05th week of 2014 patent applcation highlights part 70 |
Patent application number | Title | Published |
20140033191 | DYNAMIC SOFTWARE VERSION SELECTION - Dynamic software version selection is performed by executing a software component on a processing device having a binding library associated with a software component, where the binding library comprising a loader component and a binding component. The loader component serves as an intermediary between the software component and the binding component and the binding component comprises software component-side logic. The binding library is utilized to interface the software component with a remote server across a network environment. In response to a request to update to a different version of the library, the loader component selects a desired version of the library. The desired version of the library is loaded into memory of the processing device by logically disconnecting from the remote server, unloading a previously loaded library, loading the updated version of the library, and reconnecting to the remote server. | 2014-01-30 |
20140033192 | EXPORTABLE DOCUMENT PROFILES - Apparatus, systems, and methods may operate to receive an electronic document and an associated document profile at a client. The client may then open the electronic document using a software application and configure the software application using the associated document profile. Additional apparatus, systems, and methods are disclosed. | 2014-01-30 |
20140033193 | Secured distribution of software updates - In some embodiments, a system includes a signature server comprising a signature unit to receive an update to a software application. The signature server also includes a first machine-readable medium to store a mapping between an identification of the software application and an address of a location of a private key. The system includes a cryptographic device coupled to an external port of the signature server. The cryptographic device includes a second machine-readable medium to store the private key. The cryptographic device also includes a cryptographic unit to generate a signature of the update based on the private key. | 2014-01-30 |
20140033194 | AUTOMATICALLY AND SECURELY CONFIGURING AND UPDATING VIRTUAL MACHINES - An approach for automatically and securely updating software on a virtual machine (VM) is presented. A current version of the software on the VM is determined to not match an updated version of the software. With a proxy update server connected to a network and without the VM being connected to the network, the updated version of the software is downloaded, stored and pushed to the VM by using a virtualized mounted drive, the updated version is installed on the VM to replace the current version, and a confirmation indicating the installation is received. An update of the software is provided dynamically via a connectivity of the proxy update server to the network while the VM is prevented from being infected with a virus that requires a connection to the VM through the network. | 2014-01-30 |
20140033195 | SOFTWARE SELECTION BASED ON AVAILABLE STORAGE SPACE - Software selection based on available storage space involves determining that a data package (e.g., a software component) is not to be loaded (e.g., not to be installed) onto a storage device (e.g., a disk drive) of a computer (e.g., a target computer). This determination is based on the available storage capacity of the storage device (e.g., free disk space) and on a storage requirement of the optional data package (e.g., disk space required by the proposed software component). In some example embodiments, available storage capacity is determined automatically (e.g., by using an application programming interface). | 2014-01-30 |
20140033196 | METHOD AND SYSTEM FOR DETERMINING THE ELIGIBILITY FOR DEPLOYING PROTECTED CONTENT - Methods and systems for using a flexible serialization technique to determine whether certain protected content items (e.g., software) are eligible to be installed on a target computer system during an installation procedure are described. Consistent with some embodiments of the invention, a serial number entered by an end-user is decoded to identify a product identifier that corresponds with a select folder in a folder hierarchy on a storage medium that contains various payloads for installing digital content items on a target computer system. The folder that corresponds with the product identifier includes license configuration information that specifies a set of digital content items eligible for installation, based on the serial number entered by the end-user. | 2014-01-30 |
20140033197 | MODEL-BASED VIRTUAL SYSTEM PROVISIONING - Model-based virtual system provisioning includes accessing a model of a workload to be installed on a virtual machine of a system as well as a model of the system. A workload refers to some computing that is to be performed, and includes an application to be executed to perform the computing, and optionally includes the operating system on which the application is to be installed. The workload model identifies a source of the application and operating system of the workload, as well as constraints of the workload, such as resources and/or other capabilities that the virtual machine(s) on which the workload is to be installed must have. An installation specification for the application is also generated, the installation specification being derived at least in part from the model of the workload and the model of the virtual system. | 2014-01-30 |
20140033198 | EXTENSIBLE DISTRIBUTION/UPDATE ARCHITECTURE - Methods and systems to install a player to process content data are disclosed. In some embodiments, a method includes launching a content access manager on a user device to read metadata containing compatible player data, determine whether a compatible player able to access the content data is installed on the user device, and if not, to install a compatible player. Other embodiments involve receiving content data and data about one or more compatible players able to access the content data, generating the metadata using the data about one or more compatible players, and distributing the content data, the metadata, and the content access manager in a transmittable unit. Additional apparatus, systems, and methods are disclosed. | 2014-01-30 |
20140033199 | SOFTWARE SELECTION BASED ON ESTIMATED AVAILABLE STORAGE SPACE - Software selection based on estimated available storage space involves determining that a data package (e.g., a software component) is not to be loaded (e.g., not to be installed) onto a storage device (e.g., a disk drive) of a computer (e.g., a target computer). This determination is based on estimated available storage capacity of the storage device (e.g., free disk space) and on a storage requirement of the optional data package (e.g., disk space required by the proposed software component). In some example embodiments, available storage capacity is estimated by an administrator (e.g., a user) and received via a user interface (e.g., a graphical window, or a data entry field). | 2014-01-30 |
20140033200 | METHOD AND SYSTEM TO PROVISION AND MANAGE A COMPUTING APPLICATION HOSTED BY A VIRTUAL INSTANCE OF A MACHINE - A system and method are described for provisioning and managing virtual instances of a computing application running within a public virtualization space (referred to as a hosted service system). A hosted service system may be configured to provide automated administration of the computing application, replacing the administration tasks that would otherwise be performed by the customer when running in an on-premise production deployment and to provide encrypted networking and other services that are specific to the public virtualization environment and are designed to provide a secure integration fabric between a customer's own private data center and virtual instances of the computing application running within an insecure public virtualization service. | 2014-01-30 |
20140033201 | System and Method of Replicating Virtual Machines for Live Migration Between Data Centers - A method includes providing a storage volume at a processing site, directing a storage controller of the processing site to asynchronously mirror the storage volume to another storage volume of another processing site that is remote from the first processing site, determining to migrate a virtual machine of the first processing site that is associated with the first storage volume to the second processing site, synchronizing the first and second storage volumes in response to the migration, live migrating the virtual machine to the second processing site and a second virtual machine of the second processing site with the second storage volume, and directing a second storage controller of the second processing site to asynchronously mirror the second storage volume to the first storage volume. | 2014-01-30 |
20140033202 | MEDIA RESPONSE TO SOCIAL ACTIONS - A method includes enabling accessing of content via a first device. The access of the content may be suspended in response to receiving a suspending signal associated with a second device coupled to the first device in a communication session. The access of the content may be resumed via at least one of the first device or a third device coupled to the first device in the communication session. | 2014-01-30 |
20140033203 | COMPUTER ARCHITECTURE WITH A HARDWARE ACCUMULATOR RESET - A processor with an accumulator. An event is selected to produce one or more selected events. A reset signal to the accumulator is generated responsive to the selected event. Responsive to the reset signal, the accumulator is reset to zero or another initial value while avoiding breaking pipelined execution of the processor. | 2014-01-30 |
