Patents - stay tuned to the technology

Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


19th week of 2014 patent applcation highlights part 68
Patent application numberTitlePublished
20140130069METHOD AND APPARATUS FOR GENERATING VIDEO FOR A VIEWING SYSTEM FROM MULTIPLE VIDEO ELEMENTS - A video processing system located at a remote location such as a TV broadcasting station or an Internet media server stores a plurality of video elements at that are delivered to a viewing system located at a viewer's premises. The video processing system is capable of receiving a selection request comprising two or more video elements or subsets thereof, wherein the subsets are regions of interest or portions of the corresponding video elements. The video processing system constructs a custom video by combining them based on the viewer' selection and using the region of interest that are provided, and forwards the custom video to the viewing system. Billing based on record of usage is also supported for the custom video.2014-05-08
20140130070LOGGING NETWORK DISCOVERABLE INFORMATION - Systems and methods for logging network discoverable information. An indication of user-interest of particular media content may be identified. An address identification parameter that specifies a network file path of the particular media content may be identified based on the indication of user-interest. A location parameter that specifies an estimated physical location of the particular computing device within a computing network may be determined based on the address identification parameter. The address identification parameter may be stored within a network accessible media content log.2014-05-08
20140130071Method and System for Protecting Cable Televisions Subscriber-specific Information Allowing Limited Subset Access - A television program ratings method and system includes transferring information associated with households from a cable provider to a ratings provider such that the ratings provider has access to information associated with sampled households and lacks access to information associated with non-sampled households. To this end, identity information and usage information associated with the households are respectively anonymized and encrypted. Knowledge of the identities of the sampled households enables the anonymized identity information and the encrypted usage information for the sampled households to be respectively de-anonymized and decrypted. The ratings provider knows which households are sampled households. As such, the ratings provider de-anonymizes and decrypts the information associated with the sampled households and then uses the de-anonymized and decrypted information to determine television program ratings. The cable provider anonymizes and encrypts the information for all households as the cable provider does not know which households are sampled households.2014-05-08
20140130072VIEWING INFORMATION COLLECTING SYSTEM, BROADCAST RECEIVING APPARATUS, AND VIEWING INFORMATION COLLECTING METHOD - An IPTV terminal has viewer information acquiring unit for acquiring viewer information, information about a viewer watching video/audio TV outputs; channel information detecting unit for detecting channel information about an IPTV broadcast distributed by IPTV broadcast distribution server; TV connection detecting unit for detecting connection between IPTV terminal and TV to generate connection information; viewing information generation unit for generating viewing information from channel information the channel information detecting unit detects when a viewer watching video/audio output from TV is present and when IPTV terminal is connected to TV by referring to the viewer information the viewer information acquiring unit acquires and to the connection information the TV connection detecting unit generates; and viewing information transmitting unit for transmitting the viewing information the viewing information generation unit generates to viewing information collecting server.2014-05-08
20140130073SYSTEM AND METHOD FOR DELIVERING MEDIA BASED ON VIEWER BEHAVIOR - Methods, systems and devices are provided for communicating multimedia content over a service provider network. A network server may receive an audio-video stream from a content provider server, relaying the audio-video stream to a receiver device via the service provider network, receive an operating mode notification identifying a user behavior from the receiver device, and ceasing the relaying of the audio-video stream to the receiver device based on the user behavior. The network server may also alter the audio-video stream based on the received operating mode notification and send the altered audio-video stream to the receiver device via the service provider network.2014-05-08
20140130074SYSTEM AND METHOD OF DELIVERING VIDEO CONTENT - A method includes determining a data capacity of a first network device of a plurality of network devices that provide content to a set-top box device. In response to the data capacity satisfying a first threshold and a second threshold, sending a first command to the first network device. The first command instructs the first network device to store media content associated with a particular channel corresponding to a predicted channel change request at the first network device. In response to the data capacity satisfying the first threshold and failing to satisfy the second threshold, sending a second command to the first network device and sending a third command to a second network device. The third command instructs the second network device to store the media content associated with the particular channel.2014-05-08
20140130075INFORMATION PROCESSING APPARATUS AND METHOD, COMPUTER PROGRAM THEREOF, AND RECORDING MEDIUM - An information processing apparatus is provided in which a first record control means controls record of user presence time information indicating time in which a user was present within a predetermined range around a display means displaying content, based on an output from a sensor detecting the user; a second record control means controls record of operation history information including content specifying information for specifying the content as target of operation, operation content information for indicating content of operation related to display of the content by the user, and operation time information for indicating time of the operation; and an audience-quality constituent item calculation means calculates an audience-quality constituent item constituting audience quality which indicates quality of content watched by the user, based on the recorded user presence time information and operation history information.2014-05-08
20140130076System and Method of Media Content Selection Using Adaptive Recommendation Engine - This is a system and method of providing selected media content whereby information about the characteristics or behavior of a person viewing the content viewer is detected or otherwise determined and then automatic feedback is used so that as such adjustments are made, the view behavior is further monitored in order to evaluate the quality of the adjustments and make further adjustments in order to meet a pre-determined objective.2014-05-08
20140130077METHOD AND DEVICE FOR GENERATING AND DETECTING A FINGERPRINT FUNCTIONING AS A TRIGGER MARKER IN A MULTIMEDIA SIGNAL - A device is configured to perform a method that detects a trigger marker for an action corresponding to a segment of a multimedia signal. A fingerprint is generated based on the segment of the multimedia signal at a trigger time point. The generated fingerprint is stored in a database and communicated to the device. During playback of the multimedia signal, fingerprints of segments of the multimedia signal are generated and matched against fingerprints in the database. When a match is found, one or more associated actions for the segment are retrieved by the device. The trigger time point may be determined as a time point near or at the segment of the multimedia signal with the matched fingerprint. In this way, trigger markers for actions may be enabled without modifying the multimedia signal.2014-05-08
20140130078Providing a Viewer Incentive With Video Content - Video content may be transmitted with enhanced content or ancillary information that includes viewer loyalty incentives. The viewer loyalty incentives may be in the form of incentives, certificates or other information which may accumulate depending on viewing time. The more the viewer watches, the more incentives the viewer may receive.2014-05-08
20140130079METHOD AND DEVICE FOR PROVIDING A VIDEO STREAM FOR AN OBJECT OF INTEREST - A method and device for ranking video feeds provide a user with the best feed depending on what the user wishes to see. The method includes obtaining one or more video feeds and ranking the video feeds. The ranking is based, at least in part, upon input from a viewer indicating an object of interest. The ranking can consider things such as video stream resolution and signal strength.2014-05-08
20140130080SYSTEM AND METHOD FOR VOTING ON POPULAR VIDEO INTERVALS - A system and method is provided for identifying popular intervals in online hosted videos. To determine popular intervals associated with a video, a plurality of votes for one or more intervals of the video are collected and organized into a plurality of groups. Each group includes votes for intervals of the video that are similar to each other. A group having the highest number of votes is identified, and a most popular clip of the video is formed based upon the intervals in the group with the highest number of votes. This process can be carried out to determine the groups having the second and third highest number of votes in a single video to form the second and third most popular clips in that video, as well as across numerous videos to identify the most popular clips within different videos.2014-05-08
