51st week of 2015 patent applcation highlights part 63 |
Patent application number | Title | Published |
20150365373 | System for Social Media Tag Extraction - A system for extracting and monitoring media tags within video content includes at least one server in communication with a plurality of content sources, the server receiving video content from the content sources, a recorder saving the video content, a detector receiving at least one frame of the video content, the detector detecting one or more unknown text within the frame and creating one or more images, each image associated with one of the one or more unknown text, the detector generating metadata associated with the one or more unknown text appearing in the frame, and an optical character recognition engine scanning the one or more images and converting the one or more images into one or more known text. The server further determines that the one or more known text is a media tag. | 2015-12-17 |
20150365374 | PROXY SCHEMES FOR VOICE-OVER-LTE CALLS - A method includes, in a wireless data network, monitoring communication conditions at an intermediate location between a wireless communication terminal and a network element that provides voice-call services over the network to the wireless communication terminal. Upon detecting that the communication conditions are expected to cause the wireless communication terminal to send a notification to the network element, an early notification is sent to the network element on behalf of the terminal. Another method includes detecting a notification in which a terminal notifies a network element of degraded reception performance. A modification, which the network element is expected to perform in a transmission characteristic to the terminal in response to the notification, is predicted. In-flight communication traffic, which is en-route to the terminal and whose transmission characteristic is not yet modified in response to the notification, is intercepted. The predicted modification is applied to the in-flight communication traffic. | 2015-12-17 |
20150365375 | DELIVERY OF A MEDIA ITEM - An approach for delivery and sharing a media item is provided. In an example embodiment, the approach provides a first arrangement that comprises obtaining one or more media items associated with a first client, obtaining one or more unique identifiers, each associated with at least one media item of the one or more media items and providing said one or more unique identifiers to at least one second client to enable identification of the one or more media items. In another example embodiment the approach further provides a second arrangement that comprises comprising obtaining one or more unique identifiers, each associated with at least one media item of one or more media items, wherein the one or more media items are associated with a first client, determining whether the one or more media items having said one or more unique identifiers associated therewith are already available for at least one second client at an apparatus, requesting, in response to one or more of the one or more media items having said one or more unique identifiers associated therewith not being available for the at least one second client at the apparatus, the respective one or more media items from the first client, and associating the one or more media items with said first client. | 2015-12-17 |
20150365376 | ELECTRONIC DEVICE AND NETWORK CONNECTION METHOD OF ELECTRONIC DEVICE - A method and an electronic device are provided for providing a network connection. Gateway address information of a first network is received from the first network. The gateway address information is configured as gateway address information of the electronic device. It is determined whether the configured gateway address information remains valid when the network connection of the electronic device is switched from the first network to a second network. It is determined whether to update the configured gateway address information based on whether the configured gateway address information remains valid. | 2015-12-17 |
20150365377 | SERVICE DISCOVERY ACROSS DIFFERENT NETWORKS - Technologies for service discovery and media sharing are disclosed. A described technique includes receiving, at a first device, service information for a streaming service provided by a second device, the first device and second device being on different first networks, the first networks being different local multicast networks; inserting an entry in a multicast domain name system (mDNS) cache of the first device based on the service information such that the streaming service is (i) discoverable by the first device via a mDNS query and (ii) accessible through a second network that interconnects the first networks; and sending streaming information from the first device to the second device through the second network for the streaming service. | 2015-12-17 |
20150365378 | ONE-WAY DATA TRANSMISSION AND RECEPTION SYSTEM AND METHOD - A one-way data transmission and reception system and method, which mitigate the problem of a buffer overflow that may occur on a reception system while also mitigating the problem of data loss caused by a link error that may occur in the unidirectional line of a physical one-way data transmission system. The one-way data transmission system includes a first interface unit connected to a first network. A second interface unit is unidirectionally connected to a reception system connected to a second network. An interface integration module unit transmits a delayed Transmission Control Protocol (TCP) Acknowledgement (ACK) frame to a TCP session established with a device of the first network unit through the first interface unit, and transmits one or more identical data frames to the reception system through the second interface unit. | 2015-12-17 |
20150365379 | SYSTEM AND METHOD FOR MANAGING, CONTROLLING AND CONFIGURING AN INTELLIGENT PARENTAL CONTROL FILTER - A system and a method for intelligently learning a list of allowed IP content at one or more internet connected devices by implementing an intelligent parental control means is provided. The means includes a router and a filter. The router monitors and records web based operations done at the internet connected devices during a learning mode to create a list of allowed IP content at the internet connected devices. The filter implements the list and accordingly allows and blocks the content. Further, a remote device communicating with the router via a central server remotely controls and configures the router and the filter. The remote device permits the router to approve or disapprove a blocked IP content, when the blocked content is accessed at the internet connected devices. | 2015-12-17 |
20150365380 | SYSTEM AND METHOD FOR INTERLOCKING A HOST AND A GATEWAY - A method is provided in one example embodiment and includes exchanging a session descriptor associated with a network connection and an application on a host, correlating the session descriptor with a network policy, and applying the network policy to the network connection. In alternative embodiments, the session descriptor may be exchanged through an out-of-band communication channel or an in-band communication channel. | 2015-12-17 |
20150365381 | APPARATUS, METHOD, AND SYSTEM FOR SECURING A PUBLIC WIRELESS NETWORK - An approach for automatically securing a public wireless network is disclosed. A VPN connection platform maintains a list of available trusted wireless access identifiers to connect to a public wireless network from a mobile device. The trusted wireless access identifiers are provided to an application associated with the mobile device that selectively initiates a virtual private connection when the mobile device cannot utilize anyone of the trusted wireless access identifiers. | 2015-12-17 |
20150365382 | METHOD AND APPARATUS FOR ENFORCING STORAGE ENCRYPTION FOR DATA STORED IN A CLOUD - In one embodiment, a method includes providing a request to store at least a first piece of data. The request to store the first piece of data is a request to store the first piece of data in a first encrypted form on a cloud associated with the cloud application provider. The method also includes determining whether the cloud application provider is capable of encrypting the first piece of data, and providing the first piece of data to the cloud application provider if it is determined that the cloud application provider is capable of encrypting the first piece of data. If it is determined that the cloud application provider is not capable of encrypting the first piece of data, the method further includes encrypting the first piece of data to create the first encrypted form and providing the first encrypted form to the cloud application provider. | 2015-12-17 |
20150365383 | ENERGY SERVICE DELIVERY PLATFORM - A resource management client apparatus ( | 2015-12-17 |
20150365384 | System and Methods for Transmitting Information Using Inaudible Acoustic Signals - A system and associated methods for transmitting information using inaudible acoustic signals are disclosed. In at least one embodiment, a user application resides in memory on an at least one user device; the user application being configured for generating and processing the inaudible acoustic signals. Similarly, a vendor application resides in memory on an at least one vendor device; the vendor application being configured for generating and processing the inaudible acoustic signals as well. Upon a one of the user device and vendor device needing to transmit information to the other, the information is converted to an inaudible acoustic signal. With the user device and vendor device positioned proximal to one another, the inaudible acoustic signal is produced via a speaker of the one of the devices and received via a microphone of the other of the devices. The inaudible acoustic signal is then converted back to the information. | 2015-12-17 |