20140033204 | Background Services Launcher For Dynamic Service Provisioning - A background service launcher is disclosed that provides dynamic access to services required by clients. Clients access services by a single unified pathname space and interface environment. When a client tries to open a service, if the service is running it will receive the request immediately, however when the service is not running the background service launcher having previously registered associated paths, receive the client request, start the background service, and then redirect the client to it. The ability to dynamically launch services enables resources to be accessed such as cloud based filesystems by being dynamically mounted and accessible to clients in the operating system. | 2014-01-30 |
20140033205 | PROVIDING HIGH AVAILABILITY TO A HYBRID APPLICATION SERVER ENVIRONMENT CONTAINING NON-JAVA CONTAINERS - A method, system and computer program product for providing high availability to a hybrid application server environment containing non-Java® containers. Each hybrid application server in the cluster includes a Java® container and a non-Java® container hosting Java® and non-Java® applications, respectively. Upon detecting the non-Java® container becoming unavailable (failing), an object, such as an MBean, identifies and deactivates those Java® application(s) that are dependent on the non-Java® application(s) deployed in the unavailable non-Java® container using dependency information stored in an application framework. The deactivated Java® application(s) are marked as being unavailable. A routing agent continues to send requests to those Java® application(s) that are not marked as being unavailable within that hybrid application server containing the unavailable non-Java® container. As a result of not deactivating the entire hybrid application server containing the unavailable non-Java® container, unimpacted applications continue to service requests thereby optimally using the resources. | 2014-01-30 |
20140033206 | MONITORING THREAD STARVATION - The present disclosure includes methods and systems for monitoring thread starvation. A number of embodiments include determining an amount of time a thread is not runnable, determining an amount of CPU consumption time for the thread, and determining an amount of thread starvation time based on the amount of time the thread is not runnable and the amount of CPU consumption time for the thread. | 2014-01-30 |
20140033207 | System and Method for Managing P-States and C-States of a System - A current value of a load indicator of a system is determined, by an application entity, based on one or more of a central processor unit utilization measure of the system, a memory utilization measure of the system, a system-internal resources utilization measure, an input/output utilization measure of the system, and a secondary storage utilization measure of the system, wherein the system is associated with a plurality of P-states and a plurality of C-states. An operating mode of the system is determined, by the application entity, based on the current value of the load indicator, wherein the operating mode comprises a P-state selected from the plurality of P-states and a C-state selected from the plurality of C-states. The system is operated in accordance with the operating mode. A predictive load map associating respective time periods and respective operating modes may be generated and adaptively adjusted. | 2014-01-30 |
20140033208 | METHOD AND DEVICE FOR LOADING APPLICATION PROGRAM - Disclosed in the present disclosure is an application loading method, including: an M2M terminal module starts up an application manager after being powered up and initialized; the application manager receives a load application instruction and creates a load thread; and the load thread loads an application according to a load application instruction and ends the load thread after the execution of the application is completed. Also disclosed in the present disclosure is an application loading device. By way of the method and device in the present disclosure, the compile efficiency is improved, and it is advantageous for terminal maintenance, and the service function is realized when executing an independent application. | 2014-01-30 |
20140033209 | Handling of Barrier Commands for Computing Systems - A computing system for handling barrier commands includes a memory, an interface, and a processor. The memory is configured to store a pre-barrier spreading range that identifies a target computing system associated with a barrier command. The interface is coupled to the memory and is configured to send a pre-barrier computing probe to the target computing system identified in the pre-barrier spreading range and receive a barrier completion notification messages from the target computing system. The pre-barrier computing probe is configured to instruct the target computing system to monitor a status of a transaction that needs to be executed for the barrier command to be completed. The processor is coupled to the interface and is configured to determine a status of the barrier command based on the received barrier completion notification messages. | 2014-01-30 |
20140033210 | Techniques for Attesting Data Processing Systems - A technique for attesting a plurality of data processing systems includes generating a logical grouping for a data processing system. The logical grouping is associated with a rule that describes a condition that must be met in order for the data processing system to be considered trusted. A list of one or more children associated with the logical grouping is retrieved. The one or more children are attested to determine whether each of the one or more children is trusted. In response to the attesting, the rule is applied to determine whether the condition has been met in order for the data processing system to be considered trusted. A plurality of logical groupings is associated to determine whether an associated plurality of data processing systems can be considered trusted. | 2014-01-30 |
20140033211 | LAUNCHING WORKFLOW PROCESSES BASED ON ANNOTATIONS IN A DOCUMENT - Methods and apparatus, including computer program products, implementing and using techniques for launching a process based on annotations made to a document in an enterprise content management system. It is determined whether an annotation has been added to a document in the enterprise content management system, wherein the annotation is stored as a separate element and the separate element is associated with the document. It is determined whether the annotation is of a type indicating that a subsequent workflow process is to be performed. In response to determining that the annotation is of a type indicating that a subsequent workflow process is to be performed, the annotation is parsed to obtain information to be used in the subsequent workflow process. The subsequent workflow process is launched. The launch uses at least some of the information obtained from parsing the annotation as parameters in the subsequent workflow process. | 2014-01-30 |
20140033212 | Multi-Tenant Queue Controller - Novel tools and techniques for controlling workloads in a multi-tenant environment. Some such tools provide a queue controller that can control workflow processing across systems, work (provisioning engines, computing clusters, and/or physical data centers. In an aspect, a queue controller can determine the status of each work request based on one or more attributes, such as the workflow type, the systems affected by (and/or involved with) the workflow, information about the tenant requesting the workflow, the job type, and/or the like. In another aspect, a queue controller can be policy-based, such that policies can be configured for one or more of these attributes, and the attribute(s) of an individual request can be analyzed against one or more applicable policies to determine the status of the request. Based on this status, the requested work can be scheduled. | 2014-01-30 |
20140033213 | SYSTEM AND METHOD FOR MEMORY MANAGEMENT - A system and method for automatic memory management of a shared memory during parallel processing of a web application. The system includes a computing system configured to allow parallel computing of a web application executed within a web browser. The computing system includes shared memory having a set of blocks distributed at least a first thread and at least one spawned thread of a processing function of the web application. The memory is partitioned into a nursery heap, a mature heap and a database having a plurality of private nurseries, wherein the first thread has access to the nursery heap and mature heap and the at least one spawned thread has access to an associated one of the plurality of private nurseries. During parallel computing of the web application, management of the shared memory includes garbage collection of at least each of the plurality of private nurseries. | 2014-01-30 |
20140033214 | MANAGING ARRAY COMPUTATIONS DURING PROGRAMMATIC RUN-TIME IN A DISTRIBUTED COMPUTING ENVIRONMENT - A plurality of array partitions are defined for use by a set of tasks of the program run-time. The array partitions can be determined from one or more arrays that are utilized by the program at run-time. Each of the plurality of computing devices are assigned to perform one or more tasks in the set of tasks. By assigning each of the plurality of computing devices to perform one or more tasks, an objective to reduce data transfer amongst the plurality of computing devices can be implemented. | 2014-01-30 |
20140033215 | SCHEDULING METHOD AND SCHEDULING SYSTEM - A scheduling method that is executed by a first device includes acquiring in response to a process request received by the first device, any one among a device count of peripheral devices near the first device and a device count of the peripheral devices near the first device, including the first device; and determining, by a CPU of the first device, a scheduling method for scheduling a process corresponding to the process request, based on the device count. | 2014-01-30 |
