50th week of 2015 patent applcation highlights part 71 |
Patent application number | Title | Published |
20150358321 | STORAGE DEVICE, INFORMATION PROCESSING APPARATUS, AND INFORMATION PROCESSING METHOD - According to embodiments, a storage device includes a storage unit, a receiving unit, an authenticating unit, and a control unit. Prior to executing erasure processing of data that has been stored in the storage unit, the receiving unit receives, from an external device that clocks time, third information including first information and second information, the first information regarding time counted by the external device and the second information being information for authenticating the external device. The authenticating unit performs authentication processing of the external device by using the second information included in the third information. When the authentication of the external device has succeeded, the control unit generates an erasure log that contains erasure time when the erasure processing has been executed on the basis of the first information included in the third information. When the authentication of the external device has failed, the execution of the erasure processing is prohibited. | 2015-12-10 |
20150358322 | Generating and Using Ephemeral Identifiers and Message Integrity Codes - Systems and methods for generating and using ephemeral identifiers are provided. One example method includes determining, by one or more computing devices, a current time-count. The method includes determining, by the one or more computing devices, a time-modified identifier based at least in part on a static identifier and the current time-count. The method includes determining, by the one or more computing devices, an ephemeral identifier based at least in part on the time-modified identifier and a rotation key. One example system includes a plurality of beacon devices, at least one observing entity, and at least one verifying entity. | 2015-12-10 |
20150358323 | SYSTEM AND METHOD FOR MODULAR AND CONTINUOUS DATA ASSURANCE - A system for assuring the integrity of information files includes a first server, a manifest transfer engine and a second server. The first server stores information files and an associated manifest file containing a manifest entry for each stored information file. The manifest transfer engine receives the manifest file and the information files from the first server on a predetermined basis. The manifest transfer engine compares an identifying characteristic of each received information file with the manifest entries in the manifest file and, when there is a match, transfers the associated information file on the output as an authenticated information file. The second server receives the authenticated information file from the manifest transfer engine, optionally segments the authenticated information file, and then generates an associated manifest entry for the received authenticated information file (or segmented information files) and stores the associated manifest entry (or entries) in an updated manifest file. | 2015-12-10 |
20150358324 | SCHEDULE RECORDING METHOD - Disclosed is a schedule recording method, comprising: an authentication server receiving triggering information and then acquiring key information from the triggering information, the key information comprising an authentication code; acquiring an authentication window, and searching the authentication window for the authentication code; if the authentication code is found, extracting a time factor corresponding to the authentication code, and generating and storing an authentication code list and/or staff log. | 2015-12-10 |
20150358325 | Method and System for Distributing Service Data - Provided are a method and system for distributing service data, wherein the method includes that a user terminal is authenticated and accesses a core network, a service data message sent by the user terminal is received, target address information contained in the service data message is acquired, and the service data message is distributed according to the acquired target address information. | 2015-12-10 |
20150358326 | SECURED DATA EXCHANGE WITH EXTERNAL USERS - A method for controlling access to enterprise objects for an external user. The method includes receiving a search request from an external SRM for access to an enterprise object in an enterprise system, evaluating an enterprise rule tree to determine access and editing privileges granted to an external user accessor for the enterprise object, granting the access and editing privileges to the external user accessor based upon the enterprise rule tree, and sending the enterprise object as external user data to the SRM when the enterprise rule tree authenticates the external user accessor. | 2015-12-10 |
20150358327 | Personal Location Code - Methods and apparatus, including computer program products, for receiving a request from a requestor to locate a user. The request identifies a personal location code (PLC) for the user. It is determined if the request is allowed based on the PLC. If the request is allowed, the current location of the user is obtained based on the location of one or more devices associated with the user. The current location of the device is then provided to the requestor. | 2015-12-10 |
20150358328 | SECURE LOCAL SERVER FOR SYNCHRONIZED ONLINE CONTENT MANAGEMENT SYSTEM - Systems, methods, and non-transitory computer-readable storage media for securely accessing locally stored synchronized content using a local web server. A client application on a client device may receive from a web browser on the client device a request to access a local content stored on a client device. The client application may be configured to synchronize the local content with a remote content stored in an online content management system. The client application may issue a challenge for the web browser. The client application or the online content management system may then receive a response to the challenge. If the response is a valid response to the challenge, the web browser may be allowed to access the local content via the client application. | 2015-12-10 |
20150358329 | ACCESS RESTRICTION DEVICE, ON-BOARD COMMUNICATION SYSTEM AND METHOD FOR COMMUNICATION RESTRICTION - An access restriction device as well as an on-board communication system and a method for communication restriction, which prevent outside leakage of information caused by unauthorized access of malicious programs to an in-car network. The communication between the in-car network of the vehicle and an external device is performed by a security controller. The security controller can perform addition or update of a program involving processing for transmission and reception of the information. The security controller performs processing for restricting access to information of the in-car network performed by program execution according to an access authorization level of each program and an access permission level of each type of information. The security controller restricts the transmission depending on the access authorization level of each program and the access permission level of each type of information in case of transmitting the information to the in-car network by the program execution. | 2015-12-10 |
20150358330 | Systems And Methods For Expedited Entitlement Checks - Systems and methods for managing access data are disclosed. One method can comprise receiving prediction information relating to one or more content options and requesting access information associated with the prediction information. At least a portion of the received access information can be processed to provide a preliminary access decision. A request for access relating to the one or more data options can be received and an access decision based at least in part on the preliminary access decision can be provided. | 2015-12-10 |
20150358331 | IDENTITY MANAGEMENT, AUTHORIZATION AND ENTITLEMENT FRAMEWORK - A system and method are provided for identity management of applications on computing devices. A set of applications are registered at an identity management system. Each application allows a different level of access permission to the application based on a user role associated with a user accessing the application. A set of user profiles associated with users are received. Each user profile includes a login credential for allowing access to the applications and a user role for defining a user level of access permission to the applications. An access request to access an application is received at the identity management system and responsive to the access request, a user associated with the access request is authenticated. Upon successful authentication, the user role associated with the authenticated user is determined and the user is allowed to access functions of the application corresponding to the determined user role. | 2015-12-10 |
20150358332 | DETERMINING TRUST LEVELS ON A DEVICE RECEIVING AUTHORIZATION - Methods and systems for receiving an offer from an entrusting device to access one or more devices are disclosed. A trust model module of a first device receives the offer from the entrusting device to provide the first device with permission to access the one or more devices, and determines whether or not to accept the offer from the entrusting device to provide the permission to access the one or more devices, wherein the first device determines whether or not to accept the permission to access the one or more devices based on a relationship between the first device and the entrusting device and/or a relationship between the first device and the one or more devices. | 2015-12-10 |