20150365385 | METHOD AND APPARATUS FOR SECURING SENSITIVE DATA IN A CLOUD STORAGE SYSTEM - In one aspect, relates to a system and method of seamlessly encrypting data files before uploading them to a public cloud storage system by providing an encrypted drive system (EDS) that forms a security layer around existing cloud storage services to provide enhanced protection to data. The EDS also provides a convenient interface to specify data protection policies across connected cloud storage applications. The EDS implements standard functionalities like accessing, search and sharing directly on the encrypted data using secure indexing and querying of encrypted data. The EDS is able to guarantee a much higher level of security for data in the cloud without the user having to compromise on the features of the various applications. | 2015-12-17 |
20150365386 | CONCURRENT DEVICE CONTROL - Methods, systems, and devices for controlling a plurality of electronic devices are disclosed. An accessory device may monitor one or more frequency bands to capture data transmitted between two devices during a pairing process. The accessory device may utilize data to capture subsequent RF signals transmitted from one of the devices. The accessory device may then intercept commands and data from multiple devices, establish pairing relationships with computing devices, and operatively control computing devices in accordance with the intercepted commands. | 2015-12-17 |
20150365387 | SYSTEMS AND METHODS FOR CUSTOMER SERVICE ACCESS TO A CONSUMER INTERFACE SYSTEM - A computer-based method for providing a customer service representative (CSR) access to an interface system uses a computing device including a processor and a memory. The method includes receiving, by the processor, an authentication request including a CSR identifier associated with the CSR. The method also includes identifying, in the memory, a customer identifier using at least the CSR identifier. The method further includes transmitting an authentication response in response to the authentication request. The authentication response includes at least the customer identifier. | 2015-12-17 |
20150365388 | SYSTEMS AND METHODS FOR MULTI-STAGE IDENTITY AUTHENTICATION - Certain implementations of the disclosed technology may include systems and methods for multi-stage identity authentication. A method is provided that includes receiving a set of identity information associated with a subject and querying one or more public or private databases with at least a portion of the set of identity information. The method includes receiving independent information responsive to the querying. The method includes determining zero or more first indicators of fraud risk and producing one or more identity proofing queries derived from the independent information. Based at least in part on a comparison of the one or more proofing queries and a query response, the method includes determining zero or more second indicators of fraud risk and evaluating a fraud score. Responsive to evaluating the fraud score, the method includes initiating one or more of authentication enrollment and multi-factor authentication of the subject. | 2015-12-17 |
20150365389 | AUTHENTICATION OF DEVICES HAVING UNEQUAL CAPABILITIES - A system authenticates in-vehicle electronic devices having unequal capabilities such as having varying different communication and processing capabilities. A Connected Vehicle Gateway portion of a selected in-vehicle device acts as an onboard authentication proxy and onboard key server functionality for other in-vehicle devices, and serves as an interface between an in-vehicle network and one or more associated external networks, thereby eliminating the need for explicit peer discovery protocol and the requirement of devices to perform key establishment with each individual communication peer. Instead, each in-vehicle device establishes the group keys as a result of its authentication with the onboard key server and uses the group keys to locally generate and update its session keys. The onboard key server selectively obtains the keys from one or more off-board authentication servers and distributes them to selected in-vehicle devices. | 2015-12-17 |
20150365390 | METHOD OF CREATING PREFERENCE IMAGE IDENTIFICATION CODE, METHOD OF DIAGNOSING PREFERENCE IMAGE IDENTIFICATION CODE, AND METHOD OF PROVIDING INFORMATION USING PREFERENCE IMAGE IDENTIFICATION CODE - Disclosed are a method of creating a preference image identification code, a method of diagnosing the preference image identification code, and a method of providing information using the preference image identification code. | 2015-12-17 |
20150365391 | METHODS AND SYSTEMS FOR AUTOMATIC CONTENT RETRIEVAL AND ORGANIZATION - Methods and systems for automated retrieval of content embedded in or referred to in a message received in a user account are provided. A UCM and/or a UCR may access a user account and retrieve a message from the account. The message may be then analyzed to extract information related to the content that may be included in the message. The content associated with the extracted information is accessed and retrieved. The retrieved content is presented to the user. | 2015-12-17 |
20150365392 | METHOD AND SYSTEM FOR TRANSMITTING AUTHENTICATION CONTEXT INFORMATION - A system of the present invention uses an identity provider to provide the authentication services for multiple service providers. An identity provider communicates with one or more service providers. A user that wishes to gain access to a service provider is authenticated through the use of the identity provider. A user desiring to access a service provider is first authenticated by the identity provider. The identity provider determines if the user meets the desired class level and provides various information related to the authentication. When the user attempts to access a second service provider that is associated with the same identity provider, the second service provider accesses the identity provider and determines that the user was recently authenticated. The identity provider then transmits the relevant information regarding the authentication process to the second service provider, which can then allow or deny the user access to the second service provider. | 2015-12-17 |
20150365393 | PROVISIONING FOR SMART NAVIGATION SERVICES - Techniques for provisioning a smart navigation service are presented. The provisioning can be performed by a name owner, by the smart navigation service itself, or by a third-party keyword service. The provisioned information can include an entity name, a keyword, and possibly other data correlated to at least one network locator. The navigation service electronically stores in navigation service persistent memory a rule correlating the entity name, the keyword, and, if used, the other data, to the at least one network locator, such that when the navigation service receives, from a client computer communicatively coupled to the navigation service, command data that includes the entity name, the keyword, and possibly other data, the navigation service responds to the client computer with the at least one network locator. | 2015-12-17 |
20150365394 | STATELESS AND SECURE AUTHENTICATION - Authenticated requests can be sent without requiring the requests to include or potentially expose secret information used for the authentication process. A client device use a security credential such as a key to sign a request to be sent to a recipient. When the request is received, the recipient determines whether the request was signed using the correct key for the sender. In some embodiments a client token is included with the request that statelessly encodes the key, enabling a recipient capable of decoding the client token to determine the key and compare that key to the signature of the request. The sender can store the secret information in a secure location, such as a browser security module, such that the secret information is not exposed to the browser or script executing on the client device. | 2015-12-17 |
20150365395 | SOCIAL CONTENT INTEGRATION - Herein disclosed is an integrated platform comprising at least one social network and one password to access the platform and the at least one social network. In some embodiments, the at least one social network comprises the integrated platform itself as a social network, Google+, Instagram, LinkedIn, Facebook, Twitter, Tumblr, or combinations thereof. In some embodiments, the integrated platform provides full function of the at least one social network. In some embodiments, the full function comprises logging in, registering, saving log-ins, following, posting, chatting, inviting friends, adding friends, sending messages, sending or uploading photos or videos, notifying, sharing, aggregating news feed. In some embodiments, the integrated platform provides a chatting function with a user-dictated timed self-destruct feature or instant self-destruct feature by shaking a mobile device on which the platform is installed. In some embodiments, the chatting function comprises photo or video correspondence. | 2015-12-17 |