20140033216 | TASK PROCESSING METHOD AND DEVICE - The present invention relates to the field of computer technologies, and disclosed are a task processing method and an associated mobile terminal for performing the method. The method includes: scanning an application program, so as to obtain a list of predefined tasks corresponding to the application program; comparing the list of predefined tasks with a preset white list of tasks; removing a matched task from the list of predefined tasks, so as to obtain a new task list, so that a user selects a task according to a need from the new task list for execution; detecting one or more user selections of members of the new task list; updating the new task list and the preset white list of tasks according to the user selections; and performing the updated new task list using the application program. | 2014-01-30 |
20140033217 | MULTI-CORE PROCESSORS - A method of operating a multi-core processor. In one embodiment, each processor core is provided with its own private cache and the device comprises or has access to a common memory, and the method comprises executing a processing thread on a selected first processor core, and implementing a normal access mode for executing an operation within a processing thread and comprising allocating sole responsibility for writing data to given blocks of said common memory, to respective processor cores. The method further comprises implementing a speculative execution mode switchable to override said normal access mode. This speculative execution mode comprises, upon identification of said operation within said processing thread, transferring responsibility for performing said operation to a plurality of second processor cores, and optionally performing said operation on the first processor core as well. | 2014-01-30 |
20140033218 | JOB PLACEMENT BASED ON MODELING OF JOB SLOTS - A collection of job slots correspond to placement of observed jobs associated with a plurality of job categories in a data processing environment. An incoming job is received, and based on a job category of the incoming job, the incoming job is assigned to a particular one of the job slots to perform placement of the incoming job on physical resources. | 2014-01-30 |
20140033219 | METHOD, APPARATUS AND COMPUTER FOR LOADING RESOURCE FILE FOR GAME ENGINE - A method for loading a resource file for a game engine is provided. The method includes: activating a thread to a preload a predetermined resource file, wherein the predetermined resource file includes a texture resource file, and one or both of a structure resource file and a model resource file; and accessing and loading one or both of the structure resource file and the model resource file through memory mapping. The provided method increases a loading speed while loading a game resource file and fully utilizes computer resources. | 2014-01-30 |
20140033220 | PROCESS GROUPING FOR IMPROVED CACHE AND MEMORY AFFINITY - Embodiments include determining a set of two or more processes that share at least one of a plurality of resources in a multi-node system in which the processes are running, wherein each of the set of two or more processes is running one different nodes of the multi-node system. For each combination of the set of processes and the resources, a value is calculated based, at least in part, on a weight of the resource and frequency of access of the resource by each process of the set of processes. The pair of processes having a greatest sum of calculated values by resource is determined. A first process of the pair of processes is allocated from a first node in the multi-node system to a second node in the multi-node system that hoses a second process of the pair of processes. | 2014-01-30 |
20140033221 | PROCESSOR SCHEDULING METHOD AND SYSTEM USING DOMAINS - Aspects of the present invention concern a method and system for scheduling a request for execution on multiple processors. This scheduler divides processes from the request into a set of domains. Instructions in the same domain are capable of executing the instructions associated with the request in a serial manner on a processor without conflicts. A relative processor utilization for each domain in the set of the domains is based upon a workload corresponding to an execution of the request. If there are processors available then the present invention provisions a subset of available processors to fulfill an aggregate processor utilization. The aggregate processor utilization is created from a combination of the relative processor utilization associated with each domain in the set of domains. If processors are not needed then some processors may be shut down. Shutting down processors in accordance with the schedule saves energy without sacrificing performing. | 2014-01-30 |
20140033222 | CONTAMINATION BASED WORKLOAD MANAGEMENT - Computer-implemented methods for workload management and related computer program products are disclosed. One method comprises receiving corrosion rate signals from a first sensor associated with a first compute node, determining a first corrosion level for the first compute node as a function of the corrosion rate signal received from the first sensor, and automatically removing a first workload from the first compute node in response to determining that the first compute node has a first corrosion level that is greater than a setpoint level of corrosion. | 2014-01-30 |
20140033223 | LOAD BALANCING USING PROGRESSIVE SAMPLING BASED ON LOAD BALANCING QUALITY TARGETS - A method, system, and computer program product for of load balancing in a parallel map/reduce paradigm. The method commences by sampling a first set of input records, and forming a prospective load balancing assignment by assigning the first set of input records to the plurality of worker tasks based on a workload estimate for each of the worker tasks. To measure the prospective load balancing assignment, the method compares the workload variance over the plurality of worker tasks to a workload variance target, and also calculates a confidence level based on the sampled first set of input records. If the measured quality of the prospective load balancing assignment is not yet achieved, then the method samples additional input records; for example when the calculated workload variance is greater than the maximum workload variance target or when the calculated confidence level is lower than a confidence level threshold. | 2014-01-30 |
20140033224 | METHOD FOR MONITORING THE COORDINATED EXECUTION OF SEQUENCED TASKS BY AN ELECTRONIC CARD COMPRISING AT LEAST TWO PROCESSORS SYNCHRONIZED TO ONE AND THE SAME CLOCK - A method for monitoring the coordinated execution of sequenced tasks by an electronic card including at least one first processor (PP | 2014-01-30 |
20140033225 | METHOD FOR MONITORING THE COORDINATED EXECUTION OF SEQUENCED TASKS BY AN ELECTRONIC CARD COMPRISING AT LEAST TWO PROCESSORS SYNCHRONIZED TO TWO DIFFERENT CLOCKS - A method for monitoring the coordinated execution of sequenced tasks by an electronic device including a main electronic card including at least one main processor synchronized to a main clock and at least one auxiliary electronic card including at least one auxiliary processor synchronized to an auxiliary clock, includes
| 2014-01-30 |
20140033226 | Application Gateway in a Browser Based Environment - An application gateway enables controlled communication between application components within a browser based environment while maintaining a level of isolation of the individual application components. A dispatching API wrapper and a listening API wrapper are registered for each of a plurality of application components. The registered API wrappers are used to send and receive communications from the associated application components. For example, a first application component can dispatch an action to a second application component via the first application component's dispatching API wrapper. The second application component can receive the action via the second application component's listening API wrapper. As another example, a first application component can dispatch an event that broadcasts a state to other application components via the first application component's dispatching API wrapper. A listening API wrapper of at least one other application component receives the state and may perform other functions dependent on the state. | 2014-01-30 |
20140033227 | EMBEDDED USER INTERFACE - A system to provide embedded user interface (UI) may comprise a request collector to receive a request directed at a host application from a user interface (UI), a response collector to receive a response from the host application, and a response dispatcher to dispatch the response to the UI via the asynchronous communication channel. The request and the response may be communicated via an asynchronous communication channel. | 2014-01-30 |
20140033228 | CONFIGURING CONTENT DISPLAY DIMENSIONS - Systems and methods of configuring content display dimensions via a computer network are provided. A request for content to display in an content item slot of a resource can be received via a computer network at a data processing system. The data processing system can determine, from the request, dimensions of the content item slot. Responsive to the request, the data processing system can select content for display in the content item slot. The content can include a script configured to execute at the resource. Based on information received from execution of the script, the data processing system can determine that the dimensions of the content item slot are greater than dimensions of the content. The data processing system can adjust the dimensions of the content item slot based on the dimensions of the content. | 2014-01-30 |