20150358333 | GEO-LOCATION AND BIOMETRIC PRESENCE SECURITY - Geo-location and biometric security systems and methods are provided for authenticating a user of a mobile device. The geo-location and biometric security system may include a plurality of human biometric and geo-location security functions on the user device. The biometric and geo-location security functions may be set in any combination by the user to determine the security conditions for the device to enable resources or applications local to or remote from the user device. In certain instances, the applications enabled by the present invention are secure financial transactions. | 2015-12-10 |
20150358334 | Method for authenticating a client program by a remote data processing system - A method, executed by a data processing device, for verifying authenticity of a client program executed on a processing device, the method comprising: receiving one or more messages from the processing device, and verifying authenticity of the client program based on one or more properties of the received messages; repeatedly updating a first part of the client program, wherein different instances of the first part of the client program cause messages sent by the processing device to have respective detectable properties indicative of the instance of the first part of the client program. | 2015-12-10 |
20150358335 | Method and Apparatus for Trusted Branded Email - A trusted branded email method and apparatus in one aspect detects branded electronic messages and performs validation before it is sent to a recipient. In another aspect, an electronic messages is branded by embedding branding assets and validation signatures. Algorithms that generate validation signatures are dynamically selected to further strengthen the security aspects. Branding assets are presented to a user using a distinct indicia that represents to the user that the branding assets are secure. | 2015-12-10 |
20150358336 | METHOD FOR DETECTING FRAUD IN AN IMS NETWORK - A fraud detection method which may be performed by an HSS server in an IMS network is provided. It may comprise receiving a message from an I-CSCF or an S-CSCF entity, the message mentioning a public identity and a private identity and verifying the validity and the consistency of said public and private identities, the message also mentioning at least one address of a user in the IMS network. If invalidity or inconsistency is found, the method may include storing information to the effect that a fraud has been detected for a set comprising the public identity, the private identity and the at least one address. | 2015-12-10 |
20150358337 | NON-CONTACT ELECTROMAGNETIC ILLUMINATED DETECTION OF PART ANOMALIES FOR CYBER PHYSICAL SECURITY - An apparatus for testing, inspecting or screening an electronic device for electrical characteristics, modified or unmodified hardware, or firmware modifications including Malware, Trojans, improper versioning, and the like, includes a transmitting antenna positioned at a distance from the electronic device and a electromagnetic energy receiver or sensor for examining a resulting unintentional derived electromagnetic energy from the electronic device. The receiver collects unintentional RF energy components emitted by the device and includes a processor and executable instructions that perform analysis in a response to the acquired electromagnetic energy input. The characteristics of the collected RF energy may be compared with RF energy characteristics of an exemplary device. The analysis determines one of a modified, unmodified or score of certainty of discerned condition of the device. | 2015-12-10 |
20150358338 | NETWORK-BASED DETECTION OF AUTHENTICATION FAILURES - A method includes monitoring communication traffic that is exchanged over a computer network. One or more authentication attempts that have failed are identified in at least part of the monitored communication traffic. Hostile activity is detected in the computer network by analyzing the failed authentication attempts. | 2015-12-10 |
20150358339 | DETECTION OF INTRUSION IN A WIRELESS NETWORK - A method and associated system for detecting intrusion of a wireless network. A determination is made that a first data stream received by the wireless network does not include N1 communication protocols included in a second data stream previously determined to be valid, N1 being a positive integer. A determination is made that N1 exceeds a predetermined first tolerance, and in response, that the first data stream does not include N2 communication protocols included in a third data stream previously determined to be intrusive to the wireless network, N2 being an integer equal to or greater than zero. A determination is made that N2 is less than a predetermined second tolerance, and in response, an alert that the received data stream is potentially intrusive to the wireless network is generated. | 2015-12-10 |
20150358340 | Method, apparatus and system for realizing security detection in heterogeneous network - Provided are a method, apparatus and system for realizing security detection in a heterogeneous network. UE establishes cross-Evolved NodeB (eNB) double/multiple connections with a MeNB and a LPN in an access network which is a kind of heterogeneous network, the LPN is responsible for data distribution, and the distribution is layered by RB; the MeNB receives a report message from the LPN through a backhaul interface between the MeNB and the LPN, and the report message contains the data count sent/received between the LPN and the UE; and the MeNB transmits CP information with the UE to compare the data counts actually sent/received between the access network and the UE to detect whether there is insertion of an attacker or not. According to the present disclosure, the heterogeneous network is deployed with the MeNB and the LPN, so that joint transmission service is provided for the UE; and moreover, the security performance of the network is further improved, the present disclosure is applicable to various backhauls, and good joint transmission service can be securely and efficiently provided for the UE. | 2015-12-10 |
20150358341 | Assessing Threat to at Least One Computer Network - Apparatus for assessing threat to at least one computer network in which a plurality of systems ( | 2015-12-10 |
20150358342 | MALICIOUS WEBSITE ACCESS METHOD AND APPARATUS - A malicious website access method and apparatus are provided. The method includes: determining whether a website is a malicious website; and acquiring a non-executable preview interface of a web page of the malicious website for a terminal to display, if the website is a malicious website. A user may view, through a non-executable preview interface, information about a website to be accessed by the user. Moreover, because a terminal does not access a malicious website directly, the terminal is not exposed to malicious websites, thereby enhancing security of the terminal. | 2015-12-10 |
20150358343 | DETECTION AND CLASSIFICATION OF MALICIOUS CLIENTS BASED ON MESSAGE ALPHABET ANALYSIS - Described herein are systems, methods and apparatus for detecting and classifying malicious agents on a computer network. Many attacks require that the malicious message or messages employ certain characters. Such sets of characters can be indicative of an attack and referred to as a “malicious alphabet.” All clients on a network are likely to use characters from malicious alphabets in legitimate and valid network messages. However, malicious clients are likely to use characters from malicious alphabets in different ways than legitimate clients. According to the teachings hereof, a particular client's use of a malicious alphabet can be tracked and used to identify it as a potential attacker. Such tracking may take place across the applications and/or websites to which the traffic is directed. Based on the nature and extent of the client's use of the malicious alphabet, a reputation score for the client can be developed. | 2015-12-10 |
20150358344 | Automated forensics of computer systems using behavioral intelligence - A method for computer system forensics includes receiving an identification of at least one host computer ( | 2015-12-10 |
20150358345 | ACTIVE ATTACK DETECTION SYSTEM - A method and system of detecting security attacks on a wireless networked computer system includes a remote sensor having a wireless adapter, processor, storage and memory, the remote sensor configured and arranged to emulate a client workstation that is activated and instructed to connect to a wireless computer network having an unknown security status. A secure communications tunnel is established via wired or wireless means between the remote sensor and a server. The server is configured to issue commands to the remote sensor and receive alert information from the remote sensor which detects security events on the wireless computer network. The server determines the threat level the security event poses to a user of the wireless computer network and issues a threat assessment to the user. | 2015-12-10 |
20150358346 | PREVENTING A MEMORY ATTACK TO A WIRELESS ACCESS POINT - Systems, methods, and machine-readable and executable instructions are provided for preventing a memory attack to a wireless access point (AP). Preventing a memory attack to a wireless access point can include receiving, with a wireless AP, a generic advertisement service (GAS) initial request from a querying station and transmitting, with the wireless AP, a GAS initial response to the querying station without querying an advertisement server based on the GAS initial request. | 2015-12-10 |
