35th week of 2015 patent applcation highlights part 69 |
Patent application number | Title | Published |
20150244599 | MANAGEMENT SYSTEM - A management system manages a computer system including a plurality of types of managed objects. A storage device of the management system stores one or more meta-rules indicating a correspondence relationship between a cause event and one or more influence events, as well as change frequency information indicating a change frequency for each relation between the types of managed objects. A control device of the management system divides, on the basis of the change frequency information, a first relation group indicating a connection configuration within a rule for a first meta-rule, into a second relation group configured by a relation in which a change frequency is equal to or larger than a predetermined value, and a third relation group configured by a relation in which a change frequency is less than a predetermined value, and divides a first meta-rule into a second meta-rule in which the connection configuration indicated by the second relation group is the connection configuration within a rule, and a third meta-rule in which the connection configuration indicated by the third relation group is the connection configuration within a rule. | 2015-08-27 |
20150244600 | STRUCTURED LOGGING SCHEMA OF USAGE DATA - Technologies are generally described to provide a logging schema to track requests processed by a service. A request may be received at a collaborative service, and the request may be processed by one or more subsystems of the service to fulfill the request. The logging schema may be configured to track user requests as each request is received and processed at each individual subsystem of the collaborative service. A logging entry may be created at a data store of the service, where the logging entry includes a subsystem name, an operation performed by the subsystem to fulfill the request, error information, and start and end times of the operation. The logging schema may enable continuous monitoring of a performance of the system, such as which operations take the most time, which operations have the most success and the least success, and which features are most popular based on usage data. | 2015-08-27 |
20150244601 | COMPENSATION PROCEDURE FOR EXCESS TRANSMISSION OPPORTUNITY TIME - Methods, systems, and devices are described for efficient use of transmit opportunities (TXOPs) through adjustment of contention window backoff time values to compensate for one or more TXOPs that may exceed a TXOP limit. A contention window value may be increased, for example, to provide other devices in the network with a fair opportunity for network access based at least in part on one or more TXOPs that exceed the TXOP limit. Allowing one or more transmissions to exceed a TXOP limit may provide enhanced efficiency as compared to having multiple transmissions. | 2015-08-27 |
20150244602 | Maintaining Consistency within a Federation Infrastructure - The present invention extends to methods, systems, and computer program products for a joining node to join a ring of nodes within a rendezvous federation. Embodiments of the invention include establishing a neighborhood of multiple nodes on the ring of nodes. The joining node indicates its intent to take id-space ownership for a portion of the id-space between the joining node and a selected immediately adjacent node. The joining node initiates a one-way monitoring relationship with the selected immediately adjacent node. The joining node receiving an indication from the selected immediately adjacent node that indicates acceptance of the joining node's intent to take id-space ownership for a portion of the id-space between the joining node and the selected node and indicates establishment of a one-way monitoring relationship between the selected node and the joining node. The joining node agrees to participate in a one-way monitoring relationship with the selected node. | 2015-08-27 |
20150244603 | DETERMINING METHOD AND SYSTEM - A computer obtains first information related to a first communication path that is from a first aggregating apparatus to a second aggregating apparatus when the second aggregating apparatus receives a transmission signal that is from sensor nodes in response to a transmission instruction that is transmitted by the first aggregating apparatus and propagated by multi-hop communication via the sensor nodes. The computer obtains from a storage apparatus, second information that is related to a second communication path that is a stationary path from the first aggregating apparatus to reception by the second aggregating apparatus. The computer determines correspondence of the first communication path and the second communication path by comparison of the first information and the second information, and if the first communication path and the second communication path do not correspond, the computer determines that an abnormality related to a sensor node is present. | 2015-08-27 |
20150244604 | TESTING POWERLINE COMMUNICATION DEVICES - Testing procedures and associated messaging can be performed via powerline communication (PLC) medium. A first device can test a second device using management messages via the PLC medium. For example, the first device may transmit a test setup request message including at least one test parameter to the second device via the PLC medium. The first device may conduct a test of the second device in accordance with the at least one test parameter. The first device may determine a first performance metric associated with the test. The first performance metric can describe at least one of a PLC interface of the second device and the PLC medium between the first device and the second device. Test results can be translated to a common format for comparison to traditional tests which may be based on Ethernet performance metrics. | 2015-08-27 |
20150244605 | METHOD FOR EXCHANGING INFORMATION FOR ESTABLISHING A PATH BETWEEN TWO NODES OF A COMMUNICATION NETWORK - An exemplary method and apparatus are provided for exchanging information for establishing a path between a first node and a second node of a communication network. The first node and the second node are adapted to send continuity check messages to monitor the established path. The technique includes generating, at the first node and at the second node, at least one link state message according to a routing protocol; inserting continuity check link state information into the at least one link state message; and exchanging between the first node and the second node, the link state messages for computing the path. The continuity check link state information are indicative of at least one rate of transmission of the continuity check messages supported by the first node and the second node. | 2015-08-27 |
20150244606 | METHOD FOR LOOPBACK DETECTION AND NETWORK DEVICE UTILIZING THE SAME - A method for loopback detection includes: receiving a loopback detection frame by a port; detecting and determining whether the loopback detection frame is transmitted via the port; analyzing the loopback detection frame and determining whether a loopback has occurred in a network device when the loopback detection frame is transmitted via the port; when the loopback has occurred, determining the loopback has occurred in which of one or more virtual local area networks (VLANs) that the port joins in; blocking the VLAN(s) that the port transmitting the loopback detection frame joins in and in which the loopback occurred, for the port being unable to transmit any packet in the blocked VLAN(s); and when the loopback has not occurred, dropping the loopback detection frame. | 2015-08-27 |
20150244607 | Software Defined Networking (SDN) Specific Topology Information Discovery - Disclosed herein is a mechanism for discovering SDN specific topology information in a SDN interconnection network. SDN specific topology information may comprise SDN IDs, SDN member router ID lists, and SDN address lists. A SDNC associated with a local SDN domain in the SDN interconnection network may determine a set of routers and/or links in the local SDN domain for link advertisement and may associate the set of routers with the local SDN domain. The SDNC may further determine a set of border routers in the local SDN domain for broadcasting the link advertisements and SDN specific topology information to other interconnected SDN domains. The SDNC may receive link advertisement and SDN specific topology information from other interconnected SDN domains and may compute a best path through each router and/or link across the SDN domains. | 2015-08-27 |
20150244608 | REACTIVE SOURCE ROUTING ASSOCIATED WITH A NETWORK - An initiation of a network device on a host system may be detected and an IP address may be assigned to the network device. Furthermore, a network gateway may be associated with the IP address. In some embodiments, a network may be assigned to the network device. The network may be configured to route outgoing data from the network through the network gateway as opposed to a default network gateway. | 2015-08-27 |
20150244609 | AUTOMATIC AGGREGATION OF INTER-DEVICE PORTS/LINKS IN A VIRTUAL DEVICE - A virtual device includes multiple devices connected to operate as a single device. A first one of the devices is configured to determine that the first device connects to a second one of the devices via a first link; identify a second link; determine that the second link connects the first device to the second device; and automatically aggregate the first link and the second link to form a link aggregation with the second device based on determining that the first device connects to the second device via both the first and second links. The first device is further configured to transmit packets to the second device via the first and second links of the link aggregation. | 2015-08-27 |
