Patents - stay tuned to the technology

Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


06th week of 2014 patent applcation highlights part 76
Patent application numberTitlePublished
20140040909DATA PROCESSING SYSTEMS - A data processing system is described in which a plurality of data processing units 2014-02-06
20140040910INFORMATION PROCESSING APPARATUS AND CONTROL METHOD THEREOF - Each of a plurality of circuit blocks includes a plurality of arithmetic elements. A power supply controller individually controls power supply to the plurality of circuit blocks. A resource management unit acquires first information regarding an arithmetic element necessary for an arithmetic process, and second information regarding an arithmetic element included in a circuit block which is supplied with power. Based on the first information and the second information, the resource management unit preferentially assigns, to the arithmetic element included in the circuit block which is supplied with power, a process for implementing the arithmetic process.2014-02-06
20140040911DYNAMIC JOB PROCESSING BASED ON ESTIMATED COMPLETION TIME AND SPECIFIED TOLERANCE TIME - The invention provides a system and method for managing clusters of parallel processors for use by groups and individuals requiring supercomputer level computational power. A Beowulf cluster provides supercomputer level processing power. Unlike a traditional Beowulf cluster; however, cluster size in not singular or static. As jobs are received from users/customers, a Resource Management System (RMS) dynamically configures and reconfigures the available nodes in the system into clusters of the appropriate sizes to process the jobs. Depending on the overall size of the system, many users may have simultaneous access to supercomputer level computational processing. Users are preferably billed based on the time for completion with faster times demanding higher fees.2014-02-06
20140040912SYSTEM AND METHOD FOR TOPOLOGY-AWARE JOB SCHEDULING AND BACKFILLING IN AN HPC ENVIRONMENT - A method for job management in an HPC environment includes determining an unallocated subset from a plurality of HPC nodes, with each of the unallocated HPC nodes comprising an integrated fabric. An HPC job is selected from a job queue and executed using at least a portion of the unallocated subset of nodes.2014-02-06
20140040913JOB PLAN VERIFICATION - A job plan verification system (2014-02-06
20140040914Load Determination Method - Methods and devices for determining load on a computing device (2014-02-06
20140040915OPEN STATION CANONICAL OPERATOR FOR DATA STREAM PROCESSING - Customizing functions performed by data flow operators when processing data streams. An open-executor(s) is provided as part of the data stream analytics platform, wherein such open-executor allows for both of: 1) customizing user plug-ins for the operators, to accommodate changes in user requirements; and 2) predefining templates that are based on specific meta-properties of various operators and that are common therebetween.2014-02-06
20140040916AUTOMATIC EVENT CORRELATION IN COMPUTING ENVIRONMENTS - Systems and methods of automatic event correlation for computing environments are disclosed. An example method may include parsing an event message to identify an event, and marking the event message when the event is related to a previous event. The method may also include adding the marked event message to a trail of events. The method may also include parsing the trail of events. The method may also include changing the marked event message when parsing the trail of events confirms a condition in the computing environment.2014-02-06
20140040917Resuming Applications and/or Exempting Applications from Suspension - Only a particular number of applications on a computing device are active at any given time, with applications that are not active being suspended. A policy is applied to determine when an application is to be suspended. However, an operating system component can have a particular application be exempted from being suspended (e.g., due to an operation being performed by the application). Additionally, an operating system component can have an application that has been suspended resumed (e.g., due to a desire of another application to communicate with the suspended application).2014-02-06
20140040918METHOD FOR CALLING APPLICATION MODULE AND MOBILE TERMINAL - A method for calling an application module and a mobile terminal thereof are provided in the present document, which can call the application module quickly during text editing. The method includes that: during the text editing, after the mobile terminal detects an identifier for calling an application, it determines that conditions for calling the application module are satisfied and calls the application module. The conditions include receiving a command from user to confirm calling the application. The mobile terminal includes a detecting module, a condition judging module and a calling module. The embodiments of the present invention call each application module instantly during the text inputting, and in addition, the final required data are inserted directly into the text editing position to reduce users' operation procedures, thus greatly improving friendliness of man-machine interaction, the overall efficiency, speed and convenience of input, and making users' input experience improved dramatically.2014-02-06
20140040919REMINDER MESSAGES - In one embodiment, event data descriptive of an event to occur at an event time is received at a first computer system via a network. Reminder data, descriptive of a reminder time to occur on or before the event time, is received via the network. At a time after receipt of the event data, article data descriptive of an article to be associated with the event is receive via the network. The article data is data created during an electronic scanning operation. At the reminder time a reminder message describing the event and the article is sent via the network to a second computer system, for presentation at the second computer system.2014-02-06
20140040920STRATEGY BASED EVENT NOTIFICATION CHAIN - Various exemplary embodiments relate to a method and related network node including one or more of the following: receiving, at the event bus from a sender, an indication of an event; identifying a plurality of listeners to which event notifications should be pushed based on the event; determining a sorted order for the plurality of listeners; and pushing, by the event bus, event notifications to the plurality of listeners in an order specified by the sorted order.2014-02-06
20140040921ISA BRIDGING WITH CALLBACK - Methods, apparatuses and storage medium associated with ISA bridging with callback, are disclosed. In various embodiments, at least one computer-readable storage medium may include instructions configured to enable a target device with a target ISA, in response to execution of the instructions, to provide an ISA bridging layer to the target device to facilitate a library service to callback a callback function of an application. The library service may be implemented for the target ISA, and the application may be implemented at least partially for a source ISA that may be different from the target ISA. The ISA bridging layer may include a source ISA emulator and a library emulator configured to cooperate to enable the application to call the library service, and the library service to callback the callback function, across the two instruction set architectures. Other embodiments may be disclosed or claimed.2014-02-06
20140040922SYSTEM AND METHOD FOR CONFIGURING DRIVERS - Driver systems and methods are provided, such as those that include identifying a process corner of a driver; and configuring the driver based on the identified process corner. Further embodiments provide a method that includes detecting a process corner of a driver, setting a reference voltage of a calibration circuit based on the process corner detected, and configuring the driver based on the reference voltage.2014-02-06
20140040923Automated Application Programming Interface (API) Generation - Techniques are provided for automatically generating Application Programming Interfaces (APIs) in a computing device. In one example, a request for the addition of a first API to a software infrastructure of a computing device is received. An API coding table that includes one or more initial API parameters corresponding to the first API is generated and an API coding template stored in memory of the computing device is obtained. A compiler of the computing device generates functional codes for the first API based on the API coding template and the initial API parameters.2014-02-06