20150365396 | Multiple Input Based Passwords - A computer-implemented method, carried out by one or more processors, for utilizing one or more input methods for passwords. In an embodiment, the method comprises the steps of determining, by one or more processors, one or more input methods supported for a password entry, wherein the password entry verifies a user's credentials; receiving, by one or more processors, a candidate password through the one or more input methods, wherein each character of the candidate password has an associated input method; and storing, by one or more processors, the candidate password as the password entry, along with the associated input method for each character of the candidate password. | 2015-12-17 |
20150365397 | WEB AUTHENTICATION METHOD AND SYSTEM - In a web authentication method for launching a webpage, a HTTP GET request is sent to a server and verified for the existence therein of an authorization field. If no, an affirming message and a source code for generating a login page are sent. A piece of authorization data is inputted to the login page, at least part of which is generated based on the source code by a scripting engine of a browser. Contents required by the authorization field are generated based on the input information and sent along with the authorization field to the server by the web browser as instructed by the scripting engine through an API. The webpage is selectively launched. | 2015-12-17 |
20150365398 | Verifiable Tokenization - Use rules are included within tokenized data either before or after tokenization. The use rules can be appended to the data before or after tokenization, can be used to modify the data before or after tokenization, and can be used to select or generate token tables for use in tokenizing the data. The use rules limit how, where, and when the tokenized data can be used, who can use the tokenized data, and the like. In addition, data can be tokenized such that the tokenized data can be identified as tokenized based on the tokenized data failing a validation test. The data is tokenized using one or more token tables, and the validation test is applied to the tokenized data. If the tokenized data passes the validation test, the data is modified with formatting rules or re-tokenized with additional token tables until the tokenized data fails the validation test. | 2015-12-17 |
20150365399 | METHOD AND APPARATUS FOR SHARING SERVER RESOURCES USING A LOCAL GROUP - A computer implemented method and apparatus for sharing server resources. One or more applications are registered to a first local group on a device, and one or more applications are registered to a second local group on the device. If a user and device have been authenticated, and a device token already acquired for obtaining authorization for a first application of the first local group to access resources from a server, the same device token is available for use in obtaining authorization for a second application of the first group to access (share) resources from the server. Thus, the user need not re-submit authentication credentials to the authorization server. When the user signs out of an application of the same group, the sign out procedure is processed locally for all applications of the group. A device token is surrendered when it is not needed by applications of any other group. | 2015-12-17 |
20150365400 | PASSWORD-LESS AUTHENTICATION SYSTEM AND METHOD - In one aspect, the present disclosure describes a server-implemented method for authenticating a login without a password. The method includes: a) receiving, from a request initiator, a request to authenticate a login, the request including a user identifier; b) providing, to a device pre-registered for use in association with the user identifier, an acknowledgement request, the device being configured to generate a prompt in response to receiving the acknowledgment request, the prompt requesting input to authenticate the login; c) initiating a timer; d) determining that a login confirmation message has been received from the pre-registered device before expiration of the timer; and e) in response to determining that the login confirmation message has been received from the pre-registered device before expiration of the timer, providing an authentication acknowledgment message to the request initiator. | 2015-12-17 |
20150365401 | CAPTCHA CHALLENGE INCORPORATING OBFUSCATED CHARACTERS - A method for determining if a user of a computer system is a human. A processor receives an indication that a computer security program is needed and acquires at least one image depicting a first string of characters including at least a first and second set of one or more characters. A processor assigns a substitute character to be used as input for each of the second set of one or more characters. A processor presents the at least one image and an indication of the substitute character and when to use the substitute character to the user. A processor receives a second string of characters from the user. A processor determines whether the second string of characters substantially matches the first string of characters based on the substitute character assigned to each of the second set of one or more characters and determines whether the user is a human. | 2015-12-17 |
20150365402 | SYSTEM AND METHOD FOR ONE TIME PASSWORD AUTHENTICATION - An authentication system for providing an authentication service for a user accessing the same through a communication network includes a seed server for managing a user seed value related to each user identification information, a one time password (OTP) generation device provided in a user's mobile terminal, the OTP generation device generating a user OTP by using at least one portion previously defined in an IP address dynamically assigned to the mobile terminal by a mobile communication operator and a user's user seed value, and an authentication server for, if a user authentication request is received, generating an OTP corresponding to the user OTP by using the at least one portion previously defined in the IP address dynamically assigned to the mobile terminal and the user seed value related to the user identification information, and comparing the user OTP with the corresponding OTP, thereby authenticating the user. | 2015-12-17 |
20150365403 | NETWORK-BASED AUTHENTICATION FOR THIRD PARTY CONTENT - A system may be configured to allow for network-based authentication of a user device, which may reduce or eliminate the need for a user to provide credentials. The authentication may be performed when the user device attempts to access content provided by a third party content provider. The network-based authentication may be performed by, or in conjunction with, a device that is associated with the same telecommunications network as the user device, and which can authenticate the identity of the user device. | 2015-12-17 |
20150365404 | System and Method for Binding a Smartcard and a Smartcard Reader - Systems and methods for binding a smartcard and a smartcard reader are provided. A smartcard is provision to store a first set of credentials for use in traditional transactions such as at a brick and mortar retail store and a second set of credentials for use when performing a transaction using a smartcard reader associated with a user such as an on-line transaction. The user smartcard reader registers with a smartcard issuer server by cryptographically authenticating a secure processor associated with the smartcard reader. As a result of the registration, the secure processor obtains a set of private keys associated with the second set of credentials. When a request for a authorizing a transaction via the user's smartcard reader is received, the smartcard reader cryptographically authenticates itself to the smartcard using a private key associated with a credential to be used to authorize the transaction. | 2015-12-17 |
20150365405 | Mobile Security Fob - A computer-implemented method comprising: receiving, from a primary factor authentication device by one or more computer systems, a request to enroll a mobile device as a secondary factor authentication device; and
| 2015-12-17 |
20150365406 | GENERATION AND AUTHENTICATION OF BIOMETRIC INFORMATION USING WATERMARK - An apparatus for generating biometric information, the apparatus includes a biometric scanning module configured to scan a body of a user to generate biometric image information; a seed supplying module configured to supply a secure seed having a security that is effective for a preset time period; a security pattern generating module configured to generate a secure watermark pattern based on the secure seed; and a biometric information generating module configured to generate biometric information to be used for authentication by the use of the biometric image information and the secure watermark pattern. | 2015-12-17 |
20150365407 | AUTHENTICATION OF MOBILE APPLICATIONS - Embodiments of the present invention provide a system, method and computer program product for authenticating a mobile application. According to one embodiment the method comprises registering, by a computer processor of a computer system, the mobile application, wherein the registration includes receiving and storing information associated with the mobile application, receiving, by the computer processor, one or more application details associated with the mobile application from a computing device, comparing, by the computer processor, the received one or more application details associated with the mobile application with the stored information associated with the mobile application, generating, by the computer processor, a notification based on the comparison to indicate authenticity of the mobile application and sending the notification to the computing device. | 2015-12-17 |
