43rd week of 2015 patent applcation highlights part 76 |
Patent application number | Title | Published |
20150304210 | Method for Processing Subnet Route and Message Forwarding Equipment - Provided are a method for processing a subnet route and message forwarding equipment. The method includes: it is detected that a next-hop host route to which the subnet route is directed becomes invalid; when the next-hop host route becomes invalid, a deletion instruction for deleting the next-hop host route is generated and issued; the deletion instruction is intercepted, and converted into a first updating instruction for modifying the next-hop host route; and a next-hop egress of the next-hop host route is updated into a Central Processing Unit (CPU) of the message forwarding equipment according to the first updating instruction. According to the disclosure, management over the subnet route can be simplified, and switching efficiency of the subnet route can be improved. | 2015-10-22 |
20150304211 | CARRIER-DRIVEN BEARER PATH SELECTION - Carrier-driven bearer path selection is disclosed. Carrier-driven bearer path selection enables a carrier to assert bearer path selection policies. Bearer paths available to UEs can be checked for compliance with a carrier's policies. Preferred bearer paths can be designated to the UE for selection. Designation of preferred bearer paths can, in an aspect, be related to route cost, path requests, or path characteristics. In addition, complex bearer path schema can be determined. In an aspect, complex bearer path schema can include asymmetric routing, bonding, and multiplexing. The subject disclosure can enable a carrier to improve management of the carrier's network resources by driving bearer path selection determination to UEs. | 2015-10-22 |
20150304212 | METHOD AND APPARATUS FOR MATCHING FLOW TABLE, AND SWITCH - A method and an apparatus for matching a flow table, and a switch are provided. An exact match entry and a wildcard entry that are in each flow entry are stored separately, the exact match entry is stored in a memory, the wildcard entry is stored in a TCAM, and an index value index is used to represent the exact match entry, so that the wildcard entry uses less TCAM resources, thereby increasing utilization of the TCAM; and a proper searching algorithm is used to separately perform matching on the exact match entry and the wildcard entry, which increases a searching speed. | 2015-10-22 |
20150304213 | COMPUTER SYSTEM AND MAINTENANCE METHOD OF COMPUTER SYSTEM - A communication system includes a control device configured to calculate a packet forwarding path and set a flow based on the packet forwarding path in a node, and a plurality of nodes configured to forward a received packet based on a flow set by the control device. The control device, when receiving a detour instruction, calculates a new packet forwarding path which detours a detour target node and sets a flow based on the new packet forwarding path in the plurality of nodes on the new packet forwarding path. | 2015-10-22 |
20150304214 | FAST REROUTE IN MULTI-PROTOCOL LABEL SWITCHING TRAFFIC ENGINEERING NETWORK - In an example, multi-protocol label switching traffic engineering (MPLS TE) fast reroute (FRR) is implemented in an MPLS TE network. The MPLS TE network includes a bypass protection (BP)-label switching path (LSP) protecting a working LSP. A node receives a packet from an upstream adjacent node of the node in a working LSP. The packet includes a label which is an incoming label of the working LSP at the node. When detecting a downstream adjacent node of the node in the working LSP is unreachable, the node replaces the label in the packet with an outgoing label of a WP-LSP at the node, and forwards the packet in the WP-LSP which delivers the packet to an ingress node of a BP-LSP. The BP-LSP then delivers the packet to an egress node of the BP-LSP and the packet is forwarded from the BP-SLP to the working LSP. | 2015-10-22 |
20150304215 | PACKET RELAY APPARATUS, PACKET TRANSFER METHOD, AND COMMUNICATION SYSTEM - A packet relay apparatus having one or more communication interfaces coupled to a network, a processor coupled to the one or more communication interfaces, and a memory coupled to the processor, said packet relay apparatus holds path information including a plurality of combinations of a final destination and a next transfer destination of a packet, and conditions for applying individual combinations of the path information; determining, on the basis of information included in a received packet, whether or not the received packet satisfies the condition for applying each combination of the path information; and transferring the received packet to one or more next transfer destinations of one or more combinations of the path information associated with the condition determined to be satisfied and including a final destination identical to final destination information included in the received packet. | 2015-10-22 |
20150304216 | CONTROL METHOD, CONTROL APPARATUS, COMMUNICATION SYSTEM, AND PROGRAM - A control apparatus includes: a path calculation unit that calculates first and second paths sharing start and end nodes out of a plurality of nodes; a rule generation unit that generates a first rule for forwarding a packet along the first path and a second rule for forwarding a packet along the second path; and a rule transmission unit that sends the first and the second rules to at least one of the nodes, and has at least one of the nodes forward a packet according to either the first rule or the second rule. | 2015-10-22 |
20150304217 | SECURITY FOR PACKETS USING A SHORT MAC HEADER - Certain aspects of the present disclosure provide methods and apparatus for applying security to packets, for example, packets utilizing short MAC headers. | 2015-10-22 |
20150304218 | Control Channel Establishing Method, Forwarding Point, and Controller - The present invention provides a control channel establishing method, a forwarding point, and a controller. The method includes: sending, by a first FP, topology information of the first FP to a second FP by using the LLDP; receiving, by the first FP, first routing information that is sent by the controller and is used by the first FP to reach the controller, where the first routing information is generated by the controller according to the topology information of the first FP; and establishing, by the first FP, a second control channel with the controller according to the first routing information. The first FP does not need to run the IGP protocol, thereby avoiding that the first FP maintains an IGP neighbor relationship; moreover, the first FP does not need to store routing information for reaching another FP, which helps save storage resources and helps improve forwarding performance. | 2015-10-22 |
20150304219 | METHOD AND APPARATUS FOR SELECTING A NEXT HOP - Various exemplary embodiments relate to a device for routing an incoming packet to a destination, the device comprising a processor associated with a storage, in communication with a network interface, the processor being configured to receive the incoming packet; access from the storage a plurality of at least two server bits, each server bit representing a possible next hop to the destination, where if the quantity of possible next hops to the destination is less than a power of two then the quantity of server bits is equal to the next highest power of two, and wherein a quantity n is equal to the exponent of the next highest power of two; determine one or more hash bits calculated from a hash value derived from a source address, a destination address, a source port, and a destination port of the packet, wherein the quantity of hash bits is half the number of server bits; and repeatedly, for n repetitions, determine one or more output bits from a plurality of at least two inputs bits and the one or more hash bits, each input bit representing a server bit in the first repetition, the output bits representing half of the remaining possible next hops to the destination, the output bits becoming final output bits in the nth repetition or input bits to a next repetition after the first repetition. | 2015-10-22 |
20150304220 | CONGESTION CONTROL SYSTEM, CONTROL DEVICE, CONGESTION CONTROL METHOD AND PROGRAM - A congestion control system includes: edge devices that aggregate service request messages from clients, and distribute the messages to servers; a plurality of servers that process the service requests from the clients; and a control device. The control device: acquires a service request occurrence rate observed from the edge devices, and, on the basis of the acquired occurrence rate, determines the proportion of service request messages to be regulated as a regulation rate; determines the number of servers that should be operating, and notifies the edge devices of the regulation rate that was determined; and, on the basis of the number of servers that was determined, puts new servers into operation or stops the service of currently operating servers. In a system in which there a limit to server expansion and there is potential for congestion collapse to occur, integrated control is conducted in such a manner that revenue, which allows for input regulation in edge devices and server expansion, is maximized. | 2015-10-22 |
20150304221 | Method for Generating a Load Sharing Vector - The invention relates to a method for generating a load sharing vector indicating a plurality of communication targets for load sharing in a communication network. The method comprises providing a target distribution vector comprising a first number of entries indicating a first communication target, and comprising a second number of entries indicating a second communication target, and generating the load sharing vector upon the basis of active entries of the target distribution vector, the active entries indicating the communication target of the first or the second communication target which is available for load sharing in the communication network. | 2015-10-22 |
