11th week of 2016 patent applcation highlights part 69 |
Patent application number | Title | Published |
20160080387 | Database Access Using A Common Web Interface - Methods and systems for accessing databases using a common web interface are provided. A method for transmitting data retrieved from an endpoint device to a client device using a common web interface includes providing the common web interface to the client device. The common web interface allows access to a plurality of endpoint devices, each endpoint device comprising a unique endpoint address. The method further includes receiving, by a computer, identification data from the client device, retrieving an endpoint address for one of the plurality of endpoint devices based on the identification data, connecting to the endpoint device corresponding to the endpoint address, retrieving data from the endpoint device, and transmitting the retrieved data to the client device. | 2016-03-17 |
20160080388 | MANAGING SECURITY RESTRICTIONS ON A RESOURCE IN A DEFINED ENVIRONMENT - Approaches described herein manage security restrictions on a resource in a defined environment to provide authorization and access. Specifically, a security system maintains a security restriction on the resource (e.g., an information technology (IT) account of a user, or an apparatus) in a defined environment. The presence of a plurality of users is continuously monitored throughout the defined environment and, based on a detection of a pre-specified set of users from the plurality of users in the defined environment, the security restriction is managed (e.g., removed or maintained). In one embodiment, the system removes the security restriction from the resource to allow at least one of: access to the IT account of the user, and operation of the apparatus. The security restriction on the resource may be reinstated in the case that the pre-specified set of users from the plurality of users is no longer present in the defined environment. | 2016-03-17 |
20160080389 | Using Connections Between Users In A Social Networking System To Regulate Operation Of A Machine Associated With A Social Networking System User - A social networking system includes information identifying a machine (e.g., a robot, a drone, a computer, a thermostat, etc.) and a connection between the machine and an owner of the machine, which is a user of the social networking system capable of authorizing an action by the machine. The owner of the machine associates permissions associated with various actions by the machine, where a permission associated with an action identifies one or more criteria for performing the action. Permissions may specify types of connections between social networking system users and the owner of the machine via the social networking system to allow social networking system users with specific types of connections to the owner of the machine to perform certain actions using the machine. | 2016-03-17 |
20160080390 | METHOD AND APPARATUS FOR NETWORK CONTROLLED TICKET ACCESS - The system provides a method and apparatus for providing controlled access to events, premises, transportation, and the like. In one embodiment, the system provides a ticket that is tied to a user and/or a device. The ticket in one embodiment comprises a dynamic link whose privileges and permissions can be controlled by a system controller so that use, re-use, and re-sale of the ticket can be controlled by the issuer and not by a purchaser or user. The system in one embodiment uses a reader/scanner associated with a controlled entrance that can receive tickets via scanning or some other form of electronic communication. In one embodiment, the system uses radio signals, such as Wi-Fi, Bluetooth, NFC (Near Field Communication) from a mobile device to determine if access should be granted. | 2016-03-17 |
20160080391 | SYSTEM FOR MONITORING ACCESS TO NETWORK WITHIN SECURED SITE - A controller is provided which monitors/manages information terminals' access to a network within a secured site. A controller of the present invention includes: a storage device for storing security information about at least one or more information terminals received from the information terminals before accessing a network; and a processor for determining whether to permit access of an information terminal to the network based on the security information read from the storage device and access permission criteria on the security information, and generating a control signal for permitting or blocking the access of the information terminal to the network according to the determination result. | 2016-03-17 |
20160080392 | IMPLEMENTING SECURITY IN A SOCIAL APPLICATION - Implementing security in social applications includes inferring a closeness level of a connection to a user's profile of a social application based on a closeness policy and implementing a security level individualized to the connection based on the closeness level. | 2016-03-17 |
20160080393 | ALLOWING VARIED DEVICE ACCESS BASED ON DIFFERENT LEVELS OF UNLOCKING MECHANISMS - Systems and methods may provide for receiving runtime input from one or more unlock interfaces of a device and selecting a level of access with regard to the device from a plurality of levels of access based on the runtime input. The selected level of access may have an associated security policy, wherein an authentication of the runtime input may be conducted based on the associated security policy. In one example, one or more cryptographic keys are used to place the device in an unlocked state with regard to the selected level of access if the authentication is successful. If the authentication is unsuccessful, on the other hand, the device may be maintained in a locked state with regard to the selected level of access. | 2016-03-17 |
20160080394 | METHOD, APPARATUS AND COMPUTER DEVICE FOR SCANNING INFORMATION TO BE SCANNED - The present invention provides a method for scanning information to be scanned in a computer device, the information to be scanned needing multiple scans, and the method comprising the steps of: a. determining a delay duration from the end of a scan for the information to be scanned to the start of a next scan according to current performance information about the CPU of the computer device; and b. scanning the information to be scanned according to the delay duration. According to the solution of the present invention, by determining a delay duration from the end of a scan for the information to be scanned to the start of a next scan according to current performance information about the CPU of a computer device, and scanning according to the delay duration, problems such as slow running due to high occupancy ratio of CPU resources during scanning can be avoided. | 2016-03-17 |
20160080395 | Provisional Bot Activity Recognition - In one implementation, a network device is configured to monitor communications associated with an endpoint and identify domain name service messages in the communications. Subsequently, the network device receives a hypertext transfer protocol (HTTP) request and determines whether a destination internet protocol (IP) address of the HTTP request is present in or absent from the domain name service messages. When the IP address is absent from the domain name service messages, the HTTP request is modified to trigger increased security. | 2016-03-17 |
20160080396 | METHOD AND SYSTEM FOR DATA SECURITY - A method for data security is provided. The method may include obtaining a first object which is set as a sensitive object. The method may also include obtaining a second object, whereby there is a first relationship between the second object and the first object. The method may further include setting the second object as a sensitive object, in response to determining that the first relationship represents that there is strict correlation between the second object and the first object. | 2016-03-17 |
20160080397 | Method and System for Forensic Data Tracking - The present invention relates to a method and system for tracking the movement of data elements as they are shared and moved between authorized and unauthorized devices and among authorized and unauthorized users. | 2016-03-17 |
20160080398 | SYSTEM AND METHOD FOR DETECTION OF TARGETED ATTACKS - Methods, systems, and computer programs for detecting targeted attacks on compromised computer. An example method includes receiving from a plurality of computer systems data about the network resource, wherein each of the plurality of computer systems has a set of parameters and associated parameter values; detecting presence of a suspect indicator in the respective data received from each of a first group of the plurality of computer systems; detecting absence of the suspect indicator in the respective data received from each of a second group of the plurality of computer systems; determining at least one suspect parameter and at least one suspect parameter value; and estimating a probability of the targeted attack from the network resource based on the suspect indicator, the at least one suspect parameter, and the at least one parameter value. | 2016-03-17 |
20160080399 | THREAT DETECTION USING A TIME-BASED CACHE OF REPUTATION INFORMATION ON AN ENTERPRISE ENDPOINT - Threat detection instrumentation is simplified by providing and updating labels for computing objects in a context-sensitive manner. This may include simple labeling schemes to distinguish between objects, e.g., trusted/untrusted processes or corporate/private data. This may also include more granular labeling schemes such as a three-tiered scheme that identifies a category (e.g., financial, e-mail, game), static threat detection attributes (e.g., signatures, hashes, API calls), and explicit identification (e.g., what a file or process calls itself). By tracking such data for various computing objects and correlating these labels to malware occurrences, rules can be written for distribution to endpoints to facilitate threat detection based on, e.g., interactions of labeled objects, changes to object labels, and so forth. In this manner, threat detection based on complex interactions of computing objects can be characterized in a platform independent manner and pre-processed on endpoints without requiring significant communications overhead with a remote threat management facility. | 2016-03-17 |