20150365408 | SECURE TRANSACTIONS USING ALPHACODES - Systems and method for sending a first alphacode to a first participant over a secure channel. Sending a second alphacode to a second participant over a secure channel. Receiving a first encoded message, a second encoded message, and a plaintext message. The first encoded message is based on the first alphacode and the second encoded message is based on the second alphacode. Generating a first ciphertext based on the first alphacode and the plaintext message. Comparing the first ciphertext to the first encoded message and determining the authenticity of the first encoded message based at least on the comparing to the first ciphertext. Comparing the second ciphertext to the second encoded message and determining the authenticity of the second encoded message based at least on the comparing to the second ciphertext. Sending a first confirmation to the first participant and sending a second confirmation to the second participant. | 2015-12-17 |
20150365409 | NETWORK CONTROLLER PROVISIONED MACSEC KEYS - Methods, network controllers, and machine-readable and executable instructions are provided for network controller provisioned MACsec keys. A network controller can provision a first network device with a media access control security (MACsec) key for a for a MACsec flow. The network controller can provision a second network device with the MACsec key for the MACsec flow. | 2015-12-17 |
20150365410 | LOCATION DETERMINATION FOR USER AUTHENTICATION - User authentication techniques based on geographical locations associated with a client device is provided. A network connection can be established between two or more host machines and a client device. Upon a request received from the client device by one of these host machines, round trip times of test messages may be measured between the client device and each of the host machines. The round trip times can be utilized to determine the current geographical location of the client device. If the location is within a tolerance geographical area, the client device may be authenticated. Otherwise, the authentication may fail or additional security procedures may be implemented. In some examples, a travel time from a historical geographical location to current geographical location can be determined. This data may be also utilized in the user authentication process. | 2015-12-17 |
20150365411 | SYSTEMS AND METHODS FOR CREATING AND DISPLAYING AN ELECTRONIC COMMUNICATION DIGEST - Systems and methods are disclosed for creating an electronic communication digest. In one implementation, a system receives a first electronic communication including first content, and generates an electronic communication digest that reflects the first electronic communication by including first digest content generated based on the first content. The system receives a second electronic communication that includes second content, and determines a repeated portion of the second content that is included in the first content and a unique portion of the second content that is unique to the first content. The system also update the electronic communication digest to reflect the second electronic communication by adding second digest content generated that includes the unique portion of the content and does not include the repeated portion of the second content. | 2015-12-17 |
20150365412 | SECURED ACCESS TO RESOURCES USING A PROXY - A method of authentication and accessing resources is provided. A client device may send a request to a proxy device to access a resource, such as an enterprise resource. The proxy device may authenticate with one or more servers associated with the resource. During authentication, the proxy device may receive a request for a signature controlled by the client device. In response, the proxy device may send a request to the client device for the signature. The request may also include context information that identify a data structure of authentication information exchanged (or to be exchanged) during the authentication session. If the client device verifies the context information, the client device may send the requested signature. | 2015-12-17 |
20150365413 | Secure Configuration of Authentication Servers - Embodiments of the invention are directed to automatically populating a database of names and secrets in an authentication server by sending one or more lists of one or more names and secrets by a network management software to an authentication server. Furthermore, some embodiments provide that the lists being sent are encrypted and/or embedded in otherwise inconspicuous files. | 2015-12-17 |
20150365414 | Method and Device for Authenticating Static User Terminal - Provided are a method and device for authenticating a static user terminal. The method comprises: an identity request message used for acquiring a user identity of the static user terminal is sent to the static user terminal; a response message is received from the static user terminal, wherein the response message carries the user identity of the static user terminal; and, an Extensible Authentication Protocol (EAP) authentication is performed on the static user terminal according to the user identity of the static user terminal. The present disclosure solves the problem in the related art of low security in the authentication on the static user terminal access the network, thus achieving the effects of increasing the security and reliability in the authentication on the static user terminal accessing the network and improving the WLAN service using experience of the static user. | 2015-12-17 |
20150365415 | METHOD, SYSTEM AND APPARATUS FOR HANDLING TERMINAL CAPABILITIES - The present invention relates to telecommunication systems providing multiple services which could require possible adaptations based on the capabilities of the terminal used to access those services. | 2015-12-17 |
20150365416 | ENTERPRISE MOBILITY MANAGEMENT AND VERIFICATION OF A MANAGED APPLICATION BY A CONTENT PROVIDER - A non-SDK based scalable technology for integrating multiple mobile device management (MDM) service providers into a content provider platform (or server) is described herein. More specifically, the technology described herein facilitates enterprise mobility management through verification of a managed application associated with an enterprise via the content provider platform. In some embodiments, the content provider platform comprises a cloud-based collaboration and/or storage environment (“cloud-based platform server”) that prevents an unmanaged application from gaining access to the cloud-based collaboration and/or storage server. | 2015-12-17 |
20150365417 | NETWORK MANAGEMENT ACCESS BASED PREVIOUS REGISTRATION OF USER DEVICE - A user device may be self-registered in a network where it may be determine if the user device was previously registered and marked for deletion; and if the user device was previously registered and marked for deletion, access to the network may be granted or denied depending on whether the user device was previously registered and marked for deletion. | 2015-12-17 |
20150365418 | EFFICIENT INDEXING AND SEARCHING OF ACCESS CONTROL LISTED DOCUMENTS - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for storing a plurality of documents in computer-readable memory, each document of the plurality of documents having a corresponding access control list (ACL), each ACL defining a plurality of users that are authorized to access a respective document, generating an index based on the plurality of users, the index comprising a plurality of partitions, each partition corresponding to a user of the plurality of users, and, for each document of the plurality of documents: ranking the users of the plurality of users, selecting a user as an indexing user based on the ranking, and storing the document in a partition of the index, the partition corresponding to the indexing user. | 2015-12-17 |
20150365419 | SECURING PARTNER-ENABLED WEB SERVICE - The claimed subject matter provides a method for securing a partner service. The method can include receiving a request, wherein the request comprises a unique value, to access the partner service, wherein the request is received from a browser client for a partner application and determining that a user is authorized to access the partner application, the partner application generating a token that associates the user with the partner application. The method can also include generating a signature for the token, the signature to enable the partner service to independently regenerate the signature, the token comprising an identifier for the partner application enabling the partner service to detect which partner application generates the token and sending the token with the signature to the browser client. | 2015-12-17 |
20150365420 | A SECURE USER INTERACTION METHOD PERFORMING DEFINED ACTIONS ON WEB RESOURCES OVER A SEPARATE CHANNEL AND A SYSTEM THEREOF - A method and system to facilitate a secure user interaction with a web resource on a primary device by establishing a connection on a communication channel between the primary device and the web resource. The user interacts with a secondary device utilizing a separate communication channel to perform the action. | 2015-12-17 |