20150244610 | CONTROL DEVICE DISCOVERY IN NETWORKS HAVING SEPARATE CONTROL AND FORWARDING DEVICES - A Software Defined Network (SDN) includes a plurality of forwarding devices and a routing control device located separate from the forwarding devices. The routing control device, establishes paths to and from the network forwarding devices. Using such paths, forwarding devices send the routing control device information reflecting the topology if the network. Embodiments disclosed herein enable automatic discovery of the topology of the network and the paths to and from the routing control device. | 2015-08-27 |
20150244611 | SYSTEM, DEVICE, AND METHOD FOR COMMUNICATING DATA OVER A MESH NETWORK - Devices and computer-implemented methods for controlling data communication to one or more devices in a network, e.g., a mesh network. The methods include a device broadcasting data requested by a first device, and a second device eavesdropping on the broadcast of the data in order to capture the data and to storing the captured data if the data is appropriate for the second device. | 2015-08-27 |
20150244612 | RELAYING APPARATUS AND STORAGE APPARATUS - A relaying apparatus placed between a control apparatus and a storage device in a storage apparatus includes a first connection unit, a second connection unit and a processor. The first connection unit is connected to a storage device. A detecting unit detects a link-down of the first connection unit. The processor executes a process in which, the address of the storage device that was connected to the first connection unit when the link-down has occurred to the first connection unit matches the address of the storage device connected to the second connection unit when the link-up has occurred to the second connection unit, and an access request is given from the control apparatus with an attached first identifier that identifies the first connection unit, data is forwarded via the second connection unit. | 2015-08-27 |
20150244613 | Contextual Summarization Tag And Type Match Using Network Subnetting - Techniques are presented herein to distribute the processing of communication to network-connected devices to routing nodes, as opposed to centralizing those operations in one device as in the traditional/classical system. Using a bitmapped Type field, advertisements and queries can be categorized. Also, by using a Subgroup field, the scope of advertisements and queries can be dynamically limited. These techniques reduce the number of matches and make the matches more relevant to the user who sent the query. Routing nodes can be any network element that routes traffic, physical or virtual (cloud-based router or switch). The intelligence to perform these techniques can be embodied as an overlay on top of a physical network. | 2015-08-27 |
20150244614 | METHOD AND APPARATUS FOR NODE REALIGNMENT IN A TELECOMMUNICATIONS NETWORK - A method of realigning a node in a label switched network comprising a plurality of nodes and a node with a processor, a memory, and a network interface, for carrying out the method. The method includes periodically maintaining backup path status information for the node., restarting the node, and re-establishing label switched paths with the plurality of nodes using the backup status information. Communication with adjacent nodes is carried out in order to reconcile the path status information with respective path status information in the adjacent nodes in order to establish node realignment preferably judged against a threshold value for path reliability. | 2015-08-27 |
20150244615 | NEIGHBOR-LABEL DISTRIBUTION WITH LABEL DISTRIBUTION PROTOCOL - Label Distribution Protocol (LDP) extensions are described that enable distribution of neighbor-label mappings for directly connected neighbor routers. A router capable of supporting the LDP extensions distributes neighbor-labels to be used by the router to label switch traffic destined for the directly connected neighbor router irrespective of a hop-by-hop Interior Gateway Protocol (IGP) path determined based on link metrics. In some examples, the neighbor-labels may increase backup coverage, e.g., link protection and/or node protection, in a network that, due to link metrics, does not have a viable loop-free alternate (LFA) path between an ingress router and an egress router of a label switched path (LSP). In other examples, the neighbor-labels may improve load balancing by enabling an ingress router in a first autonomous system (AS) to select a particular remote link on which to send traffic destined for remote routers in a second AS. | 2015-08-27 |
20150244616 | ROUTING A MESSAGE IN A DYNAMIC SERVICE MESH - An example method for routing a message in a dynamic service mesh includes receiving at a mesh point a first message from a sender service and determining, based on a routing table, whether the mesh point has previously received a second message from the sender service. When the mesh point is determined to not have received the second message from the sender service, the first message is routed to a target service in the dynamic service mesh. The method includes receiving an indication of whether the first message has been accepted by the target service and updating the routing table based on the indication. When the indication indicates that the first message has been rejected by the target service, the first message is routed from the mesh point to a second target service. | 2015-08-27 |
20150244617 | PHYSICAL PATH DETERMINATION FOR VIRTUAL NETWORK PACKET FLOWS - In general, techniques are described for configuring and managing virtual networks. For example, a distributed virtual network controller is described that configures and manages an overlay network within a physical network formed by plurality of switches. A plurality of servers are interconnected by the switch fabric, each of the servers comprising an operating environment executing one or more virtual machines in communication via the overlay networks. The servers comprises a set of virtual switches that extends the overlay network as a virtual network to the operating environment of the virtual machines. The controller may instruct the servers and the virtual switches to perform various operations, such as determining a physical network path taken by packets of a network packet flow, determining latency through the network, re-routing traffic in the virtual network due to network events, replicating traffic for multicasting, providing multi-tenant services to support multiple virtual networks, monitoring and logging traffic characteristics within the virtual networks and other operations. | 2015-08-27 |
20150244618 | BASEBAND UNIT (BBU) IMPLEMENTATION FOR FACILITATING 6LOWPAN DATA ACCESS - A scheme for providing access to 6LoWPAN data in a wireless access network. In one embodiment, a Digital Unit (DU) of the wireless access network is provided with IP bridging functionality for packaging 6LO data as a control channel message. When the DU element receives 6LO data from an external router, the data is packaged in a format specified for a control channel associated with a CPRI link coupling to a Radio Unit (RU). The bridging functionality is operative to transmit the control channel message (including the packaged 6LO data packets) to the RU element based on an address mapping between the destination IP address of the 6LO data packets and an address of the 6LO endpoint coupled to the RU element. | 2015-08-27 |
20150244619 | COMMUNICATION METHODS AND COMMUNICATION DEVICES - According to various embodiments, a communication method may be provided. The communication method may include: at least one of sending a data unit or receiving a data unit; wherein the data unit is a null-data packet (NDP) and includes at least a physical layer (PHY) header; wherein the PHY header includes a plurality of fields; and wherein the plurality of fields include a sub-type field with at least 3 bits indicating a NDP sub-type of the data unit. | 2015-08-27 |
20150244620 | METHOD AND APPARATUS FOR AGGREGATING AND ENCODING RECEIVED SYMBOLS INCLUDING GENERATION OF A POINTER FOR A CONTROL CODE - A data processing system including an interface and an encoder. The interface is configured to receive first symbols from one or more ports. The interface is configured to aggregate a predetermined number of the first symbols to provide second symbols. The encoder is configured to (i) generate a header, and (ii) encode the second symbols to generate third symbols, where the header indicates whether the third symbols include a set of control codes. Responsive to the third symbols including the set of control codes, the encoder is configured to generate a pointer for the set of control codes, where the pointer can assume more values than are in the set of control codes. | 2015-08-27 |
20150244621 | APPLICATION LABELS FOR DATA COMMUNICATION - A communication device executes multiple applications that generate application data. The communication device determines application labels that individually identify the executing applications. The communication device inserts the application data in layer three communication payloads and inserts the application labels in layer three communication headers to individually associate the executing applications with their layer three communication headers and their application data. The communication device inserts the layer three communication headers and the layer three communication payloads in layer two communication payloads. The communication device transfers the layer two communication payloads with layer two headers. In some examples, the communication device inserts the application labels in the layer two communication headers to individually associate the executing applications with their layer two communication headers and their application data. | 2015-08-27 |