20160080400 | FILE REPUTATION EVALUATION - One or more techniques and/or systems are provided for file acquisition for reputation evaluation. A reputation service may be configured to evaluate files and provide reputations of such files to clients (e.g., an indication as to whether a file is safe or malicious). If the reputation service receives a reputation request for a file that is unknown to the reputation service (e.g., a file not yet fully acquired by the reputation service), then the reputation service may identify a set of chunks into which the file can be partitioned. The reputation service may obtain chunks from various clients, such as a first chunk from a first client and a second chunk from a second client. Such chunks may be evaluated to assign a reputation to the file. In this way, the reputation service may retrieve portions of a file in a distributed manner for reputation evaluation. | 2016-03-17 |
20160080401 | METHOD AND SYSTEM FOR DETECTING UNAUTHORIZED ACCESS ATTACK - A method is provided for detecting unauthorized access attack. The detecting method includes obtaining at least one HTTP request and at least one URL address of the HTTP request by parsing the HTTP request; determining whether there exist one or more protection rules corresponding to the URL address; and, when it is determined that the protection rules corresponding to the URL address exit, obtaining access data of the HTTP request. The detecting method also includes determining whether the access data satisfies the protection rules; and, when it is determined that the access data does not satisfy the protection rules, determining the corresponding HTTP request of the URL address to be an unauthorized access attack. | 2016-03-17 |
20160080402 | DYNAMIC CONFIGURATION OF SETTINGS IN RESPONSE TO DDOS ATTACK - A system can monitor the server for indications of an attack and adjusts server settings accordingly. In response, the system can increase server tolerance in a systematic way to deal with DDoS by adjusting server settings appropriately. Conversely, when the server is not under attack, the settings can be adjusted to those for standard operations (e.g., adjusted downward), as they are more optimal for normal, non-attack operations. | 2016-03-17 |
20160080403 | SYSTEM AND METHOD FOR MONITORING DATA AND PROVIDING ALERTS - A method for monitoring data and providing alerts is disclosed. In particular, the method may including monitoring and capturing data associated with a user of a device. Additionally, the method may include determining if a portion of the captured data matches a condition for triggering an alert. If the portion of the data is determined to match the condition for triggering the alert, the method may include storing the alert data and transmitting a notification to a client service to indicate the triggering of the alert. The method, by utilizing the client service, may include retrieving the alert data associated with the portion of the data. Furthermore, the method may include transmitting the alert including the alert data to a notification server for processing. The alert data may be configured to not include the portion of the data that is determined to match the condition for triggering the alert. | 2016-03-17 |
20160080404 | DETECTION OF MALICIOUS NETWORK CONNECTIONS - In one embodiment a method, system and apparatus is described for detecting a malicious network connection, the method system and apparatus including determining, for each connection over a network, if each connection is a persistent connection, if, as a result of the determining, a first connection is determined to be a persistent connection, collecting connection statistics for the first connection, creating a feature vector for the first connection based on the collected statistics, performing outlier detection for all of the feature vector for all connections over a network which have been determined to be persistent connections, and reporting detected outliers. Related methods, systems and apparatus are also described. | 2016-03-17 |
20160080405 | Detecting Anomalous Interaction With Online Content - Certain embodiments relate to identifying potentially fraudulent interactions with online content. An analytical application executed on a server or other computing device can identify first and second actives areas of an electronic content item that are distinguishable from one another based on a sensory indicator presented with the electronic content item. One or more actions may be performed in response to receiving inputs to the first active area or the second active area. The analytical application can receive inputs to the electronic content item from an entity. At least a subset of the inputs can include interactions that are received within the second active area rather than the first active area. The analytical application can determine that activity by the entity is anomalous based on the subset of the interactions being within the second active area rather than the first active area. | 2016-03-17 |
20160080406 | DETECTING ANOMALOUS ACTIVITY FROM ACCOUNTS OF AN ONLINE SERVICE - Anomalous activity is detected using event information that is received from accounts from within an online service. Generally, anomalous activity is detected by comparing a baseline profile that includes past event information for accounts of the online service with a recent profile that includes recent event information for the accounts. Anomalous activity is detected when the recent profile shows that one or more events are occurring more frequently as compared to the occurrence of the event the associated baseline profile. The events that are recorded and used in the anomaly detection may include all or a portion of events that are monitored by the online service. One or more reports may also be automatically generated and provided to one or more users to show activity that may be considered anomalous activity. | 2016-03-17 |
20160080407 | MANAGING OPERATIONS IN A CLOUD MANAGEMENT SYSTEM - Embodiments of the present invention provide methods, systems, and computer program products for managing operations in a cloud management system. In one embodiment, after a user submits a request to perform a cloud operation, a contextual security assessment of the requesting user and/or cloud resources on which the requested operation will be performed can be determined. An administrative user can review the contextual security assessments before approving or rejecting the cloud operation, which can help increase safety within the cloud computing environment. | 2016-03-17 |
20160080408 | APPARATUSES, METHODS AND SYSTEMS FOR A CYBER SECURITY ASSESSMENT MECHANISM - The cyber security assessment mechanism system is disclosed, including a first cyber threat intelligence processing component to calculate a cyber threat indicator confidence score associated with at least one of a cyber threat indicator or a network element after the cyber threat indicator is received. The cyber security assessment further includes a cyber security index component to generate a cyber threat index value for the cyber network based on the cyber threat indicator confidence score associated with the network elements after the cyber threat indicator confidence score is associated. The cyber security index component further sends the cyber threat index value for the cyber network, to a second cyber threat intelligence processing component disposed at a remote location from the data center such that the second cyber threat processing component generates a user interface visualization representing the cyber threat index value. | 2016-03-17 |
20160080409 | SECURITY SCANNING SYSTEM AND METHOD - The present disclosure provides a computer-readable medium, method and system for determining security vulnerabilities for a plurality of application programs used to provide television services to a customer device over a communications network. The method includes running a first scanning program against a first application program relating to a control panel for the customer device; running a second scanning program against a second application program that provides Internet content to the customer device; running a third scanning program against a third application program that relates to a component management system of customer premises equipment; and correlating security vulnerabilities identified utilizing the first, second, and third scanning programs. | 2016-03-17 |
20160080410 | SELECTIVE WEBSITE VULNERABILITY AND INFECTION TESTING - In embodiments of the present invention improved capabilities are described for selective website vulnerability and infection testing and intelligently paced rigorous direct website testing. By providing robust website content integrity checking while only lightly loading the website hosting server, visitor bandwidth availability is maintained through selective testing and intelligently paced external website exercising. A modular pod-based computing architecture of interconnected severs configured with a sharded database facilitates selective website testing and intelligent direct website test pacing while providing scalability to support large numbers of website testing subscribers. | 2016-03-17 |
20160080411 | HARDWARE-LOGIC BASED FLOW COLLECTOR FOR DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACK MITIGATION - Methods and systems for an integrated solution to flow collection for determination of rate-based DoS attacks targeting ISP infrastructure are provided. According to one embodiment, a method of mitigating DDoS attacks is provided. Information regarding at least one destination within a network for which a distributed denial of service (DDoS) attack status is to be monitored is received by a DDoS attack detection module coupled with a flow controller via a bus. The DDoS attack status is determined for the at least one destination based on the information regarding the at least one destination. When a DDoS attack is detected the flow controller is notified of the DDoS attack status for the at least one destination by the DDoS attack detection module. Responsive thereto, the flow controller directs a route reflector to divert traffic destined for the at least one destination to a DDoS attack mitigation appliance within the network. | 2016-03-17 |
20160080412 | EVENT DRIVEN ROUTE CONTROL - Embodiments provide system and methods for a DDoS service using a mix of mitigation systems (also called scrubbing centers) and non-mitigation systems. The non-mitigation systems are less expensive and thus can be placed at or near a customer's network resource (e.g., a computer, cluster of computers, or entire network). Under normal conditions, traffic for a customer's resource can go through a mitigation system or a non-mitigation system. When an attack is detected, traffic that would have otherwise gone through a non-mitigation system is re-routed to a mitigation system. Thus, the non-mitigation systems can be used to reduce latency and provide more efficient access to the customer's network resource during normal conditions. Since the non-mitigation servers are not equipped to respond to an attack, the non-mitigation systems are not used during an attack, thereby still providing protection to the customer network resource using the mitigation systems. | 2016-03-17 |