20150365421 | AUTOMATIC INTERNET ACTIVATION FOR REGISTERED USER DEVICE UPON DETECTING ITS DEVICE IDENTIFIER ON NETWORK OF HOSPITALITY ESTABLISHMENT DURING ACTIVE RESERVATION - A service controller includes a network interface for coupling to a local area network of a hospitality establishment, and one or more processors coupled to the network interface. The one or more processors are configured to detect a device identifier of a user device on a local area network of a hospitality establishment, determine whether a guest of the hospitality establishment is associated with the device identifier, and automatically activate a service for the user device at the hospitality establishment in response to detecting the device identifier on the local area network when a guest of the hospitality establishment is determined to be associated with the device identifier. | 2015-12-17 |
20150365422 | AUTHORIZING CONTENT VIEWING BASED ON CONTENT RATINGS - Apparatuses, methods, and computer program products are included that receive a content rating for content presented to an individual, determine a content authorization parameter for the individual, and trigger a precautionary action associated with the content in response to determining that the content authorization parameter for the individual is not compliant with the content rating for the content. | 2015-12-17 |
20150365423 | METHOD AND APPARATUS TO REGULATE A DIGITAL SECURITY SYSTEM THAT CONTROLS ACCESS TO A RESOURCE - A method and system to regulate a digital security system that controls access to a resource is disclosed. The system controls access to the resource according to a multi-level security protocol including a high-security-level access protocol and a low-security-level access protocol. The regulation method and system are configured to collect data from a set of user-data sources with which the user interacts during his daily life and, based on the collected data, to compute security parameters characterizing user activity. The computed security parameters are compared to a digital profile that models the characteristic behavior of this user. When the comparison indicates that the observed user activity is inconsistent with the digital behavior profile, the digital security system is regulated to set (or maintain) it in an operating state such that, when the user requests access to the resource in the future, the system will automatically implement the high-security-level access protocol. | 2015-12-17 |
20150365424 | CRYPTOGRAPHIC METHOD FOR SECURELY EXCHANGING MESSAGES AND DEVICE AND SYSTEM FOR IMPLEMENTING THIS METHOD - At least one embodiment refers to a method for securely exchanging messages between at least two devices, each of them storing a shared secret key. The method comprises: at each device: generating a random number, then sending it to the other devices; determining a first key by a first operation based onto said secret key and each random number; determining a second key based on said first key and said random numbers; at a sending device: determining a pseudo message on the basis of the message and said random numbers; calculating then sending a cryptogram on the basis of said pseudo message and said second key; and at the receiving device: decrypting said cryptogram by means of said second key; and retrieving said message from said pseudo message. | 2015-12-17 |
20150365425 | MESSAGE PROTECTION - In one example, message protection may include receiving a message, encrypting the received message, storing the encrypted message in a memory, authorizing one or more applications to handle the message, notifying authorized applications of receipt of the message, decrypting the encrypted message, and permitting one of the authorized applications to display the decrypted message. | 2015-12-17 |
20150365426 | METHOD FOR CHECKING THE INTEGRITY OF A DIGITAL DATA BLOCK - The present invention relates to methods for verifying the integrity of data blocks and for accessing the blocks and relates more particularly to a method for verifying the integrity of a digital data block, the method comprising steps of: searching for a digital fingerprint in a data block of a reference point, calculating a digital fingerprint by applying a fingerprint calculation function to the data block, the fingerprint calculated having a value which depends on each of the bits of the data block excluding the bits of a fingerprint found in the data block, and verifying the fingerprint found in the data block by comparing it with the fingerprint calculated. | 2015-12-17 |
20150365427 | TECHNIQUES FOR INTEGRATED ENDPOINT AND NETWORK DETECTION AND ERADICATION OF ATTACKS - Various embodiments are generally directed to techniques to detect and eradicate malware attacks by employing information indicative of malware activity received from both endpoint devices and network devices proving network services to endpoint devices. An apparatus to detect malware includes a processor component, an analysis component for execution by the processor component to employ a trust level assigned to a device in a network as a factor in an analysis of an indication received from the device of a malware attack, and an eradication component for execution by the processor component to determine an action to take through the network to eradicate the malware attack based on the analysis. Other embodiments are described and claimed. | 2015-12-17 |
20150365428 | COORDINATED DETECTION AND DIFFERENTIATION OF DENIAL OF SERVICE ATTACKS - According to one embodiment, an analyzer module (AM) within a same protected network and on-premise with a web application server (WAS) detects and distinguishes between types of Denial-of-Service (DoS) attacks. The AM tracks whether test HTTP messages, which include test HTTP request messages that a signal generation module (SGM) is configured to transmit to the WAS and test HTTP response messages that the WAS is expected to transmit in response to the test HTTP request messages, are timely received. The AM is aware of a timeliness that the SGM is expected to transmit the test HTTP request messages and that the WAS is expected to transmit the test response HTTP messages. The AM detects an occurrence of a DoS attack and identifies the type of the DoS attack based upon the result of the tracking indicating that a number of the test HTTP messages have not been timely received. | 2015-12-17 |
20150365429 | METHOD AND AN APPARATUS TO PERFORM MULTI-CONNECTION TRAFFIC ANALYSIS AND MANAGEMENT - A method and an apparatus to perform multi-connection traffic analysis and management are described. In one embodiment, the method includes analyzing data packets in the first data flow of a client application for a pattern of interest, where the client application communicates data using first and second data flows. In response to the method detecting a pattern of interest in the first data flow, the method identifies the second data flow and identifies a traffic policy for the second data flow. The method applies the identified traffic policy to the second data flow. Other embodiments have been claimed and described. | 2015-12-17 |
20150365430 | PROTECTING NETWORKS FROM CYBER ATTACKS AND OVERLOADING - Packets may be received by a packet security gateway. Responsive to a determination that an overload condition has occurred in one or more networks associated with the packet security gateway, a first group of packet filtering rules may be applied to at least some of the packets. Applying the first group of packet filtering rules may include allowing at least a first portion of the packets to continue toward their respective destinations. Responsive to a determination that the overload condition has been mitigated, a second group of packet filtering rules may be applied to at least some of the packets. Applying the second group of packet filtering rules may include allowing at least a second portion of the packets to continue toward their respective destinations. | 2015-12-17 |
20150365431 | SECURING CLOUD COMPUTING ENVIRONMENTS - Some examples of security cloud computing environments can be implemented as methods. A processor of a first computer system that lacks permission to store data in a cloud computing environment receives data to be stored in the cloud computing environment. The data is received from a second computer system implementing the cloud computing environment and having permissions to store data in the cloud computing environment. The processor of the first computer system determines that the received data is safe for storage in the cloud computing environment. The processor of the first computer system determines that the received data is safe for storage in the cloud computing environment. The processor of the first computer system provides a notification to the second computer system indicating that the received data is safe for storage in the cloud computing environment, and an identifier that points to the stored data at the computer-readable storage medium. | 2015-12-17 |
20150365432 | SYSTEM AND METHOD FOR OUT-OF-BAND EXPLOITATION OF PORTABLE WIRELESS SYSTEMS - In certain embodiments, virtualization mechanisms used to defend against spying can also be used by attackers as a means to execute spying attacks more effectively. In certain embodiments, attack methods may use the virtualization mechanisms to surreptitiously activate input peripherals without the user's knowledge or authorization. In certain embodiments, a virtualized network interface may be employed in which all network traffic transiting a portable wireless system is routed through a remote control component within a peripheral control domain. The remote control component may be used by an attacker to communicate remotely with the portable device to send it peripheral activation commands. The remote control component can then activate peripherals via the peripheral access module without the user's or general-purpose operating system's knowledge or authorization. All other network traffic may be passed through as normal and expected to the general-purpose operating system. | 2015-12-17 |