20150304222 | NETWORK LOAD ESTIMATION AND PREDICTION FOR CELLULAR NETWORKS - Various embodiments estimate network load in a wireless communication network. In one embodiment, at least one call detail record associated with a wireless communication network is received. A topology representing the network is analyzed. The topology includes a plurality of nodes each representing a network element within the wireless communication network. The topology also includes a plurality of edges between two or more of the plurality of nodes. Each of the plurality of edges indicates that the two or more plurality of nodes are communicatively coupled to each other within the network. A set of paths is identified between two or more nodes in the plurality of nodes corresponding to a set of call flow information within the at least one call detail record. A state of each network element represented by the two or more nodes in the set of paths is determined based on the call detail record. | 2015-10-22 |
20150304223 | SHARED BACKHAUL LINK FOR MULTIPLE WIRELESS SYSTEMS - Systems and methods are presented for effectively utilizing a Backhaul link shared by two or more wireless system Operators, such that data rates from multiple Core Network data sources to the shared Backhaul link, and data rates from multiple sets of Subscriber Stations to the shared Backhaul link, are controlled so that a combined downlink rate substantially does not exceed a predetermined Backhaul data rate, and a combined uplink rate substantially does not exceed a predetermined Backhaul data rate, thereby preventing an overloading of the shared Backhaul link. Further, communication rates of different data sets within the downstream and upstream, respectively, are dynamically altered to provide best overall service within the downstream and upstream, respectively, while not overloading the shared Backhaul link. | 2015-10-22 |
20150304224 | Method and Universal Interface Chip for Achieving High-Speed Data Transmission - A method for achieving high-speed data transmission is disclosed. The method includes: repacking a data packet to be transmitted using a preset bit width and adding a check code; for a correct response message, releasing system resources immediately, and for an incorrect response message, implementing an automatic retransmission operation on the data packet, thereby reducing the complexity and power consumption level of a chip, and ensuring the data exchange speed and quality. Also provided is a universal interface chip for achieving high-speed data transmission. | 2015-10-22 |
20150304225 | DATA PROCESSING APPARATUS AND PROGRAM - When a fixed-cycle transmission timing arrives, a fixed-period communication processing section transmits data in a shared memory to a BCM. An event table storage section stores an event table that indicates a condition of data to be transmitted by an event communication processing section and a permitted delay time, which is the period of time permitted starting from when the data satisfying the condition is extracted, until the data is transmitted. An event detecting section extracts the data in the shared memory satisfying the condition indicated by the event table. The event communication processing section transmits to the BCM the data extracted by the event detecting section, before the arrival of the transmission timing of the fixed-period communication processing section, and by the timing at which the permitted delay time elapses from the time of the data extraction by the event detecting section. | 2015-10-22 |
20150304226 | COMMUNICATION DEVICE, TRANSMISSION DATA OUTPUT CONTROL METHOD, AND PROGRAM FOR SAME - A communication device and the like are provided in which a throughput during a congestion avoidance operation in a communication session can be improved by considering a congestion state of a network. | 2015-10-22 |
20150304227 | Queue Management Method and Apparatus - Provided are a queue management method and apparatus. The method includes: acquiring a packet approximate number of a queue on which a current dequeue is performed, where the packet approximate number is stored inside a queue management component, and the packet approximate number is used for indicating a state of a current number of packets in the queue; and determining the number of times that a dequeue is allowed again for the queue according to the packet approximate number. The technical solution solves the problem in the related art that a short packet processing rate does not meet system bandwidth requirement, so as to enhance the efficiency of dequeue (e.g., short packet processing) of a queue, and enhance the performance of a traffic management system. | 2015-10-22 |
20150304228 | METHOD AND SYSTEM FOR PRIORITISING TRAFFIC FLOWS - A method for prioritising traffic within the IP protocol of a data communications network, the method comprising detecting an activity belonging to a pre-defined group of high priority activities; identifying network elements associated with the high priority activity; and prioritising traffic from the network elements associated with the high priority activity. Also disclosed is a management system arranged to implement the above-described method, and a data communications network comprising said management system. | 2015-10-22 |
20150304229 | Method and system for allocating receiving resources in a gateway server - The disclosed embodiments relate to a method and apparatus for allocating resources in an efficient manner in a gateway service device. The apparatus includes of a gateway server or head end unit connected to a plurality of end user terminals. The gateway server contains a controller for managing the allocation of receiving resources used for providing services to the end user terminals. The method includes receiving a service request, comparing the request to services already in use and, if a match is found, providing an updated data stream containing new information regarding the service to the end user terminals. | 2015-10-22 |
20150304230 | DYNAMIC MANAGEMENT OF A CLOUD COMPUTING INFRASTRUCTURE - Provided is a method of dynamically managing a cloud computing infrastructure. A cloud computing infrastructure is configured on a cloud service provider based on a parameter. The parameter is monitored for a variation. If the variation in the parameter is more than a predefined level associated with the parameter, an action is performed related to operation of the cloud computing infrastructure | 2015-10-22 |
20150304231 | GENERIC RESOURCE PROVIDER FOR CLOUD SERVICE - Systems and methods are provided for providing a cloud service. A service design defining the cloud service is generated and stored in memory during a design stage of cloud service provision. A specific provider for the defined cloud service is selected from a plurality of available specific resources during a subscription stage. The cloud service defined in the service design is provided using the selected specific provider. | 2015-10-22 |
20150304232 | MANAGING ISOLATION REQUIREMENTS OF A MULTI-NODE WORKLOAD APPLICATION - In an approach to manage isolation requirements of a multi-node workload application, a computer determines one or more first isolation levels for each of a plurality of workload nodes. The computer receives performance data for the plurality of workload nodes and analyzes the performance data for statistical trends in the performance data. The computer identifies an adverse trend in the statistical trends of the performance data and identifies a root cause of the adverse trend in the performance data. The computer then identifies one or more second isolation levels required to meet performance targets, the second isolation levels including an adjustment to the first isolation levels for the plurality of workload nodes. | 2015-10-22 |
20150304233 | EFFICIENT MANAGEMENT AND CONFIGURATION OF IN-BAND RESOURCES - There is disclosed herein, by way of example, an enterprise server computing platform configured to provide stateless computing, wherein each node has no set configuration, including for example, MAC addresses, UUIDs, firmware, and BIOS by way of non-limiting example. Certain devices or peripherals may be considered “out-of-band,” meaning that they are discoverable and configurable in standby power by a baseboard management controller (BMC) without need for an OS. Certain other peripherals are considered “in-band,” meaning that they may need an OS for discovery and configuration. According to one or more example embodiments of this Specification, a system and method are disclosed for automatically discovering and configuring out-of-band devices on a server. Out-of-band devices may then be disabled, and the server is booted with minimal resources and a bootstrap OS to discover and configure in-band devices. | 2015-10-22 |
20150304234 | NETWORK RESOURCE MANAGEMENT - A method of network resource management comprising, with a processor, creating a model of an application, defining a number of substitution points within the model, expressing the substitution points as abstract models with a set of sub-types, and codifying a number of policies that express which sourcing option to use for each substitution point. | 2015-10-22 |
20150304235 | ALLOCATING AND ACCESSING WEBSITE RESOURCES VIA DOMAIN NAME ROUTING RULES - Systems and methods are provided for allocating and accessing website resources via domain name routing rules as opposed to the domain name system (DNS). The system may include a reverse proxy server that includes domain name routing rules and a plurality of hosting servers. The reverse proxy server may receive a request from a client, wherein the request may comprise a domain name and possibly a path. The reverse proxy server may fulfill the request using the domain name routing rules for the domain name and possibly the path. The request may be, as non-limiting examples, to transfer a file to a requester, move a file from one server to another server, allocate redundant passive resources that may be activated in the event of an error, provide a website resource that may span two or more hosting servers and/or retrieve data from cache on the reverse proxy server. | 2015-10-22 |