20160080413 | BLOCKING FORGIVENESS FOR DDOS - Techniques are provided for blocking forgiveness in a system that mitigates distributed denial of service (DDoS) attacks on a network. A user's network address can be blocked as a result performing human behavior analysis on network resource request activity from the user's address. The system can block an address temporarily based on their behavior, classifying legitimate human users as a malicious attacker performing a DDoS attack. But subsequent behavioral analysis of network resource requests can identify that the user should not have been blocked. The system can automatically unblock the user's address, and allow further network resource requests. Previously blocked requests can also be unblocked. The number of infractions (e.g., action classified as malicious) can be tracked and compared to a threshold. If the number is less than the threshold, then that address is not blocked, thereby allowing forgiveness of a certain number of infractions. | 2016-03-17 |
20160080414 | System and a Method for Identifying Malware Network Activity Using a Decoy Environment - A system for gathering information about malware and a method of use therefor, the system comprising a working environment including physical working environment servers, physical working environment endpoints, a working environment network, a switch, and a router directing traffic between said working environment network and an external network, a decoy environment including at least one physical machine, a decoy environment server, a decoy environment endpoint, a decoy environment network and a decoy environment router, a file directing mechanism directing at least some files to the decoy environment, and a threat tracking mechanism tracking and observing actions triggered by the files in the decoy environment. | 2016-03-17 |
20160080415 | NETWORK INTRUSION DIVERSION USING A SOFTWARE DEFINED NETWORK - Methods, devices, and systems are described for diverting a computer hacker from a physical or other targeted production computer to a decoy software-based host emulator that emulates the physical computer. The decoy has the exact same IP address as the physical computer. In order to avoid packet collisions, a programmable physical switch and a virtual networking switch are employed, both of which can use software-defined networking (SDN). The virtual switch prevents packets from the decoy from flowing out of its virtual network until commanded. Upon a command, the physical switch redirects specific flows to the virtual switch, and the virtual switch opens specific flows from the decoy. The specific flows are those with packets containing the hacker's computer IP address, production computer IP address, and production computer port. The packets are associated with TCP connections or UDP sessions. The decoy host emulator can be a virtual machine (VM) running alongside many other VMs in a single computer. If the hacker performs a horizontal scan of the network, additional flows are diverted to other decoy host emulators. | 2016-03-17 |
20160080416 | SECURITY FOR GROUP ADDRESSED DATA PACKETS IN WIRELESS NETWORKS - A wireless network includes a border router, multiple router nodes and end devices. All nodes of the wireless network use a same group key for encryption and decryption of payloads of multicast layer-2 packets. A router node of the wireless network receives a group key from its parent node, and forwards the group key to its child nodes. The router node receives a layer-2 multicast packet with a payload specifying a multicast layer-3 address. The router node decrypts the payload using the group key. If at least one child node of the router node belongs to a group corresponding to the multicast layer-3 address, the router node forwards the encrypted payload as a layer-2 multicast packet to corresponding child nodes. Use of a same group key across all nodes of the wireless network reduces storage space in a node for storing group keys, and also simplifies group key handling. | 2016-03-17 |
20160080417 | LABELING COMPUTING OBJECTS FOR IMPROVED THREAT DETECTION - Threat detection instrumentation is simplified by providing and updating labels for computing objects in a context-sensitive manner. This may include simple labeling schemes to distinguish between objects, e.g., trusted/untrusted processes or corporate/private data. This may also include more granular labeling schemes such as a three-tiered scheme that identifies a category (e.g., financial, e-mail, game), static threat detection attributes (e.g., signatures, hashes, API calls), and explicit identification (e.g., what a file or process calls itself). By tracking such data for various computing objects and correlating these labels to malware occurrences, rules can be written for distribution to endpoints to facilitate threat detection based on, e.g., interactions of labeled objects, changes to object labels, and so forth. In this manner, threat detection based on complex interactions of computing objects can be characterized in a platform independent manner and pre-processed on endpoints without requiring significant communications overhead with a remote threat management facility. | 2016-03-17 |
20160080418 | NORMALIZED INDICATIONS OF COMPROMISE - Threat detection instrumentation is simplified by providing and updating labels for computing objects in a context-sensitive manner. This may include simple labeling schemes to distinguish between objects, e.g., trusted/untrusted processes or corporate/private data. This may also include more granular labeling schemes such as a three-tiered scheme that identifies a category (e.g., financial, e-mail, game), static threat detection attributes (e.g., signatures, hashes, API calls), and explicit identification (e.g., what a file or process calls itself). By tracking such data for various computing objects and correlating these labels to malware occurrences, rules can be written for distribution to endpoints to facilitate threat detection based on, e.g., interactions of labeled objects, changes to object labels, and so forth. In this manner, threat detection based on complex interactions of computing objects can be characterized in a platform independent manner and pre-processed on endpoints without requiring significant communications overhead with a remote threat management facility. | 2016-03-17 |
20160080419 | DATA BEHAVIORAL TRACKING - Threat detection instrumentation is simplified by providing and updating labels for computing objects in a context-sensitive manner. This may include simple labeling schemes to distinguish between objects, e.g., trusted/untrusted processes or corporate/private data. This may also include more granular labeling schemes such as a three-tiered scheme that identifies a category (e.g., financial, e-mail, game), static threat detection attributes (e.g., signatures, hashes, API calls), and explicit identification (e.g., what a file or process calls itself). By tracking such data for various computing objects and correlating these labels to malware occurrences, rules can be written for distribution to endpoints to facilitate threat detection based on, e.g., interactions of labeled objects, changes to object labels, and so forth. In this manner, threat detection based on complex interactions of computing objects can be characterized in a platform independent manner and pre-processed on endpoints without requiring significant communications overhead with a remote threat management facility. | 2016-03-17 |
20160080420 | USING INDICATIONS OF COMPROMISE FOR REPUTATION BASED NETWORK SECURITY - Threat detection instrumentation is simplified by providing and updating labels for computing objects in a context-sensitive manner. This may include simple labeling schemes to distinguish between objects, e.g., trusted/untrusted processes or corporate/private data. This may also include more granular labeling schemes such as a three-tiered scheme that identifies a category (e.g., financial, e-mail, game), static threat detection attributes (e.g., signatures, hashes, API calls), and explicit identification (e.g., what a file or process calls itself). By tracking such data for various computing objects and correlating these labels to malware occurrences, rules can be written for distribution to endpoints to facilitate threat detection based on, e.g., interactions of labeled objects, changes to object labels, and so forth. In this manner, threat detection based on complex interactions of computing objects can be characterized in a platform independent manner and pre-processed on endpoints without requiring significant communications overhead with a remote threat management facility. | 2016-03-17 |
20160080421 | Contextually Aware Device Management - Contextually aware device management techniques are described. Identifying data is provided via a communication connection by a client device to a service provider via a network that is usable by the service provider to identify the client device or functionality of the client device. One or more contexts are received at the client device from the service provider via the network that correspond to the identifying data. Each of the one or more contexts includes management objects along with one or more triggers configured to cause the context to transition to a corresponding one of a plurality of context states and thereby cause performance of one or more actions corresponding to the context state. The one or more contexts are implemented locally by the client device effective to identify and perform the one or more actions corresponding to the context state by the client device based on identification of the one or more triggers without use of network communication by the client device. | 2016-03-17 |
20160080422 | TRANSFORMING BUSINESS POLICIES TO INFORMATION TECHNOLOGY SECURITY CONTROL TERMS FOR IMPROVED SYSTEM COMPLIANCE - A hierarchically layered group of domain-specific enhanced enterprise ontologies where each domain layer is connected to the immediate domain layer below through a layer policy/control/context translation ontology. Security controls discovery and a mapping ontology is semantically integrated to domain meta models in each layer and a corresponding security controls knowledge base. | 2016-03-17 |