20150244622 | METHOD AND DEVICE FOR PROCESSING PACKET CONGESTION - Provided are a method and device for processing packet congestion. The method includes: receiving a packet fragment of a packet and fragment parameters and acquiring congestion parameters required for processing packet congestion according to the fragment parameters; when the packet fragment is an SOP fragment in the packet, acquiring an average queue size and a size threshold of the packet according to the fragment parameters and the congestion parameters and processing the packet. By acquiring the average queue size and the size threshold of the packet according to the fragment parameters and congestion parameters received and processing the packet according to the relationship between the average queue size and the size thresholds when a packet fragment received is an SOP fragment, the solution effectively eliminate the packet congestion in a communication network, accelerate the operation speed of processing the packet congestion and greatly save an internal cache space. | 2015-08-27 |
20150244623 | MESH PROFILING - An analysis device for analysing a communication network comprising a plurality of communication devices, the communication network being configured such that transport of packets through the network is provided by the communication devices in the network listening for and relaying packets, the analysis device being configured to: receive a traffic statistics log from a profile device, the traffic statistics log comprising a traffic statistics message from each of the plurality of communication devices, each traffic statistics message comprising data defining at least one reception property of the reception of at least one probe message at the respective communication device; and identify, based on the at least one reception property, at least one restriction point communication device from the plurality of communication devices that is a restriction point in the network. | 2015-08-27 |
20150244624 | PACKETIZED RADIO FREQUENCY TRANSPORT SYSTEM - Means for transporting multi-band RF spectrum over a digital network including: means for converting radio frequency signal into internet protocol packets; means for time stamping and preserving timing for the converted radio frequency signal; and means for transporting the radio frequency signal using a radio transport standard. | 2015-08-27 |
20150244625 | METHOD AND APPARATUS FOR CONTROLLING CALL VOLUME - A method and apparatus for controlling a call volume for an office that serves as a protecting site for another office in a packet network are disclosed. For example, the method collects one or more customer registration counts from one or more session border controllers located in a first office, determines if the one or more customer registration counts have reached or exceeded a threshold. The method directs all of said one or more session border controllers located in said first office to enact one or more throttling rules if the one or more customer registration counts have reached or exceeded the threshold. | 2015-08-27 |
20150244626 | IDENTITY-AWARE LOAD BALANCING - A method, system, and computer program product for identity-aware load balancing are provided in the illustrative embodiments. A sender of a packet is identified using an attribute communicated with the packet. The attribute is sufficient to identify a sender of the packet. The packet is directed to a set of resources managed by a load balancing application. A rule corresponding to the sender is selected. The rule is executed to identify a characteristic of an algorithm usable in a load balancing operation of the load balancing application. The packet and the identified characteristic of the algorithm are communicated to the load balancer. The communicating causes the load balancer to select an algorithm for a load balancing operation with the packet such that the selected algorithm includes the identified characteristic of the algorithm. | 2015-08-27 |
20150244627 | INFORMATION PROCESSING SYSTEM AND CONTROL APPARATUS AND METHOD - This system includes: plural first information processing apparatuses on which a virtual machine that belongs to either of plural subnets; plural second information processing apparatuses on which a virtual router used for communication between subnets; a controller that controls communication paths within a subnet, deployment of the virtual machine and deployment of the virtual router; and plural switches that connects the plural first information processing apparatuses, the plural second information processing apparatuses and the controller. The controller selects any one of the virtual machine, the virtual router and a communication path within any one of the plural subnets based on a predetermined evaluation value concerning a communication amount for each first information processing apparatus and a predetermined evaluation value concerning a communication amount for each switch, and changes deployment destination of the selected virtual machine or the selected virtual router or the selected communication path. | 2015-08-27 |
20150244628 | ADVERTISING TRAFFIC ENGINEERING INFORMATION WITH BORDER GATEWAY PROTOCOL - In general, techniques are described for distributing traffic engineering (TE) link information across network routing protocol domain boundaries using a routing protocol. In one example, a network device logically located within a first routing protocol domain includes a routing protocol module executing on a control unit to execute an exterior gateway routing protocol. The routing protocol module of the network device receives an exterior gateway routing protocol advertisement from a router logically located within a second routing protocol domain and decodes traffic engineering information for a traffic engineering link from the exterior gateway routing protocol advertisement. A path computation module of the network device computes a traffic engineered path by selecting the traffic engineering link for inclusion in the traffic engineered path based on the traffic engineering information. | 2015-08-27 |
20150244629 | END TO END FLOW CONTROL - A network device implementing the subject system for end to end flow control may include at least one processor circuit that may be configured to detect that congestion is being experienced by at least one queue of a port and identify another network device that is transmitting downstream traffic being queued at the at least one queue of the port that is at least partially causing the congestion. The at least one processor circuit may be further configured to generate an end to end flow control message that comprises an identifier of the port, the end to end flow control message indicating that the downstream traffic should be flow controlled at the another network device. The at least one processor circuit may be further configured to transmit, out-of-band and through at least one intermediary network device, the end to end flow control message to the another network device. | 2015-08-27 |
20150244630 | IPoE DUAL-STACK SUBSCRIBER FOR ROUTED RESIDENTIAL GATEWAY CONFIGURATION - A network element implements a method to support a plurality of network services between a residential gateway and the network element over non-channelized media using a single subscriber session. The method includes receiving from a residential gateway a request for a network service that includes a Media Access Control (MAC) address of the residential gateway, determining whether the MAC address of the residential gateway matches a MAC address of an existing subscriber session for a previously configured network service, and upon determining that the MAC address of the residential gateway matches the MAC address of the existing subscriber session, consolidating a subscriber session for the network service and the existing subscriber session into a single dual-stack session. The method further includes enabling the residential gateway to access the network service where the network service and the previously configured network service are managed by the single dual-stack session. | 2015-08-27 |
20150244631 | DEDICATING RESOURCES OF A NETWORK PROCESSOR - Disclosed herein are techniques for dedicating resources of a network processor. An interface to dedicate resources of a network processor is displayed. Decisions of the network processor are preempted by the selections made via the interface. | 2015-08-27 |
20150244632 | SLOTTED MESSAGE ACCESS PROTOCOL FOR POWERLINE COMMUNICATION NETWORKS - A slotted message access protocol can be implemented for transmitting short packets. Each beacon period may be divided into multiple time slots. At least one time slot may be assigned to a network device per beacon period based, at least in part, on latency specifications of packets that the network device is configured to transmit. In one example, some of the unassigned time slots may be designated as contention-based time slots. Network devices may contend with each other to gain control of and transmit packets during a contention-based time slot based on the priority level of the packets to be transmitted. Network devices may also use an encryption key and an initialization vector for securely exchanging short packets. Furthermore, a repeater network device may be designated to retransmit a packet, received from an original transmitting network device, during a communication time slot assigned to the original transmitting network device. | 2015-08-27 |
20150244633 | METHODS AND APPARATUS FOR PATH SELECTION WITHIN A NETWORK BASED ON FLOW DURATION - In some embodiments, an apparatus includes a forwarding module that is configured to receive a group of first data packets. The forwarding module is configured to modify a data flow value in response to receiving each first data packet. The forwarding module is also configured to store each first data packet in a first output queue based on the data flow value not crossing a data flow threshold after being modified. Furthermore, the forwarding module is configured to receive a second data packet. The forwarding module is configured to modify the data flow value in response to receiving the second data packet, such that the data flow value crosses the data flow threshold. The forwarding module is configured to store the second data packet in a second output queue based on the data flow value having crossed the data flow threshold. | 2015-08-27 |