20150304236 | USER INPUT PROCESSING FOR ALLOCATION OF HOSTING SERVER RESOURCES - Systems and methods are provided for dynamically allocating and accessing hosting server resources to users of hosting services. The system may include one or more servers that provide multiple levels of access to the hosting server resources, and an administration server configured with one or more migration paths that allow the user to migrate the account between two levels while the account remains accessible to all entities authorized to access the account. The hosting server resources may be divided according to virtual partitions that are resizable by the administration server. The system may include a migration interface stored on and accessible to the user from the administration server. The migration interface provides the user with options to migrate the account between the levels of access. The system may include an application programming interface that provides access to the administration server for changing the account's level of access. | 2015-10-22 |
20150304237 | METHODS AND SYSTEMS FOR MANAGING ACCESS TO A LOCATION INDICATED BY A LINK IN A REMOTE ACCESS SYSTEM - A method of managing access to a location indicated by a link in a remote access system, the method comprising: executing a first computer program using one or more resources of a client computing device or a server device, the execution of the first computer program resulting in the presentation of a link; receiving an instruction to access a storage location indicated by the link; determining whether to access the storage location indicated by the link using one or more resources of the client computing device or the server device based on one or more factors; and accessing the storage location indicated by the link using one or more resources of the client computing device or the server device in accordance with the determination. | 2015-10-22 |
20150304238 | Bandwidth Management in Local Premise Networks - A router has a processor, a data repository, a primary port to Internet connection on a primary path, wired connection or wireless coupling to individual ones of a plurality of bandwidth-using devices forming a local premise network, the router and the bandwidth-using devices sharing bandwidth on the primary port, software executing on the processor from a non-transitory medium, execution of the software providing a mechanism for configuration, applying a priority level to individual ones of the bandwidth-using devices in the local premise network, monitoring bandwidth available on the primary path on a periodic or continuous basis, apportioning bandwidth share among the devices in the local premise according to the priority level of each device and the current bandwidth available, and managing receipt and transmission of packets to and from individual ones of the devices according to the bandwidth share apportioned. | 2015-10-22 |
20150304239 | TELECOMMUNICATION NETWORK NODE SUPPORTING HYBRID MANAGEMENT USING A HARDWARE ABSTRACTION AND MANAGEMENT PROTOCOL CROSS-CONNECT FUNCTION - A telecommunication node within a network of nodes managed by more than one network manager, including a plurality of management interfaces, each management interface operative to communicate with a different network manager using a respective protocol, wherein at least two of the protocols are different protocols, a plurality of hardware resources, each resource being accessed through a respective application programming interface (API), and a cross-connect module, coupled with the management interfaces and with the hardware resources, operative to make each management interface interoperable with all of the APIs. | 2015-10-22 |
20150304240 | CLOUD SERVICE MANAGEMENT SYSTEM - A system includes a cloud computing system. The cloud computing system includes a continuous delivery system to enable design and deployment of a cloud service in the cloud computing system. The cloud computing system also includes a cloud services system to enable access and consumption of a service offering associated with the cloud service by a user. The cloud computer system further includes a cloud service management system that is executed on a non-transitory computer readable medium. The cloud service management system can integrate the continuous delivery system and the cloud services system over the cloud computing system to provide the design and the deployment of the cloud service and publication of the cloud service to the cloud services system. | 2015-10-22 |
20150304241 | SYSTEM AND METHOD FOR REDUCING LATENCY TIME WITH CLOUD SERVICES - A system and method for reducing service latency includes dividing an information technology service for a customer into an infrastructure management service and a data management service. Data associated with the information technology service is stored in a backup memory. A set of infrastructure images related to the information technology service is stored at a cloud service provider. The infrastructure images are updated with software updates and hardware updates, as needed, and the data associated with the information technology service is updated through backup and restore mechanisms. The set of infrastructure images that have been updated with data with latest updates are started for recovery, continuity, testing, etc. | 2015-10-22 |
20150304242 | DYNAMIC INFORMATION SERVICE METHOD AND SYSTEM - A system, method, and computer-readable storage medium configured to access computing resources and functions in a computer network based on organization hierarchy and geographic provisioning. | 2015-10-22 |
20150304243 | ALLOCATING AND ACCESSING HOSTING SERVER RESOURCES VIA CONTINUOUS RESOURCE AVAILABILITY UPDATES - Systems and methods are provided for dynamically allocating and accessing hosting server resources to users of hosting services. The system may include one or more servers that provide multiple levels of access to the hosting server resources, and an administration server configured with one or more migration paths that allow the user to migrate the account between two levels while the account remains accessible to all entities authorized to access the account. The hosting server resources may be divided according to virtual partitions that are resizable by the administration server. The system may include a migration interface stored on and accessible to the user from the administration server. The migration interface provides the user with options to migrate the account between the levels of access. The system may include an application programming interface that provides access to the administration server for changing the account's level of access. | 2015-10-22 |
20150304244 | Using SerDes Loopbacks for Low Latency Functional Modes With Full Monitoring Capability - An apparatus comprising high speed ports connected via an integrated high speed serial switch fabric and serializer/deserializer circuits to an internal processing logic, wherein said high speed serial switch fabric is adapted to switch a serial reception signal received by a high speed port to at least one other high speed port of said apparatus and/or to the serializer/deserializer circuit of the receiving high speed port. | 2015-10-22 |
20150304245 | CROSSBAR SWITCH AND RECURSIVE SCHEDULING - A crossbar switch has N input ports, M output ports, and a switching matrix with N×M crosspoints. In an embodiment, each crosspoint contains an internal queue (XQ), which can store one or more packets to be routed. Traffic rates to be realized between all Input/Output (IO) pairs of the switch are specified in an N×M traffic rate matrix, where each element equals a number of requested cell transmission opportunities between each 10 pair within a scheduling frame of F time-slots. An efficient algorithm for scheduling N traffic flows with traffic rates based upon a recursive and fair decomposition of a traffic rate vector with N elements, is proposed. To reduce memory requirements a shared row queue (SRQ) may be embedded in each row of the switching matrix, allowing the size of all the XQs to be reduced. To further reduce memory requirements, a shared column queue may be used in place of the XQs. The proposed buffered crossbar switches with shared row and column queues, in conjunction with the row scheduling algorithm and the DCS column scheduling algorithm, can achieve high throughput with reduced buffer and VLSI area requirements, while providing probabilistic guarantees on rate, delay and jitter for scheduled traffic flows. | 2015-10-22 |
20150304246 | BNG-pool-based response method, system and related device - A Broadband Network Gateway (BNG) pool based responding method is described, including that a BNG device in the BNG pool receives a user access request, and the BNG device responds according to the user access request and a delayed response strategy corresponding to the BNG device. A BNG device, a user equipment and a BNG pool based responding system are also described. Thus a BNG device in a BNG pool can respond to a user access request according to a delayed response strategy, then a user equipment can take a BNG device corresponding to a first response message received as a server, thereby being capable of ensuring system stability. | 2015-10-22 |
20150304247 | A METHOD FOR AUTOMATICALLY DETECTING PHYSICAL CONNECTIONS OF ETHERNET BRIDGES CONNECTED TO A ROOT BRIDGE - A method of detecting physical connections between a root bridge node and layer-2 bridge nodes organised in a layer-2 cloud. The method comprises sending a query message from a sending port of the root bridge node and starting a timer set to a waiting interval. After the timer expired, if a response message to the query message is not received or is received at the sending port then only the sending port is associated with said layer-2 cloud. Alternatively, if a response message is received at a port other than the sending port then the sending port and the receiving port are associated with said layer-2 cloud. A bridge node and a layer-2 communications network are also disclosed. | 2015-10-22 |
