GUEST TEK INTERACTIVE ENTERTAINMENT LTD. Patent applications |
Patent application number | Title | Published |
20140344890 | DNS-BASED CAPTIVE PORTAL WITH INTEGRATED TRANSPARENT PROXY TO PROTECT AGAINST USER DEVICE CACHING INCORRECT IP ADDRESS - A captive portal system includes a login database, a web server, and a name server. The name server receives a DNS request from a user device, queries the login database to determine whether the user device is logged in, and responds to the DNS request with the IP address of the web server as a resolved IP address of the specified domain name when the user device is not logged in. The web server accepts a connection request from the user device to the IP address of the web server, receives an HTTP request specifying a non-local target URL from the user device, queries the login database to determine whether the user device is logged in according to the source address of the user device, and acts as a transparent proxy between the user device and the non-local target URL when the user device is logged in. | 11-20-2014 |
20140250470 | METHOD OF OPERATING ONE OR MORE CONTROLLABLE DEVICES IN DEPENDENCE UPON COMMANDS RECEIVED FROM A MOBILE DEVICE AND SYSTEM CONTROLLER THEREOF - A system controller for operating one or more controllable devices in dependence upon commands received from a mobile device includes a first communication interface for receiving a command from the mobile device and a second communication interface for receiving a message from a controllable device. One or more processors are configured to determine whether the mobile device that sent the command is authorized to operate a target controllable device to which the command pertains, and generate a command identifier for identifying the command, and send an instruction corresponding to the command and including the command identifier to the target controllable device when the mobile device is authorized to operate the target controllable device. The system controller replies to a pending command identified by a particular command identifier with a response indicating transaction complete when the message from the controllable device acknowledges the particular command identifier. | 09-04-2014 |
20140250460 | VIRTUAL DESKTOP SERVICES - Methods and apparatus are described for providing access to arbitrary applications via an interactive television service using a pool of remote virtual desktops. | 09-04-2014 |
20140245395 | OFF-SITE USER ACCESS CONTROL - Systems and methods are described for off-site user access control to communications services via a site-based communications network. Embodiments operate in context of sites, each having one or more site-based networks in communication with external networks via one or more on-site routers. User devices are provided with controlled access to those external networks via wired or wireless connections between those user devices and the site based networks. In some embodiments, on-site routers maintain route maps that indicate which user devices are authorized. Standard routing functions are used so that traffic from authorized devices is routed normally, while traffic from unauthorized devices is automatically forwarded to an off-site (e.g., cloud-based) authentication system. As devices become remotely authenticated, the off-site authentication system can remotely update route maps of the on-site routers to add those devices. | 08-28-2014 |
20140189759 | CUSTOM-TAILORED ENTERTAINMENT EXPERIENCE FOR USER IDENTIFIED BY DIFFERENT LOYALTY PROGRAM USER IDENTIFIERS AT DIFFERENT HOSPITALITY LOCATIONS - A user profile server stores a particular user profile corresponding to a user who belongs to a plurality of separate loyalty programs, and the particular user profile includes a plurality of different loyalty program user identifiers each identifying the user on a respective one of the separate loyalty programs. The user profile server communicates user a preference included on the particular user profile to a first controller via the computer network and communicates the user preference included on the particular user profile to a second controller via the computer network. The first controller is associated with a first hospitality location where the user is identified according to a first loyalty program user identifier included on the particular user profile, and the second is controller is associated with a second hospitality location where the user is identified according to a second loyalty program user identifier included on the particular user profile. | 07-03-2014 |
20140143380 | DYNAMIC ASSIGNMENT OF CENTRAL MEDIA DEVICE SUPPORTING NETWORK-BASED MEDIA SHARING PROTOCOL TO GUEST DEVICE OF HOSPITALITY ESTABLISHMENT FOR MEDIA SHARING PURPOSES - A media system includes a computer network, a media device supporting a network-based media sharing protocol, a plurality of output devices located at a plurality of physical locations within a hospitality establishment, and a system controller. In response to a first event, the system controller assigns the media device to a particular guest device by reconfiguring one or more components of the computer network to enable the particular guest device to utilize the network-based media sharing protocol to share media over the computer network with the media device, and commands an output device located at a physical location associated with the particular guest device to play media corresponding to the media signal outputted by the media device on the output port. In response to a second event, the system controller un-assigns the media device from the particular guest device and commands the output device to stop playing the media. | 05-22-2014 |