20150244634 | APPARATUS, METHOD AND SYSTEM OF RATE ADAPTATION BASED ON GOODPUT - Some demonstrative embodiments include devices, systems and methods of to rate adaptation based on goodput. For example, an apparatus may include a packet selector to select at a first device a plurality of goodput packets from a plurality of received packets from a second device, the packet selector to select the plurality of goodput packets based on at least one selection parameter corresponding to the plurality of received packets; a band calculator to calculate a bit-rate band based on a dispersion of a goodput parameter corresponding to the plurality of goodput packets; and a feedback module to provide a bit-rate adaptation feedback to the second device based on the bit-rate band. | 2015-08-27 |
20150244635 | PACKET PRIORITIZING IN AN INDUSTRIAL WIRELESS NETWORK - A wireless communication device providing a node in the network includes a wireless transmitter, a wireless receiver, a transmission buffer, and a packet prioritizing unit configured to obtain data relating to packets to be transmitted in the network, obtain indications of the remaining lifetime of the packets, where the indications are based on the time needed for reaching a destination node, prioritize the packets according to the remaining life time indications, where the prioritization is made in ascending order from an indication of a low remaining life time to a high remaining lifetime, and place the packets in the transmission buffer for transmission according to the prioritization. | 2015-08-27 |
20150244636 | METHOD AND SYSTEM FOR RATE ADAPTION OF HTTP STREAM MEDIA - A method and apparatus for rate adaption of HTTP stream media is disclosed in this invention. The method comprises: acquiring from a server a stream media with a selected video rate at a client adopting the TCP protocol at its transmission layer and the HTTP protocol at its application layer, wherein the selected video rate allows an amount of buffered data to be maintained in a predetermined range in a buffer for buffering the stream media under a current download rate speed. This invention may improve user experience. | 2015-08-27 |
20150244637 | Exporting Real Time Network Traffic Latency and Buffer Occupancy - Techniques are presented herein to facilitate the monitoring of occupancy of a buffer in a network device. Packets are received at a network device. Information is captured describing occupancy of the buffer caused by packet flow through the buffer in the network device. Analytics packets are generated containing the information. The analytics packets from the network device for retrieval of the information contained therein for analysis, replay of buffer occupancy, etc. | 2015-08-27 |
20150244638 | CONFIGURABLE PACING FOR MESSAGING SYSTEMS - Embodiments of the present invention provide a method, system and computer program product for configurable pacing in messaging systems. In an embodiment of the invention, a configurable message pacing method has been provided. The method includes receiving a message directed for placement in a repository of an intermediate messaging system into which messages are placed by message producing applications and from which messages are retrieved by message consuming applications. Thereafter, it can be determined if the placement of the received message into the repository will result in a breach of an associated threshold value for the repository. Consequently, a message pacing action can be triggered responsive to the determination that the placement of the received message into the repository will result in a breach of the associated threshold value for the repository. | 2015-08-27 |
20150244639 | METHOD AND APPARATUS FOR DERIVING A PACKET SELECT PROBABILITY VALUE - A method and apparatus for deriving a packet select probability value for a data packet. The method comprises determining a queue length value for a target buffer of the data packet, calculating a queue congestion value based at least partly on the queue length value and a packet select queue length range, and calculating the packet select probability value for the data packet based at least partly on an exponential function e | 2015-08-27 |
20150244640 | ARRANGEMENT AND METHOD FOR USE IN MANAGING RESOURCES OF A PLURALITY OF COMPUTING DEVICES - An arrangement for use in managing resources of a plurality of computing devices, the arrangement comprising: an interface configured to receive an indication of a parameter associated with a first computing device of the plurality of computing devices; and a migration module configured to migrate a virtual machine, or part of a virtual machine, from the first computing device to a second computing device in response to the indication received by the interface. | 2015-08-27 |
20150244641 | MOBILE COMMUNICATION SYSTEM AND USER TERMINAL - In a mobile communication system comprising a first user terminal and a second user terminal, D2D communication is radio communication directly performed between the first user terminal and the second user terminal in a frequency and a time assigned from a base station. In a time in which data is to be received from the first user terminal, when the second user terminal does not receive the data from the first user terminal, the second user terminal transmits failure notification indicating reception failure in the D2D communication to the base station. | 2015-08-27 |
20150244642 | Method and Apparatus For Supporting Scalable Multi-Modal Dialog Application Sessions - Embodiments disclosed herein enable scaling up and making advanced natural language (NLU) applications more robust. According to one embodiment, state(s) associated with a dialog session may be recorded to a non-transitory medium. The dialog session may be suspended after a given period of inactivity and later automatically awakened based on unique client, session, or device identifier, or any combination thereof. Memory and resources associated with the suspended session may be reclaimed, the memory and resources being otherwise held by the session during the period of inactivity, enabling higher density (e.g., a larger number of sessions supported). Embodiments disclosed herein obviate a need for sticky dialog sessions, enabling higher density, and may further failover protection and fault tolerance for the dialog sessions. | 2015-08-27 |
20150244643 | DATA CENTER RESOURCE ALLOCATION SYSTEM AND DATA CENTER RESOURCE ALLOCATION METHOD - A data center including: a data center infrastructure including at least one service network accessed by a terminal of a logical infrastructure user and a terminal of a resource user, at least one infrastructure network accessed by the terminal of the resource user, and at least one resource coupled to the service network and the infrastructure network; and a resource management apparatus for managing the infrastructure network, the service network, and the at least one resource, the resource management apparatus being configured to: generate, in response to a request, a logical service network, which is created by virtualizing the service network, a logical infrastructure network, which is created by virtualizing the infrastructure network, and a logical infrastructure in which the at least one resource is allocated to the logical service network and the logical infrastructure network; and provide the logical infrastructure to the terminal of the logical infrastructure user. | 2015-08-27 |
20150244644 | ACCESSING A CLOUD-BASED SERVICE USING A COMMUNICATION DEVICE LINKED TO ANOTHER COMMUNICATION DEVICE VIA A PEER-TO-PEER AD HOC COMMUNICATION LINK - Arrangements described herein relate to accessing a cloud based service. Responsive to a user of a first communication device initiating access to the cloud based service via the first communication device, a prompt for a valid password to be entered to access the cloud based service can be received by the first communication device. Responsive to the valid password required to access the cloud based service not being stored on the first communication device, the first communication device can automatically retrieve the valid password from a second communication device via a peer-to-peer ad hoc communication link between the first communication device and the second communication device. The valid password can be automatically provided, by the first communication device, to a login service for the cloud based service to obtain access by the first communication device to the cloud based service. | 2015-08-27 |
20150244645 | INTELLIGENT INFRASTRUCTURE CAPACITY MANAGEMENT - Systems and methods may include receiving first data regarding first devices in a network. The first data may include an amount of utilization of first resources in the network by each device of the first devices. The first data also may include characteristic data of each device of the first devices. Systems and methods may include determining a predictive model for utilization of each resource of second resources in the network based on the first data. Systems and methods may include predicting an amount of utilization of each resource of the second resources by second devices using the predictive model. Systems and methods may include allocating each resource of the second resources based on the predicted amount of utilization of such resource by the second devices. | 2015-08-27 |
20150244646 | DYNAMIC ALLOCATION OF WORKLOAD DEPLOYMENT UNITS ACROSS A PLURALITY OF CLOUDS - A method of selectively allocating a plurality of deployment units among a plurality of clouds. The method can include identifying a first context of a first deployment unit of a workload and identifying a second context of a second deployment unit of the workload. Based on the first context, a first of the plurality of clouds that satisfies at least one requirement indicated by the first context can be identified and the first deployment unit can be automatically allocated to the first cloud. Based on the second context, a second of the plurality of clouds that satisfies at least one requirement indicated by the second context can be identified, wherein the first cloud does not satisfy the requirement indicated by the second context, and the second deployment unit can be automatically allocated to the second cloud. | 2015-08-27 |