20140040924INVOCATION OF ADDITIONAL PROCESSING USING REMOTE PROCEDURE CALLS - In one embodiment, a method for invoking additional processing at a remote computing device using remote procedure calls (RPCs) is provided. In this method, a list of functions supported by the remote computing device is received from the remote computing device. From the list of functions, a function that requires metadata about the function is identified. The metadata and argument required by the function is accessed, and an RPC message that includes the metadata and the argument is composed. The RPC message is then transmitted to the remote computing device. Here, the RPC message is transmitted to call the function with the argument as input and to invoke the additional processing based on the metadata.2014-02-06
20140040925TURN TABLE FOR SPINDLE MOTOR - A turn table of a spindle motor is provided, wherein an outer diameter of a vertical portion at the disk insertion unit facing an inner periphery of a small-diameter disk is smaller by 0.01% to 0.15% than the inner periphery of the small-diameter disk to enable a chucking of the small-diameter disk having an inner diameter of an inner periphery smaller than 15 mm.2014-02-06
20140040926IN-HOME ENTERTAINMENT MEDIA STREAMING VIEWERS HEADCOUNT-BASED PRICING MODEL - The method and system of the present invention allows the media content providers to count the number of people watching the media content being streamed and apply the viewer headcount pricing model like how it is done in the movie theaters to capture revenues lost at the movie theaters from streaming video content directly to the home. The central component of the viewer headcount pricing model is the utilization of the facial recognition range camera and/or motion sensor to determine the number of viewers and charge the customers by the headcount.2014-02-06
20140040927METHOD AND APPARATUS FOR ORDERING ENTERTAINMENT PROGRAMS FROM DIFFERENT PROGRAMMING TRANSMISSION SOURCES - The present invention provides an improved method and apparatus for purchasing media features for programming transmissions. A selection is sent to a server system to buy an upgraded media feature for a programming transmission. The server system automatically coordinates purchasing the media feature from a programming transmission source and providing the media feature from the programming transmission source. In one embodiment, an entertainment system includes a user interface from which a viewer selects an upgraded media feature for a programming transmission, wherein the programming transmission with the upgraded media feature is provided to the entertainment system.2014-02-06
20140040928AUDIENCE POLLING SYSTEM - A system for acquiring feedback from an audience, such as a group of participants in an educational class or a business meeting. The system includes a camera that is controlled to capture an image of the group of participants. Each participant may be provided with a set of encoded objects that both reflect responses that can be selected by the participant and the identity of the participant. These objects may be encoded with a pattern that facilitates computerized recognition in the image of the response selected by the participant and participant identifier. Based on information acquired from the image, the system can automatically, or with user input, analyze responses from the group of participants.2014-02-06
20140040929METHODS AND APPARATUS TO COLLECT AUDIENCE INFORMATION ASSOCIATED WITH A MEDIA PRESENTATION - Methods and apparatus to collect audience information associated with a media presentation are described herein. An example method includes detecting, at a base meter located in proximity to a media presentation device, registration information from a portable metering device within proximity of the base meter, the registration information identifying a user associated with the portable metering device. A content identifier associated with media presented by the media presentation device is determined. A polling query is sent to the portable metering device for presentation to the user. A response to the polling query, the registration information, and the content identifier are communicated to a data collection facility.2014-02-06
20140040930METHODS AND SYSTEMS FOR VIEWING DYNAMICALLY CUSTOMIZED AUDIO-VISUAL CONTENT - Systems and methods for viewing dynamically customized audio-visual content are described. In some implementations, a process may include providing at least one selection signal indicative of a preference, receiving a dynamically customized audio-visual content including an audio-visual core portion at least partially modified with at least one revised content portion in accordance with the at least one selection signal, and displaying the dynamically-customized audio-visual content.2014-02-06
20140040931DYNAMIC CUSTOMIZATION AND MONETIZATION OF AUDIO-VISUAL CONTENT - Systems and methods for dynamic customization of audio-visual content are described. In some implementations, a process may include receiving at least one audio-visual core portion, receiving at least one selection signal indicative of a viewer preference, modifying the audio-visual core portion with at least one revised content portion in accordance with the at least one selection signal to create a dynamically customized audio-visual content, and outputting the dynamically-customized audio-visual content.2014-02-06
20140040932METHODS AND SYSTEMS FOR VIEWING DYNAMICALLY CUSTOMIZED AUDIO-VISUAL CONTENT - Systems and methods for viewing dynamically customized audio-visual content are described. In some implementations, a process may include providing at least one selection signal indicative of a viewer preference, receiving a dynamically customized audio-visual content including an audio-visual core portion having at least one revised content portion customized in accordance with the at least one selection signal, displaying the dynamically-customized audio-visual content; and providing a consideration for the dynamically-customized audio-visual content.2014-02-06
20140040933NAVIGATION AWARE NEWS SERVICE - A mobile terminal simultaneously receives an interactive service, such as a betting service, and a web-based news service operating in conjunction with the interactive service across a wireless connection. Both services are simultaneously displayed in different windows on the same display of the mobile terminal. The user's selections, navigation of pages and other input in the interactive service are monitored and used to select related news items for a scrolling news frame.2014-02-06
20140040934METHODS AND APPARATUS FOR MONITORING AND/OR COLLECTING VIEWERSHIP STATISTICS - Methods and apparatus for collecting program viewership information are described. A viewership monitoring module is provided access to decrypted program content allowing program information to be recovered without having to capture output program content using a microphone or camera. The monitoring module is loaded onto a secure device, e.g., a home network device, such as a router used to deliver content to a secure playback device. Alternatively the secure device which performs the monitoring maybe the secure playback device. Since a user of the secure device or a company implementing the viewership monitoring process loads the monitoring module onto the secure device, the network used to deliver the secure content need not be informed of which network customers are contributing to the viewership information which is being collected.2014-02-06
20140040935MULTI-SCREEN TARGETED ADVERTISING - A system provides, to consumers, coupon offers that correspond to television advertising seen by the consumer. The system may receive tracking information of a television advertisement presented to a user of a particular set-top box, and identify, from a group of stored coupon content, particular coupon content corresponding to the television advertisement. Based on stored delivery preferences for the user, the system sends the particular coupon content to a user device (e.g., a smart phone, computer, etc.) associated with the set-top box.2014-02-06
20140040936WIRELESS ACCESS POINT WITH DIGITAL TELEVISION CAPABILITIES - In some embodiments a wireless access point receives digital television content. The digital television content is transmitted in a wireless manner over a wireless network of the wireless access point. Other embodiments are described and claimed.2014-02-06
20140040937REMOTE VIEWING OF MULTIMEDIA CONTENT - A method and system for remote viewing of multimedia content using a multimedia content distribution network (MCDN) is configured to duplicate multimedia content displayed on a first MCDN terminal device and route the duplicate multimedia content to a second MCDN terminal device. The MCDN terminal devices may be coupled to a local network at an MCDN client premises. The MCDN terminal devices may also include wireless telephony devices for mobile remote viewing functionality. The method may include transcoding of the multimedia content into a format suitable for the second MCDN terminal device.2014-02-06