20140033229 | METHOD AND COMPUTATION NODE FOR PROCESSING APPLICATION DATA - The present invention provides a method and a computation node for processing application data. The method includes: starting, by an operating system, a service process; establishing, by the operating system, a socket connection between the service process and backup software, where the service process has a root operation right, and the service process and the backup software have the same user identifier; sending, by the backup software through the socket, a processing request for application data; receiving, by the service process through the socket, the processing request for application data, where the processing request is sent by the backup software, sending the processing request for application data to corresponding application software, receiving application data returned by the corresponding application software, and sending the returned application data to the backup software through the socket. | 2014-01-30 |
20140033230 | INMATE INFORMATION CENTER FOR CORRECTIONAL FACILITY PROCESSING - A platform application and methods of operation that integrate both native and third-party modules into an integrated environment on an inmate computing device is disclosed. Third-party modules or systems are applications meant to operate independent from the platform application. Information is communicated between the platform application and third-party module or system to add audit, alarm and other functions across all modules or systems controlled by the platform software. The third-party module or system is audited to allow triggering of rules that cause remedial action to be taken. Triggers can be on actions not monitored by a particular third-party module or system. | 2014-01-30 |
20140033231 | ELECTRONIC DEVICE WITH A FUNCTION OF ALERTING RUNNING APPLICATIONS AND METHOD THEREOF - A method for alerting running application includes steps of producing the input signals in response to user operation, detecting whether the electronic device is at the standby state, determining which applications are running, determining audio files corresponding to the determined applications according to the relationship table stored in a storage unit, and playing the determined audio files and controlling the audio output unit to output audio signals corresponding to the audio files. | 2014-01-30 |
20140033232 | FUNCTION EXECUTION FRAMEWORK DESCRIBE FUNCTIONALITY - A framework can provide describe definitions for use cases. The framework can comprise a controller layer, a wrapper layer, and a function layer. The controller layer can be configured to receive describe requests and return describe results. The wrapper layer can be configured to call describe methods of functions that implement the use cases. The function layer can comprise functions that implement the use cases. A function execution request can be received, a customized function execution sequence can be determined for the function execution request, the customized function execution sequence can be executed, and results of the execution can be returned. The customized function execution sequence can comprise an indication of execution order for a plurality of functions. | 2014-01-30 |
20140033233 | FUNCTION EXECUTION FRAMEWORK WRAPPER LAYER - A framework can provide function execution services. The framework can comprise a controller layer, a wrapper layer, and a function layer. The controller layer can be configured to process function definition requests and function execution requests, and return results. The wrapper layer can be configured to query the function layer to determine function definitions and pass function execution requests and results with the function layer. The function layer can comprise functions and/or features. A function execution request can be performed by determining a step execution sequence, executing the step execution sequence, and returning results of the execution of the step execution sequence. The step execution sequence can comprise setup steps, execute steps, and/or finalize steps. | 2014-01-30 |
20140033234 | REPLACEMENT OF INBOX DRIVER WITH THIRD PARTY DRIVER - Embodiments efficiently replace an inbox driver of a computer with a third party driver. The inbox and third party drivers are function drivers configured to service an external device connected to the computer. A Function Loader driver is installed within the computer to enable replacement of the inbox function driver with the third party function driver based on a highest ranking of matching criteria. The Function Loader driver cooperates with a Function Loader Child driver, which intercepts a packet exchange that pertains to the external device to determine whether specified rules for replacement are satisfied. If so, the Function Loader Child driver modifies content of the packet exchange to uniquely identify the third party function driver as having the highest ranking of matching criteria. Accordingly, the operating system recognizes the third party function driver as a preferred driver for servicing the external device and installs the third party driver. | 2014-01-30 |
20140033235 | Method and System for an Application Framework for a Wireless Device - Methods and systems for managing applications by an application manager within a man machine interface (MMI) application framework are disclosed. Aspects of the method may include creating an active application context upon launching a first application by the application manager. The active application context may be transitioned into a suspended application context upon suspending the first application by the application manager. The suspended application context may be stored in an application manager context stack. The stored suspended application context may be acquired from the application manager context stack upon receipt of an exit message by the application manager. The application manager context stack may comprise a last-in-first-out (LIFO) context stack. The first application associated with said suspended application context may be reactivated upon removal of the suspended application context from the application manager context stack. | 2014-01-30 |
20140033236 | METHOD AND SYSTEM FOR PROVIDING ON-DEMAND AND PAY-PER-VIEW CONTENT THROUGH A HOSPITALITY SYSTEM - A method and system for providing content to a receiving device from a local headend is set forth. The local headend communicates channel data for content stored at a video server to a receiving device, receives a selection of the channel data to form selected content from the receiving device and communicates content corresponding to the selection to the receiving device. The local headend stores a purchase record corresponding to the selection at the local headend, associates the purchase record with the receiving device within the local headend and communicates a request for a callback from the local headend to the receiving device. The receiving device communicates a callback signal from the receiving device to an external headend comprising purchase data corresponding to the purchase record. | 2014-01-30 |
20140033237 | TECHNIQUES FOR MEDIA QUALITY CONTROL - Techniques for media quality control may include receiving media information and determining the quality of the media information. The media information may be presented when the quality of the media information meets a quality control threshold. A warning may be generated when the quality of the media information does not meet the quality control threshold. Other embodiments are described and claimed. | 2014-01-30 |
20140033238 | METHOD OF PROVIDING INFORMATION AND DISPLAY DEVICE THEREOF - A method for providing information which is performable by a display device is provided. The method includes: receiving at least one piece of broadcasting program information; obtaining at least one of viewing history information which relates to at least one piece of content that was watched before a predetermined point of time and recording information which relates to at least one piece of content that was recorded before the predetermined point of time; and displaying at least one piece of broadcasting program information from among the at least one piece of broadcasting program information which corresponds to the predetermined point of time on a first region of the display device based on the predetermined point of time, and displaying at least one of the viewing history information and the recording information on a second region of the display device based on the predetermined point of time. | 2014-01-30 |
20140033239 | NEXT GENERATION TELEVISION WITH CONTENT SHIFTING AND INTERACTIVE SELECTABILITY - Systems and methods for providing next generation television with content shifting and interactive selectability are described. In some examples, image content may be transferred from a television to smaller mobile computing device, and an example-based. visual search may be conducted on a selected portion of the content. Search results may then be provided to the mobile computing, device. In addition, avatar simulation may be undertaken. | 2014-01-30 |
20140033240 | SYSTEMS AND METHODS FOR ASSESSING VIEWER INTEREST IN CONTENT AND ADVERTISEMENTS - A method for assessing viewer interest in content and advertisements may include receiving an indication regarding a content playback mode change (e.g., a change from a skip or fast-forward mode to a pause or rewind mode) occurring during playing of a media content segment such as a television program or movie. The method then proceeds to associate the playback mode change with a sub-segment of the television program, such as an advertisement or commercial, and a level of interest of a user in the advertisement or commercial is determined based on the associated content playback mode change. An item, such as an advertisement or promotional offer can be selected to be presented to the user based on the determined level of interest of the user in the advertisement or commercial. Systems for assessing viewer interest in content and advertisements include devices and components configured to perform or enable such methods. | 2014-01-30 |