20150304248 | 50 GB/S ETHERNET USING SERIALIZER/DESERIALIZER LANES - Systems, devices, and methods of implementing 50 Gb/s Ethernet using serializer/deserializer lanes are disclosed. One such device includes circuitry operable to provide a media access control (MAC) interface. The MAC interface is associated with a port having a 50 Gb/s link rate. The device also includes circuitry operable to generate Ethernet frames from data received at the MAC interface and circuitry operable to distribute the Ethernet frames across a group of serial/deserializer (SERDES) lanes associated with the port, the group having size N. The device also includes circuitry operable to transmit the distributed Ethernet frames on each of the SERDES lanes at a 50/N Gb/s rate. | 2015-10-22 |
20150304249 | Device and Method for Progressive Media Download with Multiple Layers or Streams - A terminal, server, computer readable medium and method for scrolling ahead a desired content while the content is downloading to a terminal. The method includes selecting the desired content for being downloaded in the terminal; starting a first download process for the desired content, wherein the first download process is configured to download a first variant of the desired content; starting a second download process for the desired content, wherein the second download process is configured to download a second variant of the desired content, and the second variant is different from the first variant; offering for playback the first variant; and offering for playback the second variant when a user scrolls ahead the desired content or the first variant becomes unavailable. | 2015-10-22 |
20150304250 | ONLINE SHOPPING IN EMAIL MESSAGES - A method includes receiving, at an email service implemented by one or more server computers, an email message addressed to a user from a seller; and outputting, for display at a client computing device associated with the user, an email interface screen having a user operable interface element for ordering goods or services that are described in the email message. The method also includes receiving, at the email service, information indicating operation of the user operable interface element; and in response to receiving the information indicating operation of the user operable interface transmitting a purchase request relating to the goods or services. | 2015-10-22 |
20150304251 | Direct Manipulation of Object Size in User Interface - A client device displays user interface elements on a display device such as a screen. The user interface elements have a configuration including a size. An input device of the client device detects a gesture motion intended to modify the size of a subset of the user interface elements in a composing region of the screen. The gesture motion includes at least one gesture object (e.g., a finger, a stylus) contacting the composing region of the screen, moving across the screen while maintaining contact with the screen, and detaching from the screen after moving across the screen. In response to the gesture motion, the client device determines an updated configuration including an updated size for the subset of user interface elements. The subset of user interface elements is displayed in their updated configuration. | 2015-10-22 |
20150304252 | INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, AND PROGRAM - An information processing device including a receiving unit that receives predetermined information from a first information terminal possessed by a first user and a second information terminal possessed by a second user, an action recognition unit that recognizes an action of the first user on the basis of the predetermined information received from the first information terminal, and an information transmitting unit that transmits, on the basis of the recognized action of the first user, information for determining whether or not the second information terminal possessed by the second user is to acquire the predetermined information. | 2015-10-22 |
20150304253 | Experience Sharing with Commenting - Exemplary embodiments involve real-time commenting in experience-sharing sessions. An exemplary method involves: (a) a server system facilitating an experience sharing session between a sharing device and one or more viewing devices, wherein the server system receives media in real-time from the sharing device and transmits the media to the one or more viewing devices in real-time, wherein the media comprises video; (b) during the experience sharing session, the server system receiving one or more comments from one or more of the viewing devices; (d) the server system filtering the received comments in real-time based on filter criteria; and (e) the server system initiating real-time delivery, to the sharing device, of one or more of the received comments that satisfy the filter criteria. | 2015-10-22 |
20150304254 | INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING APPARATUS, AND STORAGE MEDIUM - An information processing system is implemented by an information processing apparatus and terminals connected to the information processing apparatus. The information processing system includes a destination determiner that determines a destination terminal of the terminals based on the right of a sender terminal of the terminals that has sent a message, a message generator that generates a message adapted for the destination terminal based on the message sent from the sender terminal, a transmitter that sends the message generated by the message generator to the destination terminal, and a display unit that is provided in each of the terminals and displays the message sent from the transmitter in a display format corresponding to the right of the each of the terminals. | 2015-10-22 |
20150304255 | SYSTEMS AND METHODS FOR MODIFYING CONTENT OF A MESSAGE INTENDED FOR A PLURALITY OF RECIPIENTS - Systems and methods are provided for facilitating an exchange in a messaging conversation between an originating entity and a plurality of recipient entities. According to certain aspects, a facilitating entity receives a message from the originating entity that is intended for the plurality of recipient entities. The facilitating entity analyzes the message to determine how to modify content associated with the message and modifies the content of the message according to the analysis. The facilitating entity sends the modified message to the plurality of recipient entities, hi aspects, the facilitating entity can manage rounds of message and response exchanges with one or more of the recipient entities until a predefined criteria is met, or according to other parameters. | 2015-10-22 |
20150304256 | MESSAGING SYSTEM AND METHOD - A method of cross-platform messaging including receiving, by a messaging system, at least one initial message having a message format, an initial message layout and data indicative of at least one user associated with the at least one initial message, and before delivery to a destination communication device associated with the at least one user, converting, by the messaging system, an initial message into an adapted message, and facilitating, by the messaging system, delivery of the adapted message to the destination communication device. The adapted message is characterized by, at least, an adapted message layout, and the adapted message layout differs from the initial message layout in a characteristic associated with respective message layout such as number of media objects, a graphical image of a media object, a size of a placeholder related to a media object, and a location of a media object within a respective message layout. | 2015-10-22 |
20150304257 | Network-Based Service for Secure Electronic Mail Delivery on an Internet Protocol Network - A network is disclosed that includes a message originator computer and a message recipient computer, for secure electronic mail delivery. In accordance with the invention, the network includes a message delivery server that can distinguish between real and phantom messages. In operation, the message originator computer waits a random time and then transmits a first encrypted phantom message to the message delivery server. This message is to spoof an eavesdropper into believing that there is a steady stream of messages being sent from the originator computer. However, the message delivery server recognizes the message as a phantom message and discards it. When the message originator computer receives a user request to transmit a real message to the recipient computer, it waits a random time and then encrypts and transmits the real message to the message delivery server. The message delivery server recognizes the message as a real message and forwards the real message to the recipient computer. Meanwhile, the message originator computer can continue transmitting encrypted phantom messages to the message delivery server. In this manner, an eavesdropper will be tricked into believing that there is a steady stream of messages being sent from the originator computer. | 2015-10-22 |
20150304258 | ON-DEMAND SPAM REPORTING - A device is configured to report spam on demand. The spam is reported to a spam reporting service center in a communications network. As content is received by the device, the user of the device analyzes the content to determine if the content comprises spam. If the user determines that the content comprises spam, the user triggers the device to report the spam. The content can be of any type of content or combinations of content type, such as SMS, SMS, VM, email, VVM, VVM, and advertisements. The device comprises multiple clients configured to processes, respectively, each content type. In response to receiving the trigger, the appropriate client encapsulates the content. The encapsulated content is sent to a Report Spam client to generate a spam report. The spam report includes the encapsulated content and a disposition instruction. | 2015-10-22 |
20150304259 | CONTROL AND MANAGEMENT OF ELECTRONIC MESSAGING - A method for controlling a message from a sender. A referee can evaluate a credential associated with a message to determine it's desirability to the intended recipient, and take an action based upon the results of the determination. A sender that includes a trusted component can send a credential with the message, and the message can be controlled without a referee. | 2015-10-22 |