20140040938SYSTEMS AND METHODS FOR RELOCATING MEDIA - A system and method may be provided that allows users to store, retrieve, and manipulate on-demand media content and data stored on a remote server network in an on-demand media delivery system. More particularly, the system may allow a user to access his or her on-demand media account from user equipment in different locations as long as the current user equipment can communicate with a remote server that stores user-specific information. The system upon user selection may freeze the delivery of on-demand media at a particular point and allow the user to resume the media at a later time from some other network location in system. Users may upload personal images or files to an on-demand delivery server for later retrieval and display. Users may be permitted to assign access rights to the uploaded files.2014-02-06
20140040939METHOD OF CONTENT TRANSACTION AND APPARATUS FOR CONTENT TRANSACTION - An apparatus for content transaction is disclosed, which includes a Common Interface Conditional Access Module (CICAM) and a host device which are connected through a common interface. The host device receives a signal for playing a recorded content and determines whether the recorded content includes information about the viewing rating restriction by the CICAM and executes a procedure of relieving the viewing rating restriction by at least one of the CICAM and the host device according to the result of determination. A method of content transaction is also disclosed, which includes judging whether the recorded content includes information about the viewing rating restriction by the CICAM and executing a procedure of relieving the viewing rating restriction by at least one the CICAM and the host device according to the result of the determination.2014-02-06
20140040940COMMUNICATION SYSTEM, COMMUNICATION DEVICE, AND COMMUNICATION METHOD - To suitably perform a delivery service of content to which information of ages, viewing by which is restricted, is added. In a DMS, information of whether age restriction for viewing has been imposed on the content is provided using meta-information. In response, a DMC acquires the meta-information of content, reproduction of which is intended to request to a DMR, and confirms whether the content has the age restriction for viewing. In addition, the DMC acquires information related to the device type from the DMR to which the reproduction of content is requested, and confirm whether the device is capable of controlling reproduction of the content according to the age restriction for viewing.2014-02-06
20140040941Two-Dimensional Barcode System - An end-user device, including a processor to prepare barcode-input data including (a) at least one of an identification of a user of the end-user device, and an identification of the end-user device, and (b) data based on activity of at least one of the end-user device, the user of the end-user device, and a security element removably inserted into the end-user device, and prepare a two-dimensional barcode including the barcode input data, the two-dimension barcode being prepared for displaying on a display in a manner suitable for scanning by a communication device. Related apparatus and methods are also included.2014-02-06
20140040942INTERACTIVE TELEVISION PROGRAM GUIDE SYSTEM AND METHOD WITH NICHE HUBS - A system for providing interactive television program guide features and other features and information related to a specific user interest or programming category in niche hubs is provided. For example, a movie lovers niche hub may provide programming features such as television program listings for movies, video-on-demand listings for movies, pay-per-view listings for movies, web site links related to movies, movie-related merchandise, movie news groups, movie chat groups, movie e-mail clubs, movie contests, movie trivia questions, movie actor interviews, movie reviews, movie channel package ordering, etc.2014-02-06
20140040943MULTIPLE INTERACTIVE ELECTRONIC PROGRAM GUIDE SYSTEM AND METHODS - A multiple Interactive Program Guide (IPG) system provides different television programming and different IPGs to several different users respectively. A single set-top box is capable of providing programming and scheduling data to several different television sets. Each of the different IPGs share a common database. Therefore, a first IPG being viewed by a first user can display data added or modified via a second IPG by a second user of the system. Furthermore, the data added or modified by the second user can influence the viewing rights of the first user. Also, all the competing and conflicting requests for limited resources, such as VCR scheduled recordings, will be brought to the users' attention and will be displayed by the system.2014-02-06
20140040944DYNAMIC INSERTION OF CINEMATIC STAGE PROPS IN PROGRAM CONTENT - Dynamically replaceable assets are inserted in program content and may be used for the insertion of cinematic stage props therein. Such assets can be used for advertising purposes in that images of different products and services can be inserted therein and are changeable via a network. Such assets may be created by identifying locations in the content where the assets can be inserted, establishing the assets in the identified locations, and determining location and visual effects information for each asset. Replacement images, such as images of products, may be obtained via a network. The visual appearance of each replacement image may be modified using visual effects information so the inserted objects appear natural as if they were part of the original scene.2014-02-06
20140040945DYNAMIC CUSTOMIZATION OF AUDIO VISUAL CONTENT USING PERSONALIZING INFORMATION - Systems and methods for dynamic customization of advertising content are described. In some implementations, a process may include obtaining at least one customization input based at least partially on a personalizing information corresponding to at least one user, modifying at least part of an audio-visual content in accordance with the at least one customization input to create a dynamically customized audio-visual content, and providing the dynamically-customized audio-visual content.2014-02-06
20140040946DYNAMIC CUSTOMIZATION OF AUDIO VISUAL CONTENT USING PERSONALIZING INFORMATION - Systems and methods for dynamic customization of advertising content are described. In some implementations, a process may include obtaining at least one customization input based at least partially on a personalizing information corresponding to at least one user, modifying at least part of an audio-visual content in accordance with the at least one customization input to create a dynamically customized audio-visual content, and providing the dynamically-customized audio-visual content.2014-02-06
20140040947SYSTEMS, METHODS AND COMPUTER-READABLE MEDIA FOR LOCAL CONTENT STORAGE WITHIN A MEDIA NETWORK - Systems, methods and computer-readable storage media for storing or caching targeted content on a receiver device using existing bandwidth within a media network are described. For example, unused bandwidth within a transport stream may be detected and targeted content may be inserted into the transport stream within the unused bandwidth. The targeted content may include targeted advertisements for a household addressable media network. The transport stream may be transmitted to the receiver device which may access and store the targeted content responsive to various targeted content signals. For instance, the transport stream may include targeted content signals configured to trigger the receive device to access and store the targeted content. The transport stream may include a commercial feed transport stream.2014-02-06
20140040948INFORMATION DISTRIBUTION DEVICE, INFORMATION RECEPTION DEVICE, SYSTEM, PROGRAM, AND METHOD - Provided are an information distribution device, system, program, and method that can increase the effectiveness of advertisements. The information distribution device selects advertisements to distribute based on viewer attributes collected while distributing content to a display unit.2014-02-06
20140040949USER CONTROL INTERFACE FOR INTERACTIVE DIGITAL TELEVISION - A method of controlling a television increasing a control function when a user-movable object is on one side of a line displayed on a layout, and decreasing the control function when the user-movable object is on the other side of the line. The method may involve movements in one, two, or three dimensions.2014-02-06