20140033241 | Program Modeling Tool - Method, device, and non-transitory storage medium to receive peak viewership parameters that indicate one or more program channels to be modeled; query a device that stores viewership data based on the peak viewership parameters; determine a peak viewership for the one or more program channels; query another device that stores network configuration data pertaining to a program delivery network; obtain channel path information pertaining to the one or more program channels; generate peak channel delivery data based on the channel path information and the peak viewership data; and simulate, based on the peak channel delivery data, resource utilization of the program delivery network stemming from a provisioning of the one or more program channels according to a delivery channel format that is different from another delivery channel format that was used to deliver the one or more program channels to subscribers. | 2014-01-30 |
20140033242 | VIDEO SERVICE ASSURANCE SYSTEMS AND METHODS IN WIRELESS NETWORKS - A computer-implemented method, a video service assurance system, and a wireless network with video service assurance provide analytics associated with video services in a network, such as Long Term Evolution (LTE) wireless networks, and actionable recommendations to improve the video services. In particular, the computer-implemented method of video service assurance includes obtaining measurement data and statistics from at least one network element in a network related to a plurality of video streams thereon, performing data aggregation and analysis with the measurement data and statistics related to the video streams, and providing actionable recommendations for improvement of the video streams to the at least one network element based on the data aggregation and analysis. | 2014-01-30 |
20140033243 | GROUP BASED MULTICAST STREAMING SYSTEMS AND METHODS - Group based multicast streaming systems and methods are disclosed. An exemplary method includes a group based multicast streaming system defines a media multicast streaming event, determines that a group of users satisfies a minimum participation level associated with the media multicast streaming event, and executes, based on the determined satisfaction of the minimum participation level by the group of users, the media multicast streaming event by multicast streaming a media program to the group of users during a timeslot, and provides an incentive to the group of users for participation in the multicast streaming of the media program during the timeslot. Corresponding systems and methods are also disclosed. | 2014-01-30 |
20140033244 | Moving Image Data Delivery System, An Advertising Image Data Delivery System, and A Moving Image Viewing Apparatus - An advertisement provider issues coupons to an audiences of television set in exchange of viewing a commercial message and receives advertising rate from the advertiser of the commercial message in exchange of informing of the coupon issuance. A television station allows the audience to decompress a downloaded digital image data of a television program in exchange of presentation of the coupon. The television station receives allotment of the advertising rate in exchange of informing of the coupon presentation form audiences. The television station sorts the presented coupons by the advertisement providers to inform each advertisement provider of the coupon presentation. The television station allows the decompression even in a shortage of the presented coupon, provided that it will be compensated by money or later presentation of coupon by due data. The commercial messages are provided automatically or by request. The audience may voluntarily replace television program by commercial message. | 2014-01-30 |
20140033245 | CUSTOMIZING DVR FUNCTIONALITY - Techniques described herein automatically identifies, in a multimedia content, an advertiser from which an advertisement in the multimedia content originates and/or a brand to which the advertisement pertains. The system determines whether the identified advertiser and/or identified brand is specified in a not to be displayed list and if so, performs at least one of: presents alternative content during the time interval that the advertisement occupies in the multimedia content or skips over the advertisement in the multimedia content. | 2014-01-30 |
20140033246 | PROGRAM TELECAST MONITORING USING WATERMARKS - Methods, apparatus and articles of manufacture for program telecast monitoring using watermarks are disclosed. Example methods disclosed herein to watermark media can include encoding the media with a sequence of watermarks, a watermark in the sequence of watermarks including payload data identifying the media. Such example methods can also include, modifying the sequence of watermarks to further include a data pattern associated with a particular transmission of the media. In some examples, respective watermarks in the sequence of watermarks are to be modified to include respective portions of the data pattern, wherein the respective portions, when combined, form the data pattern. | 2014-01-30 |
20140033247 | METHOD AND APPARATUS FOR ENCRYPTING/DECRYPTING MULTIMEDIA CONTENT TO ALLOW RANDOM ACCESS - A method is disclosed for encrypting a multimedia file including parsing the multimedia file to identify a media data portion; encrypting the media data portion; and, combining the encrypted media data portion with a non-encrypted non-media data portion. A method is also disclosed for playing a multimedia file including parsing the multimedia file to identify an unencrypted metadata portion; using the unencrypted metadata portion to locate a position of interest in the media file, the position of interest having an associated encrypted media data portion; and, decrypting the associated encrypted media data portion. An apparatus for performing the methods is also disclosed herein. | 2014-01-30 |
20140033248 | INCLUDING INSERTS IN MULTIMEDIA CONTENT - Disclosed are methods and apparatus for including an insert (e.g., an advertisement) in multimedia content. The method comprises receiving, by a receiving module, one or more indications, each indication being an indication that a consumer intends to consume, at some time in the future, the multimedia content. Using the indications, a value of a metric is then determined. The metric is dependent upon the number of received indications or one or more attributes of consumers whom the indications indicate intend to consume the multimedia content. An insert is then selected depending on the determined value for the metric. The selected insert is then included in the multimedia content. | 2014-01-30 |
20140033249 | SYSTEM AND METHOD FOR DELIVERING TARGETED ADVERTISING DATA IN AN INTERNET PROTOCOL TELEVISION SYSTEM - A method is disclosed for delivering targeted advertising data over an Internet Protocol Television (IPTV) network including but not limited to displaying in a picture in picture queue display, a set of follow-on advertisements comprising less than all of the plurality of follow-on advertisements; rotating one of the set of follow-on advertisements off of the on-screen picture in picture queue display to an off-screen storage; and rotating another one of the follow-on advertisements from the off-screen storage to the on screen picture in picture queue display. A system and computer program are disclosed for practicing the method. | 2014-01-30 |
20140033250 | Preprocessing Video to Insert Visual Elements and Applications Thereof - Embodiments of this invention relate to preprocessing video such that visual elements, such as advertisements, can be inserted at a later point in time when the video is requested by a user. In an embodiment, a video and target data is received. The video is analyzed to determine how a target moves and changes over time. Metadata describing how the target moves and changes over time is stored. When a user requests an on-demand video such as from a video sharing site, a visual element is inserted into the video. The visual elements move and change as defined in the stored metadata. In this way, advertisements can be inserted into on-demand video such as video from a video sharing website. | 2014-01-30 |
20140033251 | SYSTEM AND METHOD FOR INTERACTING WITH SOCIAL NETWORKING IN AN INTERNET PROTOCOL TELEVISION SYSTEM - In an Internet protocol television network, a set-top box includes a social network interface module and a remote control interface module. The social network interface module receives a first selection of a content item from the remote control interface module, and receives a second selection of a comment from the remote control interface module. The social network interface module also posts the second selection on a social network system. | 2014-01-30 |
20140033252 | SYSTEMS AND METHODS FOR PROVIDING BLACKOUT RECORDING AND SUMMARY INFORMATION - Systems and methods for providing blackout support in video mosaic and television environments are disclosed. In response to receiving a request for a video mosaic page, screen data or application data, which may include blackout information, is received. The blacked out content may be automatically recorded to the user equipment or a network server for later playback after the blackout has expired. In addition, an overlay of options associated with the blacked out asset may be presented. The overlay may include options to substitute the blacked out asset with replacement content, search for similar content, retrieve more information about the blackout, or present summary information, such as a sports ticker, in place of the blacked out cell. | 2014-01-30 |
20140033253 | IMAGE DISPLAY DEVICE AND METHOD FOR OPERATING SAME - The present invention relates to an image display device and a method for operating same. According to an embodiment of the present invention, a method for operating an image display device uses a remote controller, and comprises the steps of: displaying a pointer in a first area of a display; receiving movement coordinate information of the pointer from the remote controller; restoring the first area using a prestored image when the first area does not overlap a second area where a pointer is displayed, based on the movement coordinate information; storing an image of the second area; and displaying a pointer in the second area. This enables the pointer of the remote controller to be easily displayed. | 2014-01-30 |
