03rd week of 2014 patent applcation highlights part 66 |
Patent application number | Title | Published |
20140019986 | MANAGING MULTI-THREADED OPERATIONS IN A MULTIMEDIA AUTHORING ENVIRONMENT - Managing multi-threaded computer processing, including: processing a main thread for an object in background of the multi-threaded computer processing without locking the object during its process in the background, wherein processing a main thread includes: monitoring the state of the object, wherein the object is deemed ready for processing after it satisfies a set of rules to check for its completeness, and the object has not been modified for a pre-determined period of time; creating and adding tasks to a queue for processing once the object is ready; and packaging required information for the tasks into a single data structure that is passed to a task thread and returned to the main thread upon completion. | 2014-01-16 |
20140019987 | SCHEDULING MAP AND REDUCE TASKS FOR JOBS EXECUTION ACCORDING TO PERFORMANCE GOALS - Allocations of resources are determined for jobs that have map tasks and reduce tasks. The jobs are ordered according to performance goals of the jobs. The tasks of the jobs are scheduled for execution according to the ordering and the allocations of resources for the respective jobs. | 2014-01-16 |
20140019988 | SUPPORT OF NON-TRIVIAL SCHEDULING POLICIES ALONG WITH TOPOLOGICAL PROPERTIES - A system comprises a scheduling unit for scheduling jobs to resources, and a library unit comprising a machine map of the system and a global status map of interconnections of resources. A monitoring unit generates status information signals for the resources. The library unit receives the signals and determines a free map of resources to execute the job to be scheduled, the free map indicating the interconnection of resources to which the job in a current scheduling cycle can be scheduled and determined by removing from the machine map resources which fall within the global status map and re-introducing resources in the global status map which the scheduling unit has indicated the job being scheduled can be scheduled to. The monitoring unit dispatches a job to the resources in the free map which match the resource mapping requirements of the job and fall within the free map. | 2014-01-16 |
20140019989 | MULTI-CORE PROCESSOR SYSTEM AND SCHEDULING METHOD - A multi-core processor system includes plural CPUs; memory that is shared among the CPUs; and a monitoring unit that instructs a change of assignment of threads to the CPUs based on a first process count stored in the memory and representing a count of processes under execution by the CPUs and a second process count representing a count of processes assigned to the CPUs, respectively. | 2014-01-16 |
20140019990 | INTEGRATED CIRCUIT DEVICE AND METHOD FOR ENABLING CROSS-CONTEXT ACCESS - An integrated circuit device comprising an instruction processing module for performing operations on data in accordance with received instructions. The instruction processing module comprises a context selector unit arranged to selectively provide access to at least one process attribute(s) within a plurality of process contexts in accordance with at least one context selector value received thereby. The instruction processing module is arranged to receive an instruction comprising a context indication for a process attribute with which an operation is to be performed, provide the context selector value based at least partly on the context indication to the context selector unit, and execute the operation to be performed with the process attribute for at least one process context to which the context selector unit provides access in accordance with the context selector value. | 2014-01-16 |
20140019991 | ENHANCED MICROPROCESSOR OR MICROCONTROLLER - A microcontroller device has a central processing unit (CPU); a data memory coupled with the CPU divided into a plurality of memory banks, a plurality of special function registers and general purpose registers which may be memory-mapped, wherein at least the following special function registers are memory-mapped to all memory banks a status register, a bank select register, a plurality of indirect memory address registers, a working register, and a program counter high latch; and wherein upon occurrence of a context switch, the CPU is operable to automatically save the content of the status register, the bank select register, the plurality of indirect memory address registers, the working register, and the program counter high latch, and upon return from the context switch restores the content of the status register, the bank select register, the plurality of indirect memory address registers, the working register, and the program counter high latch. | 2014-01-16 |
20140019992 | Method of Parallel Processing of Ordered Data Streams - The disclosure relates to parallel processing of multiple digital data streams. The method includes transferring portions of incoming streams and attributes thereof to processors and obtaining respective portions of output streams and providing a sequence of the portions. Providing includes searching for a processor which is processing a portion of a particular incoming stream that has been located in a particular first stream before a portion already processed in said processor, and when several such processors are found, selecting a processor which is processing a portion of the particular incoming stream that is closest to the processed portion of the particular incoming stream. The processed portion of the particular incoming stream (and previously processed portions of the incoming stream from other processors) is transferred to the selected processor. If no such processors are found, the processed portions of the incoming stream are transferred to a respective output stream. | 2014-01-16 |
20140019993 | Tunneling Application Plug-Ins, Systems and Methods - A device server capable of adapting to a data flow through the use of plug-ins is presented. The device server manages data flow between data ports through the use of a data flow application. Additionally, the device server stores a collection of data flow plug-ins capable of modifying the data flow application based on plug-in parameters associated with each of the data flow plug-ins. These parameters can be used to describe the nature or functionality of each plug-in. The device server is environmentally aware and is capable of determining which plug-ins are desirable or should be made available at any given time based on environmental context. The device server can then select one or more of the desirable plug-ins and integrate the plug-ins' functionality with the data flow application forming a modified data flow rule set. The integrated data flow rules set dictates data flow between the data ports. | 2014-01-16 |
20140019994 | INFORMATION PROCESSING TERMINAL AND INFORMATION PROCESSING METHOD - According to one embodiment, an information processing terminal includes a memory unit, a detector, and an initiation controller. The memory unit is configured to store an application for controlling external device. The detector is configured to detect a trigger provided by a user to initiate the application. The initiation controller is configured to initiate the application for controlling the external device based on the trigger without clearing a lock function. | 2014-01-16 |
20140019995 | SCALABLE EVENT-DRIVEN SYSTEM - Processing events in a distributed environment. There is provided an apparatus which includes a central queue for receiving events and tracking their progress through filtering, correlation, and update processing of stateful target objects, at least one filtering node, at least one correlation node and at least one update node. The central queue receives events in their order of arrival, each event having an entry in the central queue. Processing of events is divided into three pipelined stages in the order of filtering, correlating and updating. A result for each event of each of filtering the events, correlating the events and updating the target object is recorded in the central queue as part of the event's queue entry. The method may be performed by one or more computing devices. The exemplary embodiments detect and compensate for any erroneous results due to unsynchronized parallel processing, and guarantee an eventually correct outcome. | 2014-01-16 |
20140019996 | EVENT HANDLING SYSTEM - A service that determines what event has occurred and provide a list of actions that the service can be performed in order to help the user through a hectic time period is disclosed. In one example, one or more modules can identify one or more events and transmitting an indication of the at least one event to a mobile device. Then, one or more modules can receive an indication that a mobile device has selected at least one of the at least one event, and determine at least one action to perform, wherein the at least one action can be associated with the at least one selected event. | 2014-01-16 |
20140019997 | VIRTUALIZATION SYSTEM AND METHOD THEREOF - A virtualization system for running a virtual machine independent of a master system is described, wherein the virtual machine has its own dedicated output and input devices to enable true parallel processing with the master system. | 2014-01-16 |
20140019998 | PARALLEL SYSTEM AND METHOD THEREOF - A parallel system for running a virtual machine independent of a master system is described, wherein the applications run on a subsystem has its own dedicated monitor and input devices to enable true parallel processing with applications run the master system. | 2014-01-16 |
20140019999 | DISK DEVICE AND METHOD OF DRIVING TRAY OF DISK DEVICE - A disk device and a method of driving a tray of the disk device. The method includes outputting a tray driving control signal in response to a tray opening instruction, and maximizing an output voltage of the tray driving control signal during a time period in which the tray is expected to be stalled. | 2014-01-16 |