20140040950INTEGRATED INTERNET CAMERA SYSTEM AND METHOD - An Internet direct device comprises an imaging system to capture audio or video images and a microprocessor. The microprocessor transmits the captured audio or video images to another Internet direct device upon image capture and receives audio or video images from the other Internet direct device over a communications network. The Internet direct device automatically connects to the communications network on power-up using one of a plurality of available modes of connection, which is designated as a primary mode of connection. The Internet direct device automatically switches to another available mode of connection when the Internet direct device detects that the primary mode of connection to the communications network is unavailable.2014-02-06
20140040951USING IPTV AS HEALTH MONITOR - An IPTV can receive a user name and present a screen enabling a user by means of a remote control to select health information categories, inputting numeric parameters into the selected categories which can be uploaded to an Internet server for analysis and viewed by the user for subsequent monitoring/charting.2014-02-06
20140040952CONTROLLING DELIVERY OF VIDEO PROGRAMS USING USER DEFINED IDENTIFIERS FOR VIDEO RECEIVER DEVICES - A method of controlling delivery of video programs from video distribution equipment to video receiver devices includes receiving messages at the video distribution equipment from a mobile terminal operated by a user. The messages contain user defined identifiers that are associated with equipment identifiers of different ones of the video receiver devices. The user defined identifiers are stored associated with the equipment identifiers in a subscriber account. Delivery of video programs from the video distribution equipment to the video receiver devices is controlled in response to commands received from the mobile terminal which request delivery of identified video programs to identified ones of the user defined identifiers. Related video distribution equipment and mobile terminals are disclosed.2014-02-06
20140040953REMOTE CONTROL BASED INTERACTIVE PROGRAM GUIDE - The present invention relates to electronic program guides. Program guide state information is stored in a remote control which generates and delivers a pseudo-interactive guide to end users with the system state information (guide information to channel mapping maintained in the remote control device.2014-02-06
20140040954INPUT DEVICE AND METHOD, INFORMATION PROCESSING APPARATUS AND METHOD, INFORMATION PROCESSING SYSTEM, AND PROGRAM - An input device includes: an operating section which is held by a user and operated in a three-dimensional free space in order to operate an information processing apparatus by remote control; a calculation section which calculates a hand shake related value for controlling selection of an image to be controlled which is displayed on the information processing apparatus, the hand shake related value being relevant to an amount of hand shake of the operating section; and an output section which outputs the hand shake related value as an operation signal for operating the information processing apparatus by remote control.2014-02-06
20140040955ELECTRONIC PROGRAM GUIDE WITH ADVANCE NOTIFICATION - A non-frame television program guide notification system is provided. The system allows a user at a system to order and receive notifications of non-frame television programs. The user can order notifications by selecting a program or supplying a program title directly. The user can specify when and how often the notifications will be generated and received. If desired, the user can view a list of all currently requested notifications. Entries can be added to the list or the user can cancel a previously ordered notification.2014-02-06
20140040956MEDIA CONTENT CATALOG SERVICE - Aggregating media content catalog data from a plurality of content providers. The catalog data is merged according to rules and provided to a user on a scheduled basis or on demand. In an embodiment, the merged catalog data represents an incremental update to previously delivered catalog data.2014-02-06
20140040957HANDHELD TERMINAL, INFORMATION PROVIDING METHOD, INFORMATION PROCESSING PROGRAM, INFORMATION PROVIDING SERVER, BROADCASTING RECEPTION APPARATUS, AND INFORMATION PROVIDING SYSTEM - A handheld terminal includes a device communication unit which communicates with at least one or more broadcasting reception apparatus receiving contents and content information about the contents from a content provider and receives the content information from the broadcasting reception apparatus, a content display unit which displays the content information received from the broadcasting reception apparatus, a server communication unit which communicates with an information providing server which manages related information relating to the contents and receives the related information relating to the content information received from the broadcasting reception apparatus from the information providing server, and a related information display unit which displays the related information received from the information providing server.2014-02-06
20140040958PHONE BASED TELEVISION REMOTE CONTROL - A phone that interacts with a television system. At least one module may be adapted to receive a user input identifying a video selection. At least one module may also be adapted to display video information corresponding to the video selection. At least one module may further be adapted to transmit a control signal adapted to cause the display of video information corresponding to the video selection on the television system. The phone may, for example, be adapted to receive television system setting information and provide for user control of various television system settings. Also for example, the phone may be adapted to receive media guide information, present such information to a user, provide for user selection of a media element, and transmit a control signal adapted to cause delivery of the selected media element from a multimedia source to the television system.2014-02-06
20140040959DEVICE ORIENTATION CAPABILITY EXCHANGE SIGNALING AND SERVER ADAPTATION OF MULTIMEDIA CONTENT IN RESPONSE TO DEVICE ORIENTATION - Capability exchange signaling techniques provide orientation sensor information from UEs to network servers. The orientation sensor information describes a device's support for orientation sensor capabilities, or a current orientation state of the device. Based on such information, a multimedia server provides different encoded versions of multimedia content for different device orientation modes supported by the device. The server may also adapt, dynamically and in real-time, media capture or transcode parameters for creating content tailored (i.e., optimized) for the device's current orientation mode, or for its various intermediate orientation states and spatial positions.2014-02-06
20140040960ROAMING MEDIA SYSTEM AND METHOD - A portable media system comprising at least one media receiver having at least one video or audio output, wherein the at least one media receiver is operative to communicate with at least one media service provider while roaming; and at least one unique identifier embedded on the at least one media receiver.2014-02-06
20140040961SATELLITE BROADCAST RECEIVING AND DISTRIBUTION SYSTEM - A satellite system for transmission of signals of two different frequencies and polarizations simultaneously, and will accommodate two different polarity commands from different sources at the same time. The satellite system includes a satellite antenna that receives signals. A head-in frequency processor enables the different frequencies and polarizations to be transmitted simultaneously via a single coaxial cable. This single coaxial cable is coupled to a head-out receiver processor which is connected to a receiver. This configuration provides for the system that will permit for satellite broadcasting in locations that are not in the line-of-sight path to the satellites such as high-rises, hospitals, condominiums, schools, and the like.2014-02-06
20140040962AUDIO WIRELESS TRANSMISSION SYSTEM AND WIRELESS TRANSMISSION METHOD - Disclosed herein are an audio wireless transmission system including: a video device broadcasting and transmitting audio signal through an industrial scientific medical (ISM) band frequency; and a wireless terminal sensing the ISM band frequency transmitted from the video device and demodulating the audio signal so as to listen to the audio signal, and an audio wireless transmission method using the same, in order for each individual to receive audio signal of a video device in a public place through a wireless terminal possessed by each individual and listen to the audio signal.2014-02-06
20140040963APPARATUS AND METHOD FOR PROVIDING N-SCREEN SERVICE IN BROADCAST SYSTEM - A method for supplying an N-screen service by a main N-screen device in a broadcast system is provided. The method includes receiving an Application Information Table (AIT) including a screen_type indicating a type of N-screen device in which a broadcast service application will be run from a broadcast service provider, and one of running the broadcast service application based on the screen_type, performing an operation related to running the broadcast service application by considering a connection relationship between the main N-screen device and a sub N-screen device based on the screen_type, and discarding the AIT based on the screen_type.2014-02-06