20140130081MANAGING A TV APPLICATION FOR OVER-THE-TOP TV - A method of displaying content on a TV using over-the-top (OTT) processes where the viewer has a user experience similar to or identical with conventional TV usage. The viewer powers on the TV and the last channel or service that was watched is displayed wherein all the content is displayed using OTT and the viewer does not have to execute any other steps, such as going to an app menu and launching a TV app in order to watch OTT content. It is determined whether an input source for the TV is set to a virtual input source. A TV app that enables OTT viewing (viewing TV content via an IP network) is executed. Once the TV app launches, normal TV operations can be performed. The virtual input source of the TV is linked to the TV application.2014-05-08
20140130082WEB-BASED VIDEO BROADCASTING SYSTEM HAVING MULTIPLE CHANNELS - A web-based video broadcast system, comprising at least one web page in communication with a host system to permit a plurality of users and a plurality of content providers to access the host system. The host system is programmed to register a plurality of channels, each associated with a unique channel identifier, and to associate each of at least a portion of the plurality of channels with at least one content provider responsive to a request by the at least one content provider. The host system is further programmed to permit the at least one content provider associated with a channel to selectively upload to the host system at least one video file and associate the at least one video file with the channel. The host system is further programmed to store the at least one video file and continuously display the at least one video file responsive to a user selecting the channel via the at least one web page.2014-05-08
20140130083IMAGE DOMAIN COMPLIANCE - Systems and methods for generating domain-compliant image data. Domain-specific usage rights may be evaluated. The domain-specific usage rights may be associated with the transfer of particular encoded image data to a particular computing system other than the computing system. The domain-specific usage rights may specify maximum allowable spatial frequency content of the particular encoded image data. Domain-compliant image data may be generated by removing particular disallowable spatial frequency content from the encoded image data prior to transfer to the particular computing system.2014-05-08
20140130084SCHEME FOR DETERMINING THE LOCATIONS AND TIMING OF ADVERTISEMENTS AND OTHER INSERTIONS IN MEDIA - A method for use with content includes analyzing a sequence of frames of the content, determining whether an area exists in a scene depicted by the sequence of frames where additional content such as advertising can be inserted without obstructing activity in the scene, for any such area, determining an amount of time that the area is available when the sequence of frames is being played, and for any such area, determining a size of the area. A storage medium storing a computer program for causing a processor based system to execute these steps and an apparatus for use with content are also disclosed.2014-05-08
20140130085Method and System to Provide Interactivity Using an Interactive Channel Bug - A method and system are disclosed to provide interactivity using an interactive channel bug. The interactive channel bug (e.g., an “interactive broadcast channel branding logo”) allows a television user to access a variety of interactive services. The interactive broadcast channel branding logo may be configured to launch a functionality determined by a broadcaster. This functionality may change over time. The form of the interactive broadcast channel branding logo may also change over time in which the availability of new interactive services is indicated.2014-05-08
20140130086System and Method for Bypassing an Emergency Alert Break-In for a Television Program - Embodiments of the disclosed invention include a system and a method for bypassing an emergency alert break-in for a recorded event. For example, in one embodiment, a set top box is disclosed that includes a memory component for storing computer executable instructions; a communication interface for receiving media content data from a cable service provider; a decoder module for decoding the received media content data; an emergency alert break-in monitoring module for identifying an emergency alert break-in from the received data; a digital video recorder controller module for determining whether the identified emergency alert break-in affects a recording of a program on a recorded channel; and an emergency alert break-in bypass module for bypassing the identified emergency alert break-in for enabling the digital video recorder controller module to record the program without the identified emergency alert break-in.2014-05-08
20140130087METHOD AND SYSTEM FOR PROVIDING ADDITIONAL INFORMATION ON BROADCASTING CONTENT - The present invention relates to a method and a system for providing additional information on broadcast content, and particularly, to a method and a system for providing additional information corresponding to broadcast content displayed on a television to a separate viewer's terminal. The method for providing additional information on the broadcast content is performed by a voice feature extraction server and comprises the steps of: extracting audio feature data of the broadcast content to store voice feature information previously grouped in preset units in a provided storage space; and detecting voice feature information corresponding to the voice feature data received from the viewer's terminal among the stored one or more pieces of voice feature information and transmitting the detected feature information to the viewer's terminal, wherein the viewer's terminal extracts the voice feature data from an input audio signal according to a preset method and transmits the extracted voice feature data to the voice feature extraction server, a temporal position corresponding to the voice feature data is determined from the received voice feature information, and the additional information is displayed at the temporal position.2014-05-08
20140130088SYSTEM AND METHOD FOR PROVIDING TIME-BASED CONTENT - System and method for providing time-based content. In one embodiment, time-based offers are presented to viewers of broadcast content, and may be presented on the same display device being used to display broadcast programming. In another embodiment, time-based offers are commercial offers inviting the viewer to purchase goods or services at a special rate for a limited time. Time-based offers may also be customized based on programming content being viewed and/or viewer profile data. Responses to presented time-based offers may be used to update viewer profile data and/or merchant conversion profile data, which is a measure of how effective the particular offer is.2014-05-08
20140130089SYSTEM AND METHOD FOR E-MAIL NOTIFICATION - A method includes receiving, from a set-top box device, an e-mail notification request including a set-top box identifier associated with the set-top box device and linked to an internet protocol television account identifier. The method includes accessing stored information that includes a plurality of set-top box identifiers and that links respective set-top box identifiers with corresponding e-mail accounts. The method further includes determining, based on the stored information and the set-top box identifier, an e-mail account of a first user maintained at a mail server, where the determination includes associating the internet protocol television account identifier with the e-mail account. The method further includes determining whether an e-mail has been received for the e-mail account at the mail server. When the e-mail has been received, the method includes generating an e-mail delivery notification and transmitting the e-mail delivery notification to the set-top box device associated with the e-mail notification request.2014-05-08
20140130090CONTEXTUAL GESTURE CONTROLS - Devices in a multi-media environment may be controlled by a controller that accepts gestures as inputs. The gestures may correspond to different commands based on a current operating mode of a multi-media device in the multi-media environment. A set top box may obtain information relating to the operating mode of the multi-media device, and may provide the information to the controller. The gestures may be translated to a context-specific command for the multi-media device by the set top box or the controller. Some gestures may persist across multiple devices or services as corresponding to one command.2014-05-08
20140130091USER INTERFACE INTERACTION SYSTEM AND METHOD FOR HANDHELD DEVICE AND TV SET - An interaction system and method for interaction between a handheld device and a television comprises the configuration and connection of a first HDMI transferring module and a television screen in addition to a configuration and connection of a second HDMI transferring module, a touch screen, a gesture managing module and a display managing module. A user interface system and method for interaction between a handheld device and a television can utilize a handheld device having a touch screen to operate the television without requiring the assistance of other hardware units, such as a mouse or keyboard. All the operations can be done by using only the handheld device, thereby reducing the costs of devices.2014-05-08