20150244647 | SYSTEMS, APPARATUS, AND METHODS FOR NON-BLOCKING SWITCH NETWORKS - A switch network may include a plurality of switch stages arranged in sequential stages. The plurality of switch stages may include a first switch stage connected to a plurality of inputs, a second switch stage connected to each switch in the first switch stage, a third switch connected to each switch in the second switch stage, a fourth switch stage connected to each of the switches in the third switch stage, and a fifth switch stage connected to a plurality of outputs and each switch in the fourth switch stage, and a control element configured to control each of the plurality of switch stages for routing a signal from one of the plurality of inputs to one of the plurality of outputs. | 2015-08-27 |
20150244648 | AUTO-CONFIGURATION OF A MESH RELAY'S TX/RX SCHEDULE - A communication device capable of communicating over a communication network that is configured such transport of packets through the network is provided by each communication device in the network listening for and relaying packets, the communication device comprising a relay unit configured to listen for packets and relay them over the network, a detection unit configured to identify other communication devices in the network that are also capable of acting as relay devices and a power controller configured to adjust the power that the communication device uses to listen for packets in dependence on the other devices identified by the detection unit. | 2015-08-27 |
20150244649 | MULTIPLE ETHERNET PORTS AND PORT TYPES USING A SHARED DATA PATH - In an embodiment an interface unit includes a transmit pipeline configured to transmit egress data, and a receive pipeline configured to receive ingress data. At least one of the transmit pipeline and the receive pipeline being may be configured to provide shared resources to a plurality of ports. The shared resources may include at least one of a data path resource and a control logic resource. | 2015-08-27 |
20150244650 | EFFICIENT PACKET PROCESSING AT VIDEO RECEIVER IN MULTIMEDIA COMMUNICATIONS OVER PACKET NETWORKS - Systems and methods of handling packet errors associated with multimedia data received at data receivers from data senders, in which packet error feedback information is provided by the data receivers to the data senders in one or more real-time transport control protocol (RTCP) feedback packets. The data receivers can calculate, determine, or otherwise obtain costs associated with providing specific forms of packet error feedback information in the RTCP feedback packets, and further calculate, determine, or otherwise obtain wait times for handling out-of-order packets, as well as receiving retransmissions of lost packets. By handling packet errors associated with multimedia data while taking into account such costs and wait times, each of which can have an impact on system bandwidth and/or latency, the systems and methods can more reliably achieve the quality of experience (QoE) generally desired and/or required for multimedia data transmissions. | 2015-08-27 |
20150244651 | RESILIENT ROUTING BASED ON A MULTI-CHANNEL MODEL FOR EMERGENCY MANAGEMENT - There is provided a system and method for resilient routing based on a multi-channel model for emergency management. The system includes a packet delivery anomaly detector for determining an existence of an anomaly in a mandated routing infrastructure for a packet that renders the packet incapable of reaching a destination node designated for the packet through the mandated routing infrastructure. The system further includes a dynamic alternate route identifier for dynamically identifying alternate routes for the packet responsive to a determination of the existence of the anomaly. The alternate routes are outside the mandated routing infrastructure, are provided using one or more mobile devices external to and not part of the mandated routing infrastructure, and are dynamically identified responsive to at least geographic location information. The system also includes a wireless transmitter for wirelessly routing the packet using at least one of the alternate routes. | 2015-08-27 |
20150244652 | RESILIENT ROUTING BASED ON A MULTI-CHANNEL MODEL FOR EMERGENCY MANAGEMENT - There is provided a system and method for resilient routing based on a multi-channel model for emergency management. The system includes a packet delivery anomaly detector for determining an existence of an anomaly in a mandated routing infrastructure for a packet that renders the packet incapable of reaching a destination node designated for the packet through the mandated routing infrastructure. The system further includes a dynamic alternate route identifier for dynamically identifying alternate routes for the packet responsive to a determination of the existence of the anomaly. The alternate routes are outside the mandated routing infrastructure, are provided using one or more mobile devices external to and not part of the mandated routing infrastructure, and are dynamically identified responsive to at least geographic location information. The system also includes a wireless transmitter for wirelessly routing the packet using at least one of the alternate routes. | 2015-08-27 |
20150244653 | METHODS AND SYSTEMS FOR CREATING AUTO-REPLY MESSAGES - This application discloses a method implemented on a client system for creating an automatic reply (auto-reply) message. The client system obtains content information of a webpage including information concerning a plurality of content items. A graphical user interface is displayed and includes a preview of the webpage including the plurality of content items of the webpage. Then, the auto-reply message is composed in accordance with a user selection of a specific content item of the webpage in the webpage preview, and at least includes corresponding information of the selected content item. The auto-reply message is further associated with one or more predefined keywords according to one or more auto-reply rules, and sent with these predefined keywords to a server system. The server system is configured to return the auto-reply message automatically to a subscriber device in response to a user inquiry including at least one of the predefined keywords. | 2015-08-27 |
20150244654 | SERVER DEVICE, METHOD, AND SYSTEM - The server device stores image information uploaded by any registered user in conjunction with the identification information of the uploading user who uploaded said image information and manages the association between tagged image information that is subjected to tagging and tagged users by performing a tagging operation that associates image information uploaded to the image information storage unit by the uploading user with any registered user in response to a request from the uploading user or other registered users. | 2015-08-27 |
20150244655 | DYNAMICALLY UPDATING CONTENT IN E-MAIL - Methods and systems of dynamically updating content in e-mail messages are described. In some embodiments, an e-mail message is generated. The e-mail message comprises existing content viewable within an e-mail client and is configured to initiate a modification of the existing content within the e-mail message by the e-mail client subsequent to the e-mail message being downloaded by the e-mail client. The modification of the existing content is viewable within the e-mail client. The generated e-mail message is sent to an e-mail account from which a user can view the e-mail message within the e-mail client. In some embodiments, the e-mail message is further configured to cause the e-mail client to obtain new content from a remote server for use in the modification of the existing content within the e-mail message. | 2015-08-27 |
20150244656 | METHOD AND SYSTEM FOR PROVIDING USER INTERFACE FOR INTERACTIVE BROADCAST PROGRAM USING MOBILE INSTANT MESSENGER - Disclosed are a method and system for providing a user interface for an interactive broadcast program using a mobile instant messenger. The method for providing a user interface for an interactive broadcast program comprises the steps of: executing a chat room capable of participating in a broadcast program using a program ID, which is a buddy ID generated on a mobile instant messenger (IM), for the broadcast program; and displaying messages with regard to the broadcast program sent to or received from a user via the chat room. The step of displaying messages may provide a plurality of input buttons as a user interface (UI) for inputting messages from the user on the screen of the chat room, the input buttons enabling messages to be inputted for each participation objective in the broadcast program. | 2015-08-27 |
20150244657 | System And Method Of Message Threading For A Multi-Format, Multi-Protocol Communication System - This disclosure relates to systems, methods, and computer readable media for performing multi-format, multi-protocol message threading in a way that is most beneficial for the individual user. Users desire a system that will provide for ease of message threading by “stitching” together related communications in a manner that is seamless from the user's perspective. Such stitching together of communications across multiple formats and protocols may occur, e.g., by: 1) direct user action in a centralized communications application (e.g., by a user clicking ‘Reply’ on a particular message); 2) using semantic matching (or other search-style message association techniques); 3) element-matching (e.g., matching on subject lines or senders/recipients/similar quoted text, etc.); and 4) “state-matching” (e.g., associating messages if they are specifically tagged as being related to another message, sender, etc. by a third-party service, e.g., a webmail provider or Instant Messaging (IM) service). | 2015-08-27 |