20150365433 | DETECTION OF PHISHING ATTEMPTS - A method for alerting a service provider and/or a user of a web browser of a phishing attempt comprises providing on a page that it is desired to protect against phishing, a Javascript that when caused by a phishing page to run not in the context of the original page generates an indication that a phishing attempt may exist. | 2015-12-17 |
20150365434 | ROTATION OF WEB SITE CONTENT TO PREVENT E-MAIL SPAM/PHISHING ATTACKS - Embodiments of the invention provide a method, system and computer program product for phishing attack management through Web site content rotation. In an embodiment of the invention, a method for phishing attack management through Web site content rotation is provided. The method includes receiving a request for a variation of a component to be incorporated into a Web page from a requesting Web page rendering engine from over a computer communications network. The method also includes comparing the requested variation of the component to a currently configured variation of the component. Finally, the method includes returning both the requested variation of the component and an alert indicating a possible phishing attack in response to the request if the requested variation of the component differs from the currently configured variation of the component. | 2015-12-17 |
20150365435 | SHARED SECURITY UTILITY APPLIANCE FOR SECURE APPLICATION AND DATA PROCESSING - A security information technology element (ITE) for secure application and data processing, including a physical enclosure defining a protection envelope and a secure computing device disposed within the protection envelope. The security ITE provides security services to applications and a secure processing environment for hosting applications, and includes cryptographic services and hardware acceleration. A security manager within the security ITE is configured to erase data within the protection envelope upon detecting physical tampering. | 2015-12-17 |
20150365436 | Techniques for Improved Run Time Trustworthiness - Techniques are presented herein for attesting the trustworthiness of devices in a secure network during run-time operation. A security management device is configured to perform network trust attestation operations in order to generate an access control policy that defines access rights for a device in a network. The access control policy is assured by creating a hash value for the access control policy and then signing the hash value to generate a signed hash value. The signed hash value is integrated with the access control policy, and the access control policy is sent with the signed hash value to the operator device for verification. | 2015-12-17 |
20150365437 | MANAGING SOFTWARE DEPLOYMENT - The method includes identifying an instance of software installed. The method further includes determining a fingerprint corresponding to the instance of software installed. The method further includes determining a security risk associated with the instance of software installed. The method further includes identifying a software management policy for the instance of software based upon the fingerprint, security risk, and designated purpose of the computing device. In one embodiment, the method further includes in response to identifying the software management policy, enforcing, by one or more computer processors, the software management policy on the instance of software installed on the computing device. | 2015-12-17 |
20150365438 | Method and System for Automated Incident Response - Methods, systems, and apparatus, including computer programs encoded on computer storage media, for implementing a response to one or more security incidents in a computing network. One of the methods includes identifying a security incident based on detecting one or more indicators of compromise associated with the security incident, comparing the security incident with a predefined ontology that maps the security incident to one or more courses of action, selecting a response strategy that includes one or more of the courses of action, and implementing the response strategy as an automated response. | 2015-12-17 |
20150365439 | SYNCHRONIZATION OF SECURITY-RELATED DATA - An example method includes retrieving, by a local device ( | 2015-12-17 |
20150365440 | SHARED SECURITY UTILITY APPLIANCE FOR SECURE APPLICATION AND DATA PROCESSING - A method includes registering an application with a security information technology element (ITE), the security ITE comprising a secure computing device located within a protection envelope and configured to provide security services for one or more applications. The security ITE provides security services to applications and a secure processing environment for hosting applications, and includes cryptographic services and hardware acceleration. A security manager within the security ITE is configured to erase data within the protection envelope upon detecting physical tampering. | 2015-12-17 |
20150365441 | System for Providing DNS-Based Control of Individual Devices - A device control system is associated with individual devices connected through a network control point to a gateway and thereby to the Internet. The gateway inserts an EDNS0 pseudo resource record into an additional data section in each DNS query initiated by an individual device, the EDNS0 pseudo resource record identifying the initiating device. A dynamic policy enforcement engine in front of the DNS engine intercepts the DNS query, identifies the initiating device, and selects a policy that applies to the device. The dynamic policy enforcement engine may provide parental control and security service to the individual device by blocking the DNS query or passing it to the DNS engine according to the policy. A component that intercepts DNS queries may provide several additional types of services to the individual devices, including advertising, messaging, mobile device tracking, individual device application control, and delivery of individualized content. | 2015-12-17 |
20150365442 | INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD AND RECORDING MEDIUM - An information processing device ( | 2015-12-17 |
20150365443 | METHOD, SERVER AND APPARATUS FOR ESTABLISHING POINT-TO-POINT CONNECTION - When a first device is establishing a point-to-point connection with a second device, a server provides connection instructions for assistance. The connection instructions define multiple connection flows. When the connection instructions are received, the first device attempts a first connection flow under a priority order. If failed, another connection is tried by the first device. The server monitors connection status and adjusts the connection instructions according to statistics and circumstances. | 2015-12-17 |
20150365444 | INTER-USER EQUIPMENT (UE) TRANSFER (IUT) FOR COLLABORATIVE SESSIONS THAT INCLUDE MEDIA SESSION INFORMATION - A method and apparatus for inter-user equipment (UE) transfer (IUT) of collaborative session control and session information between WTRUs. A collaborative session control transfer request including ongoing session information is transmitted prior to transfer of session control from one WTRU to another WTRU. Ongoing session information may include information regarding media flows and devices involved in the session. A media control transfer response is transmitted in response to the transfer request. | 2015-12-17 |
20150365445 | METHOD AND APPARATUS FOR PROVIDING A NETWORK ASSISTING SWITCH FUNCTION - A method and apparatus for providing a network assisting switch function are disclosed. For example, the method receives a query for feature processing for a call from a switch deployed in a switched network, and determines if the feature processing for the call requires one or more switching services. The method determines if the switch is able to provide the one or more switching services, if the one or more switching services are determined to be required, and initiates a temporary connection to a network assisting switch function in a packet network, if the switch is unable to provide the one or more switching services. | 2015-12-17 |
20150365446 | Process and result of real-time/live doodling that engages more than one user at the same time on an application or software that uses internet for connection - An Internet application or software has many features to connect and share data with your family and peers. | 2015-12-17 |
20150365447 | DETERMINING STORIES OF INTEREST BASED ON QUALITY OF UNCONNECTED CONTENT - A system identifies unconnected content items of high quality and provides the unconnected content items for display to a user. The method comprises receiving several content items posted on pages of a social networking system. The system then determines a subset of those content items (e.g., high quality content items). A topic is then extracted from each of the subset of content items. The topic is mapped to one or more related pages of the social networking system that represent an expanded set of pages associated with the content item. For each of the related pages, a user is identified who is connected to the related page. Finally, the content item (e.g., a high quality content item) is provided to the user for display in the user's newsfeed. | 2015-12-17 |
