21st week of 2015 patent applcation highlights part 81 |
Patent application number | Title | Published |
20150143409 | METHODS AND SYSTEMS FOR RECOMMENDING MEDIA CONTENT RELATED TO A RECENTLY COMPLETED ACTIVITY - Methods and systems are disclosed herein for a media guidance application that recommends media content based on activities recently performed by a user. For example, in response to determining that a user recently finished the laundry, the media guidance application may recommend a movie that other users accessed after finishing the laundry. | 2015-05-21 |
20150143410 | SYSTEM AND METHOD FOR PRODUCT PLACEMENT AMPLIFICATION - A system that incorporates the subject disclosure may include, for example, a memory that stores executable instructions that, when executed by the processor, facilitate performance of operations. The operations comprise obtaining product image data and comparing image data of a media program with the product image data. A product placement in the media program is determined based on the comparison, and an entry in a product placement database is generated. The entry comprises identifiers of the media program, a product descriptor descriptive of the product, and a context descriptor descriptive of a presentation scheme used for the first product placement. A rating is assigned to the media program with respect to the product in accordance with the entry of the product placement in the product placement database and other entries of other product placements in the product placement database. Other embodiments are disclosed. | 2015-05-21 |
20150143411 | INTERACTIVE ADVERTISMENT OFFERING METHOD AND SYSTEM BASED ON A VIEWED TELEVISION ADVERTISMENT - In interactive advertisement offering method and system, a server wirelessly receives from a user terminal an input signal, which is associated with a target TV advertisement viewed by a user of the user terminal. Upon identifying one TV advertisement to be the target TV advertisement based on the input signal, the server determines one of pre-stored Internet advertisements as a reference advertisement based on key terms representative of the target TV advertisement, and then transmits to the user terminal a reference advertisement menu generated thereby along with pre-stored Internet advertisement content corresponding to the reference advertisement for display of the reference advertisement menu on the user terminal. | 2015-05-21 |
20150143412 | CONTENT PLAYBACK CONTROL DEVICE, CONTENT PLAYBACK CONTROL METHOD AND PROGRAM - A content playback control device includes: an acquirer for acquiring an attribute of a listener that is the target of providing content; a determiner for determining a language when playing back the content, based on the attribute of the listener acquired by the acquirer; and a playback controller for playing back the content through audio in the determined language determined by the determiner. | 2015-05-21 |
20150143413 | METHOD AND SYSTEM FOR AUTOMATICALLY GENERATING INTERSTITIAL MATERIAL RELATED TO VIDEO CONTENT - A method implementable on a computing device for generating interstitial material for video content includes generating at least one instantiated script by inserting metadata related to the video content into at least one script template, scoring the instantiated scripts according to a predefined set of weights associated with a profile for a viewing audience to produce scored scripts, and selecting from said scored scripts according to at least said scoring for rendering as said interstitial material. Related apparatus and methods are also described. | 2015-05-21 |
20150143414 | SYSTEM, METHOD, AND SOFTWARE APPLICATION FOR TARGETED ADVERTISING VIA BEHAVIORAL MODEL CLUSTERING, AND PREFERENCE PROGRAMMING BASED ON BEHAVIORAL MODEL CLUSTERS - The method and system for TV user profile data prediction and modeling allows accurate and narrowly focused behavioral clustering. A client-side system classifies television consumers into representative user profiles. The profiles target individual user advertising and program preference category groups. A contextual behavioral profiling system determines the user's monitor behavior and content preferences, and the system may be continually updated with user information. A behavioral model database is queried by various system modules. The programming, including targeted advertising for television and interactive television is based on the profile data prediction, modeling and preference determination. The system is enabled to present a complete program sequence to the viewer based on the preference determination and stored programming. The latter is referred to as automatic program sequence (virtual channel) creation and the virtual channel can be presented as a separate channel in an electronic programming guide (EPG). | 2015-05-21 |
20150143415 | SYSTEM AND METHOD FOR DELIVERING TARGETED ADVERTISING IN AN INTERNET PROTOCOL TELEViSION SYSTEM - A system is disclosed for delivering targeted advertising data over a network including but not limited to a first video server processor interface for sending data for rotating one of the set of follow-on advertisements off of the on-screen picture in picture queue display to an off-screen storage; and a second video server processor interface for sending data rotating another one of the follow-on advertisements from the off-screen storage to the on screen picture in picture queue display. | 2015-05-21 |