20150244658 | SYSTEM AND METHOD FOR EFFICIENTLY MIXING VOIP DATA - A method, computer program product, and computer system for monitoring a communication session between a plurality of users. It is determined whether at least two users of the plurality of users are sending media in the communication session. If only a first user of the plurality of users is sending media, the media is delivered to the plurality of users via a first technique. If the first user and a second user of the plurality of users are sending media, the media is delivered to the plurality of users via a second technique. | 2015-08-27 |
20150244659 | MESSAGE PROCESSING METHOD AND ELECTRONIC DEVICE SUPPORTING THE SAME - A message processing method and an electronic device for supporting the same are provided. The electronic device includes a communication interface configured to receive a message including a plurality of pages, and a control module configured to process the received message, wherein, if undefined data exists among data contained in a specific page of the plurality of pages, the control module combines at least a part of data contained in a next page that is sequential to the specific page with the undefined data. | 2015-08-27 |
20150244660 | DOCUMENT OBJECT MODEL API FOR MIME - The claimed subject matter provides systems and/or methods that facilitate interpreting Multipurpose Internet Mail Extensions (MIME) data. An interface can obtain MIME data. For instance, a stream of MIME data can be obtained, MIME data can be loaded from a static file, etc. Moreover, any disparate type of RFC 822 data can additionally or alternatively be received by the interface. Also, a MIME reader can analyze the MIME data (and/or normalized RFC 822 data) to interpret encoded structural information and generate at least one primitive based on the encoded structural information. Further, a hierarchical model can be built utilizing the at least one primitive. | 2015-08-27 |
20150244661 | METHOD AND APPARATUS FOR DISPLAYING RICH TEXT MESSAGE ON NETWORK PLATFORM, AND COMPUTER STORAGE MEDIUM - The present disclosure discloses a method performed by a computer server for processing a rich text message on a network platform, which includes: receiving a rich text message prepared by a third party at a first terminal, the rich text message comprising a structure of a rich text displaying manner; resolving the structure of the rich text displaying manner to generate a rich text in an HTML format, and causing the display of the rich text message including the rich text in the HTML format on a user interface at a second terminal; and extracting the structure of the rich text displaying manner after detecting a user selection of the rich text at the second terminal, so as to cause the display of the rich text at the second terminal. The present disclosure further discloses a computer server for performing the method, and an associated non-transitory computer readable storage medium. | 2015-08-27 |
20150244662 | MESSAGING APPLICATION FOR TRANSMITTING A PLURALITY OF MEDIA FRAMES BETWEEN MOBILE DEVICES - A system and method for transmitting a plurality of media frames between mobile devices is described. The media frames comprise video data, photo data, textual data, graphical data and/or audio data. | 2015-08-27 |
20150244663 | AUTOMATIC DELIVERY SELECTION FOR ELECTRONIC CONTENT - Computer program products and methods for the secure delivery of a message in a communication system. The method includes identifying a best method for delivery of a message including considering preferences of a sender and a recipient and sending the message from the sender to the recipient using the identified method. | 2015-08-27 |
20150244664 | ENTERPRISE MESSAGING PLATFORM - In at least one embodiment, a method of operating a messaging platform system is disclosed. The method can include: receiving a login from a first user account to the messaging platform system from a terminal, the login including login information; determining a terminal type based at least partly on the login information; monitoring for a user action at the terminal; receiving an incoming message for the first user account from a second user account; and determining whether to push the incoming message to a destination device associated with the first user account based on the monitoring of the user action and the terminal type. | 2015-08-27 |
20150244665 | APPARATUS AND METHOD FOR TRANSMITTING MESSAGE - A method for transmitting a message to at least one device by an electronic device is provided. The method includes determining status information of at least one device connected with the electronic device, generating a message, based on the status information of the at least one device, and transmitting the message to the at least one device. | 2015-08-27 |
20150244666 | SCALABLE MESSAGE FIDELITY - Message content is scaled to support rich messaging. Devices and associated messaging systems can support various levels of content richness or fidelity. Message content scaling is employed to ensure sharing of content in as rich a manner as possible given limitations associated with various messaging systems, among other things. Messages can be scaled down or degraded, for instance where communicating devices do not support high fidelity content being transmitted. Alternatively, messages can be scaled up or enriched in cases, where low fidelity content is transmitted to a device supporting richer content, for example. | 2015-08-27 |
20150244667 | MAILING LIST MANIPULATIONS - Implementations for mailing list manipulations are disclosed. In one example, the method includes receiving a first distribution list comprising a first plurality of electronic messaging system addresses, receiving a first identifier referencing a first electronic messaging system address, and causing a message to be sent to one or more electronic messaging system address in the first distribution list except to the first electronic messaging system address. | 2015-08-27 |
20150244668 | Tailored Interpersonal Communication Platform (ICP) Management - Systems, devices, and process are provided for tailored interpersonal communication platform management. This can include tailoring interpersonal communication methodologies across a selection of network supported interpersonal communication platforms including one-on-one social media, broadcast social media, email, SMS, and VoIP, etc. for a user, and among and between the user and enrollees or participants in one or more of various ICPs. | 2015-08-27 |
20150244669 | SMART CONVERSATION METHOD AND ELECTRONIC DEVICE USING THE SAME - The disclosure proposes a smart conversation method and an electronic device using the same method. According to one of the exemplary embodiments, an electronic device may receive via a receiver a first communication in a first communication type and determining a recipient status. The electronic device may determine a second communication type as an optimal communication type based on the recipient status. The electronic device may convert the first communication into a second communication that is suitable for the second communication type. The electronic device may transmit via a transmitter the second communication in the second communication type. | 2015-08-27 |
20150244670 | Browser and method for domain name resolution by the same - Disclosed are a browser and a method for domain name resolution by the same. The method comprises: starting the browser and calling DNS acceleration data information, wherein the DNS acceleration data information comprises several domain names obtained in advance and IP address information corresponding to each domain name; receiving an access request for a certain URL initiated by a user, parsing the access request and extracting the domain name corresponding to the URL; and detecting whether the domain name corresponding to the URL is contained in the DNS acceleration data information, and if yes, obtaining the IP address information corresponding to the domain name, and utilizing the IP address information for access processing. By conducting statistics on some primary domain names in advance to form DNS acceleration data information, the disclosure may implement webpage browsing acceleration when the DNS acceleration data information is called by a user-side browser. Such a procedure of acceleration processing consumes a short time, and improves the efficiency of DNS acceleration. | 2015-08-27 |
20150244671 | CLIENT TRAFFIC REDIRECTION SERVICE - Disclosed are various embodiments for performing network traffic redirection at the client side. Sending of data to a service at a network address is initiated. Whether the network address is in a predetermined network address range is determined. The network address is translated, when the network address is in the predetermined network address range, to one of multiple other network addresses based at least in part on an availability of the service at the other network address. The data is routed to the other network address. | 2015-08-27 |
20150244672 | SYSTEMS AND METHODS FOR FASTER DOWNLOAD OF DIGITAL CONTENT IN MOBILE WIRELESS DEVICES - A handheld wireless device makes a request for service from a server of a business on a global network, the request originating from the wireless device is automatically routed to the closest server of the business that is geographically closest to the location of the wireless device as determined by a GPS function in the device, or by a router server in the wireless network based on the group of cell towers being connected to by the wireless device, or based on the location of the wireless device in a global telephone network database, for faster access to the service and a response there from. | 2015-08-27 |