20150304260 | METHOD OF PROCESSING CONNECTION DATA OF PLATFORM OF AN INTERNET SITE - The present invention relates to a method of processing data regarding connection to a platform ( | 2015-10-22 |
20150304261 | SYSTEMS AND METHODS FOR ECHOING OR REDIRECTING ELECTRONIC MESSAGES IN A CONVERSATION - Systems and methods are provided for echoing or redirecting messages in a conversation between an originating entily and a plurality of recipient entities, According to certain aspects, a facilitating entity determines to echo or redirect an electronic message and identifies an additional entity to which to echo or redirect the electronic message. In some embodiments, the facilitating entity can echo or redirect return messages that are associated with an original message. In redirecting an electronic message, the facilitating entity retrieves the electronic message from a recipient entity and sends the electronic message to an additional entity. The facilitating entity echoes or redirects messages according to various analyses and/or in response to various conditions, situations, and/or the like. | 2015-10-22 |
20150304262 | Device Discovery Method, Apparatus and System - A device discovery method, apparatus and system. The method includes transmitting a detection request message on a set transmit channel, where the detection request message carries interception rule information of a local device, and the interception rule information includes at least interception time information and/or interception channel information; and intercepting, according to the interception rule information, a detection response message transmitted by another device. The device discovery method, apparatus and system provided by the embodiments of the present invention can improve the device discovery efficiency. | 2015-10-22 |
20150304263 | INNER-CIRCLE SOCIAL SOURCING - A social networking environment supporting collaborative social interaction is disclosed. The social networking environment may be implemented by a computing system including a number of client computing devices and a server system that communicate with each other via a communications network. User profile and geographic location information associated with users of the social networking environment may be shared with each other. Users may request commentary from other users regarding a target user. Users may receive and fulfill requests for commentary to facilitate social interactions between two or more other users. Users may define an inner-circle of users from which commentary may be requested by that user. | 2015-10-22 |
20150304264 | CONTEXT AWARE SERIALIZATION - Certain embodiments of the present invention relate to techniques for serializing account and message management actions performed at a message management service for synchronization with a messaging service. A message management service can receive requests from a client device and/or a messaging service to perform actions on resources for an email message account. The actions can include account-related actions, folder-related actions, message thread-related actions, and/or message-related actions. Message management service can implement techniques for serializing actions that conflict, such as actions on a resource (e.g., a message account, a message, a folder, or a message thread) that conflict with other actions on the same resource and/or other resources that have a dependency relationship. By performing serialization, message management service can prevent conflicting actions from being performed concurrently, while enabling non-conflicting actions to be performed in parallel, thereby improving performance for execution of actions. | 2015-10-22 |
20150304265 | BROADCAST NOTIFICATION SYSTEM - An online content management service can manage distribution of event notifications to client devices based on notification keys. Client devices can register with the content management service to receive event notifications associated with one or more specific notification keys of interest. The content management service can receive information about events, determine a notification key for each event, and selectively send notifications to clients that are registered for that notification key. The content management service can store event notifications for client devices that are generated during a period when the client device is not in communication with the content management service and can send the missed event notifications to the client device when the client device reestablishes communication with the content management service. | 2015-10-22 |
20150304266 | METHOD AND APPARATUS FOR ADDING FRIEND, AND STORAGE MEDIUM - A method and apparatus for adding friend are described. The method includes: scanning to acquire a two-dimension code shared by a two-dimension code sharing user; parsing the two-dimension code to obtain a responsive user identifier; judging a relationship between the user identifier and a user identifier of the two-dimension code sharing user; and if the relationship is a stranger relationship, entering a friend adding interface and adding the two-dimension code sharing user as a friend. The present method is capable of avoiding leakage of user information. | 2015-10-22 |
20150304267 | MOTOR VEHICLE COMPRISING AN OPERATING DEVICE FOR OPERATING AN INTERNET PORTAL OF A SOCIAL NETWORK SERVICE - A method controls an Internet portal for a social network service from a motor vehicle. The Internet portal provides functions that can be activated by sending a control command to the Internet portal. An immobile proxy device provides a module that receives a selection, which is made by a user in the motor vehicle, for one of the functions and then sends a control command, which is specific to the Internet portal, for activating the function to the Internet portal. The module also produces suitable display data for the motor vehicle from output data from the Internet portal. The module also receives additional data from an additional data source and produces an additional control command for the Internet portal and/or display data for the motor vehicle therefrom. | 2015-10-22 |
20150304268 | SHARING A SECRET IN A SOCIAL NETWORKING APPLICATION ANONYMOUSLY - Technology is directed to a social networking application for sharing secrets anonymously. The social networking application receives a message from a user, anonymizes the message to generate a secret and shares the secret with other users. The other users cannot know who posted the secret. A message can include multimedia content such as a text, an image, an audio, a video or a combination thereof. The secrets are displayed in a graphical user interface (GUI) as secret GUI components. A secret GUI component displays the secret in a particular format. In one example, a text of the secret is superimposed on an image or a background color of the secret in the secret GUI component. The secret GUI component includes GUI elements using which users can “love”/“heart”/“like” a secret and/or comment on the secret. The secret GUI component can display author-viewer relationship information or a location information of the author. | 2015-10-22 |
20150304269 | SYSTEM AND METHOD - A system and method is provided for managing text-based communication between visitors of a website. In particular, the invention relates to a system and method for managing online comments contributed by these visitors. More particularly, but not exclusively, there is provided a system for processing online comments associated with electronic content, the system comprising one or more processor is configured to assign a comment to one of at least two options, the at least two options relate to at least two potential viewpoints associated with the electronic content. The method comprising assigning a comment to one of at least two options, the at least two options relate to at least two potential viewpoints associated with the electronic content. | 2015-10-22 |
20150304270 | SYSTEM, PROCESS AND COMPUTER WRITEABLE MEDIUM FOR PROVIDING A SOCIAL MEDIA DIRECTED MOBILE APPLICATION HAVING INQUIRY BASED GAME PLAY FUNCTIONALITY - A social media based messaging and entertainment system incorporating any number of processor driven devices, each including key input and audio/visual output display features. A software program incorporated into the processor device further includes a plurality of enterable fields for composing and responding to query based messages. The software program further may include any of a browser supported website or a mobile operating system supported application configured for linking together any number of the processor driven devices. | 2015-10-22 |
20150304271 | Address resolution protocol buffer and buffering method thereof - An Address Resolution Protocol, ARP, cache is provided, including a network interface module, configured to send an Internet Protocol, IP, data package to the searching module for IP address searching; and to send an acquired Media Access Control, MAC, address to the searching module after the IP address searching fails; a searching module, configured to search, according to the IP data package sent from the network interface module, the ARP cache module for the IP address; and to store the IP address and the MAC address sent from the network interface module in the ARP cache module after the IP address searching fails; and the ARP cache module, configured to provide the IP address to the searching module for the IP address searching; to store the IP address in the ARP cache module after the IP address searching fails. | 2015-10-22 |