20140090030 | CAPTIVE PORTAL THAT MODIFIES CONTENT RETRIEVED FROM DESIGNATED WEB PAGE TO SPECIFY BASE DOMAIN FOR RELATIVE LINK AND SENDS TO CLIENT IN RESPONSE TO REQUEST FROM CLIENT FOR UNAUTHORIZED WEB PAGE - The described captive portal techniques cause client devices to render and display designated web pages. One designated web page may be different than a requested web page such as when a client is not authorized to access the requested page and is instead caused to display a login portal. The captive portal may modify the designated web page to ensure that relative links lacking base domains now have specified base domains pointing to an authorized web server. The modified content is sent from the captive portal to the client device for display. Client web browser security measures related to redirection messages are thereby bypassed and load on the captive portal is minimal. Another designated web page may be the same as the requested web page such as when the requested page is an authorized page even for non-logged in clients. Authorized pages may be modified to add a login link. | 03-27-2014 |
20140089524 | ENABLING COMMUNICATION BETWEEN CLIENTS ON NETWORK ACCORDING TO PREDETERMINED NAMING CONVENTION WITH LOCATION-BASED HOSTNAMES - A method of automatic hostname configuration includes receiving a request from a client device. A location detection module may be utilized for determining a location identifier representing a location at which the client device is located. A hostname is formed including at least the location identifier, and a control server assigns the hostname to the client device by sending an acknowledgement including the hostname to the client device. The request and acknowledgement may be communicated using DHCP. Simple network management protocol messages may be sent to one or more switches to query for a MAC address of the client device to determine the source switch and port from which the request originated. The switch-port-to-location table may include several ports that map to a same location identifier. The hostname may further be formed by including a device type identifier associated with the client device. | 03-27-2014 |
20140053282 | SYSTEM AND METHOD OF INTEGRATING MODULES FOR EXECUTION ON A COMPUTING DEVICE AND CONTROLLING DURING RUNTIME AN ABILITY OF A FIRST MODULE TO ACCESS A SERVICE PROVIDED BY A SECOND MODULE - A system for integrating modules of computer code may include a sandbox validator for receiving a first module and verifying that the first module complies with one or more sandbox constraints. A computing device may execute the first module within a runtime environment. A module integrator may operate within the runtime environment for receiving a request from the first module to access a service provided by a second module and only allowing the first module to access the service when the first module is authorized to access the service according to a service authorization table. The sandbox validator may ensure the first module correctly identifies itself when requesting a service provide by another module and that the first module includes runtime policing functions for non-deterministic operations. A service authorizer may generate an authorization policy for the first module, which is sent to the computing device along with the first module. | 02-20-2014 |
20140026162 | METHOD OF PROVIDING CUSTOMIZED HOSPITALITY MEDIA FUNCTIONS AT A PLURALITY OF SET-TOP BOXES BEING CONNECTED TO AN RF COAX NETWORK, AND HOSPITALITY MEDIA SYSTEM THEREOF - A hospitality media system includes a plurality of set-top boxes (STBs) coupled to a radio frequency (RF) coax network. Each STB has an identifier for identifying the STB. A content source broadcasts media content to the STBs utilizing the RF coax network and an update server distributes software data to the STBs. The software data causes a particular STB to perform a media function customized for the particular STB according to the identifier of the particular STB. | 01-23-2014 |
20130347028 | HOSPITALITY MEDIA SYSTEM OPERATED BY MOBILE DEVICE - A hospitality media system includes a media system controller and a plurality of controllable devices operable by the media system controller, each of a plurality of rooms having one or more in-room controllable devices. A communication module performs data communications with a mobile device. An authentication module receives identification information from the mobile device, determines a registered room currently associated with the identification information, and includes in an authorized subset of the controllable devices for which the mobile device is authorized to operate at least the in-room controllable devices of the registered room. The media system controller operates the authorized subset of the controllable devices in dependence upon commands received from the mobile device. | 12-26-2013 |
20130347015 | Increasing pay-per-use media credit associated with guest room in response to notification message tracking usage of service offered by hospitality establishment - A hospitality establishment includes guest rooms having media devices installed therein. Each guest room has one or more in-room media devices for providing a pay-per-use media function. A media system controller dynamically associates a credit corresponding to a monetary value with a particular guest room in response to an occurrence of a first event, configures an in-room media device of the particular guest room to indicate the credit associated with the particular guest room and allow a guest of the particular guest room to utilize at least an amount of the credit toward an order of the pay-per-use media function, activates the pay-per-use media function on at least one of the in-room media devices of the particular guest room in response to a received order, and decreases the credit associated with the particular guest room according to the amount of the credit utilized toward the received order. | 12-26-2013 |