20160080423 | IMEI BASED LAWFUL INTERCEPTION FOR IP MULTIMEDIA SUBSYSTEM - The present invention addresses method, apparatus and computer program product for enabling International Mobile Equipment Identifier based Lawful Interception for Internet Protocol IP Multimedia Subsystem, VoLTE and beyond systems. Thereby, an International Mobile Equipment Identifier allocated to a User Equipment and verified by an Evolved Packet Core is transmitted from a Mobility Management Entity to a Packet Gateway, the International Mobile Equipment Identifier is transmitted to a Proxy Call State Control Function via Policy and Charging Rules Function within the Policy and Charging Control procedures at Internet Protocol Multimedia Subsystem registration, and the International Mobile Equipment Identifier is transmitted to a Serving Call State Control Function at call set-up. | 2016-03-17 |
20160080424 | APPARATUS AND METHOD FOR REESTABLISHING A SECURITY ASSOCIATION USED FOR COMMUNICATION BETWEEN COMMUNICATION DEVICES - A communication apparatus monitors a communication situation of a communication performed using each of a plurality of security associations established between the communication apparatus and a counterpart apparatus, and stores information indicating the communication situation. When a first security association in the plurality of security associations is disconnected, the communication apparatus determines whether the counterpart apparatus uses the disconnected first security association, based on the information. When the counterpart apparatus uses the first security association, the communication apparatus reestablishes a second security association which supersedes the first security association. | 2016-03-17 |
20160080425 | Content-Aware Firewalling, Policy Regulation, and Policy Management for Industrial Automation, Machine To Machine Communications, and Embedded Devices - In one embodiment, a processor-implemented method for controlling network traffic to and/or from at least one industrial machine, including: (a) receiving, as input, (i) a stored policy object in language form defining at least one desired behavior and/or operational constraint for the at least one industrial machine, and (ii) a stored machine profile defining an association between the language of the stored policy object and at least one control signal or instruction for the at least one industrial machine; (b) detecting, in network traffic to and/or from the at least one industrial machine, a transaction; (c) applying the received policy object and machine profile to the detected transaction to determine whether a desired behavior exists and/or whether an operational constraint is satisfied; and (d) modifying network traffic to and/or from the at least one industrial machine based on the determination in step (c). This permits expression and enforcement of constraints on actual industrial machine behaviors by filtering, modifying or blocking network communications (e.g., control signals and telemetry) that violate constraints or could cause unsafe or inefficient operation. | 2016-03-17 |
20160080426 | SYSTEMS AND METHODS FOR CLOUD DATA SECURITY - Techniques for providing data security services with respect to cloud-based services are described. Examples include a security service provider (“SSP”) configured to perform or provide one or more security-related services or functions with respect to or on behalf of some other system or service. The other system or service may be, for example, a cloud-based system that provides network-accessible services. The SSP allows a user of the cloud-based service to provide and manage one or more security-related services, such as data storage, encryption, decryption, key management, and the like. By using and controlling the SSP, the user can be confident that his or her data is being securely represented and stored, even though it is being operated upon by a cloud-based service that is not under the user's control. | 2016-03-17 |
20160080427 | SYSTEM, ARRANGEMENTS AND METHODS RELATING TO ACCESS HANDLING - A core network access packet data node and a core network access edge node are described herein. The core network access packet data node and/or the core network access edge node is/are adapted to hold or receive access priority related information comprising a subscriber related access allocation priority parameter relating to a subscriber requesting a network resource. Further, the core network access packet data node and/or the core network access edge node is/are adapted to have a preliminary access decision unit being provided for deciding if a network resource request is to be handled. Moreover, the core network access packet data node and/or the core network access edge node is/are adapted to have a final decision unit being provided for making a final decision relating to grant/rejection of a request to be handled, i.e. given preliminary access. | 2016-03-17 |
20160080428 | INFORMATIONAL ENRICHMENT FOR INTERACTIVE SYSTEMS - Interactive services are enhanced by intercepting a session initiation protocol message used to initiate a bidirectional communication and in transit to a networked recipient computer that provides interactive services for the bidirectional communication to be initiated. Supplemental information is obtained based on information in the session initiation protocol message in order to provide to the networked recipient computer of the bidirectional communication to be initiated. A computer processor of an intermediary computer is used to insert the supplemental information into the session initiation protocol message. The session initiation protocol message is routed with the supplemental information inserted to the networked recipient computer that provides the interactive services for the bidirectional communication to be initiated. | 2016-03-17 |
20160080429 | Routing of Sessions to Other Communication Networks - System, methods, nodes, and instruction set for routing a session invitation from a first network ( | 2016-03-17 |
20160080430 | VOICE TRANSMISSION TECHNOLOGY SELECTION - The present invention relates to a method of transmitting a signal by an MME (Mobility Management Entity) in a wireless network, the method comprising: receiving a tracking area update message from an UE (User Equipment); transmitting, on reception the tracking area update message, an Update Location message comprising an IMS voice over PS (Packet Switched) session supported indication to an HSS (Home Subscriber Server), wherein the IMS voice over PS session supported indication indicates whether or not an IMS Voice over PS Session is supported homogeneously in all tracking areas in the serving MME. | 2016-03-17 |
20160080431 | EXTENDING COMMUNICATION SERVICES TO A CONSUMPTION DEVICE USING A PROXY DEVICE - A system for data communications comprising a handset having a processor, a wireless communications device, a speaker and a microphone and one or more software applications operating on the processor that are configured to interface with a voice over long-term evolution (VoLTE) service. A wireless access point coupled to the handset through a local wireless communications media and the wireless communications device, the wireless access point further coupled to a long range wireless communications media and configured to interface with a server that provides VoLTE calling functionality | 2016-03-17 |
20160080432 | Meeting Management System Including Automated Equipment Setup - A system includes at least one processor, a memory, at least one data storage device, at least one communication interface, and at least one program of instructions stored in the memory and executable in the processor. The program of instructions accepts information defining a presentation type of meeting, the presentation type of meeting being associated with preset resources including a presentation capture device, displays at least one presentation preset parameter based on the presentation type of meeting, receives presentation preset information from the at least one displayed presentation preset parameter, the presentation preset information including a start time, an end time, and shared documentation, automatically determines a room by communicating with a scheduling server the availability of the preset resources based on the received presentation preset information, notify a conference initiator of the room, and sends at least one command to control at least one of the associated preset resources in response to the start time and the end time. The at least one presentation preset parameter includes a recording profile, the presentation preset information includes a preconfigured recording profile, the preconfigured recording profile includes at least one AV workflow function, the at least one AV workflow function includes an encoding profile, and the encoding profile includes an audio CODEC preset parameter, an audio channels preset parameter, a sampling frequency preset parameter and an audio bitrate preset parameter. | 2016-03-17 |
20160080433 | Remote Conference Implementation Method and Apparatus - The present invention relates to the field of remote access technologies, and discloses a remote conference implementation method and apparatus, where the method is specifically that: a conference terminal detects a first mobile terminal at a current conference site, sends, a first dialing instruction to the detected first mobile terminal, to enable the first mobile terminal to establish an audio link according to an identifier of a second mobile terminal; and encodes a received audio signal of another conference site and/or an obtained audio signal of the current conference site, sends the encoded audio signal to the second mobile terminal based on the audio link, receives an audio signal sent by the second mobile terminal by using the first mobile terminal, decodes the audio signal, and then plays the decoded audio signal. In this way, a sound pickup range can be effectively expanded. | 2016-03-17 |
20160080434 | System, Method, and Computer Program Product For Resolving Addressing In A Network Including A Network Address Translator - A system, method, and computer program product through which address resolution is performed for nodes of a network that are behind a network address translator (NAT). A determination is made upon the initiation of a communication session as to whether one or more of the nodes included in the session are behind a NAT. Based on the determination, information is exchanged from an independent application server to the nodes included in the session so as to resolve the addressing problems introduced by the NAT. The invention is applicable in applications including, but not limited to, IP telephony, and applications complying with the session initiation protocol (SIP). | 2016-03-17 |