20150358347 | PREVENTING AN INPUT/OUTPUT BLOCKING ATTACK TO A WIRELESS ACCESS POINT - Systems, methods, and machine-readable and executable instructions are provided for preventing an input/output blocking attack to a wireless access point. Prevention can include instructions to receive a first comeback request from a querying station and to transmit a first portion of a response in a first comeback response frame including an indication of a comeback delay. Prevention can include instructions to receive a second comeback request from the querying station and transmit a second portion of the response in a second comeback response frame in response to the second comeback request complying with the comeback delay. Prevention can include instructions to drop the second comeback request from the querying station in response to the second comeback request not complying with the comeback delay. | 2015-12-10 |
20150358348 | Method of DDos and Hacking Protection for Internet-Based Servers Using a Private Network of Internet Servers by Executing Computer-Executable Instructions Stored On a Non-Transitory Computer-Readable Medium - A method of DDoS and hacking protection for internet-based servers using a private network of internet servers utilizes multiple data streams sent over a network of proxy servers to mitigate malicious attacks and ensure fast connections from a user to a destination server. The destination server is hidden from the user and the redundancy of the proxy network serves to maintain security and connection quality between the user and the destination server. | 2015-12-10 |
20150358349 | Preventing application-level denial-of-service in a multi-tenant system - Denial-of-service attacks are prevented or mitigated in a cloud compute environment, such as a multi-tenant, collaborative SaaS system. This is achieved by providing a mechanism by which characterization of “legitimate” behavior is defined for accessor classes, preferably along with actions to be taken in the event an accessor exceeds those limits. A set of accessor “usage profiles” are generated. Typically, a profile comprises information, such as a “request time window,” one or more “constraints,” and one or more “actions.” A request time window defines a time period over which request usage is accumulated and over which constraints are applied. A constraint may be of various types (e.g., number of transactions, defined resource usage limits, etc.) to be applied for the usage monitoring An action defines how the system will respond if a particular constraint is triggered. By applying the constraints to accessor requests, over-utilization of compute resources is enabled. | 2015-12-10 |
20150358350 | PROTECTION METHOD AND DEVICE - A protection device ( | 2015-12-10 |
20150358351 | NETWORK DEVICE, AND DATA SENDING AND RECEIVING SYSTEM - In order to detect and prevent attacks in which the network is infested with unauthorized data to cause malfunction, the invention aims, on the basis of network cycle information, to detect errors and to prevent unauthorized data forwarding in a network system such as a vehicle-mounted network. This network device is provided with a communication unit which receives data, a time management unit which manages the reception time at which data is received, and a control unit which processes data. If, for received data used as a reference, first data is received having the same identifier and a reception interval shorter than a prescribed cycle, the control unit waits to receive data having the same identifier as the first data from the reception time of the received data used as a reference up until the prescribed cycle has elapsed, and if during this interval second data is received having the same identifier as the first data, the control unit determines that an error has occurred and performs cycle abnormality detection processing (see FIG. | 2015-12-10 |
20150358352 | TRUSTED COMMUNICATION NETWORK - A system includes a processing node configured to send authorized inbound messages to registered enterprise networks. An authorized message is a message that includes trusted source indicia. Trusted source indicia indicates that the message was sent by one or more of the processing node or an authenticated message transfer node associated with one of the registered enterprise networks. The system may further include an administration node configured to maintain registration of a plurality of message transfer nodes associated with the enterprise networks. A method includes receiving outbound messages from an authenticated message transfer node of an enterprise network, screening the messages for threats to determine whether to send the messages to associated recipients, applying a first message identifier to each message, wherein the first message identifier can be used to track the message and, for each message, sending the message to the associated recipient if no threats are detected in the message. | 2015-12-10 |
20150358353 | ENHANCED SELECTIVE WIPE FOR COMPROMISED DEVICES - Systems, methods, and software are disclosed herein that enhance selective wipe technology and operations. In an implementation, an application initiates a request to authenticate a user with respect to the application. In some scenarios, the application receives a response to the request that includes a selective wipe instruction. Then the application receives such a response, the application selectively wipes data associated with the application. | 2015-12-10 |
20150358354 | METHOD AND SYSTEM FOR POLICY BASED AUTHENTICATION - A mobile device capable of performing a plurality of functions. The mobile device includes a memory for storing a plurality of different security policies; an input device for invoking a function from the plurality of functions by a user; a processor for assigning a first security policy from the stored plurality of security policies to the invoked function; and a security module for requiring the user to satisfy the assigned first security policy, before the invoked function is performed by the mobile device. | 2015-12-10 |
20150358355 | DEVICES, SYSTEMS, AND METHODS FOR ENABLING RECONFIGURATION OF SERVICES SUPPORTED BY A NETWORK OF DEVICES - Systems, devices, and methods are disclosed for enabling the reconfiguration of services supported by a network of devices. Such reconfiguration can be realized dynamically and in real time without compromising the security of the overall system from external threats or internal malfunctions. These systems, devices and methods may provide a first functional stack supporting a previous version of a specific service and the provisioning of a second functional stack dynamically and in real-time that supports an updated version of the specific service. In addition, an administration function may be included in the embodiment such that the administration function manages and controls the functional stacks and network operations. Using these mechanisms, an existing service can be changed dynamically or a new service can be added dynamically in a secure manner without interruption of other existing services. | 2015-12-10 |
20150358356 | PROCESSING DEVICE AND METHOD OF OPERATION THEREOF - A processing device ( | 2015-12-10 |
20150358357 | PROCESSING DEVICE AND METHOD OF OPERATION THEREOF - A processing device ( | 2015-12-10 |
20150358358 | ADDING FIREWALL SECURITY POLICY DYNAMICALLY TO SUPPORT GROUP VPN - A server device receives, from a member device, a registration request for a group virtual private network (VPN) and provides an initial firewall security policy for the group VPN. The server device receives instructions for a policy configuration change and sends, to the member device, a push message that includes dynamic policies to implement the policy configuration change. The dynamic policies are implemented as a subset of a template policy. The member device receives the push message with the dynamic policies, associates the dynamic policies with the template policy, and applies the initial security policy data and the dynamic policies to incoming traffic without the need for a reboot of the member device. | 2015-12-10 |
20150358359 | POLICY-BASED PHYSICAL SECURITY SYSTEM FOR RESTRICTING ACCESS TO COMPUTER RESOURCES AND DATA FLOW THROUGH NETWORK EQUIPMENT - Embodiments are directed to systems and methods for integration and normalization of physical security data, states and events to and from disparate physical security systems to maintain in real-time rules based policy state information to enforce physical security policies uniformly across network and information technology (IT) systems. Moreover it pertains specifically to such apparatus for providing an integration platform, methods and processes for normalizing data from physical security systems, to maintain physical security states, mapping to network access and either directly affecting the network equipment through standard programming commands or providing interfaces for network equipment and IT applications to query and determine physical security access states thus enforcing rules in real-time based on security systems data and events. | 2015-12-10 |
20150358360 | POLICY-BASED SELECTION OF REMEDIATION - Methods and systems for remediating a security policy violation on a computer system are provided. According to one embodiment, information regarding a program-code-based operational state of a host asset is collected by a light weight sensor (LWS) running on the host asset via a survey tool. The information is transmitted by the LWS to a remote server via an external network. Multiple security policies are enforced by the remote server with respect to the host asset based on the received information including determining whether the program-code-based operational state of the host asset represents a violation of one or more security policies, by evaluating, the received information with respect to the security policies, each of which define at least one parameter condition violation of which is potentially indicative of unauthorized activity on the host asset or manipulation of the host asset making the host asset vulnerable to attack. | 2015-12-10 |