20150143416 | METHOD AND APPARATUS FOR MATCHING OF CORRESPONDING FRAMES IN MULTIMEDIA STREAMS - A method and an apparatus for matching corresponding frames in two multimedia streams are suggested. The first multimedia stream is an original multimedia stream for which meta-data are available. The second multimedia stream is broadcasted or multi-casted multimedia stream and has undergone processing steps such that the meta-data of the original video stream are no more available or no longer reliable. The matching of corresponding frames in the two multimedia streams is based on the comparison of audio fingerprints and the detection of shot boundaries. | 2015-05-21 |
20150143417 | METHOD AND APPARATUS FOR REAL-TIME VIEWER INTERACTION WITH A MEDIA PRESENTATION - Real-time participation within a media presentation is disclosed. A participant overlay may be generated by preprocessing a media presentation to extract a time-variant metadata stream associated with one or more interactive regions depicted in the media presentation. The participant overlay includes simulated physics, which may include boundaries of the interactive regions defined in accordance with content in said media presentation. A participant's interaction with said media presentation through the interactive regions may be captured and combined with the media presentation for display on a display. The interaction may comprise a user action upon one or more elements in the media presentation, a user action expressed in the media presentation through an avatar, or a user action in said media presentation in connection with a game element. | 2015-05-21 |
20150143418 | IMAGE DISPLAY APPARATUS AND OPERATION METHOD THEREOF - An operation method of an image display apparatus is discussed, which includes displaying a first dashboard including a live broadcast video and content information based on viewing history of a user on a display unit, displaying a portion of a second dashboard and a third dashboard including the content information based on the viewing history of the user at left and the right sides of the first dashboard or at upper and lower sides of the first dashboard, receiving an input to select the second dashboard or the third dashboard, displaying the entirety of one selected dashboard on an area on which the first dashboard was displayed based on the selection input, displaying a portion of a fourth dashboard on an area on which the selected dashboard was displayed, and displaying a portion of the live broadcast video on an area on which an unselected dashboard was displayed. | 2015-05-21 |
20150143419 | SESSION ADMINISTRATION - Administration of sessions, such as but not necessarily user interface (UI) and media sessions, is contemplated. The session administration may include transferring and/or sharing a session from one client to another without requiring an application required to process the transferred/shared session to be operational when receiving an action used to initialize session administration. | 2015-05-21 |
20150143420 | REMOTE CONTROL AUDIO LINK - One embodiment may take the form of a voice control system. The system may include a first apparatus with a processing unit configured to execute a voice recognition module and one or more executable commands, and a receiver coupled to the processing unit and configured to receive a first audio file from a remote control device. The first audio file may include at least one voice command. The first apparatus may further include a communication component coupled to the processing unit and configured to receive programming content, and one or more storage media storing the voice recognition module. The voice recognition module may be configured to convert voice commands into text. | 2015-05-21 |
20150143421 | METHOD, SERVER, CLIENT AND SOFTWARE - A client device, comprising: | 2015-05-21 |
20150143422 | METHODS AND SYSTEMS FOR CREATING AND MANAGING MULTI PARTICIPANT SESSIONS - A method of creating a multi participant session among a plurality of viewers of media content. The method comprises automatically identifying which media content is currently presented on a plurality of client terminals of a plurality of subscribers, receiving, from a first subscriber, a first selection indicative of a template of a multi participant session object and a second selection indicative of a group from the plurality of subscribers, creating a multi participant session object adapted for simultaneous presentation with the media content according to first and second selections and establishing a multi participant session among at least one member of the group and the first subscriber using the multi participant session object. | 2015-05-21 |
20150143423 | APPARATUS, METHOD, AND SYSTEM FOR CONTROLLING DEVICE BASED ON USER INTERFACE THAT REFLECTS USER'S INTENTION - Disclosed are a device control apparatus, method, and system based on a user interface that reflects a user's intention. The apparatus may includes a user interface processing unit for displaying a user interface, including a content selection unit for selecting content and first and second control icons, on the touch screen of a first device, generating a selection icon indicating that the content has been selected when a signal to select the content selection unit is received from the touch screen, and displaying the selection icon on the touch screen and a transmission unit for sending a message, requesting that the content be displayed on a screen of a second device either in full screen mode or PIP mode, to the second device when at least part of the selection icon enters the first control icon or the second control icon is detected by the touch screen. | 2015-05-21 |