20140033254 | DYNAMIC SYNCHRONIZATION OF MEDIA STREAMS WITHIN A SOCIAL NETWORK - A method of synchronizing first and second streams of a multimedia content program is operable for determining a temporal difference indicative of a relative timing between first and second streams of the program, the first stream being provided to a first multimedia processing resource (MPR) and the second stream being provided to a second MPR. The method includes manipulating at least one of the streams to reduce the temporal difference until the temporal difference is less than a predetermined threshold and enabling a viewer of the first stream to interact with a viewer of the second stream regarding the program. Interactions are visually detectable on a first display screen corresponding to the first MPR. | 2014-01-30 |
20140033255 | IP-Based Television Messaging Services - Architecture for the delivery of IP-based messages from wired and/or wireless devices to a television system. The means for delivery can be via an Internet Protocol Television (IPTV) technology. The message is processed through a messaging system that obtains a mapping of a message address to an IPTV address, and routes the message to an IPTV network for delivery the desired television system for presentation. Messaging can be via SMS (short message service) for textual content, MMS (multimedia messaging service) for multimedia content, or other messaging technologies, such as instant messaging, an e-mail, for example. Optionally, the message from the user device can include a request for confirmation of delivery of the message to the television. The confirmation can then be routed back over an IP data network to the user device and presented to the user. | 2014-01-30 |
20140033256 | METHOD AND APPARATUS FOR PROVIDING ENHANCED ELECTRONIC PROGRAM GUIDE WITH PERSONALIZED SELECTION OF BROADCAST CONTENT USING AFFINITIES DATA AND USER PREFERENCES - Apparatuses and methods are provided to inform a user of a broadcast stream, which has multiple, concurrently received channels of program content, about recommendations of a subset of the content currently playing across the available channels or to be played within a selected future time period. The subset of content is selected based on user preferences and system data (e.g., program topic and channel affinities among the broadcast content and channels) to recommend a more diverse subset of content than would be discovered if only user preferences were employed to make the selection of recommended content. | 2014-01-30 |
20140033257 | UTILIZATION OF A REMOTE CONTROL TO DISPLAY MEDIA | 2014-01-30 |
20140033258 | SYSTEMS AND METHODS FOR TRANSPONDER STACKING - Systems and methods are disclosed for enabling each wideband tuner of a television converter device such as a set-top box to receive transponders from any satellite location and provide a unique feed per television converter device (e.g., per set-top box) input, giving each television converter device tuner its own set of six, eight or more transponders. The capacity of transponder stacking in the digital domain is extended to a system and method to make use of wideband tuner/demodulators. Each television converter device has a single wideband tuner/demodulator for six, eight or more transponders with each transponder being from any of all possible satellite locations. Bandwidth to each television converter device is thereby usefully increased. | 2014-01-30 |
20140033259 | SATELLITE SIGNAL DISTRIBUTION - Disclosed is a system and method for receiving satellite television signals. A centralized system component may be provided in association with the satellite antenna. The centralized system component includes at least one or more tuners and one or more demodulators. The centralized component may provide output through a network adaptor that provides output through a single output, which is a coaxial cable in one embodiment. The centralized component may send output in the form of packetized data directed to one or more set-top boxes by way of a network transaction. The set-top box or boxes may be operable to receive the network transaction and to process the data, as appropriate, for display on a TV/monitor. | 2014-01-30 |
20140033260 | Shared Television Sessions - Shared television sessions are described. In embodiment(s), television content can be received via a tuner of a tuner device. A shared television session can be established between rendering devices that share the tuner of the tuner device to receive the television content. A tuner configuration input can be received when initiated at a rendering device, and the tuner configuration input can be communicated to the tuner device to change the television content. The tuner device can receive different television content via the tuner according to the tuner configuration input. Tuner update data associated with the tuner configuration input can then be communicated to update the rendering devices that further share the tuner of the tuner device to receive the different television content. | 2014-01-30 |
20140033261 | RDMA BASED REAL-TIME VIDEO CLIENT PLAYBACK ARCHITECTURE - A client playback architecture for a media content distribution system is provided. In the preferred embodiment, the client playback architecture is a Remote Direct Memory Access (RDMA) based architecture. The RDMA based architecture enables the client playback device to obtain media content from a central server in real-time or in substantially real-time as the media content is needed for playback at the client playback device. More specifically, the playback device includes RDMA enabled playback circuitry operating to perform RDMA transfers for select media content, buffer the media content received as a result of the RDMA transfers, and provide the media content for presentation to one or more associated viewers via one or more audio/video interfaces. | 2014-01-30 |
20140033262 | Parsing Single Source Content for Multi-Channel Publishing - An approach is provided in which a content manager receives a publication request to publish content data on a particular distribution channel. The content manager identifies one or more channel format parameters corresponding to the selected distribution channel and dynamically formats the content data according to the identified channel format parameters, which results in formatted content data. In turn, the content manager publishes the dynamically formatted content data on the selected distribution channel. | 2014-01-30 |
20140033263 | COMMUNICATION APPARATUS, AND METHOD AND PROGRAM FOR CONTROLLING THE SAME - A communication apparatus comprises a reception unit that receives a reception signal from a metal cable and extracts reception data; a transmission unit that sends a transmission signal obtained by modulating transmission data with a frequency included in a first frequency band to the metal cable; an interference signal detection unit that detects a signal used in communication using a cable modem, modulated by a frequency included in a second frequency band, and transmitted over the metal cable as an interference signal; and a signal transmission control unit that instructs the transmission unit to modulate transmission data using a frequency included in a third frequency band that does not have any frequency band overlapping the second frequency band when the interference signal is detected and a frequency band overlapping both the first frequency band and the second frequency band exists. | 2014-01-30 |
20140033264 | NETWORK INTERFACE DEVICE HAVING A SOLID-STATE SAFEGUARD APPARATUS FOR PRESERVING THE QUALITY OF PASSIVE OPERATION IN THE EVENT OF DISRUPTIVE OPERATIONAL CONDITIONS - A network interface device has a safeguard apparatus. The safeguard apparatus is operable in power on, power off, and degraded power conditions. In power on operation, the safeguard apparatus maintains the quality of active and passive branch communications. During power off and degraded power operation, the safeguard apparatus safeguards the quality of the passive communication path. | 2014-01-30 |
20140033265 | DIGITAL RIGHTS MANAGEMENT IN A COLLABORATIVE ENVIRONMENT - A system for enforcing rights management policies in a collaborative environment is provided. The system may reside at a collaboration host and may include a session manager to manage a collaborative session associated with a plurality of participants, a shared view detector to detect a request to distribute shared content to participants of the collaborative session, a policy module to obtain a rights management policy associated with at least a portion of the shared content, a filter generator to generate a filter based on the obtained rights management policy, and a shared view distributor to distribute the shared content to the participants of the collaborative session together with the filter. | 2014-01-30 |
20140033266 | METHOD AND APPARATUS FOR PROVIDING CONCEALED SOFTWARE EXECUTION ENVIRONMENT BASED ON VIRTUALIZATION - A method and apparatus provides a concealed software execution environment based on virtualization. The method and apparatus constructs a concealed domain that is exclusively executed without being exposed to the outside using a virtualization-based domain separating technology and executes security information such as key information provided by a secure element within the concealed domain. | 2014-01-30 |
20140033267 | TYPE MINING FRAMEWORK FOR AUTOMATED SECURITY POLICY GENERATION - One embodiment provides an automated security policy generation system for a computing system including at least one resource and at least one subject. The automated security policy generation system comprises a clustering module configured for clustering the subjects and the resources into at least one subject cluster and at least one resource cluster, respectively, based on one or more access permissions. Each access permission represents a permission that a subject requires to access a resource. The automated security policy generation system further comprises a recommendation module configured for generating a security recommendation for the computing system based the subject clusters and the resource clusters. Access to the resources by the subjects is controlled based on the security recommendation. | 2014-01-30 |