20140130092ELECTRONIC PROGRAM GUIDE WITH DISPLAY OF ALTERNATIVE-SOURCE MULTIMEDIA PROGRAM OPTIONS AND ESTIMATED AVAILABILITY PARAMETERS - An electronic program guide (“EPG”) coordinates the display of availability metadata representing the availability of listed multimedia programs from one or more alternative content sources. The EPG presents multimedia programs available from a primary content source. A system identifies alternative content sources for one or more multimedia programs listed in the EPG, estimates availability parameters from these alternative content sources, and supplements the EPG with availability metadata that represent the determined availability parameters of the versions of the multimedia programs from one or more alternative content sources. The system estimates missing availability parameters based on application of one or more availability rule sets, which can reflect, for example, a contractual agreement or arrangement, a data analysis performed on historical availability data for the multimedia program or the content provider, and the like.2014-05-08
20140130093METHOD AND SYSTEM FOR PROVIDING VIEWING NOTIFICATIONS FOR A SET-TOP BOX - The disclosed embodiments include a method for providing viewing notifications for a set-top box that includes the steps of: storing usage information associated with a media content received by the set-top box, the usage information containing a length of time that the media content was displayed; determining, using a processor, whether a viewing notification is to be sent to a particular user based on user preferences and the usage information; responsive to a determination that the viewing notification is to be sent to the particular user, retrieving a notification identifier associated with the particular user and sending the viewing notification regarding the usage information; receiving a response to the viewing notification from the particular user, wherein the response includes a partial command that is interpreted based on the viewing notification as a requested command to be performed by the set-top box; and performing, using the processor, the requested command.2014-05-08
20140130094USER INTERFACE - A method of providing access to a block of stored content includes transmitting a general EPG at a content receiver for display on a presentation device, the EPG including a plurality of channels having a plurality of programs available at a plurality of times, receiving input from a user to display a block guide, and transmitting the block guide wherein, the block guide is associated with the block of stored content for accessing the block of stored content, the block guide including a plurality of channels having a plurality of programs available for a selected airing time.2014-05-08
20140130095METHOD AND SYSTEM FOR PROVIDING ELECTRONIC PERSONALIZED MENU - The present invention provides a machine-implemented method of displaying an electronic personalized menu applied for a multimedia system, wherein the multimedia system provides a plurality of services for one or more users, wherein each of the plurality of services includes one or more service options/items, and the multimedia system comprises a sever, the method comprising: detecting recognition data corresponding to the one or more users and recognizing the identity and number of the one or more users by a recognition method; automatically logging into a personal or group account based on the identity and number of the one or more users and then the sever recording use habits of the one or more users of the personal or group account; and displaying an electronic personalized menu of the personal or group account based on the use habits recorded.2014-05-08
20140130096SYSTEM AND METHOD FOR ORGANIZING AND DISPLAYING A LIST OF TELEVISION PROGRAMS - A method for organizing a plurality of television programs is provided. The method includes (i) obtaining a first personalized list of television programs that are scheduled for broadcast at a current time, (ii) obtaining a second personalized list of television programs that includes television programs that are scheduled to be broadcast at a subsequent duration, (iii) displaying, at a display unit, the first personalized list of television programs that are scheduled for broadcast at the current time as a one dimensional set, and (iv) displaying, at the display unit, the second personalized list of television programs that are scheduled to be broadcast at the subsequent duration as a one dimensional set. The first personalized list of television programs and the second personalized list of television programs are personalized separately based on at least one parameter other than a channel associated with the television programs.2014-05-08
20140130097APPARATUS AND METHOD FOR TELEVISION - An apparatus for selecting television programs for display comprises a receiver for receiving audio/video data representing the programs and data indicating a schedule for the programs. The schedule includes programs transmitted by one or more broadcast transmission systems, and for one or more of the programs in the schedule an indication that the programs can be received by selectively streaming audio/video data representing the programs. A control processor receives the data indicating the schedule and generates signals representing the schedule for display so a user can select the programs for display or recording. The control processor determines that one of the programs is not available to be selectively streamed, and for the identified programs, identifies one or more alternative sources of the audio/video data relating to the programs and arranges for the generated signals representing the schedule of programs to include an indication of the alternatives for selection.2014-05-08
20140130098IMAGE DISPLAY APPARATUS AND METHOD FOR OPERATING THE SAME - A multifunctional display device and a method of controlling the same are disclosed herein. The method may include displaying a first card object in a first area of the display, displaying a second card object in a second area of the display, and partially displaying a third card object in a third area of the display to indicate that additional card objects are available for display. The first card object may be configured to display a video image and the second card object may have at least one link for connecting to a server. Based on a request to change the displayed card objects, the third card object may be displayed in the second area of the display and a fourth card object may be partially displayed in the third area of the display.2014-05-08
20140130099USER-INTIATED FEEDBACK AND CORRECTION OF PROGRAM METADATA THROUGH AN ELECTRONIC PROGRAM GUIDE - A system provides for display of an electronic programming guide (“EPG”) that facilitates user feedback to identify or propose corrections to potentially inaccurate program metadata through users' interactions with a user-feedback interface. The user-feedback interface may include a “flag-for-correction” feedback option whereby the user flags program metadata as potentially inaccurate. In response to receiving at least a specified threshold number of “flag-for-correction” indicators for particular program metadata, the system may alert an administrator to initiate the administrator's review of the flagged program metadata. The user-feedback interface can include an interface that permits the users to propose a corrected version of the identified program metadata. The system may then initiate administrative review of the program metadata in response to the proposed correction indicators or enable automatic correction of the program metadata in response to the user feedback.2014-05-08
20140130100METHOD, APPARATUS AND COMPUTER PROGRAM PRODUCT FOR SWITCHING TELEVISION CHANNELS - A method, an apparatus, and a computer program product for switching television channels, adapted to an electronic apparatus having a touch screen for controlling a television system to switch the television channels, are provided. A control panel including a first and a second switching region is displayed on the touch screen. The first switching region corresponds to a plurality of first television channels provided by the television system, and the second switching region corresponds to a channel list which includes a plurality of second television channels selected from the first television channels. Next, a touch operation performed on the control panel is detected by using the touch screen. When the touch operation is within the first switching region, the first television channels are switched according to the touch operation. When the touch operation is within the second switching region, the second television channels are switched according to the touch operation.2014-05-08
20140130101SYSTEM, TELEVISION RECEIVER, INFORMATION TERMINAL, CONTROL METHOD, PROGRAM, AND RECORDING MEDIUM - The present invention provides a system for remote control of a television with use of an information terminal, wherein the system is easier to use and causes less erroneous operation than the conventional systems. A system (2014-05-08
20140130102DETAILED INFORMATION MANAGEMENT SYSTEM - The present invention provides a detailed information management system configured so that detailed information linked to the viewed scene is displayed in real-time on a display of a terminal device such as a remote controller at hand, in a simple operation. The detailed information management system (2014-05-08
20140130103SYSTEMS AND METHODS FOR DISPLAYING AND INTERACTING WITH INTERACTION OPPORTUNITIES ASSOCIATED WITH MEDIA CONTENT - Methods to present video and purchasing function content embedded in the video in a single user interface. The user interface may be configured to allow the user watching the video to take an action with respect to the video content, which may include items for purchase, and to allow the user to both watch the video content, and select the item for purchase in one transaction step. In other embodiments, the video content is segmented such that a user is provided the ability to select one or more objects in the video. In other embodiments, the user interface provides a dynamic message such as a “call to action” to a user. The call to action may be timed with the video and/or with the user viewing selections in order to urge a user to take a pre-determined action such as purchase a product, make a donation, and the like.2014-05-08