20150304272 | NETWORK ACCESSING METHOD, APPLICATION SERVER AND SYSTEM - The present invention discloses a method, an application server and a system for network access, wherein, the method comprises: receiving a network address of a network to be accessed provided by a user via a client; obtaining a temporary account information of the network to be accessed corresponding to the network address according to the network address; logging on the network to be accessed via the temporary account information; and feeding a network page information after logging on the network to be accessed back to the client. In the embodiments of the invention, when a user accesses a network, on which the user is not registered, via a client, because the application server may obtain the temporary account information of the network to be accessed according to the network address, the application server may log on the network to be accessed in place of the user and feed back the network page information after logging on to the client, thereby it may be realized that a user accesses a network without registration; in comparison with the prior art, because a user does not need to register time after time when accessing different networks, user operation is simplified, and user experience is improved. | 2015-10-22 |
20150304273 | COMMUNICATION DEVICE RECORDING INPUT VALUES FOR SUBNET MASK SETTING ITEM, IP ADDRESS SETTING ITEM, AND GATEWAY SETTING ITEM - In a communication device a processor receives, from a terminal device, a plurality of input values corresponding to a plurality of setting items including an IP Address setting item, a Subnet Mask setting item, and a Gateway setting item. The plurality of input values includes a first input value, a second input value, and a third input value. The processor determines whether the third input value is within a range that is defined by the received first input value and the received second input value; and record the first input value for the Subnet Mask setting item, the second input value for the one of the IP address setting item and the Gateway setting item, and the third input value for the remaining one of the IP address setting item and the Gateway setting item when it is determined that the third input value is within the range. | 2015-10-22 |
20150304274 | METHOD AND APPARATUS FOR CONFIGURING DHCP CLIENT - It is provided a method for configuring a DHCP client. The method comprises the steps of detecting state of the DHCP client; in response to transition to Bound state, storing network address and at least one of configuration parameters of the DHCP client, which is allocated by a DHCP server; and when the DHCP server is unreachable, in response to transition to Selecting state, restoring the network address and the at least one of configuration parameters without changing the Selecting state of the DHCP client. | 2015-10-22 |
20150304275 | CARRIER GRADE NAT - Described herein are techniques for providing carrier grade dynamic network address translation (NAT). The disclosed techniques allow for dynamic switching from regular NAT to network address ports translation (NAPT) based on system load. Under the NAPT mode, the disclosed techniques allow the ports of a public IP address to be broken up into contiguous blocks of ports (e.g., of the same size and/or of varying size) such that each block can be assigned to an associated (e.g., different) private IP address. For each new connection from the private IP address, if the port used is the next port sequentially, the NAT device can store an offset from the starting public/private IP address ports. If the port is not the next port sequentially, the network address translation device can associate a new block of public ports to the private IP address. | 2015-10-22 |
20150304276 | NETWORK ADDRESS TRANSLATION TRAVERSAL SYSTEM AND METHOD FOR REAL-TIME COMMUNICATIONS - A network address translation traversal system and method for real-time communications are provided. The network address translation traversal system includes a user terminal equipment, a network address translation device, a signaling control system and a peer terminal. The user terminal equipment is in a private network, while the signaling control system and the peer terminal are in a public network. The signaling control system is configured to instruct the network address translation device to create a network address translation mapping for a real-time communication connection. The peer terminal is configured to create the real-time communication connection with the user terminal equipment via the network address translation device directly according to the network address translation mapping. | 2015-10-22 |
20150304277 | METHOD, USER NODE AND REMOTE ACCESS SERVER FOR RELEASING ADDRESS - A method for releasing an address, a user node and a remote access server are disclosed. The method includes: when releasing an Internet protocol version 6 (IPv6) address, a user node notifying the released IPv6 address to nodes within a scope of a local link. In the above technical scheme, when releasing the IPv6 address generated through a prefix, the user node notifies the released IPv6 address to the nodes within the scope of the local link, which enhances the accuracy of charging, improves the user experience, and plays a role of address resource recovery within the scope of the local link, thereby being able to reuse address resources released by the user in the network. | 2015-10-22 |
20150304278 | SYSTEMS AND METHODS FOR SECURE NETWORK-BASED MONITORING OF ELECTRICAL POWER GENERATORS - A computer-based method for monitoring power generation uses a first computing device including a processor and a memory. The method includes receiving, at the first computing device, controller data from a controller associated with a power generator. The first computing device and the controller are coupled in two-way communication. The method also includes transmitting the controller data to a second computing device associated with monitoring the power generator. The first computing device transmits the controller data in one-way communication to the second computing device. | 2015-10-22 |
20150304279 | Peripheral Interface for Residential laaS - A physical peripheral device is connected to a remote virtual appliance provided by a cloud service using a peripheral interface device. A cloud service user is authenticated through the peripheral interface device using a user identifier. Physical peripheral devices connected to the peripheral interface device are detected, and connection parameters to the remote virtual appliance are negotiated to establish a network tunnel. The remote virtual appliance is activated, and the physical peripheral devices are connected to the remote virtual appliance. | 2015-10-22 |
20150304280 | INTRUSION PREVENTION AND DETECTION IN A WIRELESS NETWORK - The invention provides an intrusion detection and prevention system and computer program which, when operated or executed by a security element ( | 2015-10-22 |
20150304281 | METHOD AND APPARATUS FOR APPLICATION AND L4-L7 PROTOCOL AWARE DYNAMIC NETWORK ACCESS CONTROL, THREAT MANAGEMENT AND OPTIMIZATIONS IN SDN BASED NETWORKS - A multi-cloud fabric system includes an open flow switch responsive to a first and subsequent data packets and a services controller including a flow database. Further, the multi-cloud fabric system includes a SDN controller that communicates with the services controller through an open flow switch, wherein upon the receipt of the first data packet, the open flow switch directs the first packet to the services controller. The services controller creates a flow entry and makes authentication decisions based on authentication information. The open flow controller based on authentication policies, determines whether to allow or deny access to a corporate network based on saved authentication policies and if the open flow controller determines to deny access, the first packet being re-directed to an authentication server for access. | 2015-10-22 |
20150304282 | Nested Independent Virtual Private Networks With Shared Rekey And Consistency Services - First and second nested virtual private networks share a common rekey service. A first key server generates first cryptographic keys and policies for use by gateways of the VPN to encrypt and decrypt data packets. The key server establishes a connection with a second key server to generate second cryptographic keys and policies independently of the first key server for use by encryption units of a second VPN that is nested with and operates independently of the first VPN. The first key server refreshes the first cryptographic keys in the first VPN gateways using a common rekey service, and cooperates with the second key server to refresh the second cryptographic keys in the second VPN encryption units using the common rekey service. | 2015-10-22 |
20150304283 | Source Based Anonymity and Segmentation for Visitors - A method and system for the anonymization and segmentation of the media access control (MAC) addresses reported by visitors' 802.11 enabled devices at a venue operator premises. This system assures a venue operator and its visitors that no individually identifying information about a visitor is re-transmitted or stored that can be traced back to their MAC address, while still allowing the venue operator to obtain venue visitor counts visit frequencies well as traffic patterns during visits (i.e. dwell times at, and movements between, locations within a venue) and counts of common visitors between venues. It also ensures that the data generated is segmented so that the data obtained by two different venue operators is not correlatable between visitors common to the two sets of data. | 2015-10-22 |
20150304284 | SECURE DELIVERY OF FILES TO AUTHORIZED RECIPIENTS - A method and system for encoding a file to be transmitted by a sender computer of a sender to a recipient computer of a recipient. The file has a name. The sender computer: encrypts the file using an encryption key; receives, from a server computer, a voiceprint identifier assigned to a voiceprint of the recipient; creates a voice check ticket by combining the received voiceprint identifier, the encryption key, and a voice check text; transmits, to the server computer, the created voice check ticket; receives an address where the transmitted voice check ticket has been stored by the server computer; encodes the received address within the name of the file, the encoding comprising renaming the file with a filename that includes the name of the file and the received address merged together; and sends, to the recipient computer, the encrypted file whose name includes the encoded address. | 2015-10-22 |