20150365448 | FACILITATING CONVERSATIONS WITH AUTOMATED LOCATION MAPPING - Individuals may utilize devices to engage in conversations about topics respectively associated with a location (e.g., restaurants where the individuals may meet for dinner). Often, the individual momentarily withdraws from the conversation in order to issue commands to the device to retrieve and present such information, and may miss parts of the conversation while interacting with the device. Additionally, the individual often explores such topics individually on a device and conveys such information to the other individuals through messages, which is inefficient and error-prone. Presented herein are techniques enabling devices to facilitate conversations by monitoring the conversation for references, by one individual to another (rather than as a command to the device), to a topic associated with a location. In the absence of a command from an individual, the device may automatically present a map alongside a conversation interface showing the location(s) of the topic(s) referenced in the conversation. | 2015-12-17 |
20150365449 | INFORMATION PROCESSING APPARATUS, SYSTEM, INFORMATION PROCESSING METHOD, AND PROGRAM - Provided is an information processing apparatus including: a first information acquisition unit configured to acquire first information indicating behavior of at least one user; a second information acquisition unit configured to acquire second information on the at least one user, the second information being different from the first information; and a display control unit configured to display, in a display unit, a user object which is configured based on the first information and represents the corresponding at least one user and a virtual space which is configured based on the second information and in which the user object are arranged. | 2015-12-17 |
20150365450 | ENHANCED STREAMING MEDIA PLAYBACK - A streaming video playback system is provided to generate locally a manifest file associated with a streaming video for a media player of a client device. The locally generated manifest file helps reduce startup time for the media player and the manifest file is locally generated based on streaming metadata associated with the streaming video and the manifest files includes HTTP Live Streaming (HLS) based master playlists and media playlists. The locally generated manifest file also provides better adaptive bit rate control by enabling pre-fetching of video segments of a streaming video and caching during playback. The streaming video playback system reduces the size of media playlist transmitted to a content sharing service using index of the last video segment and makes it practical to have DVR-able live video streaming with a larger seek window. | 2015-12-17 |
20150365451 | METHOD, APPARATUS AND SYSTEM FOR PRESENTING MOBILE MEDIA INFORMATION - A solution for presenting mobile media information is provided, including: collecting audio data associated with mobile media information, transmitting the audio data to a mobile voice platform which stores the audio data and generates a tag corresponding to the audio data, obtaining the tag from the mobile voice platform, inserting the tag into a predetermined position in the mobile media information, presenting the mobile media information with the tag being inserted into, invoking the audio data corresponding to the tag from the mobile voice platform according to a trigger operation issued when a user browses the mobile media information, and playing the invoked audio data. | 2015-12-17 |
20150365452 | QUALITY OF EXPERIENCE FOR COMMUNICATION SESSIONS - A computer-implemented method, computer program product, and computing system is provided for managing quality of experience for communication sessions. In an implementation, a method may include determining a change in an optimum video size for a streaming video. The method may also include determining one or more constraints of resizing associated with the change in the desired video size. The method may further include adaptively resizing the streaming video to a current desired video size when the one or more constraints of resizing exceed a threshold value. | 2015-12-17 |
20150365453 | MEDIA PROJECTION METHOD AND DEVICE, CONTROL TERMINAL AND CLOUD SERVER - A media projection method, a media projection device, a control terminal, and a cloud server are disclosed. The media projection method includes: establishing a playback control channel between a control terminal and a media projection device; sending, by the control terminal, a media playback request message to the media projection device over the playback control channel to cause the media projection device to enable a service of playing a corresponding media resource according to the media playback request message. The present disclosure can rapidly realize multi-screen interaction of third-party videos. | 2015-12-17 |
20150365454 | MEDIA PROCESSING SERVICES ON AN ACCESS NODE - An access node may enhance the upload experience by performing media processing services at the access node. The access node may receive media content from one or more client devices. The media content may include a plurality of content items. The access node may process at least a first portion of the media content to produce processed media content. Several examples of media processing services are described, including an image or audio enhancement process, discarding low quality content items, discarding redundant content items, categorizing/ranking the content items, facial recognition, and the generation of a compilation content item. After processing at least the first portion of the media content to produce processed media content, the access node may transmit the processed media content to a server. | 2015-12-17 |
20150365455 | Sound Signal-Based Local Interactive Platform System and Local Interactive Service Providing Method Using Same - The present invention relates to a technology for providing a place/time-based local interactive service, which provides multi-formatted content information to a user moving while carrying a smart terminal having a dedicated application installed therein. In particular, when moving into a place were a specific wired/wireless AP is installed, a user who carries a smart terminal with a dedicated application activated therein can receive multi-formatted content information previously mapped with the place using a place/time, without a separate manipulation of the smart terminal. According to the present invention, time periods during which the user carrying the smart terminal stays at the place where the specific wired/wireless AP is installed are accumulated and managed using time coins, and the user is then given a benefit according to the accumulated time periods. | 2015-12-17 |
20150365456 | SYSTEM AND METHOD OF DISCOVERY AND LAUNCH ASSOCIATED WITH A NETWORKED MEDIA DEVICE - A method, apparatus and/or system related to discovery and launch system and method. In one embodiment, a method of a mobile device includes accessing a multicast capability of an operating system through an application of the mobile device, determining if there is a similar application locally stored on a networked media device to the application on the mobile device when a multicast message is broadcast to the networked media device communicatively coupled to the mobile device through a local area network, and either populating a table of the operating system of the client device with a list of applications and/or presenting identifiers to the client device to enable a user thereof to select an identifier therethrough. | 2015-12-17 |
20150365457 | SERVICE DISCOVERY ACROSS DIFFERENT NETWORKS - Systems and techniques for service discovery and media sharing are described. For example, a described technique includes identifying, at a first device, a streaming service; receiving a request to establish communication with a second device, the first device and the second device being on different first networks, the first networks being different local multicast networks; and providing, in response to the request, service information to the second device to cause the second device to internally publish multicast domain name system (mDNS) information regarding the streaming service such that the streaming service is (i) discoverable by the second device via a mDNS query and (ii) accessible through a second network that interconnects the first networks. | 2015-12-17 |
20150365458 | CONTENT SUPPLYING DEVICE, CONTENT SUPPLYING METHOD, PROGRAM, AND CONTENT SUPPLYING SYSTEM - There is provided a content supplying device that supplies streaming data of content in accordance with MPEG-DASH, the content supplying device including: an HTTP transmission unit configured to convert each segment of the streaming data into a file and to unicast the resulting segment files via HTTP; an RTP transmission unit configured to multicast and/or broadcast the segment files via RTP; and a metafile generation unit configured to generate a metafile describing a chronological correspondence relation between the segment files to be unicasted via HTTP and the segment files to be multicasted and/or broadcasted via RTP, and to supply the metafile to a receiver. | 2015-12-17 |
20150365459 | QUALITY OF EXPERIENCE FOR COMMUNICATION SESSIONS - A computer-implemented method, computer program product, and computing system is provided for managing quality of experience for communication sessions. In an implementation, a method may include determining a change in an optimum video size for a streaming video. The method may also include determining one or more constraints of resizing associated with the change in the desired video size. The method may further include adaptively resizing the streaming video to a current desired video size when the one or more constraints of resizing exceed a threshold value. | 2015-12-17 |