20150358361 | MECHANISMS FOR HANDLING SIP GLARE ACROSS MULTIPLE DIALOGS - The system and method detect and properly handle a glare condition in a SIP communication session. A glare condition is where a communication device has two concurrent outstanding requests (typically an incoming and an outgoing request that have not be acknowledged) and needs to process one of the requests before processing the other request. To detect a glare condition, the system and method identify that an out-of-dialog SIP request is received while an outgoing SIP request is pending. In response to detecting the glare condition, a glare algorithm is initiated. The glare algorithm ensures that outstanding requests will be handled in a timely manner. | 2015-12-10 |
20150358362 | DYNAMIC APPLICATION INTEGRATION ASSOCIATED WITH TELEPHONIC COMMUNICATIONS THROUGH HOSTED VoIP PBX USING CLIENT-SIDE INTEGRATION PROXY - A system for collecting information associated with a telephonic communication made through a VoIP system by dynamically integrating a plurality of end user software applications including a client side integration proxy in electronic communication with a hosted VoIP PBX. The client side integration proxy includes its own API for communicating and exchanging data with a plurality of end user software applications. Software executing on the client side integration proxy receives a request from the end user to retrieve information about a previous telephonic communication, retrieves data related to the previous telephonic communication from a data store, assigns a portion of a memory cache for storing the retrieved data about the previous telephonic communication, enables one or more of the plurality of end user software applications to access the data about the previous telephonic communication currently stored in the assigned portion of the memory cache, enables one or more of the plurality of end user software applications, in response to the data about the previous telephonic communication accessed from the assigned portion of the memory cache, to update, modify, or add to the data about the previous telephonic communication currently stored in the assigned portion of the memory cache based on data relevant to the previous telephonic communication obtainable or generated by the one or more of the plurality of end user software applications, and retrieves and presents the supplemented data about the previous telephonic communication to the end user. | 2015-12-10 |
20150358363 | METHOD AND APPARATUS FOR CONTROLLING SESSION BETWEEN DEVICES ON NETWORK INCLUDING MULTIPLE DEVICES - Disclosed is a method for controlling a session between devices on a network including a plurality of devices, including: receiving a session control request message from a control device, wherein the session control request message represents a message for operating a session control between a first device and a second device; transmitting a triggering message for a specific control operation to the first device on the basis of the received session control request message; performing the session control between the first device and the second device by using the triggering message; and receiving a triggering response message from the first device, wherein the triggering response message indicates a result of performing the session control. | 2015-12-10 |
20150358364 | HOME APPLIANCE - A communication apparatus is disclosed. A home appliance includes a driving unit to drive a component of the home appliance, a controller configured to control the driving unit, a communication unit configured to provide network setup related information to an access point apparatus, to receive network related information from the access point apparatus, to access the access point apparatus after receiving the network related information, and to provide, to a server, after accessing the access point apparatus, product related information for product registration, and a memory configured to store the received network related information. Accordingly, it is possible to conveniently perform product registration of the home appliance. | 2015-12-10 |
20150358365 | METHODS AND SYSTEMS FOR SELECTING MEDIA CONTENT BASED ON TECHNICAL ENVIRONMENT INFORMATION - The present disclosure includes a method to provide rich media content over a computer network. The system determines a user's ability to playback said rich media content locally. Next, the system provides the user with a version of said rich media content appropriate for said user's ability to playback said rich media content locally. Next, the system loads said rich media content into a local cache of the user. Finally, the system displays said rich media content from the user's local cache after said rich media content has been completely loaded. | 2015-12-10 |
20150358366 | Method and Apparatus for Keeping Alive L2TP Tunnel State - A method and apparatus for keeping alive an L2TP tunnel state are provided, where the method includes: an active device and an opposite-end device establish an L2TP tunnel, the active device transmits to a standby device an interactive L2TP control message between the active device and the opposite-end device, and the active device performs corresponding processing on the L2TP control message only after having received a response about having stored the L2TP control message sent by the standby device; and when active-standby switching occurs between the active device and the standby device, the standby device connects to the opposite-end device via the L2TP tunnel, and performs corresponding processing according to the L2TP control message which has already been stored. Control messages of an active and standby device and an opposite-end device of the disclosure always keep synchronous, ensuring that when the active device has failed, after switching between the active and standby device, the standby device and the opposite-end device can work normally, which will not cause discarding of the message, and ensuring the normal working state. | 2015-12-10 |
20150358367 | METHOD AND SYSTEM FOR IMPLEMENTING INTEGRATED VOICE OVER INTERNET PROTOCOL IN A CLOUD-BASED NETWORK - A system for implementing VoIP over a cloud-based network includes a first edge proxy server operatively connected to a plurality of target proxy servers to receive resource information from one or more of the target proxy servers. Each target proxy server is associated with the cloud-based network. A first endpoint is operatively connected to the first edge proxy server and is configured for voice communications with a second endpoint. The voice communications are facilitated by the first edge proxy server using the received resource information. | 2015-12-10 |
20150358368 | NETWORK OPTIMIZATION OF PEER-TO-PEER TELECONFERENCING | 2015-12-10 |
20150358369 | COMMUNICATION MANAGEMENT SYSTEM, COMMUNICATION MANAGEMENT METHOD, AND COMPUTER PROGRAM PRODUCT - A communication management system manages communication terminals transmitting and receiving communication data. The system includes a session management unit configured to manage session identifying information and terminal identifying information in an associated manner, the session identifying information being used to identify a communication session being performed among a plurality of communication terminals and the terminal identifying information being used to identify each of the communication terminals; a receiving unit configured to receive, from a conversion system, terminal identifying information about a communication terminal that is being in communication, the conversion system mutually converting a communication scheme of communication data transmitted from one communication terminal and a communication scheme of communication data transmitted from another communication terminal; and a transmitting unit configured to transmit, to the conversion system, session identifying information that is associated with the received terminal identifying information in the session management unit. | 2015-12-10 |
20150358370 | Software As A Service Framework For The Digital Engagement And Conclusion Of Clients By Service Professionals - The software-as-a-service (the “Service”) is a web-based software product available to a service professional (an “SP”) allowing such SP to digitally engage clients on matters using any device that can connect to the internet such as a laptop, smartphone, tablet or other web-enabled devices (Google glasses, web-enabled watches etc.) (the “Device”). SPs can also use the Service to collaborate with their clients on matters by communicating and sharing documents with them in private collaboration portals exclusive to a specific client matter which are accessible through the Service and created by the Service during the Service's digital engagement process. | 2015-12-10 |
20150358371 | NOTIFYING ONLINE CONFERENCE PARTICIPANT OF PRESENTING PREVIOUSLY IDENTIFIED PORTION OF CONTENT - In a method for notifying a participant of an online conference of when a portion of content will be presented during the online conference, a computer receives at least one data item identifying the portion of content. The computer determines an estimate of a time at which the portion of content will be presented and the level of confidence in the accuracy of the estimate. The computer transmits a user notification including the estimate of the time at which the portion of content will be presented and the level of confidence in the accuracy of the estimate. | 2015-12-10 |
20150358372 | RECORDING AND INDICATING PREFERENCES - Recording a first user's preference for a content contribution submitted by a second user is disclosed. In response to only a single action taken by the first user interacting with a web page, an indication is received that a preference event occurred. The preference event is associated with the content contribution. Information associated with the first user's profile is updated. At least a portion of the web page is continued to be displayed to the user after receiving the preference event. | 2015-12-10 |