20150304285 | SECURE DELIVERY OF FILES TO AUTHORIZED RECIPIENTS - A method and system for decoding an encrypted file. A recipient computer: receives, from a sender computer, the encrypted file having a filename that includes an encoded address; parses the received filename; extracts the encoded address from the parsed filename; accesses a voice check ticket at the extracted encoded address; receives voice check text from the voice check ticket; visually displays the received voice check text on a computer display of the recipient computer; prompts the recipient to read aloud the displayed voice check text; receives an audio signal from a reading aloud, by the prompted recipient, of the displayed voice check text; transmits the received audio signal to a server computer; receives, from the server computer, an encryption key after the server computer has verified, from analysis of the audio signal, the recipient's voice; and decrypts the received encrypted file using the received encryption key. | 2015-10-22 |
20150304286 | SYMMETRIC KEY DISTRIBUTION FRAMEWORK FOR THE INTERNET - A method, device, and system are disclosed. In one embodiment the method includes receiving measured health information from a client on a key distribution server. Once the measured health information is received the server is capable of validating the measured health information to see if it is authentic. The server is also capable of sending a session key to the client when the measured health information is validated. When the client receives the session key, the client is capable of initiating an encrypted and authenticated connection with an application server in the domain using the session key. | 2015-10-22 |
20150304287 | SYSTEM AND METHOD FOR MERGING ENCRYPTION DATA WITHOUT SHARING A PRIVATE KEY - A method for data privacy in a distributed communication system including a plurality of client terminals merges encrypted streaming data using tree-like encryption key switching and without sharing any private keys in a distributed communication system. The merged data is then sent to client terminals to be further process by respective client terminals. | 2015-10-22 |
20150304288 | SYSTEM AND METHOD FOR END-TO-END ENCRYPTION AND SECURITY INDICATION AT AN ENDPOINT - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for implementing real-time transport control protocol to obtain an end-to-end encryption and security status of a communication session. The system collects real-time transport control protocol messages associated with a communication session, wherein the real-time transport control protocol messages are generated by devices in the communication session, and wherein the real-time transport control protocol messages include security information associated with the communication session. Then, based on the real-time transport control protocol messages, the system determines a security status associated with the communication session. The system can also generate an indication of the security status associated with the communication session. Further, the system can generate an indication of the security status of a communication session on a per participant basis. | 2015-10-22 |
20150304289 | NOTARIZATION AGENT AND METHOD FOR COLLECTING DIGITAL EVIDENCE USING NOTARIZATION AGENT - In a digital evidence collection method, an evidence collection device sends an evidence collection request message requesting permission of evidence collection to a notarization server through a notarization agent. The notarization server sends a collection permission message permitting evidence collection to the evidence collection device through the notarization agent. The evidence collection device requests evidence data from an evidence collection target system through the notarization agent. The evidence collection target system transmits the evidence data to the notarization agent. The notarization agent encrypts the evidence data and transfers encrypted evidence data to the evidence collection device. | 2015-10-22 |
20150304290 | ELECTRONIC DEVICES AND METHODS FOR NEAR FIELD COMMUNICATION - An electronic device includes a secure element, a touch sensor and a touch sensor controller. The secure element generates a security code for a trusted transaction. The touch sensor includes transmitting electrodes and receiving electrodes configured for sensing touch events on a touch-sensitive area of the electronic device. The touch sensor controller is coupled to the secure element and the touch sensor and controls operations of the touch sensor. The secure element further transmits the security code to the touch sensor controller and the touch sensor controller transmits the security code via the transmitting electrodes. | 2015-10-22 |
20150304291 | Proximity Security Tokens - Disclosed embodiments comprise one or more security methods, systems or apparatus suitable to provide additional security to personal property or financial transactions. Embodiments feature a proximity security token which is physically separate from a protected device. A communications link is provided between the proximity security token and the protected device which communications link operates over a limited range. Thus, the presence and active operation of the limited range communications link between the proximity security token and protected device indicates that the protected device has not been lost and stolen. Interruption of the communications link indicates that the protected device may have been lost or stolen causing the commencement of security actions. | 2015-10-22 |
20150304292 | A SYSTEM AND METHOD FOR SECURE PROXY-BASED AUTHENTICATION - A system and method for secure authentication facilitates improving the security of authentication between a client and a target by using an innovative authentication module on a proxy. The client can connect to the proxy using a native protocol and provides client credentials to the proxy. The proxy uses an authentication module to authenticate the client and then to provide target access credentials for proxy-target authentication, thereby giving the client access to the target through the proxy. The invention facilitates connection between the client and the target without requiring the client to be in possession of the target access credentials. The proxy can optionally be connected to a privileged, access management system which can provide and/or store target access credentials. Proxy-provided target access credentials facilitate preventing a client security breech from exposing target access credentials. | 2015-10-22 |
20150304293 | MESSAGE AUTHENTICATION SYSTEM AND MESSAGE AUTHENTICATION METHOD - The message authentication system is a message authentication system used in a multihop network and including a server | 2015-10-22 |
20150304294 | ENTITY TO AUTHORIZE DELEGATION OF PERMISSIONS - Systems and methods are described for delegating permissions to enable account access. The systems utilize a delegation profile that can be created within a secured account of at least one user. The delegation profile includes a name, a validation policy that specifies principals which may be external to the account and which are permitted to assume the delegation profile, and an authorization policy that indicates the permitted actions within the account for those principals which are acting within the delegation profile. Once the delegation profile is created, it can be provided to external principals or services. These external principals or services can use the delegation profile to obtain credentials for performing various actions in the account using the credentials of the delegation profile. | 2015-10-22 |
20150304295 | INFORMATION PROCESSING DEVICE AND METHOD FOR CONTROLLING INFORMATION PROCESSING DEVICE - A provider server ( | 2015-10-22 |
20150304296 | REGISTERING CONTENT TO A DIGITAL LOCKER - An approach is provided for registering specific content in a portable storage medium to a digital locker. The portable storage medium is configured to include a content access application which causes the user interface to display a content access and registration part on a terminal executing the content access application, to request user entry of access validation information associated with the specific content. Upon access validation, the specific content can be registered to the digital locker of the user. | 2015-10-22 |
20150304297 | Secure Information Storage and Delivery System and Method - A system for secure information storage and delivery includes a vault repository that includes a secure vault associated with a user, wherein the secure vault is associated with a service level including at least one of a data type or a data size limit associated with the secure vault, the secure vault being adapted to receive and at least one data entry and securely store the at least one data entry if the at least one of a size or a type of the at least one data entry is consistent with the service level. A mobile vault server coupled to the vault repository creates a mobile vault on a mobile device based on the secure vault and is capable of authenticating the mobile device based on user authentication information. The mobile vault server includes a mobile device handler that communicates with the mobile device. A synchronization utility determines whether the at least one data entry on the secure vault is transferable to or storable on the mobile vault based on at least one of the size or the type of the at least one data entry and transfers the at least one data entry from the secure vault to a corresponding data entry on the mobile vault if the at least one data entry on the secure vault is determined to be transferable to or storable on the mobile vault. | 2015-10-22 |
20150304298 | METHODS AND APPARATUS FOR PROVIDING ACCESS TO A SERVICE - Methods and apparatus for providing access to a service are disclosed. An example method includes analyzing a received request to verify a requesting device, the received request identifying multicast group memberships of the requesting device. Access is provided to the service in response to verifying the requesting device using the multicast group memberships. | 2015-10-22 |