20150143424 | INFORMATION DESCRIPTOR AND EXTENDED INFORMATION DESCRIPTOR DATA STRUCTURES FOR DIGITAL TELEVISION SIGNALS - According to an aspect, there is provided a digital television (DTV) data stream including program and system information protocol (PSIP) data associated with content of the DTV data stream, the PSIP data including a virtual channel table (VCT) and an event information table (EIT), the EIT comprising: a source identification field identifying a source of an associated event in a DTV data stream; an event identification field indicating an identification of the event; a start time field indicating a star time of the event; a title field indicating a title of the event; and a descriptor comprising: a descriptor tag identifying the descriptor as a genre descriptor, a descriptor length indicating a total length of the descriptor; and at least one category code for an associated event in a DTV data stream, each category code specifying genre, program type, or category information of the associated event, wherein the at least one category code specifies at least one of a set of basic categories. | 2015-05-21 |
20150143425 | METHOD AND APPARATUS FOR CREATING DYNAMIC WEBPAGES IN A MEDIA COMMUNICATION SYSTEM - A system that incorporates teachings of the present disclosure may include, for example, an Internet Protocol Television system having a controller to create a template defining a format of presentation of an webpage or HTML page using an iTV or IPTV application system, receive a request for the page from a subscriber of the iTV or IPTV system. The system can access application system subscriber data for the subscriber and a presentation of the page is dynamically adapted according to the application system subscriber data. In one alternative at, the page can be dynamically adapted by changing in content or by changing a look and feel of an HTML page or webpage. In another alternative, the webpage or HTML page can be dynamically adapted by modifying graphic user interface elements based on the application system subscriber data. Other embodiments are disclosed. | 2015-05-21 |
20150143426 | ELECTRONIC PROGRAM LIST OPERATION SYSTEM APPLIED TO PORTABLE ELECTRONIC DEVICE AND OPERATION METHOD THEREOF - An electronic program list operation system applied to portable electronic device and an operation method thereof. The electronic program list operation system includes a controlled device, at least one portable electronic device and a wireless transmission module. The portable electronic device is wirelessly connected to a network platform for readily downloading and updating program list information, whereby a user can check the program list information on the portable electronic device and input an operation command to select a desired channel. The wireless transmission module serves to transmit at least one remote control signal to the corresponding controlled device to switch to the selected channel. Accordingly, a user can browse the program list information on the portable electronic device and immediately switch to the selected channel for watching a desired program. | 2015-05-21 |
20150143427 | DIGITAL TELEVISION SIGNAL, DIGITAL TELEVISION RECEIVER, AND METHOD OF PROCESSING DIGITAL TELEVISION SIGNAL - A digital television (DTV) receiver for processing a DTV signal, the DTV receiver includes a receiver to receive a digital television signal including a plurality of extended text table (ETT) instances that appear in transport stream packets with common PID values, the ETT instances having common table ID values, each ETT instance comprising a section header and a message body, the section header containing a table identification (ID) extension field that serves to establish uniqueness of each ETT instance, the message body containing an extended text message (ETM) which provides detailed descriptions of a virtual channel or an event associated with each ETT instance, wherein the section header further contains a current next indicator field and a section length field indicating a section length, a demodulator to demodulate the digital television signal and an identifier to identify at least one pertinent ETT instance from the plurality of ETT instances. | 2015-05-21 |
20150143428 | VIRTUAL CHANNEL TABLE FOR A BROADCAST PROTOCOL AND METHOD OF BROADCASTING AND RECEIVING BROADCAST SIGNALS USING THE SAME - A virtual channel table for broadcasting protocol and a method for broadcasting by using the virtual channel table includes identification information identifying and permitting discrimination of active and inactive channels contained in the virtual channel table. At a receiver, the virtual channel table transmitted from the transmitting side is parsed, thereby determining whether the current received channel is an active or inactive channel. | 2015-05-21 |
20150143429 | VIRTUAL CHANNEL TABLE FOR A BROADCAST PROTOCOL AND METHOD OF BROADCASTING AND RECEIVING BROADCAST SIGNALS USING THE SAME - A virtual channel table for broadcasting protocol and a method for broadcasting by using the virtual channel table includes identification information identifying and permitting discrimination of active and inactive channels contained in the virtual channel table. At a receiver, the virtual channel table transmitted from the transmitting side is parsed, thereby determining whether the current received channel is an active or inactive channel. | 2015-05-21 |