20150358373 | Method, System And Various Components Of Such A System For Selecting A Chunk Identifier - The invention relates to a method, a system and various components of such a system for selecting a chunk identifier in a content delivery network. In said network a first and a second chunk are available, belonging to different quality representations of a content item. A client device transmits a first chunk retrieval request for retrieving a first chunk and a further request. In response to said first chunk retrieval request and/or said further request, delivery path information is transmitted. The delivery path information may comprise chunk identifiers and bandwidth indicators. On the basis of the delivery path information the client device determines a chunk identifier to be included in a second chunk retrieval request for retrieving a second chunk. | 2015-12-10 |
20150358374 | Method of Data Transmission in Multicast or Broadcast Service - A method of data transmission in multicast or broadcast service, for a network in a wireless communication system is disclosed. The method comprises providing a multicast stream of the multicast or broadcast service to a mobile device of the wireless communication system, and transmitting an indication to the mobile device, wherein the indication is used for resource allocation of a data stream of the multicast or broadcast service. | 2015-12-10 |
20150358375 | Cloud Queue Synchronization Protocol - An example implementation may involve a playback device of a media playback system sending a request for an indication of at least one media item from a remote queue of media items and an indication of a particular media item that is being played by the playback device. The implementation may also involve the playback device receiving an indication of one or more media items from the remote queue of media items. The one or more media items may include the particular media item is being played by the playback device. The implementation may further involve the playback device incorporating an indication of the one or more media items into a local queue of media items. | 2015-12-10 |
20150358376 | Method, Apparatus and System for Transmitting Media Data - A method for transmitting media data, where the method includes acquiring media quality information, acquiring a user quality of experience target of a user equipment, obtaining a transmission requirement of the media data stream of the user equipment according to the media quality information and the user quality of experience target of the user equipment, and sending the transmission requirement of the media data stream of the user equipment and the media data stream to a data node, so that the data node sends the media data stream to the user equipment. The transmission method according to an embodiment of the present disclosure achieves an effect of guaranteeing user quality of experience with consumption of less system resources. The present disclosure also discloses an apparatus and a system for transmitting media data. | 2015-12-10 |
20150358377 | METHOD AND SYSTEM FOR ENABLING RENDERING OF ELECTRONIC MEDIA CONTENT VIA A SECURE AD HOC NETWORK CONFIGURATION UTILIZING A HANDHELD WIRELESS COMMUNICATION DEVICE - A handheld wireless communication device (HWCD) establishes an ad hoc network comprising interconnected networks for a user. The HWCD gains access to content on a first device and controls communication of the content from the first device via the HWCD to a second device. The HWCD enables the second device to consume the content. The content may be streamed from the first device via the HWCD to the second device. The first device is a service provider network device or other network device. The access may be authenticated and/or secure. Secure access to the content is extended from the first device to the second device. The ad hoc network is configured and/or reconfigured until communication is complete. The HWCD comprises multiple wireless interfaces. The ad hoc network comprises a PAN, WLAN, WAN and/or cellular network. The HWCD may hand-off among base stations during communication of the content. | 2015-12-10 |
20150358378 | METHOD AND APPARATUS FOR ADJUSTING STREAMING MEDIA DATA TRANSMISSION - A method and an apparatus for adjusting streaming media data transmission relate to the field of streaming media communications technologies and are capable of solving a problem that playback quality of streaming media decreases due to acquiring of excessive segments with low bit rates. The method includes: acquiring a total duration parameter of streaming media, where the streaming media is formed by at least one streaming media segment that is not played; determining, according to the total duration parameter and at least one preset duration threshold, a bit rate of a next streaming media segment to be acquired; and acquiring a next streaming media segment according to the determined bit rate. The present invention is mainly applied to a streaming media transmission and playback process. | 2015-12-10 |
20150358379 | SYSTEM AND METHOD FOR ASSIGNMENT AND SWITCHING OF CONTENT SOURCES FOR A STREAMING CONTENT SESSION - Various embodiments of a system and method for assignment and switching of content sources for a streaming content session are described. Embodiments may include the generation and use of content source rankings for improving playback quality of content streams. In embodiments, a merchant system may collect and aggregate multiple quality metrics for different content streams that various content sources provide to various clients. The merchant system may utilize the quality metrics to generate rankings of content sources for clients. The merchant system may provide such rankings to clients to improve the content stream playback experience on the client. For instance, at content acquisition time, a client may request a content stream from a content resource ranked highest on a content source ranking provided by the merchant. If the content stream degrades, the client may source subsequent portions of the content stream from another highly ranked content source of the ranking. | 2015-12-10 |
20150358380 | Cloud Queue Playback Policy - An example implementation may involve a computing system receiving, from a media playback system, at least one request for an indication of one or more media items from a queue of media items. The implementation may also involve the computing system identifying one or more playback policies that are associated with the queue of media items. Each of the one or more playback policies may restrict at least one aspect of playback of at least one of the one or more media items. The implementation may further involve the computing system sending, to the media playback system, an indication of the identified one or more playback policies. | 2015-12-10 |
20150358381 | Cloud Queue Playhead - An example implementation may involve a computing system receiving, from a media playback system, a request for an indication of a playhead pointer for a particular queue of media items. The implementation may also involve the computing system identifying a position of a playhead pointer within the particular queue of media items. Each position in the queue may correspond to a media item. The implementation may further involve the computing system sending, to the media playback system, an indication of the playhead pointer. The indication of the playhead pointer indicates the assigned position of the playhead pointer. | 2015-12-10 |
20150358382 | SIGNALING RANDOM ACCESS POINTS FOR STREAMING VIDEO DATA - This disclosure describes techniques relevant to HTTP streaming of media data. According to these techniques, a server device may signal an open decoding refresh (ODR) random access point (RAP) for a movie segmentation of a movie representation. At least one frame of the media segmentation following the ODR RAP frame in decoding order may not be correctly decoded, and wherein each frame of the media segmentation following the ODR RAP frame in display order can be correctly decoded without relying on content of frames prior to the ODR RAP in display order. According to the techniques of this disclosure, a client device may communicate a request to a server device for the streaming of media data based on signaling of the ODR RAP. Also according to the techniques of this disclosure, a client device may commence decoding and/or playback of the movie representation based on signaling of the ODR RAP. | 2015-12-10 |
20150358383 | ODBC ACCESS TO EXTERNAL SERVICES - The present disclosure involves systems, software, and computer implemented methods for providing access to an external service using a SQL query. One example method includes identifying a request for an ODBC (Open DataBase Connectivity) connection. The request identifies the external service and the identified request is associated with a SQL (Structured Query Language) query. The ODBC connection is created. An HTTP (Hyper Text Transfer Protocol) request to be provided to the external service is generated. The HTTP request is generated based on the SQL query. The generated HTTP request is sent to the external service. An HTTP response is received from the external service in response to the HTTP request. A query result set table is populated based on the received HTTP response. | 2015-12-10 |
20150358384 | Intelligent Data Delivery and Storage Based on Data Characteristics - Methods, program products, and systems of intelligent data delivery and storage based on data characteristics are disclosed. A database server can receive, from a user device, a request for data. The database server can determine a data size and a data type of the requested data. The database server can identify, based on the data size and data type, and from multiple candidate data delivery protocols for responding to the request, a data delivery protocol designated for delivering data having the data size and data type. The database server can deliver the data to the user device in response to the request using the identified data delivery protocol. | 2015-12-10 |