20140020000 | DISC CLAMP WITH BALANCERS PROVIDING IMPROVED DURABILITY AND BALANCE AND SPINDLE MOTOR HAVING THE SAME - A disc clamp and a spindle motor having the same is provided, the disc clamp according to an exemplary embodiment comprising: a disc clamp body; a first disc balancer projected from the disc clamp body in the horizontal direction and configured to have a first thickness; and a second disc balancer bent downwards from an end of the first disc balancer to fix the disc and configured to have a second thickness, wherein an angle between a horizontal surface of the first disc balancer and the second disc balancer is in the range of 92° to 95°. | 2014-01-16 |
20140020001 | TURN TABLE FOR SPINDLE MOTOR AND SPINDLE MOTOR HAVING THE SAME - A turn table for a spindle motor and a spindle motor having the turn table are provided, the turn table for a spindle motor according to an exemplary embodiment comprising a clamping plate configured to have a locking protrusion protruding from an inner surface of a first recess thereof, the first recess being concavely formed in an outer circumference of the clamping plate; and a turn-table body configured to have a second recess to receive the clamping plate, and a plurality of protrusions protruding from an inner surface defined by the second recess towards the first recess to lock the locking protrusion. | 2014-01-16 |
20140020002 | APPARATUS FOR ROTATING DISK WITH IMPROVED ANTI-SLIP TORQUE - An apparatus for rotating disc is provided, the apparatus according to an exemplary embodiment is characterized in that an anti-slip torque that is applied to the upper face of the disc by using the clamp unit and the elastic member is stronger than a rotation torque that is generated by the turn table to inhibit slipping of the optical disc from the turn table. | 2014-01-16 |
20140020003 | DYNAMIC BANDWIDTH REDUCTION OF TRANSMISSION STREAMS - A processor implemented method conserves bandwidth capacity by reducing the amount of bandwidth that is used in a communication channel between a content transmitting server and a content receiving client computer while streaming multimedia content. A content receiving client computer receives a multimedia streaming content from a content transmitting server. The multimedia streaming content has a video component and an audio component. In response to determining that a user of the content receiving client computer is no longer watching the video component of the multimedia streaming content, a processor generates and transmits an inattention alert to the content transmitting server. The inattention alert directs the content transmitting server to stream only the audio component of a remaining portion of the multimedia streaming content to the content receiving client computer. | 2014-01-16 |
20140020004 | METHOD AND APPARATUS FOR EVALUATING VIDEO QUALITY - Embodiments of the present invention discloses a method and an apparatus for evaluating video quality, which relate to the field of communications technologies, and are invented for improving accuracy of evaluating quality of an IPTV service. The method includes: acquiring a channel video stream; acquiring a decoding feature parameter of a decoder, where the decoding feature parameter at least includes a decoding buffer capacity; acquiring a frame information loss ratio according to the decoding feature parameter, and acquiring mean opinion score-video MOS-V parameters according to the channel video stream; and acquiring a MOS-V value of the channel video stream according to the frame information loss ratio and the MOS-V parameters. The embodiments of the present invention are mainly applied to a technology for evaluating video quality. | 2014-01-16 |
20140020005 | DEVICES, SYSTEMS, METHODS, AND MEDIA FOR DETECTING, INDEXING, AND COMPARING VIDEO SIGNALS FROM A VIDEO DISPLAY IN A BACKGROUND SCENE USING A CAMERA-ENABLED DEVICE - The present invention discloses methods for detecting, indexing, and comparing video signals from a video display in a background scene using a camera-enabled device. Methods include the steps of: pointing a camera-enabled (CEN) device at a video-signal surface; detecting a location of the video-signal surface in the background scene on the CEN device; and extracting at least one frame from the detected video-signal surface. Preferably, the method further includes the steps of: obtaining at least one image from at least one extracted frame; computing at least one compact signature from at least one image; comparing at least one compact signature with at least one stored compact signature in a database; and determining whether at least one match was found between at least one compact signature and at least one stored compact signature. | 2014-01-16 |
20140020006 | RECEIVING APPARATUS, INFORMATION PROCESSING METHOD, PROGRAM, TRANSMITTING APPARATUS, AND APPLICATION INTERLOCKING SYSTEM - Disclosed herein is a receiving apparatus including: an extracting part configured to extract signature data representing a feature of reproduced content from the content; a profile generating part configured to generate user profile data; a query generating part configured to generate a query containing the signature data and the user profile data, transmit the query thus generated to a transmitting apparatus, and receive a response that is sent back from the transmitting apparatus in accordance with the query and that has been caused to match with the user profile data in the transmitting apparatus; and an application executing part configured to acquire and execute an application in conjunction with reproduction of the content based on the response thus received. | 2014-01-16 |
20140020007 | METHODS AND APPARATUS TO ADAPTIVELY SELECT SENSOR(S) TO GATHER AUDIENCE MEASUREMENT DATA BASED ON A VARIABLE SYSTEM FACTOR AND A QUANTITY OF DATA COLLECTIBLE BY THE SENSORS - Methods and apparatus to adaptively gather audience information data are disclosed. The disclosed methods and apparatus monitor system factor(s) and select one or more sensors from a plurality of sensors positioned to gather audience measurement data based on the monitored factor(s). Thus, the disclosed methods and apparatus adapt to the conditions they face by selecting an amount and/or type of audience measurement data they gather. | 2014-01-16 |
20140020008 | INFORMATION PROCESSING DEVICE AND METHOD FOR SETTING VOICE COMMUNICATION FUNCTION - According to one embodiment, an information processing device includes a connection module, determination module, and a setting module. The connection module is configured to connect to Internet. The determination module is configured to determine a start-up trigger for the information processing device based on a start-up instruction to the information processing device. The setting module is configured to switch a state for a voice communication function via the Internet based on the start-up trigger and to set the switched state. | 2014-01-16 |
20140020009 | APPARATUS AND METHOD FOR PROCESSING AN INTERACTIVE SERVICE - A method of processing an interactive service and an apparatus includes generating an application parameter table including a first identifier and a second identifier, wherein the first identifier identifies a interactive programming segment which application parameter table pertains to, and wherein the second identifier identifies an application within the scope of application parameter table; generating an activation message file that indicates at least one of activation times of the applications, wherein the activation message file includes a third identifier and activation messages, wherein the third identifier matches the first identifier of application parameter table which contains the applications, wherein the activation message includes a fourth identifier and a start time information, wherein the fourth identifier matches the second identifier of the application in the application parameter table. | 2014-01-16 |
20140020010 | METHOD AND SYSTEM FOR WATCHING SERVICE IN INTERNET PROTOCOL TELEVISION - The embodiments of the present invention provide a method for watching service content of an Internet protocol television. The method includes: receiving a request message requesting playing, on a second network television terminal, service content subscribed by a first network television terminal; obtaining a service profile of a first terminal and an identifier of a second terminal according to the request message; and sending the service content subscribed by the first terminal to the second terminal according to the service profile of the first terminal and the identifier of the second terminal By means of the present invention, a user may implement secure authentication by using a subscribed terminal and instruct an IPTV network side to send related service content to the second terminal according to IPTV subscription information of the first terminal. | 2014-01-16 |
20140020011 | Methods, Systems, And Computer Program Products For Delivering A Program In Advance Of A Scheduled Broadcast Time - A scheduled broadcast time is retrieved for a program that is to be delivered in advance of the scheduled broadcast time, wherein the scheduled broadcast time is associated with a program content identifier for the program. Prior to the scheduled broadcast time, a pre-cast channel is selected on a network by selecting a dedicated pre-cast channel. Prior to the scheduled broadcast time, a signal is sent for placing a viewer program storage device into a pre-cast mode, such that viewing of the pre-cast channel is disabled. Prior to the scheduled broadcast time, the program is delivered to the viewer program storage device over the pre-cast channel, wherein the delivered program is associated with the program content identifier and a time stamp for disabling playback of the delivered program until arrival of the scheduled broadcast time. | 2014-01-16 |