20150143430 | SYSTEMS AND METHODS TO PERFORM ACTIONS UPON CONTENT ITEMS ASSOCIATED WITH MULTIPLE SERIES SUBSCRIPTIONS - A method includes performing, at a media recorder device, a comparison of a user defined criterion to information descriptive of content items associated with a set of series subscriptions. The content items and the set of series subscriptions are stored at the media recorder device. The user defined criterion indicates that reruns of episodes associated with a particular series subscription of the set of series subscriptions have not been recorded within a time period. The method includes identifying, at the media recorder device, multiple series subscriptions of the set of series subscriptions based on the comparison. The method includes deleting the multiple series subscriptions from the media recorder device. The method further includes sending, from the media recorder device, a notification to a display device, the notification indicating that a cleanup operation has been performed on the set of series subscription stored at the media recorder device. | 2015-05-21 |
20150143431 | ADVANCED WIRELESS IPTV SET TOP BOX - An advanced wireless IP STB is provided with multiple built-in antennas capable of capturing plural downstream transmissions simultaneously on dedicated receivers using different modem technologies without the use of wires to the home. The proposed solution facilitates the advanced wireless IP STB being able to receive multiply sourced data traffic, including, for example, IPTV, digital TV, web TV, radio web, internet chat: written, voice and video, GPS tracking locator signals, media player web support, web based video gaming, You Tube and the like video streaming, TV surveillance, video intercom surveillance, and much more. The advanced wireless IP STB is configured to be able to establish a broadband (internet) session through previously assigned or negotiated channel assignments between one or more modems and plural remote wireless infrastructures widely deployed in a municipality, such as WIMAX. LTE, WCDMA, CDMA 1×, TDSCMA, GSM, GPRS, EDGE, 5G or the like. | 2015-05-21 |
20150143432 | METHOD AND APPARATUS FOR PROVIDING WIRELESS DIGITAL TELEVISION SERVICE - A system that incorporates teachings of the present disclosure may include, for example, a method for receiving one or more wireless digital television signals, wherein each of the one or more wireless digital television signals comprise a plurality of data segments for presenting media content, buffering the plurality of data segments of each of the one or more wireless digital television signals to generate one or more buffered data segments to cause a presentation delay of the media content, and detecting a missing data segment in the one or more buffered data segments. The method can further include transmitting a first request to a cellular communication system to provide the missing data segment, and receiving from the cellular communication system the missing data segment prior to an expiration of the presentation delay to continue a presentation of the media content without interruption. Other embodiments are disclosed. | 2015-05-21 |
20150143433 | WIRELESS SYSTEM AND WIRELESS COMMUNICATION DEVICE - A wireless system ( | 2015-05-21 |
20150143434 | MULTIMEDIA CONTENT SELF-ADAPTIVE METHOD AND MULTIMEDIA PLAYING SYSTEM - The present technology relates to a multimedia content self-adaptive method and a multimedia playing system, wherein the multimedia content self-adaptive method includes: obtaining context information; solving the media content adaptation problem according to the obtained context information. Applying the multimedia content self-adaptive method and multimedia playing system provided by the present technology, the content adaptation for the AV playing environment can be realized under the UPnP AV standard, thereby providing intelligent multimedia services. | 2015-05-21 |
20150143435 | SYSTEM AND METHOD FOR MANAGING MASHUP SERVICE BASED ON THE CONTENT OF MEDIA CONTENT - A system and method for managing a mashup service based on the content of media content are provided. The system and method infer tasks related to the content of media content that a user is currently viewing based on user profile information, and create and provide a personalized mashup service to execute a selected task, thereby overcoming restrictions and limitations in providing information in the existing content reproducing environment and improving user's viewing environment for media content. | 2015-05-21 |
20150143436 | METHOD AND APPARATUS FOR GENERATING INFORMATION ASSOCIATED WITH A LAPSED PRESENTATION OF MEDIA CONTENT - Aspects of the subject disclosure may include, for example, generating a summary of a missed portion of a media program, identifying subject matter in a segment of content in the media program that has not been presented, determining a particular time for presenting the summary according to the subject matter in the segment of content, and initiating a presentation of the summary at the particular time. Other embodiments are disclosed. | 2015-05-21 |