20150358385 | METHOD AND DEVICE FOR PROCESSING WEB REQUESTS - The invention relates to a device and a method for processing requests. In particular, the invention concerns building a dependency tree between the requests received from the client device for prioritizing the processing of the requests by the server device; maintaining a list of requests of the dependency tree in their removal order from the dependency tree while the server device is prioritizing the processing of the requests; and removing a selection of requests from the dependency tree wherein the selection is based on the order of requests in the list. | 2015-12-10 |
20150358386 | METHOD AND APPARATUS FOR THE IMPLEMENTATION OF A REAL-TIME, SHARABLE BROWSING EXPERIENCE ON A HOST DEVICE - The present invention describes a method and apparatus for the implementation of a real-time, sharable web browsing experience on a host device, utilizing the transfer of URL and form data information. The present invention further describes a method for establishing a synchronized browsing session, comprising sending a request to establish the synchronized browsing session to a synchronization server, receiving a confirmation message from the synchronization server including a session identifier associated with the established synchronized browsing session, and sending an invitation to an invitee to join the synchronized browsing session, wherein the invitation includes the session identifier. The present invention further describes a method for implementing a synchronized browsing session, comprising recording a shared web browsing interaction, and transmitting information related to the shared web browsing interaction to a synchronization server. | 2015-12-10 |
20150358387 | SMART DEVICE VEHICLE INTEGRATION - A vehicle computing system (VCS) may include a smart device interface configured to provide VCS applications with access to remote smart device features; a scripting application configured to utilize the smart device interface to execute scripting settings to automate the remote smart device features; and a user interface of the scripting application configured to facilitate editing of scripting settings when driver workload, as determined by the VCS, is below a predetermined threshold value. A configuration server may be configured to receive, via a user interface provided by the server, an action to be performed by a vehicle and a trigger specifying a condition upon which the action should be performed by the vehicle, generate a scripting setting including the action and the trigger, and provide the scripting setting to a vehicle for execution. | 2015-12-10 |
20150358388 | NETWORK-SPECIFIC DATA DOWNLOADING TO A MOBILE DEVICE - A method, system, and/or computer program product downloads a blob of data onto a mobile device. A blob of data that is to be downloaded from a server to a mobile device via a particular network is identified. A first maximum chunk size for the first network for the particular network is identified, as is a timeout value for the mobile device when downloading a chunk of data. An optimal chunk size for chunking the blob of data is determined based on the timeout value of the mobile device and the maximum chunk size for the first network. The blob of data is partitioned into chunks of data based on the first optimal chunk size, and the chunks of data are transmitted from the server to the mobile device. | 2015-12-10 |
20150358389 | REUSABLE SECURE FILE TRANSFER FOR MULTIPLE SYSTEMS - Methods for file transfer and corresponding systems and computer-readable mediums. A method includes sending a file download request, receiving a command instruction file, and downloading a file corresponding to the file download request according to the command instruction file. | 2015-12-10 |
20150358390 | METHOD AND SYSTEM TO SHARE VISUAL CONTENT ACROSS A PLURALITY OF MOBILE DEVICES TO GENERATE INTEREST, SUPPORT AND FUNDING FOR PHILANTHROPIC AND FOR SOCIAL CAUSES - Method and system for sharing visual content across a plurality of mobile or computing devices to generate interest, support and/or funding for philanthropic or social causes is disclosed. The method enables the generation of interest, support and/or funding for philanthropic or social causes from a mobile application. The user downloads the application, captures one or more photos relating to a social cause. The user shares the content with his contacts and invites them to vote or donate. The person with the most number of votes, likes, other indication of interests, forwards or the most relevant social cause is displayed on the front page of the application. The votes, likes, other indication of interests, forwards that populate are considered the most relevant and the staff or program picks are possibly the ones that obtain the most votes, likes, other indication of interests, forwards. | 2015-12-10 |
20150358391 | Application Monitoring for Cloud-Based Architectures - An example system may include one or more collectors, an analyzer, and a presentation module. The one or more collectors receive a plurality of data streams that include operational data for a plurality of application nodes. The plurality of data streams are captured and provided by a plurality of meters deployed on at least one cloud computing platform to respectively meter the plurality application nodes. The analyzer processes the plurality of data streams to generate real-time performance data for an application associated with the plurality of application nodes. The presentation module streams the real-time performance data to at least one stakeholder of the application for display via a dashboard. The real-time performance data includes one or more performance metrics describing the performance of plurality of the application nodes of the application. | 2015-12-10 |
20150358392 | METHOD AND SYSTEM OF VIRTUAL DESKTOP INFRASTRUCTURE DEPLOYMENT STUDIO - Aspects of the present disclosure relates to a virtual desktop deployment system configured to deploy a virtual desktop infrastructure. In certain embodiments, the virtual desktop deployment system includes: (a) virtual desktop servers, for hosting the virtual desktop infrastructure, (b) a computer server for deploying virtual desktop infrastructure by a system administrator, and a deployment database for storing virtual desktop infrastructure configuration and system settings, and (c) a virtual desktop deployment entity configured to perform following operations: (a) receiving configuration and system settings of the virtual desktop infrastructure, (b) discovering and scanning the virtual desktop servers to obtain system information, (c) establishing deployment rules and deployment dependencies, (d) reading the virtual desktop infrastructure configuration and system settings, (e) deploying the virtual desktop infrastructure to the virtual desktop servers, and (f) generating and storing the status, the reports, and the logs of the virtual desktop infrastructure deployment. | 2015-12-10 |
20150358393 | NETWORK-ON-CHIP COMPUTING SYSTEMS WITH WIRELESS INTERCONNECTS - Several embodiments of the present technology are related to network-on-chip based integrated circuits with wireless interconnects. In one embodiment, a computing device includes a plurality of computing cores on a common substrate. The computing cores are organized into a plurality of subnets individually associated with a set of the computing cores, a communications hub associated with the set of the computing cores, and a plurality of conductive or semi-conductive connectors connecting the set of the computing cores into a small world network. The computing device further includes a plurality of wireless transceivers on the substrate, the wireless transceivers being individually associated with one of the communications hubs of a corresponding subnet. | 2015-12-10 |
20150358394 | Method and System for Delivering Data to a Batch Consumer and a Streaming Consumer - A method and system delivers data to a batch consumer and a streaming consumer. The method and system include retrieving data from a plurality of data centers, storing the data in a first directory, bundling the data into plurality of batches in the first directory, transferring each batch of the plurality of batches to the second directory, delivering the each batch of the plurality of batches in the second directory to the batch consumer and the streaming consumer and delivering the data in the first directory to the streaming consumer. | 2015-12-10 |
20150358395 | GATEWAY-FACILITATED COMMUNICATIONS FOR RESOURCE-CONSTRAINED DEVICES - A network-connected object for performing a function and communicating with a server computing device via a network includes a functional object, application-specific input/output (I/O) device, and a gateway device. The functional object is configured to perform a function. The application-specific I/O device includes an electronic circuit configured to perform an application-specific function related to the functional object. The gateway device includes a first communication device configured for data communication with the application-specific I/O device, a second communication device configured for data communication with the server computing device, at least one processing device, and at least one computer readable storage device. The gateway device is configured to receive a command and a profile identifier from the application-specific I/O device, determine a client identification key associated with the profile identifier, and transmit the command with the client identification key to the server computing device. | 2015-12-10 |