20140040964Device Memory Allocation for Video Reproduction - A computer-implemented method includes determining a transfer rate of video content as the video content is received by a handheld electronic device. The method also includes allocating a portion of a memory of the handheld device for storing the video content for presentation preparation. The size of the memory portion is based upon the transfer rate of the video content and the difference between the time to transfer the video content and the time to present the video content.2014-02-06
20140040965RECEIVING DEVICE, RECEIVING METHOD, TRANSMITTING DEVICE, AND TRANSMITTING METHOD - Disclosed herein is a receiving device including: a receiver that receives AV content; a trigger information acquirer that acquires trigger information adapted to identify control information to control operation of an application program run in conjunction with the AV content; a table acquirer that acquires a table in which the control information identified by the trigger information is stored in response to first version information that is included in the trigger information and indicates a version of the table; and a control section that controls the operation of the application program in response to the control information that is identified by the trigger information and is stored in the table.2014-02-06
20140040966Multi-Channel Multi-Stream Video Transmission System - In one aspect the present invention provides a mechanism to carry analog video, digital video and other types of data over a single cable simultaneously between the camera modem and the monitor modem. The analog video has low latency and can be used as real time monitoring, while the digital video is usually compressed high definition video and carried in IP packets. In the camera modem, the analog video is digitized and decoded into digital video, which is further compressed by a near-zero latency video encoder. All types of data, including the compressed analog video and digital video, are multiplexed together to form a single digital stream and transmitted over the cable. In the monitor modem at the other end of the cable, the near-zero latency video stream originated from analog video is de-multiplexed from the single digital downstream, decompressed and finally the corresponding analog video is reconstructed.2014-02-06
20140040967Broadcasting Links to Enhanced Content - A computer-implemented method includes receiving, from a secondary computing device, a request for enhanced content for a media program, the request comprising information indicative of a communication channel through which the media program is being displayed on a primary computing device; receiving broadcast information indicative of enhanced content for a plurality of communication channels; extracting, from the broadcast information indicative of enhanced content for the plurality of communication channels, broadcast information indicative of enhanced content for the communication channel through which the media program is being displayed on the primary computing device; obtaining, based on the extracted broadcast information, a link to enhanced content for the media program; and sending, to the secondary computing device, the link to enhanced content for the media program.2014-02-06
20140040968RECEPTION APPARATUS, RECEPTION METHOD, TRANSMISSION APPARATUS, AND TRANSMISSION METHOD - Enable appropriate caching of application programs executed in coordination with AV content. The cache memory temporarily stores a coordinated application that is executed in coordination with received AV content. When a plurality of coordinated applications are stored in the cache memory, a control block controls the cache memory according to the priority of the coordinated applications which corresponds to a predetermined frequency specified for each of them in advance. The present technology is applicable to, for example, television receivers that receive digital television broadcast signals.2014-02-06
20140040969RESOURCE SHARING SYSTEM OF SET-TOP BOXES - The present invention is directed to a resource sharing system of set-top boxes. The set-top boxes are arranged in a network. The resources of each set-top box in the network are potentially available to another set-top box in the network that has run out of resources. When a user needs a tuner resource, the set-top box determines if it has a local tuner available. If not, the set-top box attempts to use the tuner of another set-top box in the network. In one embodiment all of the tuners in the network are pooled together and used as a global resource of tuners for all of the set-tops. Alternatively, if a set-top box runs out of resource space on a storage device, it attempts to use the storage device on another set-top box before deleting shows locally to make room for the new show.2014-02-06
20140040970METHODS USING BASE CONTENT AND ADDITIVE CONTENT AND RELATED CLIENT DEVICES AND NETWORK SERVER DEVICES - Methods of operating a network server device are provided. The methods may include establishing a session with a client device. The methods may also include transmitting a first base segment providing first base content for a first time segment to the client device. The methods may additionally include transmitting a second base segment providing second base content for a second time segment to the client device. The methods may further include transmitting an additive segment including additive content for the second time segment to the client device. Also, the additive content may be synchronized with the second base content. Related methods of operating client devices are also described, as are related network server devices and related client devices.2014-02-06
20140040971METHOD AND APPARATUS FOR MANIPULATING CONTENT CHANNELS - An apparatus and method for creating channels dedicated to a particular type of content. The method includes acquiring seed content and using the seed content in the creation or updating of a content list. Additional content for the channel is acquired based on the common features of the content list.2014-02-06
20140040972FAIL-SAFE SWITCH FOR MEDIA INSERTION SERVER IN A BROADCAST STREAM - A fail-safe mechanical switch is provided in a television broadcast environment which bypasses an advertisement insertion server in the event that a failure in the ad insertion server is detected. The broadcast stream from a satellite receiver where the stream originates thus continues uninterrupted to a remultiplexer for further distribution of the broadcast stream. The fail-safe switch cooperates with a processor which is capable of detecting a variety of failure events in the ad insertion server.2014-02-06
20140040973METHOD FOR CONTROLLING INITIAL ACCESS RIGHTS TO OPEN MOBILE ALLIANCE DEVICE MANAGEMENT SERVERS - A client device and a server device communicate using an Open Mobile Alliance (OMA)-Device Management (DM) protocol. The client device is configured to grant the desired access rights to a newly bootstrapped DM server, upon successful completion of a bootstrap procedure, by using nodes in the Bootstrap Config Management Object (MO) to specify the access rights for different portions of the Management Tree.2014-02-06
20140040974SYNCHRONOUS INTERFACE TO ASYNCHRONOUS PROCESSES - Methods, apparatus, and computer program products are disclosed for facilitating access to one or more services in a network environment. At a host, a request is received from a client machine in communication with the host over a network. An asynchronous service description file indicates one or more asynchronous communication techniques configured to be performed to access or communicate with a service over the network. The asynchronous service description file is a conversion of a synchronous service description file indicating one or more synchronous communication techniques for accessing or communicating with a synchronous service. The asynchronous service description file is provided to the client machine.2014-02-06
20140040975Virtualized Policy & Charging System - A network system for providing one or more services to one or more end-user devices communicatively coupled to the network system over a wireless access network, the network system comprising: a policy enforcement function, a first policy element, a second policy element, and a network element, wherein the network element is communicatively coupled to the policy enforcement function, the first policy element, and the second policy element, and wherein the network element is configured to communicate first policy information between the policy enforcement function and the first policy element, and communicate second policy information between the first policy enforcement function and the second policy element.2014-02-06