20150143437 | METHODS AND APPARATUS FOR SUPPORTING TRICK PLAY FUNCTIONS IN DEVICES WITHOUT LOCAL STORAGE - Methods and apparatus for providing playback devices with trick play functionality are described. The system includes a playback device, e.g., without recording capability, and a gateway device with multiple tuner-demodulators and/or a cable modem and recording capability. During normal playback, in some embodiments, both the playback device and gateway receive content in parallel with the gateway recording content at the request of the playback device and supplying the content over the local network when a user of the playback device requests a trick play operation. A single gateway, with multiple tuner demodulator pairs and/or a cable modem, supports trick play functions. In some embodiments if the number of playback devices exceeds the number of tuner-demodulator pairs in the gateway, the playback device can stream content to the gateway for recording and to be returned via the local network in the event of a request for a trick play operation. | 2015-05-21 |
20150143438 | MEDIA CONTROL DEVICE, MEDIA RENDERER DEVICE, MEDIA SERVER DEVICE, AND METHOD FOR OPERATING THE DEVICES - After the calling of the playback action of the first resource, the control device calls a multiple resource prefetch action including a plurality of prefetch resource identifiers for a plurality of prefetch resources. The media renderer prefetches the plurality of prefetch resources from the media server on the basis of the plurality of prefetch resource identifiers. The control device calls a playback action of a second resource corresponding to one of the plurality of prefetch resources. The media renderer provides seamless transition between the first resource and the second resource. | 2015-05-21 |
20150143439 | PROVIDING INCREASED BANDWIDTH FOR TRANSMISSION OF AUDIO VIDEO CONTENT AND SUPPLEMENTAL CONTENT ASSOCIATED THEREWITH - A device includes at least one computer readable storage medium bearing instructions, and at least one processor configured for accessing the computer readable storage medium to execute the instructions. The instructions configure the processor for providing audio video (AV) content on a first channel having a predefined frequency range, receiving a request for data associated with the AV content, and determining whether the first channel has sufficient bandwidth to concurrently provide at least portions of both the AV content and the data responsive to receiving the request. The instructions further configure the processor for expanding the first channel beyond the predefined frequency range to include at least one frequency above or below the predefined frequency range to render an expanded first channel responsive to a determination that the first channel does not have sufficient bandwidth, and concurrently providing the requested data and AV content over the expanded first channel. | 2015-05-21 |
20150143440 | NAVIGATION WITHIN SWITCHED DIGITAL STREAMED CONTENT - In certain embodiments, a method carried out in a digital television receiver device incapable of full two way communications, of receiving switched digital television programs involves storing a virtual channel table in the digital television receiver device, the virtual channel table having entries for each available channel and having a channel type indicator that identifies switched digital channels; receiving a command indicative of selection of a switched digital channel having the switched digital channel type indicator in the stored virtual channel table; sending a request from the television receiver device for the switched digital channel; responsive to the request, receiving a response that either grants the request or denies the request; and if the response grants the request, receiving an updated virtual channel table having updated table entries. This abstract is not to be considered limiting, since other embodiments may deviate from the features described in this abstract. | 2015-05-21 |
20150143441 | BROADCAST INTERACTIVE TELEVISION SYSTEM - A system that incorporates teachings of the present disclosure may include, for example, a system for delivering broadcast channels by way of edge routers using multicast virtual private networks, sharing a same multicast state for the broadcast channels and sharing a same multicast delivery tree for the broadcast channels. Other embodiments are disclosed. | 2015-05-21 |
20150143442 | METHOD AND APPARATUS FOR SHARING INTERNET ASSETS OR CONTENT URLS VIA A SECOND DISPLAY DEVICE - A user can share Internet assets or content URLs via a second display device with other Internet content service users. Thus, the other users will be able to view the same content on their own internet protocol televisions (IPTV), as first display devices, without the need to search for the content in the content providing service. When the shared content is URLs, the recipient can even preview the content from the URL on the second display device before sending it to the recipient's internet protocol television (IPTV). | 2015-05-21 |
20150143443 | HIGH QUALITY VIDEO SHARING SYSTEMS - A video sharing method for automatic video recording and for sharing recorded videos, comprising: registering specialized equipment and users; accepting and storing video files and music files; building searchable databases of uploaded video and music files; accepting user requests; selecting a music file; playing video files accompanied with the selected music file; and soliciting and accepting user feedback. A system plays video files at a user's request accompanied with music clips if desired. | 2015-05-21 |