20140033268 | AUTOMATED NETWORK DEPLOYMENT OF CLOUD SERVICES INTO A NETWORK - A method for automated network deployment of cloud services into a network is suggested. The method includes receiving a certain cloud service with a certain resource protection template specifying an isolation policy for isolating zones in the network, receiving certain customer protection parameters specifying customer needs regarding protection in the network, providing security requirements by matching the received resource protection templates and the received customer protection parameters, and automatically deploying the certain cloud service into the network by using the provided security requirements. | 2014-01-30 |
20140033269 | COLLABORATIVE GRAPHICS RENDERING USING MOBILE DEVICES TO SUPPORT REMOTE DISPLAY - Systems, devices and methods are described including receiving a policy from a secure storage device, where the policy may be used to implement collaborative rendering of image content. The image content may include multiple portions of image content. The policy may be used to determining rendering assignments for multiple mobile devices where the assignments may specify that a mobile device is to render one content portion while another mobile device is to render another content portion. The rendering assignments may be provided to the mobile devices and rendered output corresponding to the different content portions may be received from the mobile devices. The rendered output may then be assembled into one or more image frames and wirelessly communicated to a remote display. | 2014-01-30 |
20140033270 | SYSTEM AND METHOD FOR PROVIDING CUSTOMIZED RESPONSE MESSAGES BASED ON REQUESTED WEBSITE - The invention describes a system, method and computer product to regulate user access to websites. The system receives a URL request by a user corresponding to a website that the user wishes to access. Thereafter, the system determines the associated group of the user and the associated category of the website. Subsequently, a message to be displayed to the user is determined based on the associated group of the user and the associated category of the website. The message is included in a block page and then displayed to the user. | 2014-01-30 |
20140033271 | Policy-Based Application Management - Improved techniques for managing enterprise applications on mobile devices are described herein. Each enterprise mobile application running on the mobile device has an associated policy through which it interacts with its environment. The policy selectively blocks or allows activities involving the enterprise application in accordance with rules established by the enterprise. Together, the enterprise applications running on the mobile device form a set of managed applications. Managed applications are typically allowed to exchange data with other managed applications, but are blocked from exchanging data with other applications, such as the user's own personal applications. Policies may be defined to manage data sharing, mobile resource management, application specific information, networking and data access solutions, device cloud and transfer, dual mode application software, enterprise app store access, and virtualized application and resources, among other things. | 2014-01-30 |
20140033272 | EVALUATING A SECURITY STACK IN REPSONSE TO A REQUEST TO ACCESS A SERVICE - A process to evaluate a request to access a service received from a user's computing device having a software stack and a software stack provider over a computer network is disclosed. Prior to providing access to the service, a determination is made as to whether the software stack meets a set of conditions. If the set of conditions are met, the software stack provides verification information. The software stack provider is asked to validate the verification information. Access to the service if the software stack provider validates that the set of conditions are met. | 2014-01-30 |
20140033273 | AUTOMATING CALLS BETWEEN SEPARATE AND DISTINCT APPLICATIONS FOR INVOKING AN IDENTITY VERIFICATION FUNCTION - A method, software and system allows for the novel and seamless integration between disparate hardware and software systems to facilitate strong authentication and identity assertion of an individual as an integral component of transaction processing. The method, software and system can combine quick response (QR) code(s) with more custom mobile device uniform resource locator (URL) scheme(s) to seamlessly invoke mobile application(s) that enable an end user to perform strong, multi-factor authentication as a component of completing a transaction. The use of mobile application(s) can simplify and automate the conveyance of transaction details between computing platforms and devices to allow a user to fully participate in a transaction approval process with a simplified, convenient experience. | 2014-01-30 |
20140033274 | COMMUNICATION SYSTEM, COMMUNICATION METHOD, AND COMPUTER-READABLE RECORDING MEDIUM - A communication system comprising a plurality of terminals, comprising: a start request information obtaining unit that obtains information for requesting start of a session between a first terminal and a second terminal of the plurality of terminals; a session management unit that establishes the session in accordance with the start request information; a participation request information obtaining unit that obtains participation request information with which a third terminal of the plurality of terminals requests participating in the already established session; and a participation determination unit that allows the third terminal to participate or prohibit the third terminal from participating in the already established session, wherein when the participation determination unit allows participation in the already established session, the session management unit lets the third terminal to participate in the already established session. | 2014-01-30 |
20140033275 | COMPUTER SYSTEM, CONTROLLER, AND METHOD OF CONTROLLING NETWORK ACCESS POLICY - A computer system according to the present invention includes a controller, and a switch which carries out a relay operation on a received packet which conforms to a flow entry which is set by the controller, the relay operation being regulated with the flow entry. The switch transmits a received packet which does not conform to the flow entry which is set by the switch to the controller. The controller queries authentication information which is included in the received packet and authenticates the received packet. From among the header information of the received packet which is determined to be valid, the controller sets the switch to the flow entry which regulated the relay operation for the packet which includes information which identifies the transmission source of the received packet. Network access policy control in a computer system of an open flow protocol environment is thus made easy. | 2014-01-30 |
20140033276 | SCRIPTING ENGINE EXTERNALIZED FUNCTION EXECUTION CONTROL - Various embodiments include at least one of systems, methods, software, and data structures to evaluate function calls within a host, such as a scripting or application programming interface (API) host, prior to execution. Such embodiments may determine if a called function is authorized for execution. When the function is not authorized for execution, the function is not executed. Authorized and unauthorized functions may be set in a representation including one or both of authorized and unauthorized function functions. The representation may be stored external to the host so as to be modifiable. | 2014-01-30 |
20140033277 | Program Service Based on Individual Identification - Method, device, and storage medium for providing a program service based on identifying a user at a user level versus at an account level or a device level. The user is identified based on an identifier associated with a mobile device. The program service allows the user to store program session information according to various user settings including location, time of day, user device used during previous session, type of program, and service provider that provides access to the program service. The program service allows the user to share program session information with other users or prevent other users from accessing the program session information. The program service provides digital rights management at the user level. | 2014-01-30 |
20140033278 | SYSTEM AND METHOD OF SECURING SHARING OF RESOURCES WHICH REQUIRE CONSENT OF MULTIPLE RESOURCE OWNERS USING GROUP URI'S - In accordance with various embodiments, services gatekeeper systems and methods allow mapping and protecting communication services APIs with OAuth and group access to user information. Such a system can include a plurality of applications, executing on one or more application servers. The services gatekeeper is operable to define a group of members using a group URI, intercept requests for access to communication services APIs, obtain authorization from a group owner for access to a specified communication services API for each member of the group, and enable access to the specified communication services API of each member of the group in accordance with the scope authorized by the group owner. | 2014-01-30 |
20140033279 | SYSTEM AND METHOD OF EXTENDING OAUTH SERVER(S) WITH THIRD PARTY AUTHENTICATION/AUTHORIZATION - In accordance with various embodiments, systems and methods that provide for authorization of access to protected resources. Such a system can include a plurality of applications, executing on one or more application servers. The system can also include an authorization server which is operable to interface with one or more remote and/or non-co-located third party authentication servers. Each application can (a) receive a request for authorization to access a controlled resource; (b) redirect the request for authorization to a configurable authentication endpoint identifying a third party authentication server; (c) receive authorization information from the third party authorization server; and (d) issue an authorization code for access to the protected resource. | 2014-01-30 |