20140020012 | SERVER COLLABORATION SYSTEM - The television device is capable of accessing a first server and a second server. The television device is able to execute a first program that is suitable for a process that requires responsiveness, and a second program that is suitable for a process that requires confidentiality. In the case of performing a sequential plurality of processes, when, of the sequential plurality of processes, a first process is performed that includes the process that requires responsiveness but does not include the process that requires confidentiality, the television device executes the first program to perform the first process by means of communication with the first server, and when, of the sequential plurality of processes, a second process is performed that includes the process that requires confidentiality, the television device executes the second program to perform the second process by means of communication with the second server. | 2014-01-16 |
20140020013 | SYSTEM AND METHOD TO PROVIDE OUT-OF-BAND BROADCAST TRIGGER SYNCHRONIZATION AND COMMUNICATION TO INSERTION DEVICES - A cue message detection synchronizer that provides an out-of-band cue message to downstream content insertion devices. The cue message detection synchronizer receives a first data stream corresponding to a network feed, receives a second data stream corresponding to a provider feed, receives at least one cue message associated with the first data stream, compares the first data stream to the second data stream to determine a data stream offset, and generates cue message comprising one or more of: (i) the determined data stream offset, and (ii) a timestamp associated with the generated cue message and modified by the determined data stream offset. In this way, a location within a synchronized provider stream can be provided to downstream content insertion devices. | 2014-01-16 |
20140020014 | METHOD AND APPARATUS FOR PROVIDING WIDGET INFORMATION USING AN MPEG-2 LAYER - The present invention relates to a method for providing a widget service. More particularly, the present invention relates to a method for providing a widget service for a receiving device using a Moving Picture Experts Group (MPEG)-2 layer, the method comprising the steps of: receiving MPEG broadcast data; loading a widget general information table (WGIT) stored in program specific information (PSI) of the MPEG broadcast data; loading the information indicated by a widget information table (WIT) of the WGIT; and generating a widget using the information indicated by the WIT. | 2014-01-16 |
20140020015 | APPARATUS AND METHOD FOR MANAGING A PROGRAM-RELATED APPLICATION WIDGET IN A BROADCAST RECEIVER - An apparatus and method for managing a program-related application widget in a broadcast receiver is provided. The method includes receiving information on an application widget, which may interact with a program and content, from a broadcast provider server and managing the application widget, which may interact with the program and content, based on the received information on the application widget. | 2014-01-16 |
20140020016 | Method and Apparatus for Controlling Time-Scale Modification During Multi-Media Broadcasts - One embodiment of the present invention is a method for broadcasting information to one or more client devices from a broadcaster that is not a client device, which one or more client devices utilize presentation rates to present audio in broadcast information at various presentation rates using time-scale modification, and which method includes: (a) the broadcaster broadcasting the information; and (b) the broadcaster broadcasting guidance information used to determine presentation rates for use by the one or more client devices in presentation of audio in the broadcast information using time-scale modification; wherein the guidance information is transmitted at or not at a time of broadcast of the broadcast information. | 2014-01-16 |
20140020017 | APPARATUS AND METHODS FOR SELECTIVE ENFORCEMENT OF SECONDARY CONTENT VIEWING - Methods and apparatus for selectively enforcing required insertion or viewing of secondary content, such as advertisements or promotions, in a content distribution network. In one embodiment, the network is a managed network (e.g., cable television, satellite, or the like), and the method includes identifying secondary content with a particular attribute or property (e.g., an advertisement that a user has watched before), and selectively enabling one or more “trick mode” functions relating to that secondary content. In one implementation, audio codes or watermarks are inserted into the secondary content and detected when the content is accessed or rendered; if the detected content matches a database or listing of previously played content for that user or premises, the trick mode functionality (e.g., FF or “skip”) is enabled, thereby allowing the user to bypass the content. | 2014-01-16 |
20140020018 | METHOD AND SYSTEM FOR PROVIDING LOCATION BASED CONTENT DELIVERY BY EMBEDDING HIDDEN DATA IN A MULTIMEDIA FILE - The various embodiments herein provide a method and system for providing location based content delivery by embedding a hidden data in a multimedia file. The method comprises of encoding a hidden marker along with a multimedia content in the multimedia file, playing the multimedia file at a terminal of a particular location, initializing a client application pre-installed in a mobile device, recognizing and decoding the hidden marker in the multimedia file through the cheat application, sending the decoded hidden marker information to a central server, generating a list of postulated tasks based on the hidden marker information, sending the list of postulated tasks to the client application of the mobile device, selecting a task from the list of postulated tasks through the client application, sending the selected task information to the central server and playing the selected task at the terminal of the particular location by the central server. | 2014-01-16 |
20140020019 | Digital Satellite Broadcast Program Distribution Over Multicast IP Broadband Networks - Systems and methods for distributing digital satellite broadcast programs over multicast Internet Protocol (IP) networks are provided. A satellite receiver gateway receives a signal from a digital satellite broadcast and generates service information multicast packets that are transmitted over a multicast IP network. A device receives the service information multicast packets and generates a channel list or electronic program guide for a user. When a user selects a service from the channel list or electronic program guide the device sends a service request for the service towards the satellite receiver gateway. Either the satellite receiver gateway or a switch within the multicast IP network can then transmit the service in multicast IP packets to the requesting device. | 2014-01-16 |
20140020020 | INFORMATION DESCRIPTOR AND EXTENDED INFORMATION DESCRIPTOR DATA STRUCTURES FOR DIGITAL TELEVISION SIGNALS - According to an aspect, there is provided a digital television (DTV) data stream including program and system information protocol (PSIP) data associated with content of the DTV data stream, the PSIP data including a virtual channel table (VCT) and an event information table (EIT), the EIT comprising: a source identification field identifying a source of an associated event in a DTV data stream; an event identification field indicating an identification of the event; a start time field indicating a star time of the event; a title field indicating a title of the event; and a descriptor comprising: a descriptor tag identifying the descriptor as a genre descriptor, a descriptor length indicating a total length of the descriptor; and at least one category code for an associated event in a DTV data stream, each category code specifying genre, program type, or category information of the associated event, wherein the at least one category code specifies at least one of a set of basic categories. | 2014-01-16 |
20140020021 | Hybrid Media Receiver, Middleware Server and Corresponding Methods, Computer Programs and Computer Program Products - It is presented a hybrid media receiver capable of receiving broadcast media content using a first broadcast media network and a second broadcast media network, wherein the first broadcast media network complies with Internet Protocol Television, IPTV. The hybrid media receiver comprises: a content type receiver arranged to receive a first content type identifier and a second content type identifier, corresponding to the first broadcast media network and the second broadcast media network, respectively; and a channel data obtainer arranged to obtain, using the first content type identifier, a first list of scheduled media channels available to the hybrid media receiver over the first broadcast media network; and to obtain, using the second content type identifier, a second list of scheduled media channels available to the hybrid media receiver over the second broadcast media network. A corresponding middleware server, methods, computer programs and computer program products are also presented. | 2014-01-16 |
20140020022 | ELECTRONIC PROGRAM GUIDE WITH DIGITAL STORAGE - An interactive television program guide system with digital storage is provided. The program guide gives users the ability to store information associated with recorded programs in a directory in the digital storage device thereby providing easy access to program information. The program guide may also provide a global media library for indicating the programs stored on removable storage media used with the program guide. The guide may also allow the user to manage and maintain a user media library to do the same. Non-time-sensitive data associated with recorded programs may be stored in a way that allows the user to interact with the data on playback as if the program were being originally aired. The program guide also allows the user to define “super-programs” for playback of a sequence of stored programs or program segments. | 2014-01-16 |