20150244673 | Distributed Proxy Addressing Operations - An addressing redirection mechanism is initiated at a first networking device in a computing network in order to enable the first networking device to perform one or more distributed proxy addressing operations on behalf of a connected second networking device. An address request transmitted from a first host device to a second host device to obtain addressing information of the second host device is received at the first networking device, and the first networking device inspects the address request to identify addressing information for the first host device. The first networking device is configured to forward the addressing information for the first host device to the second networking device. | 2015-08-27 |
20150244674 | MANAGEMENT SERVER, CONNECTION SUPPORT METHOD, AND NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM ENCODED WITH CONNECTION SUPPORT PROGRAM - A management server disposed outside a firewall and supporting connection of communications between a control target device disposed inside the firewall and a cloud server disposed outside the firewall, includes a server-side session establishing portion to, based on a request from a relay device disposed inside the firewall, establish a session with the relay device, a device information acquiring portion to acquire device information about the control target device from the relay device via the established session, and an update determining portion to, in response to reception of a request of connecting to the control target device from the cloud server, determine whether to update the device information. The device information acquiring portion includes an upon-session-establishment acquiring portion to acquire the device information when a session with the relay device is established, and an upon-session-request acquiring portion to acquire the device information after updating the device information is determined. | 2015-08-27 |
20150244675 | Wireless Internet Product System - Low resource internet devices such as consumer electronics products connect to web service by means of a proxy method where the connected device does not need to maintain the expensive and fragile web service interface itself, but rather uses simple low level protocols to communicate through a gateway that executes software to translate a low level proprietary wireless protocol to a proprietary low level internet protocol that can pass through a firewall to proxy servers that translate the low level protocols thus presenting an interface that makes the internet device appear to have a full web service interface to enable communication between the internet devices and the web server. | 2015-08-27 |
20150244676 | SYSTEM AND METHOD FOR RESPONDING TO AGGRESSIVE BEHAVIOR ASSOCIATED WITH WIRELESS DEVICES - An embodiment of the invention describes a wireless device comprising a Subscriber Identity Module (SIM) further comprising a memory for storing program code for performing a plurality of operations, and a processor for processing the program code to execute the plurality of operations, the operations including receiving over-the-air instructions via a wireless network from a control center to create a rules set in the SIM, wherein the rules set defines an acceptable behavior of the wireless device, monitoring requests from a wireless modem of the wireless device for access files stored in the SIM, detecting an aggressive behavior of the wireless device based on the rules set, and blocking the wireless modem from generating traffic in the wireless network. | 2015-08-27 |
20150244677 | ARCHITECTURE FOR NETWORK MANAGEMENT IN A MULTI-SERVICE NETWORK - A mechanism is provided for a non-converged network for a service provider. A core network is divided into individually managed domains, where each of the domains comprises multiprotocol label switching for packets. A management system is coupled to each of the domains. Network elements in each of the domains are restricted from directly transferring packets to network elements in another one of domains. Each of the domains has a domain firewall at an edge of the domains, and the domain firewall restricts packets from being received from other domains. To transfer packets from one domain to another domain, the management system receives the packets from one domain and transfers the packets to the other domain after authentication. | 2015-08-27 |
20150244678 | NETWORK TRAFFIC FILTERING AND ROUTING FOR THREAT ANALYSIS - Implementations disclosed herein provide a managed security service that distributes processing tasks among a number of network security modules working in parallel to process component portions of a replayed network traffic stream. If a network security module detects a potential security threat, the network security module may generate a delivery request specifying other information potentially useful in further investigation of the potential security threat. The delivery request is communicated to a plurality of other processing entities, such as the other network security modules, and any processing entity currently receiving the requested information may respond to the delivery request. Once a source of the requested information is determined, the requested information is routed to the origin of the request. | 2015-08-27 |
20150244679 | Kernel-Level Security Agent - A kernel-level security agent is described herein. The kernel-level security agent is configured to observe events, filter the observed events using configurable filters, route the filtered events to one or more event consumers, and utilize the one or more event consumers to take action based at least on one of the filtered events. In some implementations, the kernel-level security agent detects a first action associated with malicious code, gathers data about the malicious code, and in response to detecting subsequent action(s) of the malicious code, performs a preventative action. The kernel-level security agent may also deceive an adversary associated with malicious code. Further, the kernel-level security agent may utilize a model representing chains of execution activities and may take action based on those chains of execution activities. | 2015-08-27 |
20150244680 | AGILE NETWORK PROTOCOL FOR SECURE COMMUNICATIONS USING SECURE DOMAIN NAMES - A secure domain name service for a computer network is disclosed that includes a portal connected to a computer network, such as the Internet, and a domain name database connected to the computer network through the portal. The portal authenticates a query for a secure computer network address, and the domain name database stores secure computer network addresses for the computer network. Each secure computer network address is based on a non-standard top-level domain name, such as .scom, .sorg, .snet, .snet, .sedu, .smil and .sint. | 2015-08-27 |
20150244681 | ANONYMOUS INFORMATION SHARING - An anonymous information sharing service is described herein. The anonymous information sharing service includes performing anonymous authentication of a user who would like to report an incident, anonymizing incident data, and sharing the incident data with multiple users of the anonymous information sharing service. | 2015-08-27 |
20150244682 | METHOD AND APPARATUS FOR IDENTIFYING AND PROTECTING CONFIDENTIAL INFORMATION IN A COLLABORATION SESSION - In one embodiment, a method includes initiating a session and determining whether a first indication arranged to indicate that confidential information is to be shared during the session is obtained. The session includes a plurality of participants in attendance. The method also includes, after it is determined that the first indication is obtained, determining whether each participant of the plurality of participants has agreed to maintain confidentiality with respect to the confidential information. Finally, after it is determined that each participant of the plurality of participants has agreed to maintain the confidentiality with respect to the confidential information, a second indication is provided during the session, the second indication being arranged to indicate that the confidential information is currently being shared during the presentation. | 2015-08-27 |
20150244683 | METHOD AND SYSTEM FOR ASSIGNING INFORMATION CONTENTS - A method and system is provided, including an on-board server, by which, a link to the output unit is set up, and is assigned to a specific conveying means via a first key pair. A first secret key from the first key pair is stored on the on-board server. Before the use of the conveying means, an application is installed on the output unit and a second key pair is requested, a second secret key being transmitted to the application. Then, available information contents are displayed on the output unit, and a unique code is generated for each selected content. The selected contents are requested by the application and the unique code is assigned a third key pair. A third secret key is encrypted with the public keys and assigned to the on-board server. The selected contents, encrypted with a third public key, are then transmitted to the output unit. | 2015-08-27 |
20150244684 | DATA SECURITY MANAGEMENT SYSTEM - The present patent application is directed to a data security management system. The system includes a security server configured to store an encryption key to encrypt a file or any data and a decryption key to decrypt the file or the data; a first computing device configured to send an access authorization list with authorization limit to the security server, request an encryption key from the security server, and encrypt the file or data with the encryption key received from the security server; a second computing device configured to request a decryption key from the security server and decrypt the encrypted file with the decryption key received from the security server; and a cloud storage configured to share the file between a first user using the first computing device and a second user using the second computing device. | 2015-08-27 |
20150244685 | GENERALIZED CRYPTOGRAPHIC FRAMEWORK - A user equipment (UE, | 2015-08-27 |