20160080435 | APPARATUS AND METHODS FOR ORIGINATION OF VOICE AND MESSAGING COMMUNICATION IN A NETWORK - A method that incorporates teachings of the subject disclosure may include, for example, receiving a query from a call session server for a first pointer associated with a telephone number of a terminating device of a requested communication session, transmitting to the call session server the first pointer including a session initiation protocol uniform resource identifier associated with the terminating device to initiate an internet protocol communication session, receiving a notification from the call session server responsive to the call session server failing to initiate the internet protocol communication session, and transmitting to the call session server a second pointer including a telephone protocol uniform resource identifier for originating a circuit-switched communication session responsive to receiving the notification. Other embodiments are disclosed. | 2016-03-17 |
20160080436 | DISTRIBUTED CONFERENCE AND INFORMATION SYSTEM - A distributed conference system is presented herein for providing information to a conference presenter and a group of conference attendees. The distributed conference system includes a main console used by the conference presenter and one or more distributed consoles used by conference attendees. The main console provides a touch screen or other user interface and contains functions that the conference presenter can use to control each of the distributed consoles as well as providing standard room control functions. In addition, the distributed consoles may provide access to additional information for conference attendees and the conference presenter, such as television or other video feeds and a web browser through which they can access the Internet. | 2016-03-17 |
20160080437 | SHARED INTER-OPERATIONAL CONTROL AMONG MULTIPLE COMPUTING DEVICES - A collaborative computing device group operative under a shared multiple discrete desktop user interface is established from a first desktop of a first computing device and a different discrete desktop of a second computing device physically located in user visual proximity to the first computing device. A color-coded graphical representation of a user-interface control port that allows authorized cursor navigation to and from the second computing device is displayed on the first desktop oriented in a respective direction of the second computing device. A cursor of the second computing device is authorized to migrate, under control of a user of the second computing device, from the different discrete desktop through the color-coded graphical representation of the user-interface control port of the second computing device to the first desktop and the first computing device is controlled in accordance with visual navigation and control of the cursor of the second computing device. | 2016-03-17 |
20160080438 | Method and Apparatus for Tile-Based Geographic Social Interaction - Tile-based geographic discussion platform may be provided through a location-aware map overlaid with a grid comprising a plurality of tiles. Each tile may be linked to a unique portion of the map and provide location-specific information to the user. A user may provide input with respect to a tile. | 2016-03-17 |
20160080439 | Media Sharing Device - A method includes receiving, at a local computing device, an indication of connection of a remote user device to a communication network of the local computing device, and establishing communication between the local computing device and the remote user device. The method also includes: accessing, using the local computing device, image data on remote non-transitory memory of the remote user device; and identifying, using the local computing device, any image data on the remote non-transitory memory not previously stored on local non-transitory memory in communication with the local computing device. The method also includes storing the identified image data on the local non-transitory memory. | 2016-03-17 |
20160080440 | METHOD AND APPARATUS FOR TRANSFERRING ACTIVE COMMUNICATION SESSION STREAMS BETWEEN DEVICES - Methods and system for routing first communication session data between a first device and at least one participant device via a first communication session are provided herein. In some embodiments, a method for routing first communication session data between a first device and at least one participant device includes receiving a request to establish a second communication session with at least one discovered extension device proximate to the first device, routing at least a portion of the communication session data to the discovered extension device via the second communication session and synchronizing the communication session data routed via the first communication session, and the at least a portion of the communication session data routed via the second communication session. | 2016-03-17 |
20160080441 | METHOD AND APPARATUS FOR SHARING PRESENTATION DATA AND ANNOTATION - A method and apparatus for sharing presentation data, interactions, and annotation information between devices. The method includes: converting the presentation data into at least one image; transmitting the at least one image to the second device; displaying an image from among the at least one image on a screen of the first device, and transmitting image identification information about the displayed image to the second device; adding annotation data to the displayed image, based on a user input; and transmitting annotation information about the annotation data to the second device. The second device displays an image corresponding to the image identification information on a screen of the second device based on the image identification information, and the second device displays the annotation information on the image displayed on the screen of the second device the annotation information. | 2016-03-17 |
20160080442 | INTELLIGENT STREAMING OF MEDIA CONTENT - In various embodiments, methods and systems for intelligent streaming of game content based on the level of interactivity of the game content are provided. The level of interactivity of game content is determined using techniques that classify the level of interactivity. The level of interactivity is defined for different components of game content. Streaming techniques are associated with game content having specific levels of interactivity. An edge computing infrastructure may facilitate intelligent streaming in that game assets classified as prefetch game assets or stream game assets are associated with prefetch instructions. The prefetch instructions are communicated from a game server to a game platform to instruct the game platform to prefetch a prefetch game asset to the edge computing infrastructure in advance of an anticipated game context in which the prefetch game asset is used. During the anticipated game context, the assets are retrieved for output at the game platform. | 2016-03-17 |
20160080443 | Non-Intrusive Proxy System and Method for Applications Without Proxy Support - A system and method is disclosed for enabling a redirection application to use non-proxy-enabled modules for communication with a server through a proxy server, in which a non-proxy-enabled module takes an address or an URL as the input to establish a connection with the server. This system and method does not require administrative access (e.g. super-user, root, and the like), which is useful for mobile devices where obtaining such privileges is typically difficult. In one embodiment, a media application may use a media player provided by an operating system as a module. In this embodiment, the media application is the redirection application and the media player is the module. The non-proxy-enabled modules use addresses or URLs to locate and fetch data. | 2016-03-17 |
20160080444 | PREDICTIVE CACHING FOR CONTENT - Disclosed are various embodiments for predictive caching of content to facilitate instantaneous use of the content. If a user is likely to commence use of a content item through a client, and if the client has available resources to facilitate instantaneous use, the client is configured to predictively cache the content item before the user commences use. In doing so, the client may obtain metadata for the content item and an initial portion of the content item from a server. The client may then initialize various resources to facilitate instantaneous use of the content item by the client based at least in part on the metadata and the initial portion. | 2016-03-17 |
20160080445 | Multi-Tenant Over-The-Top Multicast - Some embodiments provide a multi-tenant over-the-top multicast solution that integrates the per user stream customizability of unicast with the large scale streaming efficiencies of multicast. The solution involves an application, different multicast groups streaming an event with different customizations, and a manifest file or metadata identifying the different groups and customizations. The solution leverages the different multicast groups in order to provide different time shifts in the event stream, different quality level encodings of the event stream, and different secondary content to be included with a primary content stream. The application configured with the manifest file or metadata dynamically switches between the groups in order to customize the experience for a user or user device on which the application executes. Switching from multicast to unicast is also supported to supplement available customizations and for failover. | 2016-03-17 |
20160080446 | CONTENT DELIVERY SYSTEM AND METHOD - A method of distributing content from a source in a content delivery network, the method comprising: monitoring requests for delivery of an item of content; obtaining a prediction of future demand in respect of the said content; applying a unicast-to-multicast switching decision algorithm, the switching decision algorithm taking into account the prediction of future demand and arranged to determine whether at least one trigger condition is met; and, dependent on the outcome of the unicast-to-multicast switching decision algorithm, initiating the transition of a plurality of unicast data streams to a multicast data stream in respect of the item of content. | 2016-03-17 |