20150365460 | DYNAMIC WORKFLOW-BASED COMPOSITE WEB SERVICE SYSTEM AND METHOD - A dynamic workflow-based composite web service system and method for the creation and definition of a web service, its properties, methods, and functions through the combination of an event trigger which defines the web service endpoint, actor classes which defines the service's properties and metadata, and a workflow which defines its methods and functions. The dynamic workflow-based composite web service system and method generally includes one or more web service endpoints (the URL where the service can be accessed by a client application), an event trigger defined for each endpoint, actors which define the properties and metadata of the service, and a workflow which receives input from the endpoint, returns the result of the process, and defines the web service functions and methods. | 2015-12-17 |
20150365461 | APPARATUS AND METHOD FOR CONTROLLING EXECUTION OF MASHUP WEB OF THINGS SERVICE - An apparatus and method for controlling the execution of mashup WoT service are disclosed herein. The apparatus includes a WoT mashup service functionality entity, a WoT service execution functional entity, and a WoT service repository. The WoT mashup service functionality entity makes a response to a mashup WoT service request from a WoT service user by executing a mashup WoT service optimized for the WoT service user. The WoT service execution functional entity returns the results of simple WoT services to the WoT mashup service functionality entity in response to a request for the execution of the simple WoT services for the execution of the mashup WoT service from the WoT mashup service functionality entity. The WoT service repository stores WoT service execution descriptions each descriptive of execution logic for each of the simple WoT services. | 2015-12-17 |
20150365462 | BROWSING SESSION METRIC CREATION - A browsing process is directed to the generation and management of a browse session at a network computing provider. A client computing device requests a remote browse session instance at a network computing provider. The browse session instance may correspond to requested network content. The network computing provider retrieves the requested content through an instantiated network browse session instance, and performs a first set of processing actions to generate a processing result. The processing result may be provided to the client computing device for display, including performing a second set of processing actions on the processing result at the client computing device. Metrics related to the retrieval, processing, and use of requested network content may be recorded and transmitted to a metric reporting server. | 2015-12-17 |
20150365463 | DYNAMIC APPLICATION DEPLOYMENT - In some examples, an electronic device may offload an application to network storage. Subsequently, if a user attempts to execute the application on the electronic device, the application may be executed remotely while the application is downloaded to the electronic device. As one example, a remote computer may use an emulator to execute the application and send application execution data to the electronic device. The user may interact with the remotely executing application while the application is downloaded and reinstalled on the electronic device. Application state information may be obtained from the remotely executing application and used to initiate execution of the application locally on the electronic device. As another example, a web application version of the application may be executed remotely and accessed through a browser on the electronic device while the application is downloaded and reinstalled on the electronic device. | 2015-12-17 |
20150365464 | DOWNLOAD BOOTHS - A download booth comprising a local file server operatively connected to a removable disk drive containing, in use, multimedia content, the local file server further comprising a network interface operatively connected to a plurality of wireless access points and a wireless connection manager, wherein the wireless connection manager is configured to authenticate incoming connection requests from a plurality of wireless devices and upon authentication, to temporarily connect each authenticated wireless device to its own access point for the duration of a connection session. The end of the connection session may be determined by an estimated download time for a particular multimedia file, or upon detection of completion of a download from the download booth to the wireless device. Suitably, the connection manager is configured to dynamically queue connection requests when the number of concurrent connection requests exceeds the number of available access points and to prioritise the connection requests according to an estimated aggregated end time for completing the download requests. | 2015-12-17 |
20150365465 | Site acceleration with content prefetching enabled through customer-specific configurations - A CDN edge server is configured to provide one or more extended content delivery features on a domain-specific, customer-specific basis, preferably using configuration files that are distributed to the edge servers using a configuration system. A given configuration file includes a set of content handling rules and directives that facilitate one or more advanced content handling features, such as content prefetching. When prefetching is enabled, the edge server retrieves objects embedded in pages (normally HTML content) at the same time it serves the page to the browser rather than waiting for the browser's request for these objects. This can significantly decrease the overall rendering time of the page and improve the user experience of a Web site. | 2015-12-17 |
20150365466 | Dual-Mode Download Manager - This disclosure provides for automatically changing the mode of download of a download manager in a customer premise equipment device. In some implementations, the download manager can send a timeout option to a TFTP server and automatically change the mode of download based on whether a timeout option acknowledgement is received. The download manager can include a first control attribute to enable or disable automatic mode changes and/or a second control attribute to set the initial download mode of the device. | 2015-12-17 |
20150365467 | Emulating Functionality for Constrained Devices - To alleviate constrained nodes ( | 2015-12-17 |
20150365468 | DESKTOP SCREEN SHARING OVER HTTP - Sharing a desktop screen is implemented on a Hypertext Transfer Protocol (HTTP) web server using variable interval GET and POST requests. Connection to a web server bypasses firewall or shared IP limitations. In the described HTTP/HTTPS only solution, an existing web server is used to allow one or more clients to view a remote computer's screen and control it (remoting). The web server can act as an intermediary to enable one computer to “take control” of a second computer by enabling the first computer (a client) to view the desktop session of the second computer (a host) and enable the first computer to act as master for input device input (e.g., keyboard input, mouse input, stylus input, etc.) for the second computer. | 2015-12-17 |
20150365469 | SYSTEM AND METHOD FOR INTEGRATING WEB AND NATIVE APPLICATIONS FROM WEB-BASED CONTEXTS - A client computing device accessing a cloud computing system identifies applications that a user can use to access a cloud computing service. The client computing device receives an account list of applications associated with a user account on the cloud computing system, and identifies at least one of a characteristic of the client computing device and a local list of applications installed on the client computing device. The client computing device generates an availability list of applications based on the account list and the identified local list and device characteristics. | 2015-12-17 |
20150365470 | Concurrent Scalable Data Content Scanning - Through the use of remote actor ( | 2015-12-17 |
20150365471 | MESSAGE TRANSMISSION APPARATUS, MESSAGE TRANSMISSION METHOD, AND MESSAGE TRANSMISSION PROGRAM - Message transmission device, which performs processing concerning the transmission of messages to the terminal, executes notification processing for the transmission of a trigger packet to the terminal, said trigger packet indicating that an unsent message exists. Preparatory processing for transmission of the message to the terminal is executed. The order in which the notification processing and the preparatory processing is executed is determined in such a manner that the preparatory processing has been completed before a message acquisition request, which is a response for the trigger packet, is received from the terminal. | 2015-12-17 |
20150365472 | INPUT HANDOVER FROM A FIRST DEVICE TO A SECOND DEVICE - The invention is directed to input handover from a first device to a second device. An exemplary method comprises: establishing a connection between a first device and a second device; capturing a first image from the first device; capturing a second image from the second device; determining a location of the second device in reference to the first device based on comparing the first image and the second image; determining occurrence of a trigger event on the first device; and executing handover of an input instruction from the first device to the second device. | 2015-12-17 |