20140130104METHOD AND SYSTEM FOR ENHANCING DELIVERY OF THIRD PARTY CONTENT - An approach for enabling third party video content to be assigned a higher priority for delivery over a service provider network is described. A content delivery platform determines whether a third party content provider or video content to be delivered fulfill one or more criteria for permitting the content delivery system direct access to a video on demand network of a network provider. The content delivery platform then assigns a higher delivery priority to the video content based on the direct access of the video on demand network by the content delivery system.2014-05-08
20140130105METHOD AND APPARATUS FOR BROWSING USING ALTERNATIVE LINKBASES - Systems and methods for navigating hypermedia using multiple coordinated input/output device sets. Disclosed systems and methods allow a user and/or an author to control what resources are presented on which device sets (whether they are integrated or not), and provide for coordinating browsing activities to enable such a user interface to be employed across multiple independent systems. Disclosed systems and methods also support new and enriched aspects and applications of hypermedia browsing and related business activities.2014-05-08
20140130106METHOD AND SYSTEM FOR REMOTELY TRANSCODING CONTENT - A system and method for remotely transcoding content includes a set top box generating a playlist corresponding to content titles stored in a memory of the set top box. A user device is in communication with the cloud location and the set top box through a network. The user device reviews the playlist and selects a first content title from the playlist to form a selection. The cloud location includes a transcoder device transcoding content corresponding to the selection to form transcoded content. One of the cloud location and the set top box communicates the transcoded content to the user device.2014-05-08
20140130107SYSTEM AND METHOD FOR PROVIDING SERVICE TO A MULTI-DWELLING UNIT - A system and method for distributing television signals includes a multi-switch module multiplexing television signals therethrough. The system further includes a plurality of unit configurations having respective power sources therein. The plurality of unit configurations receives the television signals. The system also includes a splitting module in communication with the multi-switch module and the plurality of unit configurations whereby at least one of the plurality of unit configurations powers the multi-switch module.2014-05-08
20140130108FRONT MODULE HAVING TRIPLEXER FOR MULTIMEDIA OVER COAX ALLIANCE - Disclosed herein is a front module having a triplexer. According to a preferred embodiment of the present invention, the front module includes: a triplexer receiving and distributing a MoCA receiving signal and a cable broadcasting signal from a coaxial cable and receiving the MoCA transmitting signal and outputting the received MoCA transmitting signal to the coaxial cable; a transceiver for MoCA removing and outputting noise from the MoCA receiving signal input through the triplexer and amplifying the MoCA transmitting signal input from the outside and providing the amplified MoCA transmitting signal to the triplexer; and a receiver for cable removing and outputting noise from the cable broadcasting signal input through the triplexer.2014-05-08
20140130109SYSTEM AND METHOD FOR PLAYING DIGITAL TELEVISION PROGRAM, AND DIGITAL TELEVISION RECEPTION TERMINAL - A system for playing digital television. A server presets a video on demand (VOD) protocol specification, and transmits, according to the VOD protocol specification, a VOD service list and additional information to a digital television receiving terminal. The receiving terminal presets the VOD protocol specification, and stores, according the VOD protocol specification, the received VOD service list and additional information in an on-demand program database. Relative programs in the on-demand program database are matched according to a matching mark input by a user and displayed. In response to a program on-demand request of the user, the receiving terminal obtains the television program from the server and plays that program.2014-05-08
20140130110Methods And Systems For Content Control - Methods and system for providing content are disclosed. One method can comprise receiving a request for data at a first time, wherein the data comprises a first time duration, determining a buffer size based upon the first time duration, and determining a playback window based upon the determined buffer size and the first time. The method can also comprise synchronizing presentation of content on a plurality of devices.2014-05-08
20140130111AGENT-BASED COMMUNICATION SERVICE QUALITY MONITORING AND DIAGNOSTICS - Diagnosis of a service affecting condition can be performed by obtaining first diagnostic information from a first software agent installed on a first communication enabled device within a customer premises and second diagnostic information from a second software agent installed on a second communication enabled device within the customer premises. The first and second diagnostic information can be processed to determine information regarding a service affecting condition.2014-05-08
20140130112METHOD FOR ACCESSING A SERVICE, IN PARTICULAR A WEB PORTAL, BY MEANS OF A TERMINAL FOR REPLAYING A MULTIMEDIA STREAM - A method is provided for accessing a service by a terminal for replaying a multimedia stream. The terminal performs the following steps: reception of the multimedia stream; detection, in the multimedia stream, of an item of information pertaining to access to a service; storage of the item of access information; association of the item of access information with a predefined man-machine interface element; and in the event of interaction of a user with the man-machine interface element, execution of an operation for access to the service using the item of access information.2014-05-08
20140130113NOISE REDUCTION APPARATUS WITH ISOLATION TRANSFORMERS IN AN INTERNET PROTOCOL TELEVISION SYSTEM - A residential gateway includes an Internet Protocol television (IPTV) network communication port and a first isolation transformer circuit. The IPTV network communication port is configured to receive a signal from an ITPV network. The first isolation transformer circuit is in communication with the IPTV network communication port. The isolation transformer is configured to receive the signal from the IPTV network communication port, and to transform a ground of the signal to float at a ground potential of a power source of the residential gateway2014-05-08
20140130114APPARATUS AND METHOD OF PLAYING BROADCAST CONTENT IN BROADCASTING SYSTEM - A method and an apparatus for playing broadcast content in a broadcasting system are provided. The method and the apparatus enable a viewer to watch an entire event by broadcasting the event through different networks in a condition that the event may not be broadcast from start to finish over a single broadcasting network.2014-05-08
20140130115ADAPTIVE VIDEO SERVER WITH DATA RATE CONTROL AND METHODS FOR USE THEREWITH - A streaming video server includes a virtual file system that stores playlist data corresponding to a plurality of video programs available from at least one video source and that stores variant playlist data corresponding to each of the plurality of video programs that indicates a single variant for streaming each of the plurality of video programs. The streaming video server receives a request for a selected one of the plurality of video programs from a client device. The selected one of the plurality of video programs is retrieved from the at least one video source in response to the request. A rate generator generates rate data based on the transmission feedback data. A plurality of encoded segments are generated from the selected one of the plurality of video programs, based on rate data.2014-05-08
20140130116SYMBOL GESTURE CONTROLS - Devices in a multi-media environment may be controlled by a controller that accepts gestures as inputs. The gestures may represent characters and/or symbols. These symbol gestures may correspond to different commands based on a current operating mode of a multi-media device in the multi-media environment. A set top box may obtain information relating to the operating mode of the multi-media device, and may provide the information to the controller. The symbol gestures may be translated to a symbol-specific command for the multi-media device by the set top box or the controller. Some gestures may persist across multiple devices or services as corresponding to one command.2014-05-08
20140130117SYSTEM, APPARATUS AND METHOD FOR SECURING ELECTRONIC DATA INDEPENDENT OF THEIR LOCATION - The present disclosure relates to a system, apparatus and method for securing electronic files and folders independent of their location. A computer network implemented system for securing data is provided. The system includes a central server (2014-05-08
20140130118APPLICATION BASED POLICY ENFORCEMENT - One embodiment is directed to a system that comprises a network device, including at least a first port, which is configured to analyze information within one or more messages received during a session initiated by another network device. The system is configured to perform operations including determining a total number of sessions for the first port of the network device and determining whether the total number of sessions for the first port exceeds a threshold value. If the total number of sessions for the first port exceeds the threshold value, an application associated with the first port is classified as a peer-to-peer application. Thereafter, a policy may be enforced based on this classification.2014-05-08