20140020023 | SYSTEM FOR PRESENTING MEDIA PROGRAMMING GUIDES - A system for presenting media programming guides is disclosed. A system that incorporates teachings of the present disclosure may include, for example, a media receiver having a controller element to generate a Media Program Guide (MPG) that groups media programs according to a redundancy of media programs and a viewing history of a subscriber of the media receiver. Other embodiments are disclosed. | 2014-01-16 |
20140020024 | INTUITIVE IMAGE-BASED PROGRAM GUIDE FOR CONTROLLING DISPLAY DEVICE SUCH AS A TELEVISION - A control device such as a tablet computer presents a scrollable image-based program guide (IBPG) on a display that a user can swipe to cause the device to command a display device to present an audio video (AV) program represented by the image. The IBPG is a subset of an electronic program guide (EPG) from a TV signal provider and is populated using user history and favorites information and social networking site history and favorites information. Sizes of the images may vary depending on the information. | 2014-01-16 |
20140020025 | METHOD, APPARATUS AND SYSTEM FOR MULTIPLE SCREEN MEDIA EXPERIENCE - A current programming channel, and the content thereon, being displayed on a primary display device are tracked. Web content related to the content being displayed on the primary display device is searched and the resulting data is made available to a user on at least one secondary display device via a user interface. The results of the search are made available to a user such that when data resulting from the search is selected for display on the at least one secondary display device, the data is displayed on the at least one secondary display device without interfering with a display of content on the primary display device. In the event of a change of the programming channel or the content thereon, a new search is initiated for data related to content being currently viewed. | 2014-01-16 |
20140020026 | SYSTEM AND METHOD FOR MANAGING A CONTENT CATALOGUE - The present invention related to the domain of audio/video content distribution, where a catalogue of available content is made available to end users. An aim of the invention is to ensure that the catalogue has a high quality in that a search within the catalogue will have a high probability of yielding a result. The invention provides a method and a system for creating useful links between elements in the catalogue whenever it is deemed that such links be useful. The links between the elements are created either by adding new content to the catalogue or new metadata which can be associated with the new content and existing content in the catalogue. | 2014-01-16 |
20140020027 | APPARATUS AND METHOD FOR MANAGING A PERSONAL CHANNEL - The present invention relates to an apparatus ( | 2014-01-16 |
20140020028 | DYNAMIC HYPERLINKING APPROACH - A method of returning target scenes from a user link request is disclosed. The method comprises the steps of: receiving a user link request on a user interface; comparing the received user link request to a plurality of entries in a lookup table; for each entry in the plurality of entries in the lookup table that matches the received user link request, identifying a target scene that corresponds to the matched entry in the lookup table; determining a closest one of the target scenes if multiple entries in the lookup table match the user link request; and transitioning to the closest target scene. | 2014-01-16 |
20140020029 | INFORMATION DESCRIPTOR AND EXTENDED INFORMATION DESCRIPTOR DATA STRUCTURES FOR DIGITAL TELEVISION SIGNALS - According to an aspect, there is provided a digital television (DTV) data stream including program and system information protocol (PSIP) data associated with content of the DTV data stream, the PSIP data including a virtual channel table (VCT) and an event information table (EIT), the EIT comprising: a source identification field identifying a source of an associated event in a DTV data stream; an event identification field indicating an identification of the event; a start time field indicating a star time of the event; a title field indicating a title of the event; and a descriptor comprising: a descriptor tag identifying the descriptor as a genre descriptor, a descriptor length indicating a total length of the descriptor; and at least one category code for an associated event in a DTV data stream, each category code specifying genre, program type, or category information of the associated event, wherein the at least one category code specifies at least one of a set of basic categories. | 2014-01-16 |
20140020030 | METHOD AND SYSTEM FOR ORDERING VIDEO CONTENT FROM A MOBILE DEVICE - A method and system for ordering content includes a mobile device having an ordering interactive interface having available content including linear content and on-demand content. The interactive interface receives a content selection corresponding to the on-demand content from the interactive interface and communicates the selection to a content processing system. The content processing system communicates a control word to the user device. A user device receives the on-demand content corresponding to the selection in response to the control word. | 2014-01-16 |
20140020031 | CELLULAR COMMUNICATION SYSTEM FOR BROADCAST COMMUNICATION - A cellular communication system is described for supporting broadcast transmission in at least one of a plurality of communication cells. The cellular communication system comprises at least one base station ( | 2014-01-16 |
20140020032 | PORTABLE TERMINAL, INFORMATION PROCESSING APPARATUS, CONTENT DISPLAY SYSTEM AND CONTENT DISPLAY METHOD - A portable terminal includes a receiving unit which receives content information, an external device communication unit which conducts communication with an external information device, a display unit which displays the content information received by the receiving unit, an acquiring unit which acquires identification information identifying the content information displayed by the display unit, an operation unit which receives an operation indication from a user, and a control unit which conducts control such that if a transmission indication of the identification information is received by the operation unit while the content information is being displayed, the identification information acquired by the acquiring unit is transmitted to the external information device and the display of the content information by the display unit is terminated. | 2014-01-16 |
20140020033 | SYSTEM AND METHOD FOR HOME AUTOMATION - A home automation system and method are disclosed for configuring a device state including but not limited to receiving an input from the client device at the server, configuring the device state in the database at the server in accordance with the input, and sending the configured device state from the server to the client device. | 2014-01-16 |
20140020034 | MULTI-FORMAT DISTRIBUTION OF CONTENT - A content delivery resource in a cable network receives a request for specified content. The content delivery resource retrieves profile information assigned to the subscriber domain. The profile information indicates multiple different playback formats assigned to the subscriber domain. To service the request, the content delivery resource utilizes the profile information associated with the subscriber domain to select versions of the specified content encoded in accordance with the multiple different playback formats. The content delivery resource then initiates transmission of the versions of the specified content in the multiple different playback formats to the subscriber domain for playback on multiple types of playback devices. | 2014-01-16 |
20140020035 | Method and Apparatus for Presenting Media Works - One embodiment of the present invention is a method of presenting a media work that includes one or more media works at a client device, which method includes: receiving presentation rate guidance information from a remote source; determining whether the presentation rate guidance information indicates that it is mandatory to present a portion of the media work, and if so; presenting the portion. | 2014-01-16 |
20140020036 | METHODS AND APPARATUS FOR DEVICE CAPABILITIES DISCOVERY AND UTILIZATION WITHIN A CONTENT-BASED NETWORK - Methods and apparatus for determining and selecting digital coding and/or decoding technology, delivery bitrates, and resolution parameters for programming and data delivery over, e.g., a content-based network. In one embodiment, the network comprises an HFC cable or satellite network that includes a server process interfacing with a plurality of customer premises equipment (CPE), and/or associated client devices, each having different display resolution, bitrate, and/or decoding capabilities profiles. The server determines the one or more capabilities possessed by the CPE or client device, and evaluates one or more program or content choices for possible delivery to that CPE or device based on its profile. The selection process may also take into consideration network and/or CPE operational considerations, such as conservation of downstream bandwidth, CPE uprating capability, client device power consumption, and the like. | 2014-01-16 |
20140020037 | MULTI-STREAM SHARED COMMUNICATION CHANNELS - By way of a non-limiting example, a server resource receives portions of a non-adaptive bit rate data stream. The server resource also receives portions of an adaptive bit rate data stream. The server resource interleaves the portions of the adaptive bit rate data stream and the portions of the non-adaptive bit rate data stream onto the multi-stream data channel. Thereafter, the server resource initiates transmission of the multi-stream data channel (which includes the adaptive bit rate data stream and the non-adaptive bit rate data stream) over a network such as a backbone or core network to a downstream resource such as a distribution resource. The distribution resource, in turn, transmits the adaptive bit rate data stream and the non-adaptive bit rate data stream to a group of multiple subscribers that have shared access to communication link in a cable network environment. | 2014-01-16 |