20140040976SECURITY-MINDED CLONING METHOD, SYSTEM AND PROGRAM - In order to solve this problem, the first aspect of the present invention is a system for duplicating (cloning) a physical environment in a virtual environment using CMDB, the system comprising: means for setting a level of confidentiality for attributes of configuration items (CI) of CMDB managing the source hardware information and software information, and means for sending CMDB information including CI having the level of confidentiality set to a virtual environment constructing means connected via a network; the virtual environment constructing means having a means for constructing the source environment in a virtual environment based on sent CMDB information; and the sending means having a means for changing the level of confidentiality of CI attributes having the level of confidentiality set in accordance with a default confidentiality policy.2014-02-06
20140040977Policy-Based Application Management - Improved techniques for managing enterprise applications on mobile devices are described herein. Each enterprise mobile application running on the mobile device has an associated policy through which it interacts with its environment. The policy selectively blocks or allows activities involving the enterprise application in accordance with rules established by the enterprise. Together, the enterprise applications running on the mobile device form a set of managed applications. Managed applications are typically allowed to exchange data with other managed applications, but are blocked from exchanging data with other applications, such as the user's own personal applications. Policies may be defined to manage data sharing, mobile resource management, application specific information, networking and data access solutions, device cloud and transfer, dual mode application software, enterprise app store access, and virtualized application and resources, among other things.2014-02-06
20140040978Policy-Based Application Management - Improved techniques for managing enterprise applications on mobile devices are described herein. Each enterprise mobile application running on the mobile device has an associated policy through which it interacts with its environment. The policy selectively blocks or allows activities involving the enterprise application in accordance with rules established by the enterprise. Together, the enterprise applications running on the mobile device form a set of managed applications. Managed applications are typically allowed to exchange data with other managed applications, but are blocked from exchanging data with other applications, such as the user's own personal applications. Policies may be defined to manage data sharing, mobile resource management, application specific information, networking and data access solutions, device cloud and transfer, dual mode application software, enterprise app store access, and virtualized application and resources, among other things.2014-02-06
20140040979Policy-Based Application Management - Improved techniques for managing enterprise applications on mobile devices are described herein. Each enterprise mobile application running on the mobile device has an associated policy through which it interacts with its environment. The policy selectively blocks or allows activities involving the enterprise application in accordance with rules established by the enterprise. Together, the enterprise applications running on the mobile device form a set of managed applications. Managed applications are typically allowed to exchange data with other managed applications, but are blocked from exchanging data with other applications, such as the user's own personal applications. Policies may be defined to manage data sharing, mobile resource management, application specific information, networking and data access solutions, device cloud and transfer, dual mode application software, enterprise app store access, and virtualized application and resources, among other things.2014-02-06
20140040980SYNDICATION INCLUDING MELODY RECOGNITION AND OPT OUT - A syndication system facilitates rights management services between media content owners and media hosting services that elect to participate in the syndication system and mutually elect to participate with each other. The syndication system utilizes a content recognition system to identify hosted media content and ownership rights associated with the hosted content. By applying melody recognition, the content recognition system can identify compositions embodied in hosted media content even when these compositions do not precisely match any known sound recording. Thus, the content recognition system is beneficially able to detect, for example, recorded cover performances and recorded live performances embodied in hosted media content. Once identified, ownership information is determined and the syndication system can facilitate rights management policies associated with the content such as monetizing or blocking the protected content.2014-02-06
20140040981SYSTEMS AND METHODS FOR APPLYING A SECURITY POLICY TO A DEVICE BASED ON LOCATION - A security policy may be applied to a mobile communications device based on a location of the mobile communications device. For example, a first location of the mobile communications device may be obtained and a first security policy may be applied to the mobile communications device based on the first location. Furthermore, a change in the location of the mobile communications device may be detected. For example, the location of the mobile communications device may change from the first location to a second location. In response to the mobile communications device now being located at the second location, a second security policy may be applied to the mobile communications device. Thus, different security policies may be applied to a mobile communications device as the current location of the mobile communications device changes.2014-02-06
20140040982Functionality Watermarking and Management - A method, system and non-transitory computer-readable medium product are provided for functionality watermarking and management. In the context of a method, a method is provided that includes identifying a request to establish an association between a watermark template and a function of at least one user device and determining whether the request to establish the association between the watermark template and the function of the at least one user device is authorized. The method further includes authorizing the request to establish the association between the watermark template and the function of the at least one user device in response to a determination that the request to establish the association between the watermark template and the function of the at least one user device is authorized.2014-02-06
20140040983TERMINAL AUTHENTICATION METHOD AND TERMINAL - Disclosed are a terminal authentication method and a terminal. The authentication method comprises: setting on the terminal a detection device; setting on a stylus a label device capable of being detected by the detection device; the detection device detecting for label information preconfigured in the label device, and authenticating the stylus according to a detection result. Employment of the technical solution of the disclosure solves the technical problems in the related art of the incapability of the terminal to authenticate the stylus.2014-02-06
20140040984DYNAMIC TRUST SESSION - A secure session of communication between two entities in a network is disclosed. Using client-server terminology, a client sends a connection-request to a server that authenticates the connection-request and transmits a session-request to the client in response. The client reverse-authenticates the session-request and then passively waits to receive a tunnel-request transmitted by the server. The tunnel-request sets up one or more overlapping tunnels between the client and the server to support the desired communications. Each of the tunnels exists only for a specified time and is replaced by another tunnel that is set up after a selected time delay after the start of a previous tunnel.2014-02-06