20150143444 | Transcoding Media Streams Using Subchunking - A method including receiving an input media stream and splitting a video portion of a received portion of the input media stream into input video chunks. For each input video chunk of the video portion of the input media stream, the method includes assigning the input video chunk to one or more slave transcoders, splitting the input video chunk into video subchunks, and separately feeding each input video subchunk to each of the one or more slave transcoders. The method includes separately receiving output video subchunks from the one or more slave transcoders. Each output video subchunk respectively corresponds to one of the input video subchunks. The method also includes assembling the output video subchunks into an output video chunk corresponding to the input video chunk and assembling the output video chunks into an output media stream. | 2015-05-21 |
20150143445 | PRODUCTION APPARATUS AND CONTENT DISTRIBUTION SYSTEM - Provided is a production apparatus that can produce a distribution content that offers an even richer color tone expression during playback of video. The production apparatus for producing a distribution content including distribution video data is constituted by an original acquisition unit that acquires original video data; a distribution video acquisition unit that acquires the distribution video data, the distribution video data having been generated by conversion of the original video data to a lower gradation; a difference generation unit that generates difference data between the original video data and the distribution video data; and an output unit that outputs the difference data. A playback apparatus plays back the distribution content. | 2015-05-21 |
20150143446 | DTV TRANSMITTING SYSTEM AND RECEIVING SYSTEM AND METHOD OF PROCESSING BROADCAST SIGNAL - A method is described for transmitting broadcast signals. First encoding of mobile data for a mobile service is performed. Second encoding of the first encoded mobile data is performed. The second encoded mobile data multiplexed with main data for a main service in a time domain is transmitted. The second encoded mobile data is allocated in a mobile unit and the main data is allocated in a main unit. The second encoded mobile data is transmitted with signaling information. The signaling information includes information to detect the mobile unit and a coding rate of the mobile data. | 2015-05-21 |
20150143447 | Cross Layer Coordinated Channel Bonding - Different data communication architectures receive a wide variety of content, including audio and video content, for consumers. The architectures employ channel bonding to deliver more bandwidth than any single communication channel can carry. In some implementations, the communication architectures receive distributed video programming in the form of MPEG2 TS packets, flagged by marker packets. Channel bonding synchronization information may be present in packets defined above the data-link layer or received in fields within data-link layer frames. | 2015-05-21 |
20150143448 | METHOD AND APPARATUS FOR PROCESSING DIGITAL SERVICE SIGNAL - A digital service signal apparatus is disclosed. The digital service signal apparatus includes a receiving module receiving signaling information having channel information for an application from the digital service signal, a generating module generating a request using the channel information, a sending module sending the generated request, a downloading module downloading the application, an executing module configured to execute the API related to the application and a registering module configured to register the specific key set according to the mode number. | 2015-05-21 |
20150143449 | SYSTEM AND METHOD FOR PROVIDING A TELEVISION NETWORK CUSTOMIZED FOR AN END USER - A hybrid audio and video system and method of providing a television network customized for an end user at an end user location are provided. A video signal feed includes visual content. An audio signal feed includes audio content. A third signal feed includes promotional content about the end user. Specific visual content, audio content, and promotional content are electronically selected. The visual content, audio content, and promotional content are electronically combined in response to the selections to create an output feed. The selected visual content, audio content, and promotional content of the output feed through the television network at the end user location. | 2015-05-21 |
20150143450 | COMPOSITING IMAGES IN A COMPRESSED BITSTREAM - A system for compositing images in a compressed bitstream can include memory and first and second modules. The first module can be configured to receive images and corresponding position information that indicates positions of the images in a composite image, determine pixels of the images that will be occluded in the composite image, and store, at memory locations of the memory, pixels of the images that will be visible in the composite image. The second module can be configured to receive the position information, retrieve, from the memory locations, the visible pixels of the images, determine the images corresponding to the visible pixels based at least on the memory locations, and generate the composite image by arranging the visible pixels based at least on the position information. In one or more implementations, the visible pixels can be compressed before being stored in memory and decompressed after being retrieved from memory. | 2015-05-21 |