20140130119AUTOMATED MULTI-LEVEL FEDERATION AND ENFORCEMENT OF INFORMATION MANAGEMENT POLICIES IN A DEVICE NETWORK - Methods, apparatus, systems, and non-transitory computer-readable media for managing a plurality of disparate computer application and data control policies on a computing device, especially a computing device connected to a computer network, are described. In one example, at least one policy distribution point is provided that includes least one policy distribution point including at least one information management policy. A plurality of policy enforcement points, including a first policy enforcement point operating at a first policy enforcement level, and a second enforcement point operating at second policy enforcement level, are also provided. A first policy element to the first policy enforcement point, and a second policy element to the second policy enforcement point, are allocated. A management compartment in computer memory in communication with said computing device including one or more computer applications, data, and metadata specified and controlled by the information management policy is also provided.2014-05-08
20140130120POLICY-BASED SELECTION OF REMEDIATION - Methods and systems for remediating a security policy violation on a computer system are provided. According to one embodiment, an agent running on an endpoint system collects information regarding a program-code-based operational state of the endpoint system. The agent transmits the information to a remote computer system via a network coupling the endpoint system and the remote computer system in communication. The remote computer system enforces one or more security policies with respect to the endpoint system based on the received information.2014-05-08
20140130121System and Method for Information Risk Management - The present invention provides a system and method for evaluating risk associated with information access requests. The information access requests are collected, assigned a risk level according to user defined policies, a total risk is calculated and presented to user. The user can select a high risk event for further analysis. The system will break down the event into basic elements, so the user can ascertain the risk. The system allows a user to customize a report and the customized report can be saved as a template for future use.2014-05-08
20140130122SYSTEMS AND METHODS FOR PROVIDING SECURITY SERVICES DURING POWER MANAGEMENT MODE - Systems and methods for providing security services during a power management mode are disclosed. In some embodiments, a method comprises detecting with a mobile security system a wake event on a mobile device, providing from the mobile security system a wake signal, the providing being in response to the wake event to wake a mobile device from a power management mode, and managing with the mobile security system security services of the mobile device. Managing security services may comprise scanning a hard drive of the mobile devices for viruses and/or other malware. Managing security services may also comprise updating security applications or scanning the mobile device for unauthorized data.2014-05-08
20140130123METHOD FOR OPERATING INVISIBLE SYSTEM SERVICES ON ANDROID PLATFORM - A method for operating an invisible system service on Android platform is disclosed. The method for operating system services on Android platform includes selectively registering a created system service in a context manager according to a type of the created system service, where the type of the system service comprises a first type for permitting access from an outside and a second type for not permitting access from the outside, and the selectively registering comprises registering in the context manager the created system service belonging to the first type and not registering in the context manager the created system service belonging to the second type.2014-05-08
20140130124Partially Virtualizing PCR Banks In Mobile TPM - In accordance with the exemplary embodiments of the invention there is at least a method and apparatus to perform operations including triggering, with an entity of a device, an attestation with a trusted platform module/mobile platform module of the device; and in response to the triggering, sending information comprising a platform configuration register value towards the entity, where the platform configuration register depends on measurements of the entity triggering the attestation.2014-05-08
20140130125METHOD AND APPARATUS FOR ALLOCATING AND OBTAINING IP ADDRESS - A switch sends an authentication request message to a client at intervals of a preset duration. A response message sent by the client is received. The response message carries authentication information of a user carried on the client. An authentication message is sent to a server according to the response message. An authentication reply message sent by the server is received. The authentication reply message carries information about an authentication domain authorized by the server to the user. It is determined, according to the authentication reply message, whether the authentication domain of the user is changed. If the authentication domain of the user is changed, an authentication domain change message is sent to the client according to the authentication reply message, so that the client obtains an IP address again.2014-05-08
20140130126SYSTEMS AND METHODS FOR AUTOMATICALLY IDENTIFYING AND REMOVING WEAK STIMULI USED IN STIMULUS-BASED AUTHENTICATION - Systems and methods for identifying a weak stimulus in a stimulus-based authentication system is provided. Counters are associated with each stimulus used in the authentication and a first counter is incremented when the stimulus is used in an authentication session and a second counter is incremented when a successful event occurs with respect to the stimulus during the authentication session, but the authentication session ultimately fails. A ratio of the second counter and the first counter is compared to a threshold and the stimulus is identified as weak when the ratio exceeds the threshold. The stimulus may then be removed and no longer be used in the stimulus-based authentication system.2014-05-08
20140130127Risk Adjusted, Multifactor Authentication - A computer-implemented method comprising: receiving, from a device used by a user, a request to access a resource hosted by a computer system; identifying, by the computer system, a level of risk associated with the user requesting access to the resource; adjusting, by the computer system an authentication standard for access to the resource, adjusting based on the identified level of risk; determining values for authentication factors used in authenticating the user's access to the resource; applying weights to the values for the authentication factors; and determining, based on a comparison of the weighted values to the adjusted authentication standard, whether the user is authorized to access the resource.2014-05-08
20140130128METHOD AND SYSTEM FOR IMPROVING STORAGE SECURITY IN A CLOUD COMPUTING ENVIRONMENT - A method of improving storage security in a cloud environment includes interfacing a secure microcontroller with a storage controller associated with a client device in the cloud environment to authenticate a platform associated with the storage controller and registering the storage controller with an authentication server configured to be set up in the cloud environment. The method also includes authenticating the storage controller based on a communication protocol between the client device, the authentication server a td the storage controller, and obtaining, at the client device, a signature data of the storage controller following the authentication thereof. The signature data is configured to be stored in the secure microcontroller interfaced with the storage controller.2014-05-08
20140130129COUNT VALUES TO DETECT DISCONNECTED CIRCUIT - A connector including a circuit configured to be coupled to a network and an end device. The circuit configured to transmit count values in a count sequence over the network to detect whether the circuit has been, at least temporarily, disconnected from at least one of the network and the end device.2014-05-08
20140130130DYNAMIC RADIUS - A system includes a remote authentication dial in user service (RADIUS) server in communication with a network access server. The network access server provides an authentication request to the RADIUS server. The authentication request includes at least a user identifier and a device identifier. The RADIUS server determines an authentication format utilized by the network access server based on the received authentication request. The system may also determine an authorization level to provide with an authentication response.2014-05-08
20140130131METHOD AND DEVICE FOR DETERMINING NETWORK DEVICE STATUS - Disclosed is a method of transparently detecting authentication status of endpoint devices in a network. This method may be used for differentiating guest or rogue endpoints from enterprise endpoints.2014-05-08