20150244686 | APPARATUS, METHOD, AND SYSTEM FOR ACCESSING AND MANAGING SECURITY LIBRARIES - An apparatus and method for performing a cryptography function on an electronic device are provided. The method includes executing an application on the electronic device, requesting, by the application, to use a security library, loading the security library in a remote process on the electronic device, and communicating, by the application, with the security library in the remote process. | 2015-08-27 |
20150244687 | PROVIDING NOTIFICATIONS TO AUTHORIZED USERS - A method and system for initiating message listening and routing message content to authorized user devices is disclosed. For a second user device to receive notifications regarding records of a first user, the second user device provides information identifying the first user to a notification service. The notification service verifies the identifying information. The notification service initiates one or more listeners to listen for messages flowing over a messaging bus that are relating to the first user. Once a message is identified, at least a portion of the message is used to generate a notification that may be sent to the second user device. | 2015-08-27 |
20150244688 | METHOD AND SYSTEM FOR DIGITAL RIGHTS MANAGEMENT OF DOCUMENTS - An improved method and system for digital rights management is described. | 2015-08-27 |
20150244689 | METHODS AND APPARATUS FOR PROTECTED DISTRIBUTION OF APPLICATIONS AND MEDIA CONTENT - Methods, devices, apparatus, computer-readable media and processors are provided that protect the distribution of media content. Media content is encrypted and the associated cryptographic mechanisms are stored and accessible either remotely at a networked database or internally within a data storage device memory. Access to the cryptographic mechanisms is granted by associating the cryptographic mechanisms with a data storage device identification and, optionally, a computing device identification. | 2015-08-27 |
20150244690 | GENERALIZED ENTITY NETWORK TRANSLATION (GENT) - Generalized Entity Network Translation provides new state of the art methodology for extending RKI techniques into a truly generalized framework capable of operating at exceptional levels of authenticity without the need for roots, certificate authorities, or other static points in an infrastructure. More astounding is its ability to create trusted authentic entity relationships that require no externally stored state outside of the shared context between discrete peers. The present invention provides, among other things, novel improvements to blockchain-derived systems and provides strong proof of ownership, renewal, roll-backs, and localized state and many blockchain systems more palatable choices for system integration. | 2015-08-27 |
20150244691 | POLICY-BASED CONFIGURATION OF INTERNET PROTOCOL SECURITY FOR A VIRTUAL PRIVATE NETWORK - A method for performing policy-based configuration of Internet Protocol Security (IPSec) for a Virtual Private Network (VPN) is provided. According to one embodiment, a policy page through which a policy, including multiple VPN settings for establishing a VPN connection, may be viewed and configured is displayed via a user interface of a source network device. The VPN settings include a type of IPSec tunnel to be established between the source network device and a peer network device. A selection regarding the type of IPSec tunnel to be used for the VPN connection is received via the user interface. The source network device requests the VPN connection be established between the source network device and the peer network device in accordance with the policy by sending a notification request to the peer network device. The notification requests includes parameter values associated with the VPN settings. | 2015-08-27 |
20150244692 | METHODS AND APPARATUSES FOR LOCATION-BASED ACCESS MANAGEMENT - Methods and apparatuses for located-based content access control have been disclosed. A method may comprise: receiving, at a mobile device, from a short distance communication node, an identifier of the node; generating a device key for the mobile device based on the identifier of the node and an identifier of the mobile device; sending to the node the device key and the identifier of the mobile device, at least based on which the mobile device may be authenticated; and receiving, at the mobile device, from the node, one or more content keys, either encrypted or unencrypted, for decrypting content that has been or is to be saved in the mobile device. | 2015-08-27 |
20150244693 | CLOUD AWARE FILE SYSTEM - A virtual file system is described that is implemented in a virtualization platform as a stackable file system layer that intercepts file operations between a hypervisor and a physical file system. The virtual file system encrypts (at least in part) VM files to be stored, organizes the encrypted VM files into VM sets, and then maps and stores the encrypted VM sets into storage pools. Storage and access to files within the VM sets is controlled through the use of administrator-determined policies governing storage, security, access control, authentication, and auditing. The system and method described herein allow a seamless integration between a data center (e.g., a private cloud) and computing resources served across the internet and supported by cloud service providers (e.g., public clouds) while ensuring that the security needs of customers and cloud service providers are met. | 2015-08-27 |
20150244694 | AUTHORIZING SERVER, AUTHORIZING METHOD AND COMPUTER PROGRAM PRODUCT - The invention relates to an authorizing server, an authorizing method and a computer program product. An authorizing system server is in communication with an electronic device and an agent device. The authorizing server includes a transceiver and a processor. The transceiver receives a request issued by the electronic device. The processor provides an initial authorizing code in response to the request, and generates a server side code accordingly. After transmitting the initial authorizing code, the transceiver receives a remote side code, obtained according to the initial authorizing code. The processor authorizes an operation procedure to be executed when a predetermined condition is satisfied. | 2015-08-27 |
20150244695 | NETWORK AUTHENTICATION METHOD FOR SECURE USER IDENTITY VERIFICATION - In a network authentication method, a content-provider server redirects a user terminal to an identity verification server for acquiring therefrom an encrypted web address signed with an asymmetrical private key and downloaded from a downloading unit. The user terminal transmits hardware scan data associated therewith to the identity verification server upon determining, based on the encrypted web address and an asymmetrical public key from the downloading unit, that the identity verification server is currently valid to perform identity verification. The identity verification server verifies the identity of the user terminal based on relationship between the hardware scan data and pre-stored reference hardware scan data. | 2015-08-27 |
20150244696 | Methods of Authenticating Users to a Site - Systems and methods for user authentication within federated computing systems are provided. In a session, a user can be authenticated multiple times by different authentication methods for different servers of the federated system, however, once the user has been authenticated by any given authentication method, the user need not repeat that method. Systems of the present invention comprise a plurality of servers including an authentication server. The authentication server maintains authentication records for users, where each record includes which authentication methods apply to which servers. When a user first seeks access to a particular server, the server identifies the user and the server to the authentication server. If the user has already been authenticated elsewhere according to the authentication method required by the new server, the authentication server indicates to the new server that the user is authenticated, else the authentication server invokes the necessary authentication method. | 2015-08-27 |
20150244697 | Method for Secure Servicing of a Field Device - A method for secure servicing of a field device (FD) of process automation technology. The field device (FD) has a web server (WS), via which the field device (FD) can be serviced, wherein the field device (FD) has a function (CAPTCHA) for distinguishing computers from humans, wherein, upon an accessing of the field device (FD) via the web server (WS), the function (CAPTCHA) for distinguishing computers from humans is executed, in order to assure that the accessing of the field device (FD) is being done by a human user. | 2015-08-27 |
20150244698 | User identity authenticating method and device for preventing malicious harassment - A user identity authenticating method and device for preventing malicious harassment are described. The method includes: after a user logs in an internet website, unique first authentication code information is generated and stored; the first authentication code information and a Short Message (SMS) Uplink (UL) service number used for identifying the internet website uniquely are displayed on a website page; after the user sends an SMS including second authentication code information input by the user to the corresponding SMS UL service number, an acquired second authentication code is matched with a stored first authentication code, if the matching succeeds, then the authentication succeeds. The embodiments in the disclosure can avoid possible malicious harassment effectively, thus avoiding legal risks which a website service provider may confront to some extent, and improving the satisfaction of its service. In addition, the increase of processing load and performance influence of the website service provider's server, which are caused by triggering the sending of a large number of authentication codes maliciously, can be avoided in the disclosure. | 2015-08-27 |