20140040985METHOD AND APPARATUS FOR WIRELESS SECURITY ENHANCEMENT USING MULTIPLE ATTRIBUTES MONITORING, CONTINUOUS AND INTERLEAVED AUTHENTICATION, AND SYSTEM ADAPTATION - The present invention is an adaptive secure wireless communications system and method. Generally, the present invention may be operable to address challenges and threats to a secure communication session. The secure wireless communication system of the present invention may operate one or more of the following: multiple physical-layer attributes monitoring; multiple parameter confidence testing related to transceiver (Tx-Rx) specific environment and transmitter receiver hardware characteristics; continuous and interleaved authentication; and security enhancement using dynamic adaptation of the transmission system parameters based concurrent and/or conjugated transmission of data-carrying signal and security control information. The real-time physical-layer related monitoring and interaction between transmitter and receiver, using Tx-Rx related physical environment, of the present invention may effectively reduce many wireless security threats including interception and spoofing.2014-02-06
20140040986Protocol to Prevent Replay Attacks on Secured Wireless Transactions - A method and system for preventing replay attacks on secure data transactions. A replay attack occurs when an unauthorized user intercepts a secure data transaction between a device and a central system and uses the intercepted data to gain access to the central system. One method for preventing such replay attacks is the use of a unique session identification number that is generated for each secure data transaction request. A replay attack is defeated using intercepted data since the unique session identification number is valid only for a completed session and may not be reused. When a device is connected to a server using either wireless or land-line connection, the device requests a session identification number from the server. The server generates and signals to the device a unique session identification number which the device then transmits back to the server along with a request for a secure data transaction. Upon verification of the correct unique session identification number, the server implements the requested data transaction. Termination of the requested transaction by the device signals the termination of the current secure data transaction. A new unique session identification number must be requested and issued in like fashion for any additional secure data transactions. The method and system offer the advantage of use with multiple available servers, in contrast to present methods which require that a device to communicate with a given server. Further, the present method offers reduced operation time since there is a single coupling/uncoupling for each data transaction.2014-02-06
20140040987Network Application Security Utilizing Network-Provided Identities - A network security system that correlates security-related events to individual users, as identified by a user identifier and an identity provider. The user identifier may be associated in one or more implicit or explicit social networks.2014-02-06
20140040988Method and System for Data Communication to an Identification Module in a Mobile Radio Terminal - The technique described herein relates to a method for transmitting data to an identification module in a mobile terminal device that can be connected to a mobile telecommunications network, making use of an OTA server that has a database with security information for a plurality of identification modules and that also has a first interface for transmitting secured information, especially OTA messages, to the identification modules. The data is secured in the OTA server by security information stored in the database, and the secured data is transferred via a second interface of the OTA server to a data center that is connected to the OTA server. The data is transmitted to the identification module by the data center. Moreover, the technique described herein also relates to a system for carrying out the method.2014-02-06
20140040989MULTI-DEVICE BEHAVIORAL FINGERPRINTING - Disclosed herein are example embodiments for multi-device behavioral fingerprinting by a user device or a server device. For certain example embodiments, at least one device may obtain at least one behavioral fingerprint that is associated with at least one authorized user, with the at least one behavioral fingerprint including one or more indicators of utilization of two or more user devices by the at least one authorized user. The at least one device may perform at least one authentication-related operation based at least partially on the at least one behavioral fingerprint.2014-02-06
20140040990VERIFICATION OF COMPUTER SYSTEM PRIOR TO AND SUBSEQUENT TO COMPUTER PROGRAM INSTALLATION - Embodiments of the present invention provide a method, system, and computer program product apparatus for validating a computer environment. In an embodiment of the invention, a signature file denoting the infrastructure requirements of a computing environment to support a computer program to be installed in the computer environment of multiple different computing devices disposed in multiple different network domains can be loaded. Administrative network privileges to access the multiple different network domains in the computing environment can be acquired. Further, at least one deficiency in the infrastructure requirements corresponding to one of the network domains can be identified and the identified deficiency can be remediated. The identified deficiency can be reported.2014-02-06
20140040991METHOD FOR COMMUNICATING BETWEEN A SERVER AND A CLIENT AND CORRESPONDING CLIENT, SERVER AND SYSTEM - The invention relates to a method for communicating between a server and a client. The server and the client access at least one session extension key and/or a key associated with the session extension key, as an associated key. The server authorizes to extend an open communication session with the client until an expiration time only if the client sends to the server authentication data allowing the server to authenticate at least the client on a basis of the session extension key. The expiration time is a time at which the communication session is open completed by a predetermined extension time period. The invention also relates to corresponding client, server and system.2014-02-06
20140040992VEHICLE NETWORK SYSTEM - In a vehicle network system, a plurality of ECUs are network-connected. The plurality of ECUs include a first ECU that has set therein a secret key from among the secret key and a public key that form a pair and are set on the basis of initialization processing performed when the vehicle network system is created, and a second ECU that has set therein the public key. The second ECU adds, to a transmission signal, an authentication keyword created from the public key and information capable of specifying the second ECU and transmits the transmission signal with the authentication keyword added thereto to the network. The first ECU acquires the authentication keyword and estimates the reliability of the communication signal on the basis of the acquired authentication keyword and the secret key.2014-02-06
20140040993METHOD FOR PROVIDING AUTHORIZED ACCESS TO A SERVICE APPLICATION IN ORDER TO USE A PROTECTED RESOURCE OF AN END USER - The protected resource, typically an API, is exposed by endpoints of a plurality of administrative domains. The endpoints are previously unknown by said service application and the method further comprises: 2014-02-06
20140040994SERVICE OPENING METHOD AND SYSTEM, AND SERVICE OPENING SERVER - Embodiments of the present invention relate to a service opening method and system, and a service opening server. The method includes: receiving a service request from a third-party application, where the service request carries type and parameter information of the requested service; querying, according to the type information of the service, a service directory to obtain an access address and authentication type information of the requested service; when it is determined that the invoking of the service needs an authorization of an end user, obtaining an authorization notification message of the end user according to the type information of the service and the parameter information of the service; and forwarding, the service request to a capability server, and forwarding, to the third-party application, a service response message returned by the capability server. The control of the end user on the authorized service is ensured to the greatest extent.2014-02-06
20140040995Secure Administration of Virtual Machines - Methods and systems for performing secure administration of virtual domain resource allocation are provided herein. A cloud service provider (CSP) may provide instances of virtual machines to one or more contracting user entities. The cloud service provider may store an authorization database identifying one or more resources (e.g., storage, CPU, etc.) that each of the different contracting user entities is authorized to use on a virtual machine server device. The CSP may subsequently receive a request from an unverified entity to instantiate a virtual machine with access to one or more resources. The request may include security information. The CSP validates the request by verifying the unverified entity using the first security information (e.g., checking a PKI certificate, requiring a login/password, etc.) and, when the request is validated, provides access to the verified entity to a subset of the requested one or more resources based on the authorization database.2014-02-06