20140130132FEATURE SET DIFFERENTIATION BY TENANT AND USER - A system for online collaboration includes an application for online collaboration, the application including an application feature set, a control module programmed to receive a request from a user to access a tenancy associated with the application on the system, the tenancy including a site provisioned for a tenant, the request including a tenancy identifier identifying the tenancy and a user identifier identifying the user, the control module using the tenancy identifier to identify a tenancy feature set associated with the tenancy, and the control module using the user identifier to identify a user feature set associated with the user, and a web-page render module programmed to generate a collaboration web site including a site feature set including the tenancy feature set and the user feature set, the web site being sent to the user for rendering on the user's computing device.2014-05-08
20140130133METHOD OF SECURING NETWORK ACCESS RADIO SYSTEMS - A method of providing security for network access radio systems and associated access radio security systems used with the systems. The method includes connecting an access radio having a radio link to a network; communicating between the access radio and a computer over the network using a ping application having ping commands and unique encrypted codes; and enabling operation of the access radio when the access radio is receiving ping commands. Typically, the access radio and the computer are nodes on the network and the network is a local area network (LAN). The ping application sends packets of information from the computer to the access radio and receives a response from the access radio. The ping application must be functioning (i.e., sending and receiving commands between the computer and the access radio) to enable the access radio to communicate via the radio link with a remote network.2014-05-08
20140130134Managing and Providing Access to Applications in an Application-Store Module - According to one embodiment, a system includes an interface and a processor. The interface receives, from a device, a request to access an application-store module, the device being associated with a first user. The processor determines a device type associated with the device; determines an operating system associated with the device; determines a user role associated with the first user; and determines, based on the device type, the operating system, and the user role, one or more applications. The interface communicates, to the device, a first set of information to be displayed on the device, the first set of information being associated with the one or more applications.2014-05-08
20140130135INTEGRATED COLLABORATION ENVIRONMENT - Described herein is a technology for facilitating the integration of a collaboration environment. In some implementations, an activity associated with a business object is accessed via a work center. A request to post the activity is sent to a collaboration application. The collaboration application then returns an activity identifier, and the user is redirected to the activity identifier.2014-05-08
20140130136ABILITY FOR AN ADMINISTRATOR TO IMPERSONATE A USER WHEN ACCESSING A USER APPLICATION - A method for an administrator to impersonate a user is provided. A portal manager of a server detects an action initiated in the administrator portal pertaining to a user portal during a current session. The portal manager calculate a current user-to-impersonate identifier using a user identifier associated with the user portal, an administrator identifier associated with the administrator portal, and a session identifier associated with the current session. The portal manager compares the current user-to-impersonate identifier with a stored user-to-impersonate identifier. The portal manager permits the action initiated in the administrator portal to be executed in the user portal when the current user-to-impersonate identifier matches the stored user-to-impersonate identifier.2014-05-08
20140130137METHOD OF DEVICE-TO-DEVICE DISCOVERY AND APPARATUS THEREOF - Disclosed are a method of device-to-device discovery and an apparatus for the same. A method of device-to-device discovery performed in a discovery terminal may include receiving a discovery identifier of the discovery terminal from a device-to-device server; performing an authorization procedure on performing the restricted discovery of an application located in the discovery terminal with the device-to-device server; and obtaining terminal information of a discoverable terminal as a counterpart terminal with which performs the restricted discovery from the device-to-device server, when the authorization is completed. Thus, the device-to-device discovery may be performed efficiently.2014-05-08
20140130138METHOD AND SYSTEM FOR IMPLEMENTING THIRD-PARTY AUTHENTICATION BASED ON GRAY LIST - The present invention relates to a communication method, comprising: receiving a service request from a requesting party; performing a third-party authentication on the service request according to a gray list and obtaining an authentication result; and processing the service request according to the authentication result. The present invention relates to a communication system, comprising: means for receiving a service request from a requesting party; means for performing a third-party authentication on the service request according to a gray list and obtaining an authentication result; and means for processing the service request according to the authentication result. The present invention implements a third-party control of services based on the gray list, and can effectively manage a variety of services in the communication system.2014-05-08
20140130139Wireless Local Area Network Access Apparatus and Operating Method Thereof - The present invention pertains to a wireless local area network (WLAN) access apparatus and a WLAN access method, and more particularly, to a WLAN access apparatus for determining approval/denial of an access to a mobile communication terminal when access to a WLAN is requested through the WLAN access apparatus and an operating method thereof. Embodiments of the present invention include: a WLAN access apparatus, which has a unique identification (ID), for connecting a wireless network with a mobile communication terminal according to a wireless data exchange protocol; a social network service (SNS) server for providing an SNS; and an authentication server for determining a WLAN access approval according to whether a user of the mobile communication terminal successfully logs into the SNS server when the mobile communication terminal requests for access to a WLAN through the WLAN access apparatus.2014-05-08
20140130140SECURITY IN A GEO-SPATIAL ENVIRONMENT - A method, apparatus, and system of security in a geo-spatial environment are disclosed. In one embodiment a privacy server verifies that each user of the community network lives at a residence associated with a claimable residential address of the community network formed through a social community module of a privacy server using a processor and a memory, to obtain from each user of the community network, using the processor of a computing device, member data associated with each user, the member data including an address, to associate the address with a profile of each user, to determine a location of each user based on the member data, to store the member data in a database, and to obtain a personal address privacy preference from each user, the personal address privacy preference specifying if the address should be displayed to other users.2014-05-08
20140130141SYSTEM AND METHOD FOR KEY CHALLENGE VALIDATION - A system and method for providing key challenge validation is provided. In example embodiments, an initiation of a transaction is detected and a challenge comprising a string of characters is generated based on the detection. The string of characters includes transaction specific information indicating a detail of the transaction. The challenge is presented whereby the string of characters includes a challenge key. A response to the challenge is received that includes the challenge key. In various example embodiments, the transaction is validated based on an identification of the key challenge of the string of characters.2014-05-08
20140130142Method and Cloud Security Framework for Implementing Tenant License Verification - A method and cloud security framework for implementing tenant license verification. The method and framework conduct tenant license verification transparently to cloud resources and users who request them. An exemplary method comprises receiving by the framework from a client device a request for access to a cloud resource and user information; authenticating by the framework a user of the device using the information; obtaining by the framework a security context for the user including a tenant identifier identifying a multi-user enterprise to which the user belongs using the information; transmitting by the framework to an outside entity over a web services interface a tenant license verification request including the identifier; receiving by the framework from the entity a verification that a tenant license associated with the identifier is in good standing; and granting by the framework to the device access to the resource.2014-05-08
20140130143MOBILE TERMINAL AND CONTROL METHOD THEREOF - A mobile terminal for receiving a message and a control method thereof are provided. The mobile terminal includes: a wireless communication unit configured to receive at least one of authentication information and a message from an external electronic device; an authenticating unit configured to perform user authentication by using the authentication information received from the electronic device; and a controller configured to perform a control operation in response to a control command included in the received message when the user authentication is performed, and transmit a message indicating the result of performing the control operation to the electronic device.2014-05-08