20160080447 | Transmitting and Receiving Media Packet Streams - This invention concerns the transmitting and receiving of digital media packets, such as audio and video channels and lighting instructions. The network ( | 2016-03-17 |
20160080448 | Dynamic Video Streaming Based on Viewer Activity - In some examples, techniques and architectures for modifying resolution of video displayed on a display device include receiving information from a distance sensor and one or more image sensors, detecting an activity of a viewer of the display device based, at least in part, on the information received from the distance sensor and the one or more image sensors, and transmitting a request to a remote server to adjust bandwidth of media content streaming to the display device to a new bandwidth. The new bandwidth may be based, at least in part, on one or more of the activity of the viewer, size of the display device, or an ability of the viewer to resolve images displayed on the display device. | 2016-03-17 |
20160080449 | TERMINAL DEVICE, DATA TRANSMISSION METHOD, AND COMPUTER-READABLE RECORDING MEDIUM - A terminal includes: a receiving unit receiving document data from an external device; an acquiring unit acquiring the network bandwidth that is available to transmit data; an assigning unit assigning, in accordance with the network bandwidth that is available to transmit data, a transmission rate to each set of data that is to be transmitted to a different terminal device; a determining unit determining, according to the transmission rate that is assigned to the document data, the quality of the document data that is transmitted from the terminal device to a different terminal device; a converting unit converting the quality of the document data that is input from the external device such that equal to or less than the determined quality is obtained; and an encoding unit encoding multiple sets of data that include the converted document data by using the transmission rate that is assigned to each of them. | 2016-03-17 |
20160080450 | BACKFILL OF VIDEO STREAM - A data streaming method is performed at a computing device having one or more processors and memory. The memory stores one or more programs configured for execution by the one or more processors. The process records video from a camera in real-time. The recorded video is stored in the memory in a circular buffer in chronological order. The process sends data in chronological order from the circular buffer to a destination in real-time. In response to detecting that a portion of content from the circular buffer needs to be resent, the process concurrently resends to the destination in reverse chronological order data from the portion of content from the circular buffer. | 2016-03-17 |
20160080451 | REAL-TIME DYNAMIC HYPERLINKING SYSTEM AND METHOD - A system and method enabling real-time dynamic hyperlinking of software applications and resources within mobile devices is disclosed. The system/method virtualizes the graphical user experience (GEX) and user input experience (UEX) that comprise the graphical user interface (GUI) for host application software (HAS) running on a host computer system (HCS). The virtualized GUI (VUI) GEX component is converted to a remote video stream (RVS) and communicated to a remote mobile computing device (MCD) over a computer communication network (CCN). A MCD thin client application (TCA) receives the RVS and presents this GEX content on the MCD display using a graphics experience mapper (GEM). A RVS frame scope (RFS) of real-time user-selected RVS frame regions may be dynamically transmitted by the TCA to the HCS which then translates the associated RFS into a hyperlink associated with known and/or searched images that are matched to the RFS. | 2016-03-17 |
20160080452 | COMMENT LINK TO STREAMING MEDIA - Embodiments generally relate to proving a method for an authenticated user of an item of streaming media content to create a shareable clip of a portion of the item. The method comprises using an interface on a first device to accept a first input from the authenticated user to define the clip; using the interface to accept a second input from the authenticated user to create a comment for the clip; creating an identifier for the clip, the identifier uniquely corresponding to the authenticated user and the defined clip; and sending the identifier and the comment to a second user in a form that includes a clickable link. If the second user clicks on the clickable link, the defined clip is streamed to the second user to play on a second device, independent of whether the second user is authorized to access the whole of the content. | 2016-03-17 |
20160080453 | SCALING CONTENT COMMUNICATED OVER A NETWORK - An architecture is provided that can scale content resolution in order to mitigate errors in a provisioned service of a communication network, such as a wireless service or a femtocell service that integrates with DSL or other broadband carriers. The architecture can identify fault conditions relating to e.g., bandwidth oversubscription or symbolization integrity. Based upon such identification, the architecture can alter encoding format codecs of certain types of content in order to reduce their resolution/quality, thereby mitigating bandwidth oversubscription fault conditions or freeing up space (without necessarily increasing bandwidth) to insert additional FEC code. | 2016-03-17 |
20160080454 | TELECOMMUNICATION NETWORK MANAGER - In some embodiments, a telecommunication network | 2016-03-17 |
20160080455 | DELIVERY DEVICE, REPRODUCTION DEVICE, AND DELIVERY SYSTEM - A reproduction system according to an embodiment includes a communicator which communicates information including an encoded data and a processor. The processor is configured to select the encoded data to be delivered, send a request an external delivery device to deliver a third encoded data until a starting time of following segment included in a second encoded data via the communicator when the second encoded data is selected to be delivered following to a first encoded data, and decode the encoded data received by the communicator. The second encoded data and the third encoded data are generated by encoding a first content. | 2016-03-17 |
20160080456 | METHOD AND SYSTEM FOR EFFICIENT STREAMING VIDEO DYNAMIC RATE ADAPTATION - A streaming media system employs dynamic rate adaptation. The method includes a file format compatible with legacy HTTP infrastructure to deliver media over a persistent connection. The method further includes the ability for legacy client media players to dynamically change the encoded delivery rate of the media over a persistent connection. The method provided works transparently with standard HTTP servers, requiring no modification and leverages standard media players embedded in mobile devices for seamless media delivery over wireless networks with high bandwidth fluctuations. A system is also specified for implementing a client and server in accordance with the method. | 2016-03-17 |
20160080457 | Qualified Video Delivery Methods - A video server is configured to provide streaming video to players of computer games over a computing network. The video server can provided video of different games to different players simultaneously. This is accomplished by rendering several video streams in parallel using a single GPU. The output of the GPU is provided to graphics processing pipelines that are each associated with a specific client/player and are dynamically allocated as needed. A client qualifier may be used to assure that only clients capable of presenting the streaming video to a player at a minimum level of quality receive the video stream. | 2016-03-17 |
20160080458 | PARTITIONING DIGITAL MEDIA FOR CONSUMPTION - Embodiments of the present invention partition digital media content. One or more processors identify an episode of digital media content based on subscription preferences of a user. The one or more processors respond to a determination that a duration of the episode is less than or equal to a combined duration of two free time slots in an electronic calendar of a user by partitioning the episode into at least two segments. A first episode segment has a duration that is less than or equal to a duration of the first free time slot. A second episode segment has a duration that is less than or equal to the duration of the second free time slot. The one or more processors associate, in the electronic calendar, the first episode segment with the first time slot and the second episode segment with the second time slot. | 2016-03-17 |
20160080459 | METHODS AND SYSTEMS FOR AVB NETWORKS - Embodiments are disclosed for a device for determining which packets of an audio/video stream include a valid presentation time. In some embodiments, a device comprises a communication interface communicatively connectable to another device and configured to transmit data, a processor, and a storage device that stores instructions executable by the processor to designate a sample of an audio/video stream as including a valid presentation time responsive to a sum of a number of data blocks that have been sampled since a last valid presentation time stamped data block and a number of data blocks in the sample being greater than or equal to a threshold value. | 2016-03-17 |
20160080460 | VIDEO STREAMING DIAGNOSTICS - A video stream DSL analyzer receives at least non-physical layer management data and physical layer management data and in response generates metric information. The generated metric information is used to characterize the performance of the video stream information and diagnose any problems if necessary. In response to the metric information, the video stream DSL analyzer changes one or more DSL configuration(s) in order to improve performance. | 2016-03-17 |
20160080461 | EXTRACTION AND CAPTURE OF INFORMATION FROM CUSTOMIZABLE HEADER - A database system captures custom information of a header section associated with a logged interaction of a user. The database system may receive a hypertext transfer protocol (http) message including the header section and determine whether the header section includes a predetermined data pattern associated with the custom information added by a second application that is different than a first application which initiated the http message. The database system may extract the custom information from the header section in response to determining that the header section includes the predetermined data pattern. The custom information and event data extracted from the logged interaction of the user may be stored on the database system as a storage element. | 2016-03-17 |