20150358396 | INFORMATION PRESENTATION DEVICE, INFORMATION DISTRIBUTION DEVICE, AND THE INFORMATION PRESENTATION METHOD - An information presentation device includes a device side communicator that communicates with an information distribution server that retrieves information corresponding to distribution request information from information to be distributed and performs a selection on the information retrieved thereby and distributes information selected thereby, an information inputter that inputs both the contents of a request for information that is desired to be distributed, and points specifying both a reward for provision of information corresponding to this request contents and a description of the selection, a request information setter that generates the distribution request information to which both the request contents and the points are set, and transmits the distribution request information to the information distribution server via the communicator, and an information presenter that receives, via the communicator, the information which the information distribution server selects according to the description. | 2015-12-10 |
20150358397 | DISTRIBUTED SYSTEM - A distributed system is disclosed in which one or more servers respond to requests for content including hyperlinks. Hyperlinks provide an interactive visual manifestation of an underlying reference to a resource. By using a graphical user interface provided by the device, a user is able to select a hyperlink, and thereby control the device to obtain the resource to which the underlying reference refers. However, if a user selects a hyperlink and the device is unable to follow the underlying reference to obtain the resource, user disappointment results. By arranging the server, on providing visual content including one or more hyperlinks, to attempt ( | 2015-12-10 |
20150358398 | TERMINAL AND CONTROLLING METHOD THEREOF - A method of controlling a first device and a second device, and which includes transmitting first data from the first device to the second device, receiving the first data by the second device, reproducing first screen information based on the first data on a screen of the second device, receiving, in the second device, an input signal for selecting content information in the first screen information reproduced on the screen of the second device, transmitting location information corresponding to the selected content information from the second device to the first device, receiving the location information and executing a function based on the location information in the first device, transmitting second data from the first device to the second device, in which the second data is based on the executed function; and reproducing second screen information based on the second data on the screen of the second device. Further, the location information includes coordinate information of the selected content information in the first screen information reproduced on the screen of the second device. | 2015-12-10 |
20150358399 | PROVISIONING AND MANAGING SLICES OF A CONSUMER PREMISES EQUIPMENT DEVICE - At a customer premises equipment comprising one or more network interfaces, an instruction to provision a slice of the customer premises equipment (CPE) for a tenant application is received from a root network manager. The instruction identifies at least one network interface of the one or more network interfaces to allocate to the slice. The slice of the CPE is provisioned, where provisioning the slice comprises allocating CPE resources including the at least one network interface to the slice of the customer premises equipment. The tenant application is obtained. Data associating the tenant application with the slice of the CPE is stored. A management instruction for managing the tenant application is received directly from a secondary network manager associated with the tenant application. The management instruction is executed only in relation to the slice. | 2015-12-10 |
20150358400 | METHOD AND APPARATUS FOR COLLECTING AN ELECTRONIC SIGNATURE ON A FIRST DEVICE AND INCORPORATING THE SIGNATURE INTO A DOCUMENT ON A SECOND DEVICE - Disclosed embodiments are directed to systems and methods for linking more than one electronic device together to enable collection of an electronic signature or other information on a first device and incorporation of that signature or information into a document on a second device. | 2015-12-10 |
20150358401 | LOAD BALANCING WITH LAYERED EDGE SERVERS - An edge server node comprises an edge server, a DNS, and a load controller. The DNS is assigned to a layer of edge server nodes where each layer of edge server nodes has a DNS anycast IP address for the DNSs of that layer and a FQDN for that layer. The DNS either handles or offloads requests to resolve the FQDN for the assigned layer to balance the load on the edge server. A request is offloaded by returning the FQDN for another layer. The load controller monitors the load on the edge server and directs the DNS to offload requests to reduce the load on the edge server. | 2015-12-10 |
20150358402 | EFFICIENT AND SCALABLE PULL-BASED LOAD DISTRIBUTION - Various embodiments relate to a method, device, and machine-readable storage medium including: receiving a work request for distribution among a plurality of servers; selecting a server of the plurality to receive the work request including: determining whether at least one of the plurality of servers has previously indicated a capacity for additional work, and when at least one has indicated such capacity, selecting the server from a set of servers identified from the plurality as having previously indicated a capacity for additional work; and transmitting the work request to the server. Various embodiments relate to a method, device, and machine-readable storage medium including: maintaining and processing a plurality of requests; determining, based on the plurality of requests, that the server has capacity to process at least one additional request; selecting a load distributor from a plurality of load distributors; and transmitting an indication of capacity to the load distributor. | 2015-12-10 |
20150358403 | METHOD, SYSTEM, APPARATUS AND COMPUTER PROGRAM PRODUCT FOR COMMUNICATION MANAGEMENT - A method for controlling communications in a communications system includes operating a client device in the communications system; communicating by a first master device with the at least one client device; and executing a communication management service in the first master device for controlling communications between the first master device and the at least one client device. The communication management service instructs the first master device to transmit identification information of the first master device for reception by the at least one client device to inform the at least one client device the identity of the first master device. A server, a client for the system, and a computer program product are also included The master device may also manage bandwidth provided to the client devices. The bandwidth management may take into account the priority of messages from client devices, the overall bandwidth available at the region, etc. | 2015-12-10 |
20150358404 | DYNAMIC VIRTUAL MACHINE STORAGE USAGE MONITORING, PROVISIONING, AND MIGRATION - An intelligent virtual desktop infrastructure (iVDI) system is described. The system includes a first storage module having a processor, in communication with a hypervisor, and implemented by a volatile memory. The first storage module supplies a plurality of virtual machine operating systems (VMOSs) to the hypervisor. The hypervisor runs virtual machine (VMs) corresponding to the VMOSs. The systems also includes a VMOS management module configured to execute a first determination operation to determine if a usage of the first storage module has reached a preset storage limit. If yes, the VMOS management module selectively (a) initiate a deduplication operation directed to the plurality of VMOSs stored in the first storage module and (b) initiate a removal operation including removing at least one of the VMOSs from the first storage module and/or turning off at least one of the VMs running on the hypervisor. | 2015-12-10 |
20150358405 | METHODS AND SYSTEMS FOR TRANSMISSION OF DATA OVER COMPUTER NETWORKS - A computer-implemented method is provided for transparently optimizing data transmission between a first endpoint and a second endpoint in a computer network. The endpoints have a directly established data session therebetween. The data session is identified by each endpoint at least to itself in the same way throughout the session. The method includes the steps of: relaying data between the endpoints transparently in the session using a network optimization service; and transparently modifying or storing at least some of the data transmitted from the second endpoint to the first endpoint using the network optimization service in order to optimize data communications between the endpoints, wherein transparently modifying at least some of the data comprises changing the data, replacing the data, or inserting additional data such that the first endpoint receives different data than was sent by the second endpoint. | 2015-12-10 |
20150358406 | DATA SYNCHRONIZATION - An example for synchronizing data in accordance with aspects of the present disclosure includes monitoring a set of attributes at a plurality of devices on a network, selecting a group of data based on the monitored set of attributes for synchronization, assigning priority levels to each selected data and each device, prioritizing synchronization operations to be performed on the group of selected data based on the priority levels, and synchronizing the group of selected data in accordance with the prioritization of the synchronization. | 2015-12-10 |