20150304299 | Social Authentication - In one embodiment, a method includes providing for presentation to a user a number of content objects. At least one of the presented content objects is socially relevant to the user. wherein at least one of presented content objects is socially irrelevant to the user. The presented content objects are socially relevant or socially irrelevant to the user based on whether in a social graph a node corresponding to the user is connected by an edge to a node associated with the content object. The edge represents a social relationship between the content object and the user. The method also includes receiving an input indicating a selection of a number of the presented content objects by the user; and authenticating the user based on a determination of whether the selected content objects are socially irrelevant to the user. | 2015-10-22 |
20150304300 | METHOD FOR AT LEAST ONE SUBMITTER TO COMMUNICATE SENSITIVE INCIDENT INFORMATION AND LOCATIONS TO RECEIVERS - The present invention relates to a method for sending, receiving, reporting and/or responding to mood related, time-sensitive, live situation, and/or secretive matter messages, through a one-step submission, and/or Smart Button activation anonymous submit process and/or targeted authorized receipt process, having the generating, assigning, and utilizing of unique identifiers and corresponding actionable and searchable administrative report generating process. More specifically, the invention relates to a method for permitting submitter(s) to choose the degree of anonymity and/or submit information/content and/or location and send that information/content and/or location, by means of a user interface, Smart Button, or other computer, mobile device, mobile phone, smart pad, electronic device, input device, communication device, touchscreen computing device, smart device, or tablet to provide an activated application and open a log-in screen to authorized receiver(s) who may access such information/content, which can be encrypted, in whole or in part, and act, report, forward or respond accordingly. | 2015-10-22 |
20150304301 | Systems and Methods for Login and Authorization - Systems and methods are provided for login and authorization. For example, a third-party terminal receives a login request from a user and sends an authorization request from the third-party terminal to a network server; the network server generates first two-dimensional-barcode information and sends the first two-dimensional-barcode information to the third-party terminal; the third-party terminal displays a first two-dimensional-barcode image; a mobile terminal extracts the first two-dimensional-barcode information from the first two-dimensional-barcode image and sends first user account information and the first two-dimensional-barcode information to the network server; the network server validates the first user account information and the first two-dimensional-barcode information based on at least information associated with stored second user account information and second two-dimensional-barcode information generated by the network server. | 2015-10-22 |
20150304302 | METHOD AND APPARATUS OF DETECTING WEAK PASSWORD - A method and an apparatus of detecting a weak password are disclosed The method comprises: receiving a password to be detected; acquiring an identity information set of a user of the password to be detected, the identity information set including a plurality of pieces of identity information of the user and associated users thereof; detecting whether identity information associated with the password to be detected exists in the identity information set; and determining that the password to be detected is a weak password if the identity information associated with the password to be detected exists in the identity information set. The technical solution of the present disclosure can detect whether a password to be detected is set up by a user using identity information thereof or identity information of a user who be closely associated therewith, thus determining whether the password to be detected is prone to cracking, and thereby further improving the security of the password of the user. | 2015-10-22 |
20150304303 | METHOD AND SYSTEM OF PROVIDING A PICTURE PASSWORD FOR RELATIVELY SMALLER DISPLAYS - Embodiments described herein relate to a device operable to process input for a picture password for proof of knowledge. In some embodiments, the device includes a display, an input subsystem, processor(s), and memory containing instructions executable by the processor(s) such that the device is operative to display, on the display of the device, an image for the picture password proof of knowledge. The image is associated with an overlaid grid comprising a plurality of elements, and each element corresponds to a distinct area of the image. The device is further operative to, in response to receiving an input via the input subsystem at a first location of the display, highlight an element of the overlaid grid at a second location on the first image on the display. The second location is offset from the first location by a predetermined offset. | 2015-10-22 |
20150304304 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR ENABLING ACCESS TO A RESOURCE OF A MULTI-TENANT ON-DEMAND DATABASE SERVICE UTILIZING A TOKEN - In accordance with embodiments, there are provided mechanisms and methods for enabling access to a resource of a multi-tenant on-demand database service utilizing a token. These mechanisms and methods for enabling access to a resource of a multi-tenant on-demand database service utilizing a token can be utilized to prevent identification of a user attempting to access the resource, and thus unwanted use of the user's identity. | 2015-10-22 |
20150304305 | MANAGING ACCESS TO AN ON-DEMAND SERVICE - In accordance with embodiments, there are provided mechanisms and methods for managing a risk of access to an on-demand service as a condition of permitting access to the on-demand service. These mechanisms and methods for providing such management can enable embodiments to help prohibit an unauthorized user from accessing an account of an authorized user when the authorized user inadvertently loses login information. The ability of embodiments to provide such management may lead to an improved security feature for accessing on-demand services. | 2015-10-22 |
20150304306 | STORAGE SYSTEM AND METHOD OF STORING AND MANAGING DATA - A system for and method of storing data comprising: encoding a file into a plurality of fragments; retrieving storage configuration data from a data management store including data associated with a plurality of remote storage volumes, the storage configuration data comprising an indication of a predefined data transmission size corresponding to each remote storage volume; using the storage configuration data to identify a storage strategy associating each fragment with a remote storage volume, wherein using the storage configuration data includes using the indications of the pre defined data transmission sizes; packaging one or more fragments each associated with a common identified remote storage volume as identified by the storage strategy to form a data bundle; communicating the data bundle to the respective common identified remote storage volume associated with the fragments in the data bundle; and storing the fragments at that identified remote storage volume. | 2015-10-22 |
20150304307 | APPLICATION SIGNING - Systems and methods for application signing are disclosed. In some implementations, an application package identifier and a password may be received at an application signing server. Upon authenticating the application package identifier and the password, a fingerprint identifying the developer is received. Upon receipt of the fingerprint, the application signing server generates a secure key for the application based on the fingerprint, where the secure key is provided to the developer for inclusion within the application. Upon determining that the application package identifier and the secure key included in a request from an operating system of a mobile device matches an authorized application package identifier and an authorized secure key stored at the application signing server, the application signing server provides the requested list of the one or more APIs to the operating system to grant the application access to the APIs in the list. | 2015-10-22 |
20150304308 | SECURE IDENTITY FEDERATION FOR NON-FEDERATED SYSTEMS - Methods and apparatus, including computer program products, implementing and using techniques for providing user credentials over a network to a remote computer application. User credentials for the remote computer application are stored in a central repository that is accessible through the network. A request is sent to a service to perform, on behalf of a user, a particular task involving the remote computer application. It is determined whether the service has been granted permission to act on behalf of the user with respect to the remote computer application. When the service has permission to act on behalf of the user, the service is used to retrieve the user's credentials for the remote computer application from the central repository and to supply the retrieved user credentials to the remote computer application. | 2015-10-22 |
20150304309 | TRANSMITTING ENCODED DIGITAL CERTIFICATE DATA TO CERTIFICATE AUTHORITY USING MOBILE DEVICE - Techniques are disclosed for managing a digital certificate enrollment process. A certificate assistant on a server is configured to encode certificate enrollment data in a barcode graphic, such as a quick response (QR) code. A mobile phone application can then scan the barcode graphic using a camera to recover and transmit the enrollment data to a certificate authority. Doing so allows a system administrator (or other user) to complete the certificate enrollment process in cases where the server is blocked from connecting to a certificate authority (CA) directly, e.g., because the server is behind a firewall blocking any outbound network connections from being initiated. | 2015-10-22 |