20160080462 | DATA PROCESSING METHOD AND APPARATUS IN SERVICE-ORIENTED ARCHITECTURE SYSTEM, AND THE SERVICE-ORIENTED ARCHITECTURE SYSTEM - Data processing method and apparatus in a Service-Oriented architecture (SOA) system are disclosed. The method replaces a target parameter having a larger data length included in an original HTTP request with an intermediate parameter having a smaller data length. A data length of a HTTP request that is converted from an original HTTP request is reduced as compared to a data length of the original HTTP request, thus reducing an amount of data that is transmitted, i.e., sent or received, by a target component, which accordingly reduces an amount of data transmitted in the SOA system and decreases a network overhead of the SOA system. | 2016-03-17 |
20160080463 | Methods and Systems for Dynamically Generating and Reusing Dynamic Web Content - Methods and systems for generating and reusing dynamic web content involve, for example, automatically generating client-side code on a server at run time, and automatically downloading the client-side code to the client side at run time. The client-side code is executed on the client side to become a widget with dynamic behavior attributes displayed as a component of a web page on a display screen of a client-side computing device. Dynamic behavior of the client-side code may triggered via an event handler mechanism wherein properties of the client-side code are dynamically changed without affecting any other content on the web page. The widget may be redisplayed on a subsequent occasion with a change in the widget without regenerating the client-side code. | 2016-03-17 |
20160080464 | Enhanced Browser Cookie Management - Systems and methods of managing cookie handling settings provide for retrieving a web page based on a browser request and detecting one or more cookie requests associated with the web page being viewed rather than the web page associated with the cookie. A real-time dialog containing data corresponding to each cookie request associated with the web page being viewed may be generated while the web page is displayed. | 2016-03-17 |
20160080465 | CONTROL METHOD OF INFORMATION DEVICE, AND NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM STORING PROGRAM - An unregistered first subject device is managed in memory as one or more subject devices. A room selection screen for selection of a room where the unregistered first subject device is installed, is displayed on a display. The unregistered first subject device is associated with a first room and managed as a registered first subject device, based on selection of the first room from the room selection screen. A room list screen including a first room icon representing the first room is generated, and displayed on the display. | 2016-03-17 |
20160080466 | INFORMATION PROCESSING APPARATUS AND METHOD OF REMOTE OPERATION CONTROL - An apparatus link unit of a PC and an apparatus link unit of a smartphone link with each other to automatically establish a mode of remote operation between the PC and the smartphone. When the apparatus link unit of the PC transmits a notice of completion of PC-smartphone link to the smartphone, a port number to be used in the remote operation is informed. The apparatus link unit of the PC transmits a file to the smartphone using a port number of a normal link mode while a remote operation controller is performing the remote operation. | 2016-03-17 |
20160080467 | REMOTE BROWSING SESSION MANAGEMENT - A remote browsing process is directed to the generation and management of a remote persistent browsing context at a network computing provider. A client computing device requests a remote persistent browsing context instance at a network computing provider. The network computing provider provides processing results corresponding to processed representations of requested content to the client computing device. The persistent browsing context may be maintained at the network computing provider subsequent to the user ending his interaction with the browser application at the client device. A client computing device may subsequently request access to the persistent browsing context maintained at the network computing and storage device. | 2016-03-17 |
20160080468 | SYSTEMS AND METHODS FOR PROVIDING VIRTUAL CRASH CART ACCESS TO AN INFORMATION HANDLING SYSTEM - In accordance with embodiments of the present disclosure, an information handling system may include a processor and an access controller communicatively coupled to the processor. The access controller may be configured to, when locally coupled to a second information handling system determine if the second information handling system is authorized to perform virtual crash cart operations on the information handling system and, responsive to determining that the second information handling system is authorized to perform virtual crash cart operations on the information handling system, permit the second information handling system to perform virtual crash cart operations on the information handling system whereby the second information handling system implements one or more virtual information handling resources such that each virtual information handling resource behaves at least in part as a physical information handling resource present at the information handling system. | 2016-03-17 |
20160080469 | DATA COMMUNICATION METHOD AND DATA COMMUNICATION SYSTEM - A data communication method and a data communication system are provided. The method includes: transmitting, by an electronic cigarette, collected smoking-related data to a mobile terminal bound with the electronic cigarette; transmitting, by the mobile terminal, the smoking-related data to a service platform; determining, by the service platform, a user level corresponding to the smoking-related data; determining, by the service platform, information corresponding to the user level; and pushing, by the service platform, the information corresponding to the user level to the mobile terminal. The service platform pushes the information corresponding to the smoking-related data to the mobile terminal, and the mobile terminal receives the information, such that the service platform provides a customized information pushing service to the user. Different services may be pushed according to different user levels, and merchants may provide customized services and improve service quality, thereby improving user experience. | 2016-03-17 |
20160080470 | SERVER-SIDE PLAYLIST STITCHING - Described herein are techniques for providing a client device with a requested streamed video by stitching video segments and break segments into a playlist from a stitching server. The stitching server can receive a request from a client device to receive streamed video. The stitching server can retrieve first metadata representing the streamed video, wherein the first metadata includes offset information for one or more breaks in the streamed video, wherein each break contains one or more break segments. The stitching server can request and receive, from a second server, second metadata for the one or more break segments. The stitching server can create a playlist for the streamed video by stitching the second metadata into the first metadata at one or more locations indicated by the first metadata. The stitching server can then provide the playlist to the client device. | 2016-03-17 |
20160080471 | Progressive Background Uploading - In one embodiment, a method includes accessing a first instance of content to be uploaded to a server, generating a second instance of the content from the first instance, automatically uploading to the server the second instance of the content, and automatically uploading to the server the first instance of the content in response to occurrence of a pre-determined upload condition. The first instance has a first file size and the second instance has a second file size that is smaller than the first file size. The upload of the second instance makes the content available for access at least in part by one or more second users at an immediate point in time. The upload of the first instance of the content makes the content available for access by the second users in an original version. | 2016-03-17 |
20160080472 | Measuring Sharing Behavior and Audience Coverage in Online Communities - Configurations for measuring sharing behavior and audience coverage for one or more users are provided. Some configurations can include the following components: an input processor (IP), a data processor (DP) and a visualization processor (VP). The IP extracts data from user logs or processes existing raw data, and prepares the data for the data processor. In one example, the IP transforms each user record into a structured file including time-ordered data corresponding to instances of information sharing activity, target users, and associated date-time(s) for the sharing activity. The DP takes the time-ordered data from the IP and performs statistical evaluations to classify and determine the audience coverage and sharing behavior. The VP receives processed data from the DP and generates different graphical visualizations (e.g., one or more graphs) based on the statistical analysis provided by the DP. | 2016-03-17 |
20160080473 | Cloud Queue Item Removal - An example implementation may involve removing, by a computing device, a given media item from a queue of media items. The example implementation may further involve adding to the queue an indication that the given media item has been removed from the queue. After adding to the queue the indication, the implementation may also involve receiving, via a network interface, one or more requests for one or more media items from the queue of media items. After receiving the one or more requests, the implementation may involve determining that the computing system has received more than a threshold number of requests for one or more media items since adding to the queue the indication. After determining that the computing system has received more than the threshold number of requests, the implementation may involve removing the indication from the queue. | 2016-03-17 |
20160080474 | INSTANCE BACKED MOBILE DEVICES - A service provider may provide a companion computer system associated with a mobile device in order to facilitate operation of the mobile device. The companion computer system and the mobile device may be associated in a database operated by the service provider. Furthermore, the companion computer system may execute a component of an application on behalf of the mobile device, where the mobile device executes another component of the application. | 2016-03-17 |