20140020038 | RECEIVING DEVICE, RECEIVING METHOD, PROGRAM, AND BROADCASTING SYSTEM - Disclosed herein is a receiving device for receiving AV contents, the receiving device including: an obtaining section configured to obtain a description document described in a program language for displaying contents from a server present on a network connected with the receiving device; a determining section configured to determine whether the obtained the description document is obtained from a first server managed on a broadcaster side broadcasting the AV contents; and a controlling section configured to control execution of the obtained the description document according to a result of determination by the determining section. | 2014-01-16 |
20140020039 | Method, Apparatus, and Terminal Device for Sharing Internet Protocol Television Content - A method, an apparatus and a terminal device can be used for sharing Internet protocol television content. The method includes receiving a request message that is sent by a first terminal and includes a receiving terminal identifier. The request message is used for the instruction of providing a receiving terminal, which corresponds to the receiving terminal identifier, with IPTV content that is being played by a second terminal. The method further includes obtaining identification information of the IPTV content that is being played by the second terminal. The identification information includes a content identifier, a channel identifier, or a multicast address. The method further includes providing, according to the identification information, the receiving terminal with the IPTV content that is being played by the second terminal. | 2014-01-16 |
20140020040 | METHOD AND APPARATUS FOR FAST CHANNEL CHANGE - Embodiments of the present invention provide a method and an apparatus for implementing FCC. The method mainly includes: receiving, by a fast channel change FCC server, a plurality of FCC requests concurrently sent by the same user, and obtaining, rates of a plurality of channels corresponding to the plurality of FCC requests; and when the FCC server determines that the rates of the plurality of channels do not belong to the same rate range, respectively performing channel change processing for the plurality of FCC requests. The embodiments of the present invention may be applied to a scenario in which FCC is concurrently performed corresponding to a large picture and a channel corresponding to a small picture of the same user, and ensure that FCC of the channel corresponding to the large picture and FCC of the channel corresponding to the small picture do not interfere with each other. | 2014-01-16 |
20140020041 | PRIVATE USER DATA - An embodiment of the present invention includes a technique for extracting private user data. A data sequence in a packetized transport stream is parsed to obtain a user data identifier (UDI) associated with a pre-defined data structure. The UDI is registered with a registration authority and is different from a standard identifier that is defined by a standard organization in a published standard document. The UDI is recognized. The private user data is extracted from the data sequence according to the pre-defined data structure corresponding to the recognized UDI. | 2014-01-16 |
20140020042 | PARAMETERIZED SERVICES DESCRIPTOR FOR ADVANCED TELEVISION SERVICES - A method, computer program, reception apparatus, and information providing apparatus for accessing or providing access to content. The method includes receiving a transport stream from a content provider. A virtual channel table (VCT) is extracted from the transport stream. Further, a determination is made as to whether one or more services, corresponding to an entry included in the VCT, are supported by the reception apparatus based on one or more parameterized service descriptor (PSD) instances, which are associated with a predetermined Service Type and included in the VCT. | 2014-01-16 |
20140020043 | AUTOMATING AND/OR RECOMMENDING DATA SHARING COORDINATION AMONG APPLICATIONS IN MOBILE DEVICES - Coordinating data sharing among applications in mobile devices, in one aspect, may include a shared data manager application on a mobile device that manages data trade requirements automatically of a plurality of mobile applications, and permission grants or denials to reads and writes of data managed by the shared data manager and used by the plurality of mobile applications. | 2014-01-16 |
20140020044 | UNIFORM POLICY FOR SECURITY AND INFORMATION PROTECTION - System and methods for the implementation and/or enforcement of an email policy for an organization's email system are presented. A Data Loss Prevention (DLP) policy may be implemented on top of the email system. In one embodiment, the DLP policy may comprise modules and/or processing that tests emails for such sensitive data within emails. If an email comprises such sensitive data, then the DLP policy directives may specify processing to be applied as part of each stage of mail processing, from authoring to mail processing on the server and delivery. A single policy may be authored and managed that will apply the policy directives uniformly across all aspects of the message lifecycle. Each of the message policy enforcement systems may evaluate the single policy definition and apply the policy directives in a manner consistent with the contextual evaluation of the policy. | 2014-01-16 |
20140020045 | DATA DETECTION AND PROTECTION POLICIES FOR E-MAIL - Systems and/or methods for deploying and implementing data loss prevention (DLP) policy definition that may encapsulate the requirements, control objectives and directives, and/or the definitions of sensitive data types as stipulated directly or indirectly by the regulatory policy are disclosed. In one embodiment, DLP policies may be identified by an organization to run on top of a set of electronic file systems (e.g., email systems, file systems, web servers and the like). Organizations and their administrators may implement a set of DLP policy instance which are derived from DLP policy templates. DLP policy templates may comprise both structure and meaning—and may acquire a given DLP policy by the replacement of parameterized expressions with desired parameter values. In another embodiment, the state of the DLP policy instance may change according to the lifecycle of the policy instance deployment. | 2014-01-16 |
20140020046 | SOURCE CODE ANALYSIS OF INTER-RELATED CODE BASES - A method and system for analyzing source code is disclosed. A computer identifies a call in a first source code to an application programming interface in a second source code. Responsive to identifying the call in the first source code to the application programming interface in the second source code, the computer determines whether a set of policies for calls to application programming interfaces includes a policy for calls to the application programming interface. Responsive to a determination that the set of policies for calls to application programming interfaces does not include the policy for calls to the application programming interface, the computer generates the policy for calls to the application programming interface and adds the generated policy to the set of policies for calls to application programming interfaces. | 2014-01-16 |
20140020047 | CLOUD EMAIL MESSAGE SCANNING WITH LOCAL POLICY APPLICATION IN A NETWORK ENVIRONMENT - A method for applying policies to an email message includes receiving, by an inbound policy module in a protected network, message metadata of an email message. The method also includes determining, based on the message metadata, whether receiving the email message in the protected network is prohibited by at least one metadata policy. The method further includes blocking the email message from being forwarded to the protected network if receiving the email message in the protected network is prohibited by the metadata policy. In specific embodiments, the method includes requesting scan results data for the email message if receiving the email message in the protected network is not prohibited by one or more metadata policies. In further embodiments, the method includes receiving the scan results data and requesting the email message if receiving the email message in the protected network is not prohibited by one or more scan policies. | 2014-01-16 |
20140020048 | METHODS AND SYSTEMS FOR PROVIDING CONTENT WORKFLOW - Methods and systems for providing a content workflow include, for example, various embodiments for ascribing metadata and processing media assets such as video, audio, and the like for ingestion into a media delivery platform. The content workflow can be implemented in a client/server environment where media assets can be ingested and processed electronically. According to an exemplary embodiment, a method for operating a system includes receiving, via the system, a metadata file for at least one of audio and video content represented by a title, the metadata file including a provider identification; and generating, via the system and in response to the provider identification, one or more software elements representing one or more rules for distributing the content. | 2014-01-16 |
20140020049 | SYSTEM AND METHOD FOR POLICY DRIVEN PROTECTION OF REMOTE COMPUTING ENVIRONMENTS - A system that incorporates teachings of the subject disclosure may include, for example, receiving multiple software agents and configuring a network of the multiple software agents according to a predetermined policy. The process can further include facilitating secure communications among software agents of the network of the multiple software agents according to the predetermined policy. A state of one of the system, a system environment within which the system operates, or a combination thereof can be determined, based on the secure communications among the software agents of the network of the multiple software agents. A computing environment can be facilitated conditionally on the state of the one of the system, the system environment, or the combination thereof, according to the predetermined policy to support a mission application. Other embodiments are disclosed. | 2014-01-16 |