20140130144Method and System for Obtaining Application Information of Multiple Websites - The present disclosure describes a method and an apparatus for obtaining application information of multiple websites. A corresponding relationship between a main account and multiple pieces of association information is saved in advance. Each piece of association information comprises application authorization information and authentication information of a third-party website. A login request carrying the main account transmitted by a user is received and authenticated. After the user logs in, the multiple pieces of association information is obtained from the corresponding relationship according to the main account carried in the login request. An application information obtaining request is transmitted to multiple third-party websites corresponding to the multiple pieces of association information. A requested result of the application information obtaining request is returned to the user.2014-05-08
20140130145USER DEVICE ADDING SECURE TOKEN TO NETWORK REQUESTS - A user device is configured to receive a request to obtain a service, an application, or content from a provider; obtain, based on receiving the request, a token that may correspond to a user of the user device and may obfuscate an identity of the user to the provider; modify the request to include the token and to form a modified request; provide the modified request to the provider; receive, based on providing the modified request, information regarding the service, the application, or the content from the provider; and present the information for display on a display screen.2014-05-08
20140130146MEDIA ACCESS CONTROL ADDRESS TRANSLATION IN VIRTUALIZED ENVIRONMENTS - A method and a network device are provided to transmit network packets through a network security device. The method, performed by the network device, receives a request to send a network packet from a first computing device to a second computing device over a network that includes the network device and the network security device. The network packet includes a first network interface identifier for identifying the first computing device and a second network interface identifier for identifying the second computing device. The method identifies third and fourth network interface identifiers that cause the network packet to be transmitted through the network security device. The method transmits the network packet over the network through the network security device using the third and fourth network interface identifiers. The method transmits the network packet to the second computing device using the first and second network interface identifiers.2014-05-08
20140130147ENABLING ACCESS TO A SUBSET OF DATA - A method includes receiving, at a computing device, one or more replicated authorization databases. At least one of the one or more replicated authorization databases corresponds to a subscription to access selected data. The selected data is aggregated from a plurality of sources. The method also includes storing the one or more replicated authorization databases at the computing device. The method also includes determining, via the replicated authorization databases, user permission to access the selected data via the computing device. The method also includes enabling access to the selected data at the computing device after determining the user permission to access the selected data.2014-05-08
20140130148INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, AND COMPUTER PROGRAM - An information processing device includes a display that displays an input screen including a plurality of images, an image selecting section that selects at least one image within the input screen in accordance with an input operation from a user, and a controller that controls the information processing device on a basis of the image selected by the image selecting section.2014-05-08
20140130149REFINEMENT-BASED SECURITY ANALYSIS - A method, computer program product, and computer system for assigning, by a computing device, a value to a first data-flow of a first summary associated with a control flow graph and assigning the value to a second data-flow of a second summary associated with the control flow graph. The first data-flow with the value is identified to flow into a type of sink. The second data-flow with the value is identified not to flow into the type of sink. The first summary of a behavior of the first data-flow is refined in response to identifying that the first data-flow does flow into the type of sink. Refinement of the second summary of a behavior of the second data-flow is skipped in response to identifying that the second data-flow does not flow into the type of sink.2014-05-08
20140130150CONTENT-BASED ISOLATION FOR COMPUTING DEVICE SECURITY - The subject disclosure is directed towards securing a computing device using content-based isolation. When the computing device requests content data having different ownership, a monitor component identifies and groups trusted portions of the content data into one or more isolation containers such that only trusted programs are permitted access. Other programs are, therefore, untrusted and can be denied access in order to prevent malicious activity, unless access is approved by the content owner.2014-05-08
20140130151METHODS FOR PROVIDING ANTI-ROLLBACK PROTECTION OF A FIRMWARE VERSION IN A DEVICE WHICH HAS NO INTERNAL NON-VOLATILE MEMORY - Methods, systems, computer-readable media, and apparatuses for providing anti-rollback protection in a device which has no internal non-volatile memory are presented. One embodiment comprises of a device for providing anti-rollback protection. The device may obtain a firmware version number associated with a first firmware installation for the device, wherein the device is implemented on a substrate that includes no non-volatile memory. The device may obtain a lowest acceptable firmware version number, wherein the lowest acceptable firmware version number is stored in a secure element environment, wherein the secure element environment utilizes memory separated from the substrate. The device may compare the firmware version number and the lowest acceptable firmware version number, wherein if the firmware version number is less than the lowest acceptable firmware version number, then disallow the first firmware installation In at least one arrangement, the device comprises a near field communication (NFC) controller.2014-05-08
20140130152DEFENSE AGAINST DNS DOS ATTACK - A method for defending a computer system comprising a DNS server against a DoS or a DDoS attack directed at said DNS server comprises replacing the address of said system provided by a user to a client software with an alternative address, wherein said address is replaced by a software agent associated with said user, such that said client software is capable of connecting with said system.2014-05-08
20140130153SOUND AND EFFECTIVE DATA-FLOW ANALYSIS IN THE PRESENCE OF ALIASING - A method is disclosed that includes, using a data flow model of a program suitable for taint analysis of the program, tracking information from sources of taint to entities in a heap using a model of the heap based on the program. The tracking is performed so that the information is relevant for taint propagation and is performed in a manner that is field-sensitive for the entities in the heap. The method includes, based on output of the tracking, performing data-flow analysis to determine taint flow from the sources of the taint through data flow paths to sinks using the taint.2014-05-08
20140130154SOUND AND EFFECTIVE DATA-FLOW ANALYSIS IN THE PRESENCE OF ALIASING - An apparatus is disclosed including one or more memories including computer-readable program code and one or more processors. The one or more processors, in response to execution of the computer-readable program code, cause the apparatus to track, using a data flow model of a program suitable for taint analysis of the program, information from sources of taint to entities in a heap using a model of the heap based on the program. The tracking is performed so that the information is relevant for taint propagation and is performed in a manner that is field-sensitive for the entities in the heap. The one or more processors in response to execution of the computer-readable program code cause the apparatus to perform, based on output of the tracking, the operation of performing data-flow analysis to determine taint flow from the sources of the taint through data flow paths to sinks using the taint.2014-05-08
20140130155METHOD FOR TRACKING OUT ATTACK DEVICE DRIVING SOFT ROGUE ACCESS POINT AND APPARATUS PERFORMING THE METHOD - A method including: detecting an unauthorized soft rogue AP; collecting information about the detected soft rogue AP, information about one or more access terminals connected to the detected soft rogue AP, and information about one or more candidate attack terminals that are not connected to the detected soft rogue AP, and storing the collected information;2014-05-08
20140130156REFINEMENT-BASED SECURITY ANALYSIS - A method, computer program product, and computer system for assigning, by a computing device, a value to a first data-flow of a first summary associated with a control flow graph and assigning the value to a second data-flow of a second summary associated with the control flow graph. The first data-flow with the value is identified to flow into a type of sink. The second data-flow with the value is identified not to flow into the type of sink. The first summary of a behavior of the first data-flow is refined in response to identifying that the first data-flow does flow into the type of sink. Refinement of the second summary of a behavior of the second data-flow is skipped in response to identifying that the second data-flow does not flow into the type of sink.2014-05-08