20150143451 | Safety in Downloadable Applications for Onboard Computers - A method for providing safety for downloadable applications on an onboard computer in a safety critical environment includes installing an application on the onboard computer, where the application is signed by a trusted signing entity, associating a usage policy with the signed application in a safety permissions manifest, where the usage policy at least includes rules for actions allowed for the signed application under certain environmental conditions in the safety critical environment, monitoring the environmental conditions, receiving a request to perform an action from the signed application, determining whether performance of the action is permissible, where the determining is based on least on the associated usage policy and the monitored environmental conditions, and permitting/preventing the performance based on the determining. Related apparatus and methods are also described. | 2015-05-21 |
20150143452 | SYSTEM AND METHOD FOR RETROFITTING APPLICATION CODE - Disclosed is a system and method for retrofitting defensive technology that transforms potentially dangerous computer programs into safe programs. The present disclosure involves applying software rewriting and/or randomization algorithms to monitored application launches and/or API calls. The present disclosure provides systems and methods for understanding and manipulating how untrusted software will behave upon execution, thereby thwarting any chance the untrusted software could launch and/or institute a weaponized malicious software attack. The present disclosure can apply a light-weight binary rewriting and in-lining system to tame and secure untrusted binary programs. The disclosed systems and methods can also implement binary stirring by imbuing native code of software with the ability to self-randomize its instruction addresses each time it is launched. | 2015-05-21 |
20150143453 | Policy Service Authorization and Authentication - Requests for remote network resources can be denied by a policy service by redirecting a requesting user agent to an authorization portal. The authorization portal can authenticate the user agent and redirect the user agent to the originally requested resource with a token. The policy service can be configured to detect the token, and redirect the requesting user agent to the resource with a cookie. The policy service can be configured to reference such cookies when applying policy. Accordingly, an authenticated user agent can be allowed to access the remote network resource and resources at the same host/domain by virtue of the cookie and without additional authentication. | 2015-05-21 |
20150143454 | SECURITY MANAGEMENT APPARATUS AND METHOD - A security management apparatus and method are provided. The security management apparatus includes a user authentication unit, a packet inspection unit, a packet extraction unit, a file analysis unit, and an agent generation unit. The user authentication unit receives user information from a terminal of a user, and performs a user authentication procedure. The packet inspection unit inspects a packet based on rules, and transfers the inspected packet to a destination over the Internet. The packet extraction unit recognizes a specific protocol in a packet transferred to the destination or a packet returned from the destination and extracts a file based on the results of the recognition. The file analysis unit determines whether or not the extracted file is a malicious file. If the extracted file is the malicious file, the agent generation unit generates a malware removal agent, and removes malware by executing the malware removal agent. | 2015-05-21 |
20150143455 | OFF-DEVICE ANTI-MALWARE PROTECTION FOR MOBILE DEVICES - Techniques for off-device anti-malware protection for mobile devices are disclosed. In some embodiments, off-device anti-malware protection for mobile devices includes receiving a software inventory for a mobile device, in which the software inventory identifies a plurality of applications installed on the mobile device; and determining whether one or more of the plurality of applications identified in the software inventory are associated with malware based on a policy. In some embodiments, the off-device anti-malware protection for mobile devices further includes enforcing the policy on the mobile device. In some embodiments, the off-device anti-malware protection for mobile devices is provided as a cloud service. | 2015-05-21 |
20150143456 | END USER DEVICE THAT SECURES AN ASSOCIATION OF APPLICATION TO SERVICE POLICY WITH AN APPLICATION CERTIFICATE CHECK - Mobile end-user devices are disclosed having a stored network access policy, applicable to specific applications stored on and executable by the device. The policy specifies, for at least some of the applications, whether or not those applications are individually allowed to initiate access network communication activity using one or more wireless data modems, when those applications are running as a background application. One or more device agents, which may operate at different points within the device in different embodiments, enforce the policies based on a determination as to whether a running application is running as a background application. | 2015-05-21 |
