentication of the user may be performed. In response to performing authentication of the user, the authentication plug-in application may generate a message to be transmitted to the remote client computer system. The message may include an indication that the message is to be passed to the remote client computer system and information regarding the authentication of the user. In response to receiving the message from the authentication plug-in application, the message may be transmitted to the remote client computer system. | 2014-05-01 |
20140123249 | Behavioral Fingerprinting Via Corroborative User Device - Disclosed herein are example embodiments for behavioral fingerprinting via corroborative user device. For certain example embodiments, one or more devices may (i) ascertain at least one indicator of a proximity of at least one corroborative user device that is affiliated with a behavioral fingerprint and (ii) incorporate the at least one indicator of a proximity of the at least one corroborative user device into an authentication-related analysis for a user device that is associated with the behavioral fingerprint. However, claimed subject matter is not limited to any particular described embodiments, implementations, examples, or so forth. | 2014-05-01 |
20140123250 | SECURITIZATION OF DEVELOPER CREDENTIALS - Technologies are generally described for systems and methods configured to provide developer credentials to a device. In some examples, a developer device may be configured to send a registration request relating to a program to a service server. In response, the developer device may receive first information. A processor in a user device may be configured to store the program and the first information. The processor may execute at least part of the program to send a first request, including the first information, to a platform server. The processor may be further configured to receive second information in response. The processor may execute the program using the first and second information to generate a second request. The second request may include the second information and may be sent to a service server different from the platform server. | 2014-05-01 |
20140123251 | SYSTEM FOR PROVIDING CONTENT OR APPLICATION AND CONTROL METHOD THEREFOR, TERMINAL AND CONTROL METHOD THEREFOR, AUTHENTICATION DEVICE AND CONTROL METHOD THEREFOR, PROGRAM, AND INFORMATION STORAGE MEDIUM - To provide a system for providing content or an application capable of restricting a terminal device in which the content or the application is able to be used to a single terminal device among one authorized terminal device and one or more unauthorized terminal devices. According to a generation rule, a new authentication symbol string is generated based on at least a part of an authentication symbol string stored in a first authentication symbol string storage unit ( | 2014-05-01 |
20140123252 | Integrating a Router Based Web Meter and a Software Based Web Meter - A method for associating a web event with a member of a group of users is implemented at a first computing device. The method includes: receiving a data access request from a second computing device; determining whether the user has previously provided personal information and authorization to the first computing device through the second computing device; if the user's personal information and authorization are found: generating a record for the data access request; if the user's personal information is found but the user's authorization is not found: generating a record for the data access request; and if neither of the user's personal information and authorization is found: identifying one or more user identifiers that are associated with the second computing device; and returning personal information associated with the one or more user identifiers to the second computing device. | 2014-05-01 |
20140123253 | Behavioral Fingerprinting Via Inferred Personal Relation - Disclosed herein are example embodiments for behavioral fingerprinting via inferred personal relation. For certain example embodiments, at least one indication of personal relation for at least one authorized user may be inferred via at least one user-device interaction, and the at least one indication of personal relation may be incorporated into at least one behavioral fingerprint that is associated with the at least one authorized user, with the at least one behavioral fingerprint including one or more indicators of utilization of one or more user devices by the at least one authorized user. | 2014-05-01 |
20140123254 | WEBSITE RELATIONSHIP AND SHARING ACCOUNT - A relationship and sharing account system includes computing devices configured to execute modules including a user account module configured to store a plurality of user accounts, each corresponding to a user and including user information, at least some of which is accessible to other users, a login module, a communication module configured to obtain information sharing requests, which specify the sharing of information to other users, a sharing account creation module configured to create a user sharing account linked to an existing user account and corresponding to a subsidiary user, and an information duplication module configured to a) automatically copy information in a user sharing request input by the subsidiary user to the linked user account; or b) notify the user corresponding to the linked user account when an information sharing request is input by the subsidiary user and require approval before sharing the information with other users. | 2014-05-01 |
20140123255 | SYSTEM AND METHOD FOR DEVICE AUTHENTICATION WITH BUILT-IN TOLERANCE - A system for building tolerance into authentication of a computing device includes a means for executing, from a computer-readable medium, computer-implementable steps of: (a) receiving and storing a first digital fingerprint of the device during a first boot of an authenticating software on the device, the first digital fingerprint based on a first set of device components, (b) receiving a second digital fingerprint from the device at a subsequent time, (c) comparing the second digital fingerprint with a plurality of stored digital fingerprints of known devices, (d) in response to the comparison indicating a mismatch between the second digital fingerprint and the plurality of stored digital fingerprints, generating a request code comprising instructions for the device to generate a third digital fingerprint using the first set of device components, (e) sending the request code to the remote device, (f) receiving the third digital fingerprint from the remote device in response to the request code, and (g) authenticating the device based on a comparison of the first and third digital fingerprints. | 2014-05-01 |