20140130157METHOD AND SYSTEM FOR DISCRETE STATEFUL BEHAVIORAL ANALYSIS - A method for analyzing a computing system includes the steps of at a first moment in time, scanning the resources of the computing system for indications of malware, at a second moment in time scanning the resources of the computing system for indications of malware and determining the system executable objects loaded on the computing system, determining malware system changes, identifying a relationship between the malware system changes and the system executable objects loaded on the computing system, and identifying as suspected malware the system executable objects loaded on the computing system which have a relationship with the malware system changes. The malware system changes include differences between the results of scanning the resources of the computing system for indications of malware at the second and first moment of time.2014-05-08
20140130158IDENTIFICATION OF MALWARE DETECTION SIGNATURE CANDIDATE CODE - A region of HTML or PDF file bytecode run on a virtual machine is identified as possible malware, allowing a detection signature to be generated. A determination is made, based on code behavior, that malware may be present. Variables visible in this identification start state can be found by mapping the start state to scopes in an abstract syntax data structure. Searching previously executed states of the virtual machine for any assignment of a variable that belongs to the set of variables of interest provides a set of assignments of interest, even in obfuscated code. Nonterminated assignments of interest will lead in turn to other variables of interest and assignments of interest, until all assignments of interest are terminated. At that point, a region of code defined by the assignments of interest is identified as a malware detection signature generation candidate, and submitted to a human or automated analyst.2014-05-08
20140130159METHODS AND SYSTEMS FOR DETECTING AN ELECTRONIC INTRUSION - Methods and systems for detecting an electronic intrusion are described. The system receives a notification, over a network, from a first application server that is hosting a first electronic service that is hosting a first user account. The notification reports the detection of a user activity associated with the first user account. The first user account is monitored for user activity. Next, the system may identify the notification reporting the detection of the user activity associated with the first user account as a possible electronic intrusion into the first account.2014-05-08
20140130160SYSTEM AND METHOD FOR RESTRICTING PATHWAYS TO HARMFUL HOSTS IN COMPUTER NETWORKS - System and method for detecting malicious activity in a computer network that includes hosts and connectors between the hosts. Network pathways to a plurality of investigated hosts are explored. A graph is formed based on results of the exploring of the network pathways. The graph represents topology of explored portions of the computer network, including connectors (e.g., communication links) between the investigated hosts and intermediary hosts situated along explored pathways that include the investigated hosts, and an indication of a prevalence of connectors in pathways to each of the investigated hosts. The prevalence of connectors along pathways to each of the investigated hosts is compared against a threshold, and any suspicious host situated along pathways to a common investigated host that is associated with a connector having a low prevalence that is below the prevalence threshold is identified. An access restriction can be associated with the suspicious host.2014-05-08
20140130161System and Method for Cloud-Based Detection of Computer Malware - Disclosed are systems, methods and computer program products for detecting computer malware. In one example, a security server receives information about a suspicious software object detected by a client computer using one or more malware detection methods. The server identifies the malware detection methods used to detect the suspicious object, and selects one or more different malware detection methods to check whether the suspicious object is malicious or clean. The server analyzes the suspicious object using the selected one or more different malware analysis methods to check whether the object is malicious or clean. If the object is determined to be malicious, the server generates and sends to the client computer detection instructions specific to the one or more malware detection methods used by the client computer for detecting and blocking the malicious object on the client computer.2014-05-08
20140130162PHISHING PREVENTING SYSTEM AND OPERATING METHOD THEREOF - A phishing preventing system includes: a user computer outputting, at the time of accessing a predetermined website, a request signal for verifying whether the website is authenticated; a web server generating link information on the website at the time of inputting user information on the user computer and the request signal at the time of accessing the website and outputting the link information to the user computer; and a user terminal verifying whether the website is authenticated by comparing the link information with set normal authentication information by receiving the user information corresponding to the link information from the web server at the time of inputting terminal link information corresponding to the link information from the user computer.2014-05-08
20140130163Method and Apparatus for Setting Secure Connection in Wireless Communications System - A method of setting a secure connection in a wireless communications system is disclosed. The method comprises setting a protocol information to a terminal; and checking a packet received in the terminal according to the protocol information; wherein the packet comprises a protocol type, a source port, and a destination port.2014-05-08
20140130164Malicious Object Detection - Malicious object detection is disclosed. An apparatus includes one or more processors, and one or more memories including computer program code. The one or more memories and the computer program code are configured to, with the one or more processors, cause the apparatus at least to perform: obtain image data; obtain association data relating to the image data; identify the image data as corresponding to an identified image among known reference images; and set reputation data of the association data as suspicious, if the association data does not match acceptable associations for the identified image.2014-05-08
20140130165Protecting a User from a Compromised Web Resource - According to an aspect of the invention, there is provided a method of protecting a user from a compromised web resource. The method may include monitoring a user's requests for trusted web resources to determine one or more web resources to be checked. The method may include querying a network database based on the determined one or more web resources to obtain historical data relating to whether any of the one or more web resources has been compromised at any time during a preceding time period. The method may include providing a predetermined response to protect the user if any of the one or more web resources has been compromised.2014-05-08
20140130166GEOGRAPHICAL INTRUSION MAPPING SYSTEM USING TELECOMMUNICATION BILLING AND INVENTORY SYSTEMS - Systems and methods for geographically mapping a threat into a network having one or more network points include receiving threat information identifying a threat to a point of the network, correlating the threat information with location information for the identified network point, and network identification information for the identified network point, and generating a map displaying a geographical location of the threat.2014-05-08
20140130167SYSTEM AND METHOD FOR PERIODICALLY INSPECTING MALICIOUS CODE DISTRIBUTION AND LANDING SITES - A system and method for periodically inspecting malicious code distribution and landing sites, which receives a malicious-suspected URL from a management server; collects a file which is created when the malicious-suspected URL is connected and self-inspecting existence of the malicious code in the collected file using a commercial vaccine; traces, if a malicious code is detected in the collected file, a final distribution site distributing the detected malicious code; confirms information on a landing site connected to the final distribution site and registering the final distribution site and the landing site in a landing/distribution site database; confirms whether or not the final distribution site and the landing site registered in the landing/distribution site database are connectible; and updates the landing/distribution site database according to whether or not the final distribution site and the landing site are connectible.2014-05-08
20140130168ANTIVIRUS SYSTEM AND METHOD FOR REMOVABLE MEDIA DEVICES - A removable media device, which may be a USB attached device or other type of removable media device, includes a software program located on the device which upon startup or access, the software program scans one or more of electronic files stored on the removable media device and electronic files being transferred to or from the electronic media device and to or from a host computing system for the detection of viruses therein. The software program is further configured to block the transfer of detected virus-containing electronic files and to disallow the copy or writing of files to or from the removable media device to or from a host computing system that can not be scanned. The software program is further configured to block the encryption of files being written to a removable media device if such device contains hardware or software encryption if such files can not be scanned.2014-05-08
Website © 2025 Advameg, Inc.