20130346808 | DISTRIBUTED COMPUTING SYSTEM THAT MONITORS CLIENT DEVICE REQUEST TIME IN ORDER TO DETECT PERFORMANCE PROBLEMS AND AUTOMATICALLY ISSUE ALERTS - A client device in a distributed system includes a timer for timing a request time duration substantially including a period of time that the client device is waiting for results to be received via a network from a server in response to a request sent by the client device. A processor of the client device compares the request time duration with a dynamically generated request time threshold, and automatically controls a network interface to issue one or more alert messages to a network operation center (NOC) via the network when the request time duration is greater than the request time threshold. The request time threshold is dynamically calculated according to historic request time durations timed by the timer for a plurality of previous requests sent by the client device. | 12-26-2013 |
20130305320 | AUTOMATIC SERVICE ACTIVATION FOR USER DEVICE UPON DETECTING ITS DEVICE IDENTIFIER ON NETWORK OF HOSPITALITY ESTABLISHMENT - A service controller includes a network interface for coupling to a local area network of a hospitality establishment, and one or more processors coupled to the network interface. The one or more processors are configured to detect a device identifier of a user device on a local area network of a hospitality establishment, determine whether a guest of the hospitality establishment is associated with the device identifier, and automatically activate a service for the user device at the hospitality establishment in response to detecting the device identifier on the local area network when a guest of the hospitality establishment is determined to be associated with the device identifier. | 11-14-2013 |
20130297723 | AUTOMATIC CLIENT DEVICE LOCATION DETECTION WITHIN HOSPITALITY ESTABLISHMENT - An apparatus for automatic client device location detection includes a controller module configured to receive first network traffic transmitted on a computer network of a hospitality establishment from a known location within the hospitality establishment. The controller module is further configured to query one or more network components of the computer network to determine a source access-node from which the first network traffic originated, and store a mapping of the source access-node to the known location in the storage device. The controller module is further configured to receive second network traffic transmitted on the computer network by a client device at the hospitality establishment, query the one or more network components of the computer network to determine that the second network traffic originated from the source access-node, and automatically determine the client device to be at the known location according to the mapping in the storage device. | 11-07-2013 |
20130239199 | WALLED GARDEN PROVIDING ACCESS TO ONE OR MORE WEBSITES THAT INCORPORATE CONTENT FROM OTHER WEBSITES - A cleared sites list includes one or more hostname descriptors. A firewall includes rules associated with a cleared IP list including cleared IP addresses, and permits transfer of a cleared HTTP request from a user device to a cleared destination IP address that matches one of the cleared IP addresses. A controller examines a non-cleared HTTP request from the user device to a non-cleared destination IP address that does not match one of the cleared IP addresses, and acts as a transparent proxy between the user device and the non-cleared destination IP address when a destination host header of the non-cleared HTTP request matches a hostname descriptor of the cleared sites list. The controller further acts as a transparent proxy between the user device and the non-cleared destination IP address when a referrer header of the non-cleared HTTP request matches a hostname descriptor of the cleared sites list. | 09-12-2013 |
20130081093 | HOSPITALITY MEDIA SYSTEM THAT AVOIDS NETWORK CONGESTION AND SERVER LOAD WHILE PROVIDING MEDIA EXPERIENCE WITHIN GUEST ROOM, AND COMPUTER SERVER AND METHOD THEREOF - A method of servicing requests for information at a server includes receiving a request for information from a client device, and determining a number of attempts of the request made by the client device. Both the client device and the server may count the number of attempts for each request. When the number of attempts is greater than a threshold, the method includes servicing the request and sending the information to the client device. When the number of attempts is not greater than the threshold, the method includes sending a service unavailable message to the client device. A retry-after delay may be calculated by the server according to a predicted time for the server to exit an overloaded state and included in the service unavailable message. The predicted time may take into account both requests currently being serviced and requests that have been scheduled to be serviced in the future. | 03-28-2013 |
20120089713 | System And Server For Assigning Location-dependent Hostname To Client Device Over Network And Method Thereof - A method of automatic hostname configuration includes receiving a request from a client device. A location detection module may be utilized for determining a location identifier representing a location at which the client device is located. A hostname is formed including at least the location identifier, and a control server assigns the hostname to the client device by sending an acknowledgement including the hostname to the client device. The request and acknowledgement may be communicated using DHCP. Simple network management protocol messages may be sent to one or more switches to query for a MAC address of the client device to determine the source switch and port from which the request originated. The switch-port-to-location table may include several ports that map to a same location identifier. The hostname may further be formed by including a device type identifier associated with the client device. | 04-12-2012 |