20160080475 | Cross Device Application Discovery And Control - Systems and methods cross device application discovery and/or control. Cross device application discovery and/or control can provide for simple detection and activation of applications on remote devices. Cross device application discovery and/or control can provide for the control of remote applications in a master and slave configuration. Responsive to an activation message, an application can execute a task in an application, the task being displayed on a target device. Responsive to an activation message, an application can execute a task in an application on a target device, a task context data for the task being streamed to the source device for presentation on a display. Cross device application discovery and/or control can be enabled on a single operating system, or across a plurality of operating systems. | 2016-03-17 |
20160080476 | MEME DISCOVERY SYSTEM - A system for discovering internet memes from a social media stream includes a meme detector for grouping together incoming posts that contain a common set of anomalous terms, the meme detector comparing the frequency of use of the anomalous terms against normalcy models to ensure that the use of the anomalous terms is non-recurring. The system additionally includes a meme tracker for classifying each cluster of related posts as a particular meme and, in turn, associating new related posts from the media stream with the classified cluster. In this manner, the particular set of anomalous terms used to classify each meme can be augmented to include other discriminating terms. Accordingly, the parameters, or features, associated with each meme are continuously monitored and refined, as needed, to ensure that the most comprehensive and reflective cluster of posts for each meme is collected from the social media stream in an efficient fashion. | 2016-03-17 |
20160080477 | CROWD-SOURCED CLOUD COMPUTING - A first party, such as a residential subscriber to an Internet Service Provider (ISP), logically partitions its computing resources into an end user partition and a crowd sourced cloud partition. The first party installs a crowd sourced cloud application in each cloud partition. Together, a cloud provider computing system and each cloud application orchestrate cloud services over a communications network, such as the Internet. For each crowd sourced cloud application, orchestration involves registering cloud services with the cloud provider, provisioning each registered cloud service that is requested by the cloud provider, and operating each provisioned service. For the cloud provider, orchestration involves publishing each registered service as available to crowd sourced cloud users, receiving requests for cloud services from a crowd sourced cloud user, and requesting, from a crowd sourced cloud application, a registered service responsive to the request for cloud services. | 2016-03-17 |
20160080478 | MANAGING OPERATIONS IN A CLOUD MANAGEMENT SYSTEM - Embodiments of the present invention provide methods, systems, and computer program products for managing operations in a cloud management system. In one embodiment, after a user submits a request to perform a cloud operation, a contextual security assessment of the requesting user and/or cloud resources on which the requested operation will be performed can be determined. An administrative user can review the contextual security assessments before approving or rejecting the cloud operation, which can help increase safety within the cloud computing environment. | 2016-03-17 |
20160080479 | APPLICATION DEPLOYMENT METHOD AND DEVICE - The present invention provides an application deployment method and device. The method includes: receiving an application deployment request including a resource package identifier of a resource package and method artifact information of each method artifact; acquiring the resource package according to the resource package identifier, where the resource package includes the resource description file and a deployment plan, the resource description file describes the abstract method, and the deployment plan references the abstract method; adding the method artifact information to the resource description file according to the correspondence between each method artifact and each abstract method that is in the resource description file in the resource package, to form an application deployment description file; and executing, according to the application deployment description file, the method artifact of the abstract method referenced by the deployment plan. The present invention improves expansibility of application deployment. | 2016-03-17 |
20160080480 | ADAPTIVE COMMUNICATION INTERFACE - Embodiments of the invention include a communication interface and protocol for allowing communication between devices, circuits, integrated circuits and similar electronic components having different communication capacities or clock domains. The interface supports communication between any components having any difference in capacity and over any distance. The interface utilizes request and acknowledge phases and signals and an initiator-target relationship between components that allow each side to throttle the communication rate to an accepted level for each component or achieve a desired bit error rate. | 2016-03-17 |
20160080481 | METHODS OF OPERATING LOAD BALANCING SWITCHES AND CONTROLLERS USING MODIFIED FLOW ENTRIES - A method of operating a load balancing switch may include providing a flow entry in a flow table, the flow entry may include a match pattern that is satisfied by a data flow identification, and the flow entry may identify a first server. A first data packet including a first data flow identification may be received, and the first data packet may be transmitted to the first server responsive to the first data flow identification satisfying the match pattern. After transmitting the first data packet to the first server, the flow entry may be modified so that the flow entry identifies the first server and a second server. After modifying the flow entry, a second data packet including a second data flow identification may be received, and the second data packet may be transmitted to the first and second servers responsive to the second data flow identification satisfying the match pattern. | 2016-03-17 |
20160080482 | PRODUCTIVE SPEND METRIC BASED RESOURCE MANAGEMENT FOR A PORTFOLIO OF DISTRIBUTED COMPUTING SYSTEMS - A method of operating a resource management node includes, for each of a plurality of resources available in a plurality of distributed computing systems, determining a productive spend metric based on utilization of the resource and cost associated with making the resource available in the distributed computing system. Relocation of workload of selected ones of the resources between the plurality of distributed computing systems is controlled based on the productive spend metrics determined for the selected ones of the resources. Related computer program products and resource management nodes are disclosed. | 2016-03-17 |
20160080483 | METHOD FOR SETTING GATEWAY DEVICE IDENTITY, AND MANAGEMENT GATEWAY DEVICE - Embodiments of the present application disclose a method for setting a gateway device identity, and a management gateway device. The method includes: acquiring a negotiation packet of a gateway device; acquiring a gateway device priority carried in the negotiation packet; and setting a member identity of the gateway device according to the gateway device priority. According to the method and the device, complexity of selecting an active virtual gateway device or an active virtual forwarding device among multiple gateway devices can be reduced, and the processing efficiency of a service mechanism of traffic load sharing of multiple gateway devices can be enhanced. | 2016-03-17 |
20160080484 | DYNAMIC VIRTUAL RESOURCE REQUEST RATE CONTROL FOR UTILIZING PHYSICAL RESOURCES - A virtualization host may implement dynamic virtual resource request rate controls for physical resources. Individual virtual resource request queues may be maintained for different virtual compute instances implemented at a virtualization host for a particular physical computer resource. After placing a work request from one of the individual virtual resource request queues into a physical resource request queue to be performed at the physical computer resource, a delay may be dynamically determined based, at least in part, on the workload of the physical resource request queue. After imposing the delay, a next work request from the individual virtual resource request queue may be placed into the physical resource request queue. In at least some embodiments, the dynamically determined delay may include a randomly added delay. | 2016-03-17 |
20160080485 | Systems and Methods for Determining Recommended Aspects of Future Content, Actions, or Behavior - A method includes providing, by a processor of a computing device, potential requests. Each of the potential requests include an indication of at least one recommended aspect type for a future content. The method further includes receiving a selection of at least one of the potential requests for the at least one recommended aspect type for the future content. The selection is associated with a unique author in at least one social network, website, application software, or mobile application software (app). The method further includes automatically determining, in response to the selection, the recommended aspect for the future content. The recommended aspect is determined at least in part based on activity data that indicates aspects of other content authored by or interacted with by a plurality of authors in the at least one social network, website, application software, or mobile application software (app) prior to receipt of the selection. | 2016-03-17 |
20160080486 | CROWDSOURCING-BASED DETECTION, IDENTIFICATION, AND TRACKING OF ELECTRONIC DEVICES - In a method of detecting electronic devices, information about a first user equipment device is received at a server. The information is received from at least one second user equipment device within range of a wireless communication interface of the first user equipment device. A presence of the first user equipment device is detected at the server based on the information received from the at least one second user equipment device. The receiving and the detecting may be operations performed by at least one processor of the server. Related apparatus and computer program products are also discussed. | 2016-03-17 |