20150358407 | Remote Storage System and Method Using Network Attached Storage (NAS) Device - A remote storage system and method using an NAS device is provided, which enable a terminal device to upload or download storage information on the NAS device through a network. The remote storage system using the NAS device comprises: an NAS device configured to store first information uploaded by a terminal device or store second information to be downloaded by the terminal device, the first information and the second information being called storage information; a first component connected between the terminal device and the NAS device, and configured to forward the storage information; and a second component connected to the first component and configured to store user information corresponding to the NAS device, and allocates, to the NAS device according to the user information, an account and a domain name address that are used for forwarding the storage information. | 2015-12-10 |
20150358408 | INFORMATION PROCESSING SYSTEM AND DATA SYNCHRONIZATION CONTROL SCHEME THEREOF - In the present invention, in order to provide an effective synchronization process control method between sites in a multi-site file system sharing through a data center, a synchronization process target file group is split into sub trees of an appropriate size, in accordance with a conflict frequency of an update file between sites, and a throughput between site-data center. Then, the split sub tree is synchronized from the one having high conflict frequency. | 2015-12-10 |
20150358409 | A SYSTEM AND METHOD FOR INFLUENCE AN OPERATION OF A DEVICE OF THE SYSTEM | 2015-12-10 |
20150358410 | TRANSFER OF SESSION FROM INTERACTIVE DIGITAL SIGN TO MOBILE DEVICE - In one embodiment, a method includes creating at a network device, a user session with an interactive digital sign, generating a session tag for the user session, wherein the session tag is configured for input at a mobile device, transmitting the session tag to the interactive digital sign, and continuing at the network device, the user session with the mobile device. An apparatus and logic are also disclosed herein. | 2015-12-10 |
20150358411 | SANDBOXED APPLICATION DATA REDIRECTION TO DATACENTERS - Technologies are generally described to redirect data from application sandboxes to datacenters. In some examples, an application operating in an application sandbox may exchange data with an application data store, such as a file or a directory, also located in the sandbox. The data store may then exchange data with a datacenter at a particular geographic locale over a network connection established by a sandbox data servicer module. The network connection may be periodically updated to connect the data store with different datacenters at different geographic locales based on geographic information associated with the application, a device on which the application executes, the datacenters, and/or the exchanged data. | 2015-12-10 |
20150358412 | Method and CPE for promoting portal website based on MAC address - A method and CPE for promoting a portal website base on an MAC address are provided. The method includes: after a WAN connection is established successfully, CPE query a pre-established address association table; when a corresponding MAC address terminal in the address association table is connected with the CPE, the CPE set a portal website redirection rule to the IP address of the corresponding MAC address terminal; and when the terminal accesses an external network, the CPE promote the portal website according to the set portal website redirection rule. The present invention can realize the promotion of a portal website at selectable intervals, and improve the promotion frequency and flexibility of the portal website. | 2015-12-10 |
20150358413 | SAVING AND RESTORING A STATE OF A WEB APPLICATION - Embodiments of the present disclosure provide a system, method and computer program product for saving and restoring a state of a web application. According to one embodiment, the method comprises receiving an indication from at least one portlet of the web application for monitoring the state of the portlet, A type of storage mechanism supported by a client interface used for accessing the web application may be detected. An event indicating an input of a content in a form of a page of the portlet may be detected. The content received as input may be saved into a memory using the detected type of storage mechanism. The state of the page may be restored on reload using the content stored into the memory. | 2015-12-10 |
20150358414 | Inference Based Event Notifications - Inference based event notification techniques are described. In one or more implementations, user preferences are inferred based on monitored interaction of the user with at least one computing device. One or more events are located that correspond to the inferred user preferences and are likely to be available to the user based on an examination of a calendar of the user that is performed automatically and without user intervention. An option is output in a user interface that is selectable by a user to obtain credentials to attend the located one or more events. | 2015-12-10 |
20150358415 | MANAGING MOOD DATA ON A USER DEVICE - Methods and systems are presented for managing mood data on a user device. In some embodiments, a user may input mood settings on a user device in order to control mood management. The mood management features may be implemented using a mood management application on the user device. In some embodiments, the mood management system may control the input of mood data from external sources (e.g., haptic feedback from a gaming system) in accordance with the user settings. In some embodiments, the mood management system may control the output of mood data (e.g., a determined mood) to external devices (e.g., immersive environments for affecting a user's mood). In some embodiments, the mood management system may control sharing of and access to mood data stored on a server. | 2015-12-10 |
20150358416 | METHOD AND APPARATUS FOR ADAPTING CUSTOMER INTERACTION BASED ON ASSESSED PERSONALITY - A method and apparatus for guiding interaction with a subject person, for example a customer. Data relating to prior social activity of the subject person is obtained, for example from stored emails, social media, and the like. Based on the data, a determination is made of a set of personality traits of the subject person, a social networking status of the subject person, or both. The determination may include whether the subject person is a potential advocate or detractor, or a potential impact of the subject person. The subject person is categorized based on the determination, and a set of parameters for guiding interaction with a subject person based on the categorization is provided. Proposed outgoing communication can also be assessed for personality traits being conveyed, and noncompliant traits can be automatically identified and adjusted. | 2015-12-10 |
20150358417 | Systems and Methods to Manage Write Commands in a Cache - When a virtual machine sends a write command to a host operating system, a cache system stores the record included in the write command and later sends the write command to a storage system. Systems and methods store an indication of when the write command was received along with the received records in the cache. The cache system determines an order of the records from the indication. In some instances, records received at the same time are serialized and/or assigned record numbers. The simultaneously received records can be assigned a batch number. According to the determined order, the records are retrieved from the cache memory and included in write commands sent to the storage system. In some instances, checkpoints can be stored to prevent records from being re-sent to the storage system following a failure. | 2015-12-10 |
20150358418 | METHOD FOR OPERATING A CACHE ARRANGED ALONG A TRANSMISSION PATH BETWEEN CLIENT TERMINALS AND AT LEAST ONE SERVER, AND CORRESPONDING CACHE - First type cache adapted to be arranged between a client terminal and at least one server, which:
| 2015-12-10 |
20150358419 | Method and apparatus for caching user generated content messages - A method for caching User Generated Content (UGC) messages performed at a server is provided, in which first and second attribute information of an UGC message is acquired, a function value corresponding to the first attribute information is obtained based on the first attribute information and a preset first function, a function value corresponding to the second attribute information is obtained based on the second attribute information and a preset second function, the UGC message is added to the cache memory of the server when it is determined from the function values corresponding to the first and the second attribute information that the first and second attribute information of the UGC message meets a preset condition. Additionally, an apparatus and a server for caching UGC messages are also provided. | 2015-12-10 |
20150358420 | METHOD AND DEVICE TO MANAGE TEMPORARY CONTENT ON A MOBILE DEVICE - Methods, devices and program products are provided for collecting content at a mobile device, and receiving, through a user interface of the mobile device, an indicator designating at least a portion of the content to represent temporary content. The methods, devices and program products store the content in a local storage medium local to the mobile device, and delete the temporary content, from the local storage medium, based on the indicator. The methods, devices and program products may prevent transfer, of the temporary content, from the local storage medium to a remote storage medium based on the indicator. | 2015-12-10 |