20140033280 | SYSTEM AND METHOD OF MAPPING AND PROTECTING COMMUNICATION SERVICES WITH OAUTH - In accordance with various embodiments, systems and methods which allow mapping and protecting communication services and granular access to subscriber information. Such a system can include a plurality of applications, executing on one or more application servers. The system can also include a services gatekeeper which is operable to intercept request for access to communication services, obtain scoped authorization from a subscriber for access to a specified communication services, enable access to the specified communication services in accordance with the scope authorized by the subscriber. | 2014-01-30 |
20140033281 | USER AUTHENTICATION SYSTEM, USER AUTHENTICATION METHOD AND NETWORK APPARATUS - In a user authentication system which carries out authentication at a user terminal via a network, a password authentication page where permission of authentication is determined based on a consistency between an input password inputted from the user terminal and an authentication password includes: a private page URL key obtained by transforming a private page URL which the user terminal can connect via the network if it is determined that the authentication is permitted and an authentication password, using an encryption algorithm; and a URL recovery processing code to find the private page URL by transforming the private page URL key and the input password through inverse transformation of the encryption algorithm. If it is determined that the authentication is permitted, the private page URL is acquired using the URL recovery processing code. | 2014-01-30 |
20140033282 | PUTTING IN PLACE A SECURITY ASSOCIATION OF GBA TYPE FOR A TERMINAL IN A MOBILE TELECOMMUNICATIONS NETWORK - A method is provided for putting in place a security association of GBA type for a terminal. The method includes the following steps, executed in a network access server, following receipt of a request for attachment to the network from the terminal: dispatching a request for association of security to a priming function server; reception of a response comprising security association parameters, from the priming function server and dispatching a message including the security association parameters to the terminal. | 2014-01-30 |
20140033283 | APPARATUS, SYSTEMS AND METHODS FOR MEDIA CONTENT DELIVERY - A media content delivery system and method is operable to communicate an authorized single media content stream generated by a local programming provider (LPP) in a domestic market area (DMA) to a client facility, wherein the authorized single media content stream is multiplexed into a multi-media content stream with a plurality of other single media content streams generated by a plurality of other LPPS in the DMA. An exemplary embodiment identifies an authorized single media content stream of interest to a client; accesses the multi-media content stream communicated from a communication network at the client facility, unbundles the authorized single media content stream from the received multi-media content stream, and communicates the authorized single media content stream to a program content generation system operated by the client. | 2014-01-30 |
20140033284 | METHOD FOR USER AUTHENTICATION - A method for verifying an identity of a user includes (a) receiving a request for an identification phrase from a user associated with a user account; (b) selecting the phrase from a pool of phrases and associating the phrase with the user account; (c) sending the phrase to the user; (d) receiving a video recording showing a person reading one or more phrases aloud, and (e) verifying that a phrase read by the person in the video recording corresponds to the selected phrase. A third party may desire verification of the user's identity. The method confirms to the third party the user's identity based on whether or not the phrase read aloud in the video recording matches the randomly selected phrase associated with the user account. | 2014-01-30 |
20140033285 | ENTERPRISE SECURITY SYSTEM - A platform of Trust Management software which is a single, customizable, complete distributed computing security solution designed to be integrated into an enterprise computing environment. Digital Network Authentication (DNA) is the centerpiece of the system of the present invention. It is a unique means to authenticate the identity of a communicating party and authorize its activity. The whole mechanism can be thought of as a trusted third party providing assurances to both clients and servers that each communicating entity is a discrete, authenticated entity with clearly defined privileges and supporting data. Furthermore, the level of trust to be placed in the authorization of every entity communicating within the system is communicated to every entity within a distributed computing environment. | 2014-01-30 |
20140033286 | ONLINE USER ACCOUNT LOGIN METHOD AND A SERVER SYSTEM IMPLEMENTING THE METHOD - The present invention provides a webpage login method involving two client devices and a server. The server receives an information access request from a first client device. In response to the information access request, the server generates a unique identifier and returns the unique identifier to the first client device. The unique identifier is to be displayed on the first client device. Next, the server receives a first message from a second client device, the first message including user account information at the server system and authentication information. The server determines whether the authentication information corresponds to the unique identifier generated by the server system. If the authentication information corresponds to the unique identifier, the server authenticates the information access request such that the user can access information at the server and associated with the user account information from the first client device. | 2014-01-30 |
20140033287 | PRINTING SYSTEM AND METHOD TO REGISTER CARD ID - A printing system includes an image forming apparatus and a management server connected via a network. The image forming apparatus reads a card ID of a user of the image forming apparatus from the ID card, accepts non-card authentication information, transmits an authentication request, including the card ID, to the management server, and, if an unsuccessful authentication result is transmitted from the management server, transmits a card registration request, including the non-card authentication information, to the management server. The management server transmits a successful authentication result or the unsuccessful authentication result to the image forming apparatus according to whether the card ID has been registered in correspondence to the user, registers the non-card authentication information in correspondence to the user, and if the non-card authentication information has been registered in correspondence to the user, registers the card ID in correspondence to the user. | 2014-01-30 |
20140033288 | Systems and Methods for Enhanced Engagement - In some embodiments, a method comprises displaying a pre-registration invitation on a first digital device connected to a wireless network, determining one or more wireless network identifiers associated with the wireless network, generating a pre-registration code request, the request including the one or more wireless network identifiers, providing the pre-registration code request to a virtual network server, the server generating a pre-registration code in response to the pre-registration code request, the pre-registration code associated with the one or more wireless network identifiers, receiving the pre-registration code, providing a registration request from a second digital device, the registration request comprising the pre-registration code, and provisioning an account based on the registration request and the wireless network identifiers, the wireless network identifiers identified based on the pre-registration code. | 2014-01-30 |
20140033289 | ANTI-IDENTITY THEFT AND INFORMATION SECURITY SYSTEM - The anti-identity theft and information security system process includes storing secure information in association with an electronic device having a communication circuit for sending and receiving data. Biometric information is read with a scanner so that the identity of a user can be authenticating in connection with the supplied biometric information. Once approved, a data communication line is established with a remote device and access to the secure information is unlocked. Thereafter, the secure information may be transmitted between the electronic device and the remote device. | 2014-01-30 |
20140033290 | MULTIPLE AUTHENTICATION MECHANISMS FOR ACCESSING SERVICE CENTER SUPPORTING A VARIETY OF PRODUCTS - According to one embodiment, a login page is displayed on a mobile device for logging onto a support center. In response to selecting a first login option, the user is requested to speak a predetermined phrase to a microphone of the mobile device and a first voice stream is captured using a voice recorder of the mobile device. The first voice stream is transmitted to the support center for authentication based on the voice. In response to selecting a second login option, a password is obtained and is transmitted to the support center to for authentication based on the password. Upon having been successfully authenticated by the support center based on at least one of the first and second login options, a communication session is established with a support agent of the support center for support services of a product associated with the user. | 2014-01-30 |