20140020050 | Method for Determining Integrity in an Evolutionary Collaborative Information System - A method for determining integrity in an evolutionary collaborative information system is provided. The method involves recursively defining interaction of each component ensembles that respects product and technology information for identifying credentials on components and constraints on component interactions. Constraints are explicitly defined as interactional properties that are measured, derived from measurements, or evaluated from other constraints or credentials in the context of an component ensemble. Credentials are defined as properties of components that are measured, derived from measurements, or evaluated from other credentials in the context of an component ensemble. The applied ensemble decompositions that realize a service are identified for a service invocation. The values of constraints and the values of credentials in the ensemble decompositions are recursively evaluated. The integrity of the ensembles as a function of the values of the credentials and constraints is determined. | 2014-01-16 |
20140020051 | USER TO USER DELEGATION SERVICE IN A FEDERATED IDENTITY MANAGEMENT ENVIRONMENT - Method for providing user-to-user delegation service in federated identity environment, characterized in that it comprises a delegation or assignment step wherein a delegator specifies said delegation at an identity provider for delegating a privilege or task to a delegatee to be performed at a service provider. | 2014-01-16 |
20140020052 | METHODS AND SYSTEMS FOR NETWORK-BASED MANAGEMENT OF APPLICATION SECURITY - To control privileges and access to resources on a per-process basis, an administrator creates a rule that may be applied to modify a process's token. The rule includes an application-criterion set and changes to be made to the groups and/or privileges of a token. The rule is set as a policy within a group policy object (GPO), where a GPO is associated with one or more groups of computers. When a GPO containing a rule is applied to a computer, a driver installed on the computer accesses the rule(s) anytime a logged-on user executes a process. If the executed process satisfies the criterion set of a rule the changes contained within the rule are made to the process token, and the user has expanded and/or contracted access and/or privileges for only that process. | 2014-01-16 |
20140020053 | SETTING DEFAULT SECURITY FEATURES FOR USE WITH WEB APPLICATIONS AND EXTENSIONS - According to one general aspect, a computer-implemented method for implementing default security features for web applications and browser extensions includes receiving a request to include a web application or a web browser extension in a digital marketplace. A determination is made if the web application or the web browser extension conforms to default security features, wherein the default security features include a prohibition against running in-line script on web pages. The web application or the browser extension is included in the digital marketplace if the web application or the browser extension conforms to the default security features. | 2014-01-16 |
20140020054 | Techniques of Transforming Policies to Enforce Control in an Information Management System - In an information management system, policies are deployed to targets and targets can evaluate the policies whether they are connected or disconnected to the system. The policies may be transferred to the target, which may be a device or user. Relevant policies may be transferred while not relevant policies are not. The policies may have policy abstractions. | 2014-01-16 |
20140020055 | NETWORK SELECTION TOOL FOR INFORMATION HANDLING SYSTEM - A user information handling system (IHS) link analysis tool intercepts requests to navigate to a webpage, such as a link. The user IHS link analysis tool transmits the link to a security IHS link analysis tool. The user IHS link analysis tool receives a network selection message from the security IHS indicating which network the user IHS should utilize based upon the content of the link. | 2014-01-16 |
20140020056 | INTEGRATED PHYSICAL ACCESS CONTROL AND INFORMATION TECHNOLOGY (IT) SECURITY - Embodiments described herein provide security for a user integrated technology (IT) account by integrating a facility's physical access controls with its IT security system to provide authorization and access. When a user is granted facility access, his/her accounts are automatically enabled or provisioned via an IT security system. When the user exits the facility, his/her accounts are automatically disabled or de-provisioned via the IT security system. The IT security system maintains the user IT account in a secured state until the user credentials are verified at an access control point to enable access to the user IT account, and returns the user IT account to the secured state after receiving the user credentials at the access control point to disable access to the user IT account. As such, the user IT account is secured when not needed by the user to reduce periods of vulnerability. | 2014-01-16 |
20140020057 | NETWORK SELECTION TOOL FOR INFORMATION HANDLING SYSTEM - A user information handling system (IHS) link analysis tool intercepts requests to navigate to a webpage, such as a link. The user IHS link analysis tool transmits the link to a security IHS link analysis tool. The user IHS link analysis tool receives a network selection message from the security IHS indicating which network the user IHS should utilize based upon the content of the link. | 2014-01-16 |
20140020058 | METHODS AND SYSTEMS FOR IMPROVING THE SECURITY OF SECRET AUTHENTICATION DATA DURING AUTHENTICATION TRANSACTIONS - A method for improving the security of secret authentication data during authentication transactions is provided that includes converting the secret authentication data of a user into scrambled secret authentication data by associating a different text-string with each item of information included in the secret authentication data. The method also includes capturing the scrambled secret authentication data with a communications device, and conducting an authentication transaction with the captured authentication data. | 2014-01-16 |
20140020059 | CONTENT SHARING SYSTEM, INFORMATION COMMUNICATION APPARATUS, CONTENT SHARING METHOD, AND COMMUNICATION METHOD - When a user who shares content is selected in a first information communication apparatus used by one of the users who share content, sharing space securement information for the selected user is generated and transmitted to the server. When sharing space connection information for accessing a sharing space, which is generated by the server based on the sharing space securement information, is received by the first information communication apparatus, the sharing space connection information transmitted to the second information communication apparatus used by the user who share the content. | 2014-01-16 |
20140020060 | QUALITY OF SERVICE APPLICATION - A first network device receives an authentication request, from a second network device, to authenticate a user device and a first over-the-top application, stored on the user device, to determine whether to apply a level of quality of service to the first over-the-top application. The first network device authenticates the user device, based on the authentication requested. The first network device authenticates the first over-the-top application, based on the authentication request. The first network device sends an authentication result, based on the authentication of the user device and the first over-the-top application, to the second network device; and the second network device initiates, based on the authentication result, a process to apply a level of quality of service to information sent between the first over-the-top application and a provider associated with the first over-the-top application. | 2014-01-16 |
20140020061 | AUTOMATIC PROVISIONING IN MOBILE TO MOBILE PLATFORMS - Systems and methods for automatically provisioning devices that do not include or cannot provide a unique hardware identifier over a machine-to-machine network. A device or application may provide a server with a non-unique provisioning identifier during restricted communication between the server and the device. In response to receiving a provisioning identifier from a device, a server may generate a globally unique device identifier associated with the provisioning identifier for the individual device, and transmit the unique identifier to the device. The device may retain the unique identifier for future transactions. A request may be provided to a user, at the device, the server or any other interface, requesting that a newly identified device be authenticated. Upon authentication the device may communicate with the server with additional interactions that were not provided after provisioning and before authentication. | 2014-01-16 |
20140020062 | TECHNIQUES FOR PROTECTING MOBILE APPLICATIONS - Techniques for protecting mobile applications are presented. A user's mobile device is provisioned and proxied over a cloud environment with enterprise policy enforced in that cloud environment. Enterprise applications run on the mobile device within the cloud environment. Administrative reporting and control occurs within the cloud environment and the enterprise applications establish connections to, authenticate to, and communicate with remote enterprise services via the provisioned cloud environment. | 2014-01-16 |