20140040996RELAY DEVICE - A connector 2014-02-06
20140040997SELF-DELETING VIRTUAL MACHINES - Securing a virtual machine to be executed on a host machine is accomplished by authenticating, by the virtual machine during an initial boot routine, an identity of the host machine. If the identity does not match a predetermined value, then authenticating the identity of the host machine fails and data associated with the virtual machine is deleted.2014-02-06
20140040998PROVIDING AN OPERATIONAL DASHBOARD - Systems, methods, and devices for providing an operational dashboard are described herein. One method includes receiving operational data associated with a system, receiving credentials associated with a user of a user device including a number of display elements configurable by the user, and determining a particular portion of the operational data to provide to the user via the display elements of the user device based, at least in part, on the credentials.2014-02-06
20140040999HYBRID MULTI-TENANCY CLOUD PLATFORM - Technologies are presented for a hybrid cloud-based service model combining separate database/separate schema, shared database/separate schema, and shared database/shared schema architectures suitable for serving multiple tenants while addressing varying security needs. Roles and security level needs of different tenants may be determined based on tenant declaration or inference from tenant attributes. Tenants may then be assigned to suitable clouds or sub-clouds based on their security level needs. In some examples, a claims-based access control authorization model such as federation may be employed to support interactions between the three different types of clouds or sub-clouds under the umbrella of a single cloud-based service provider while maintaining application and data security.2014-02-06
20140041000ENHANCED 2CHK AUTHENTICATION SECURITY WITH INFORMATION CONVERSION BASED ON USER-SELECTED PERSONA - A server is operated to securely convey information to a user via a network by receiving, from the user, a user selected presentation form representing one of a user selected specific voice and a user selected specific background image. Information for presentation to the user is received from another user and incorporated into the user selected presentation form. The information incorporated in the user selected presentation form is transmitted to the user via the network for presentation to the user.2014-02-06
20140041001ELECTRONIC DEVICE AND METHOD FOR AUTOMATICALLY LOGGING-IN - A method for automatically logging-in of an electronic device without repeatedly inputting user information is provided. The method includes receiving log-in information transmitted by a sensor placed within a predetermined range; verifying whether the log-in information matches user information stored in a storage unit according to a first table recording a relationship of the log-in information and the user information stored in the storage unit; and logging-in of the electronic device according to the user information corresponding to the log-in information when the log-in information matches the user information stored in the storage unit. The electronic device is also provided.2014-02-06
20140041002Secure Access Method, Apparatus And System For Cloud Computing - Secure access method, apparatus and system for cloud computing are provided. The method includes: acquiring authentication information input from a client; determining a client identification of the client which is not arbitrarily changeable; if it is determined that the ordinary password corresponding to the user name is correct, determining by a distribution authentication server whether a correspondence between the client identification and the address of the cloud machine exists in a database of the distribution authentication server and whether the dynamic password is correct, and notifying the client of a successful login if the correspondence exists in the database and the dynamic password is correct, and notifying the client of an unsuccessful login if it is determined that the ordinary password corresponding to the user name is incorrect.2014-02-06
20140041003METHOD OF AND SYSTEM FOR GAINING SECURE ACCESS TO A SERVICE - In order to gain secure access to a service in a defined trustworthy environment holding at least one network component a password is saved in the network component. Then a user device is introduced into the trustworthy environment, and it contacts the network component device and retrieves the password saved in the network component. The device then communicates the password to the service, which in turn is enabled for the user device if a password stored in the service matches the password that has been communicated by the user device to the service.2014-02-06
20140041004Managing Remote Telephony Device Configuration - The remote configuration of a telephony device is managed by transmitting configuration data to the device. The data is transmitted via a data communication network. One of more service credentials are received. The credentials are authenticated. A configuration time period is activated in response to authentication of the credentials. A request for configuration data is received via the network, which includes identification data indicative that the request is from a telephony device associated with the credentials. It is determined how to proceed with processing of the request dependent on whether the request is received during the time period. If so, configuration data is transmitted via the network in response to the request. If the request is received after the time period, transmission of configuration data via the network in response to the request is inhibited.2014-02-06
20140041005METHOD AND SYSTEM OF LOGIN AUTHENTICATION - A method and system for login authentication is disclosed. The method comprises the steps of: sending, by a first client, a first login request to a login server and receiving a mapping relationship between original characters and post-mapping characters returned by the login server according to the first login request; and sending, by a second client, a second login request to the login server according to the mapping relationship, with the second login request including post-mapping information corresponding to user information determined according to the mapping relationship. The solution in the present invention is to realize joint login by two clients, such that even if one of the clients is infected with a computer virus, no particular user information can be obtained through the infected client. Thus, the security of login authentication and the security of user information can be improved.2014-02-06
20140041006SECURE MESSAGING CENTER - A secure messaging system is disclosed wherein messages are transmitted to a user based on a feature unique to the user, such as an account number. The user authenticates himself, then messages associated with the user can be displayed.2014-02-06
20140041007WEB BASED EXTRANET ARCHITECTURE PROVIDING APPLICATIONS TO NON-RELATED SUBSCRIBERS - An extranet includes a network which couples a plurality of non-related participants and a server coupled to the network. The server stores a plurality of applications including workgroup applicants, transaction applications, security applications and transport circuits and equipment. The server is programmed to load particular ones of the plurality of applications onto the network for use by the plurality of participants in response to a request by one of the participants for a particular application.2014-02-06
20140041008ESTABLISHING HISTORICAL USAGE-BASED HARDWARE TRUST - Establishing trust according to historical usage of selected hardware involves providing a usage history for a selected client device; and extending trust to a selected user based on the user's usage history of the client device. The usage history is embodied as signed statements issued by a third party or an authentication server. The issued statement is stored either on the client device, or on an authentication server. The usage history is updated every time a user is authenticated from the selected client device. By combining the usage history with conventional user authentication, an enhanced trust level is readily established. The enhanced, hardware-based trust provided by logging on from a trusted client may eliminate the necessity of requiring secondary authentication for e-commerce and financial services transactions, and may also be used to facilitate password recovery and conflict resolution in the case of stolen passwords.2014-02-06
Website © 2025 Advameg, Inc.