20140020063 | Electronic Messaging Exchange - A computer-implemented system and method for secure electronic message exchange including coupling a control platform to a workstation of a plurality of workstations via a communications medium, where the control platform includes one or more apparatuses for monitoring, controlling, conversion, and billing, related to messages exchanged between a plurality of local users and a plurality of remote users. The system prevents forwarding or copying of a message sent by a local user of the plurality of local users and received by a remote user of the plurality of remote users, to another party by the control platform. The system and method also provides for authenticating the remote user with the control platform. | 2014-01-16 |
20140020064 | Scalable Fine-Grained Multi-Service Authorization - A scalable cross-protocol mechanism is provided for describing, transmitting and checking large lists of authorizations for operations on network resources. At an authorization server, data is stored that represents operations that can be performed on a plurality of resources of a service provider at the request of one or more users. A set of {resource,operations} tuples is generated, wherein a resource describes an endpoint for a network service and operations is a list of operations that are authorized on an endpoint. The set of {resource,operations} tuples is partitioned into one or more subsets. A subset of the set of {resource,operations} tuples is combined into a string according to a predetermined rule. A hash is then computed, according to a hash function, to generate hash results. Hashes are passed instead of the lists themselves to minimize data transfer and latency. | 2014-01-16 |
20140020065 | NETWORK APPLIANCE - System, method, and device for providing services on a network. The device comprises a security assessor and a service provider unit. The security assessor is connected to the network and is configured to identify rights of an entity on the network. The service provider unit is connected to the network and the security assessor. The service provider unit comprises a discovery unit, an interaction unit, and an interest unit. The discovery unit identifies content available on the network. The interaction unit identifies interactions of the entity on the network. The interest unit identifies interests of the entity based on the identified interactions and the identified content. The service provider unit provides services to the entity on the network, based on the rights of the entity, and at least one of the identified content and the identified interests of the entity. | 2014-01-16 |
20140020066 | SYSTEM AND METHOD FOR SPAMMER HOST DETECTION FROM NETWORK FLOW DATA PROFILES - A system and method for spammer host detection from network flow data profiles comprises constructing one or more cluster profiles and detecting spammer hosts. Construction cluster profiles comprises observing network flow data from one or more hosts; for each host, representing the network flow data associated with the host as a multidimensional vector; clustering the vectors of the hosts into the plurality of cluster profiles; annotating each cluster profile using at least one of black lists and white lists; and calculating a confidence in each cluster profile annotation. Detecting spammer hosts comprises observing the network flow data from a new host; representing the network flow data associated with the new host as a multidimensional vector, and placing the new multidimensional vector of the new host into one cluster profile of the one or more cluster profiles. | 2014-01-16 |
20140020067 | APPARATUS AND METHOD FOR CONTROLLING TRAFFIC BASED ON CAPTCHA - An apparatus and method for controlling traffic based on a Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) are provided. The traffic control apparatus includes a traffic monitoring unit, a CAPTCHA verification unit, a list management unit, and a traffic control unit. The traffic monitoring unit monitors a packet between an internal network and an external network. The CAPTCHA verification unit, if packet information is not present in an access control list, sends a CAPTCHA request message to a client computer, receives a CAPTCHA response message, and verifies the CAPTCHA response message. The list management unit, if the packet information is present in the access control list, detects an access control policy corresponding to the packet information in the access control list. The traffic control unit controls traffic based the verification of the CAPTCHA response message and the control policy. | 2014-01-16 |
20140020068 | LIMITING WIDGET ACCESS OF WALLET, DEVICE, CLIENT APPLICATIONS, AND NETWORK RESOURCES WHILE PROVIDING ACCESS TO ISSUER-SPECIFIC AND/OR WIDGET-SPECIFIC ISSUER SECURITY DOMAINS IN A MULTI-DOMAIN ECOSYSTEM FOR SECURE PERSONALIZED TRANSACTIONS - A platform for performing secure personalized transactions in a multi-domain ecosystem includes a personalization tier that enables service provider personalization for one or more ecosystem elements stored on a mobile device. Further, the platform includes an enabling tier for facilitating interoperation between the personalization tier and a client device. The platform further includes a service tier that may be operating independently of the enabling tier and may enable service delivery for a plurality of services. | 2014-01-16 |
20140020069 | Authorization Caching in a Multithreaded Object Server - Systems and methods are included for accessing resource objects in a multi-threaded environment. A request is received from a requester to perform an operation with respect to a resource object, where the requested resource object has multiple associations with other objects. A determination as to whether an authorization cache entry corresponding to the requested resource object contains sufficient permission data for granting or denying the request for access to the requested resource object is made. A grant or deny of access to the requested resource object is returned when the authorization cache entry corresponding to the requested resource object contains sufficient permission data. | 2014-01-16 |
20140020070 | USER DEVICE SECURITY MANAGER - Systems and methods are disclosed to authenticate and authorize a user for web services using user devices. In various embodiments, a method may comprise: identifying, by a user device security manager executing at a user device corresponding to a user of a web service, a first request issued from an application to access remote resources associated with the web service, the application executing at the user device and separate from the user device security manager; acquiring, by the user device security manager, security information of the application in response to the identifying of the first request, the security information including at least one of an application identification, an access scope or a nonce of the application; and transmitting a second request from the user device security manager to the web service to authenticate the application by the web service based, at least in part, on the application identification. | 2014-01-16 |
20140020071 | Methods and Systems for Sharing Digital Assets - Aspects of the present invention relate to systems and methods for providing non-subscriber access to a digital asset and, in particular, to methods and systems for providing non-subscriber access to a digital asset while providing provider protection. A temporary guest credential may be generated that may allow access to a limited workspace on a resource server. The temporary guest credentials may expire after a guest-account duration limit. | 2014-01-16 |
20140020072 | SECURITY ACCESS PROTECTION FOR USER DATA STORED IN A CLOUD COMPUTING FACILITY - In embodiments of the present invention improved capabilities are described for a method and system including storing a plurality of proxy access credentials for a user to securely access each of a plurality of cloud computing facilities; receiving a request from a client device for access to one of the plurality of cloud computing facilities; securing a communication link to the client device, thereby providing a secure link; receiving access credentials from the user through the secure link; verifying an identity of the user with the access credentials; assessing a security state of the client device to determine if the client is in compliance with a security policy; and if the client is in compliance with the security policy, coupling the client to one of the plurality of cloud computing facilities through a second secure link using a corresponding one of the plurality of proxy access credentials for the user. | 2014-01-16 |
20140020073 | METHODS AND SYSTEMS FOR USING DERIVED CREDENTIALS TO AUTHENTICATE A DEVICE ACROSS MULTIPLE PLATFORMS - Methods and systems for adapting existing service provider servers to support two-factor authentication by leveraging an authentication server, which may be operated by a third party. Where a user desires to access content or services offered by a service provider server, the user may employ a client agent (for example, a web browser) in order to authenticate with the service provider server. Service provider server can redirect client agent to an authentication server to process at least a second factor or derived credential. | 2014-01-16 |
20140020074 | METHODS AND SYSTEMS FOR IMPROVING THE SECURITY OF SECRET AUTHENTICATION DATA DURING AUTHENTICATION TRANSACTIONS - A method for improving the security of secret authentication data during authentication transactions is provided that includes converting the secret authentication data of a user into scrambled secret authentication data by associating a different text-string with each item of information included in the secret authentication data. The method also includes capturing the scrambled secret authentication data with a communications device, and conducting an authentication transaction with the captured authentication data. | 2014-01-16 |
20140020075 | CENTRALIZED IDENTITY AUTHENTICATION FOR ELECTRONIC COMMUNICATION NETWORKS - A method of centralized identity authentication for use in connection with a communications network includes registering users of the communications network such that each registered user's identity is uniquely defined and determinable, and registering a plurality of vendors having a presence on the communications network. The registered vendors selectively transact with registered users, wherein the transactions include: (i) the registered vendor selling goods and/or services to the registered user; (ii) the registered vendor granting the registered user access to personal records maintained by the registered vendor; and/or (iii) the registered vendor communicating to the registered user personal information maintained by the registered vendor. The method also includes each user's identity being authenticated over the communications network prior to completion of transactions between registered vendors and registered users. | 2014-01-16 |
20140020076 | CENTRALIZED IDENTITY AUTHENTICATION FOR ELECTRONIC COMMUNICATION NETWORKS - A method of centralized identity authentication for use in connection with a communications network includes registering users of the communications network such that each registered user's identity is uniquely defined and determinable, and registering a plurality of vendors having a presence on the communications network. The registered vendors selectively transact with registered users, wherein the transactions include: (i) the registered vendor selling goods and/or services to the registered user; (ii) the registered vendor granting the registered user access to personal records maintained by the registered vendor; and/or (iii) the registered vendor communicating to the registered user personal information maintained by the registered vendor. The method also includes each user's identity being authenticated over the communications network prior to completion of transactions between registered vendors and registered users. | 2014-01-16 |
20140020077 | Unsecured asset detection via correlated authentication anomalies - A method, apparatus and computer program product for detecting that a computing device may not be secure based on inconsistent identity associations identified during Federated Single Sign-On (F-SSO). A detection proxy detects when a user with a particular session is accessing an identity provider (IdP) that is associated with an account that is not the current user's account. When a user performs a login to an F-SSO-enabled IdP, the proxy performs an F-SSO, and the results are compared with known aliases for that particular federation partner. If an anomaly is detected (e.g., the in-line device sees that a user logs into a web site as someone else), a workflow is initiated to perform a given action, such as blocking access, issuing an alert, or the like. | 2014-01-16 |
20140020078 | Confidence-based authentication discovery for an outbound proxy - A confidence-based authentication discovery scheme is implemented at a proxy. The scheme assumes that some level of unauthenticated browsing is allowed prior to enforcing authentication at the proxy. Once a known and trusted set of identity providers has been accessed and the user is required to authenticate at the proxy (e.g., as a result of policy), the proxy initiates Federated Single Sign-On (F-SSO) to one or more (or, preferably, all) known sites accessed by the browser. This F-SSO operation is performed seamlessly, preferably without the user's knowledge (after the user allows an initial trust decision between the proxy acting as a service provider and the external identity provider). The proxy collates the results and, based on the trust it has with those sites, produces a confidence score. That score is then used as input into policy around whether or not a user should be permitted to access a particular site. | 2014-01-16 |
20140020079 | METHOD FOR PROVIDING NETWORK SERVICE AND APPARATUS THEREOF - A method for providing network service and apparatus thereof are described. The method includes the following steps: acquiring a network identity information of a user wherein the network identity information stored in a browser is a kind of information with an unique recognition; matching the network identity information with a local identity database to determine whether the local identity database stores a binding relationship between the network identity information and a server account information of the user; querying the server account information stored in the local identity database based on the network identity information of the binding relationship if the network identity information is matched with the local identity database to be found in the local identity database; and automatically logging in the web server based on the server account information of the user. | 2014-01-16 |
20140020080 | CONTROLLING THIRD PARTY ACCESS TO NETWORK DEVICES - A device may receive a command from a source device, may receive information that identifies a destination device associated with the command, may receive information that identifies a user associated with the source device, and may determine a network condition of a network associated with the destination device. The device may determine that the user is associated with an available token, where the available token is associated with the user, the command, and the network condition. The device may transmit, to the destination device and based on determining that the user is associated with the available token, the command. | 2014-01-16 |
20140020081 | Portable Token Device - Disclosed is a portable token device that may be used to assist a user in generating a PIN at one device and to then pass the PIN to another device such that the two devices can securely communicate with one another. The portable token device may include: an interface; and a processor. The processor may execute operations including: determining if a close proximity coupling through the interface to a first device has occurred; transmitting a PIN request to the first device; and obtaining a PIN. Further, the processor may determine if a close proximity coupling through the interface to a second device has occurred. If so, the processor may command transmitting the PIN to the second device. The second device may perform device registration with the first device based upon the received PIN. | 2014-01-16 |
20140020082 | VALIDATING A CERTIFICATE CHAIN IN A DISPERSED STORAGE NETWORK - A method begins by a processing module receiving a certificate chain and determining whether at least one of one or more signed certificates of the chain has a valid signature. When the at least one of the one or more signed certificates has a valid signature, the method continues with the processing module identifying one or more certificate authorities (CA) to produce identified CAs, accessing registry information that includes one or more realm identifiers (IDs) and a plurality of trusted CA IDs, determining whether one or more of the identified CAs is a trusted CA, and when the one or more of the identified CAs is a trusted CA, indicating that the certificate chain is valid, identifying a realm ID based on a trusted CA ID, and generating certificate chain validation information to include the realm ID, trusted CAs, and the indication of the validity of the certificate chain. | 2014-01-16 |
20140020083 | Customizable Storage Controller With Integrated F+ Storage Firewall Protection - A Customizable Storage Controller (CSC) is a software defined storage device controller, a replacement for the ASIC storage controller approach that has been used up to now. The differences from the current storage controllers are that the CSC software will need to be protected from unauthorized modification and provides an excellent place to add additional storage management functionality. The CSC type of storage controller is a good place to integrate the F+ Storage Firewall storage protection technology, fitting the needs of the CSC as well as protecting stored data from unauthorized access. This portion of the larger patent disclosure provides the design of a CSC both with a software version of a F+ Storage Firewall, as well as an improved (more secure) CSC designed with a security co-processor and locked firmware. These designs can be implemented with standard parts such as microprocessors and/or FPGAs (Field Programmable Gate Arrays), RAM (Random Access Memory), and some version of nonvolatile memory as a program store. | 2014-01-16 |
20140020084 | System & Method for Controlling Access to Resources with a Spoken CAPTCHA Test - Systems and methods for controlling access to resources using spoken Completely Automatic Public Turing Tests To Tell Humans And Computers Apart (CAPTCHA) tests are disclosed. In these systems and methods, entities seeking access to resources are required to produce an input utterance that contains at least some audio. That utterance is compared with voice reference data for human and machine entities, and a determination is made as to whether the entity requesting access is a human or a machine. Access is then permitted or refused based on that determination. | 2014-01-16 |
20140020085 | Background Application Management - The techniques and systems disclosed herein generally pertain to managing permissions for applications to allow the applications to run in a background state by an operating system. In some embodiments, user interfaces may be used to allow users to manage application permissions without requiring the user to understand specifics of background applications, but rather by providing a predetermined threshold number of permissions that the user can assign to applications. When the predetermined threshold number of permissions has been allocated and a subsequent application requests a permission, the user may replace or swap out an application that currently has a permission by giving the permission to the requesting application. | 2014-01-16 |