20150143457 | CLIENT DEVICE TOKEN BASED MULTIFACTOR AUTHENTICATION - A multifactor authentication (MFA) enforcement server provides multifactor authentication services to users and existing services. During registration, the MFA enforcement server changes a user's password on an existing service to a password unknown to the user. During normal usage when the user accesses the existing service through the MFA enforcement server, the MFA enforcement server enforces a multifactor authentication enforcement policy. | 2015-05-21 |
20150143458 | TECHNIQUES FOR IDENTITY AND POLICY BASED ROUTING - Techniques for identity and policy based routing are presented. A resource is initiated on a device with a resource identity and role assignments along with policies are obtained for the resource. A customized network is created for the resource using a device address for the device, the resource identity, the role assignments, and the policies. | 2015-05-21 |
20150143459 | PROTECTING PRIVACY IN WEB-BASED IMMERSIVE AUGMENTED REALITY - An “AR Privacy API” provides an API that allows applications and web browsers to use various content rendering abstractions to protect user privacy in a wide range of web-based immersive augmented reality (AR) scenarios. The AR Privacy API extends the traditional concept of “web pages” to immersive “web rooms” wherein any desired combination of existing or new 2D and 3D content is rendered within a user's room or other space. Advantageously, the AR Privacy API and associated rendering abstractions are useable by a wide variety of applications and web content for enhancing the user's room or other space with web-based immersive AR content. Further, the AR Privacy API is implemented using any existing or new web page coding platform, including, but not limited to HTML, XML, CSS, JavaScript, etc., thereby enabling existing web content and coding techniques to be smoothly integrated into a wide range of web room AR scenarios. | 2015-05-21 |
20150143460 | IC CHIP, INFORMATION PROCESSING APPARATUS, SYSTEM, METHOD, AND PROGRAM - An IC chip, an information processing apparatus, system, method, and program are provided. An IC chip includes an authentication control unit configured to authenticate a request using authentication information. The request and/or the authentication information is received from outside the IC chip. | 2015-05-21 |
20150143461 | IDENTITY CONFIRMATION METHOD AND IDENTITY CONFIRMATION SYSTEM - An identity confirmation method and a identity confirmation system which do not require users to remember passwords, and automatically update credentials for use in identity confirmation, without need for the manipulation by users. This identity confirmation method and system receives current location information from a mobile communication device of a user to accumulates, as a location information history, the current location information of a user. The identity confirmation system generates a question relating to the location information history. The user returns an answer to the question. The identity confirmation system compares and matches the answer with the location information history and determine the identification of the user if the answer coincides with the location information history. | 2015-05-21 |
20150143462 | Method And System For Internet Of Things Capability Integration - Disclosed is an Internet of things capability integration system, which relates to the field of Internet of things, and the field of telecommunication network and Internet. The disclosed Internet of things capability integration system includes: an Internet of things capability integration access platform, configured to be accessed by Internet of things capability devices, authenticate the accessed Internet of things capability devices, develop Internet of things capability services based on the accessed Internet of things capability devices, and load the developed Internet of things capability services; an Internet of things capability operation management platform, configured to perform an operation management operation on the Internet of things capability services developed and loaded by the Internet of things capability integration access platform; and an Internet of things capability opening management platform, configured to open the Internet of things network capability services developed and loaded by the Internet of things capability integration access platform, and perform an management operation on the opening of the Internet of things capability services. An Internet of things capability integration method is also disclosed. The present technical schemes sufficiently exert the operation capability and resources of operators, and cover the shortage of the current Internet of things industry development. | 2015-05-21 |
20150143463 | METHOD AND SYSTEM FOR SELECTIVE PROTECTION OF DATA EXCHANGED BETWEEN USER EQUIPMENT AND NETWORK - A method and system for providing selective protection of data exchanged between user equipment (UE) and network is disclosed. The selective protection is applied to a packet, a bearer or an access point name for secure exchange of data between the UE and the network. The network decides to apply selective protection based on configuration of network, configuration of UE, load in the network, battery power availability of UE, type of application running on UE. Further, the UE can request for selective protection based on the type of application running on UE and the battery level availability of the UE. The selective protection is either enabled or disabled dynamically by the network. Further, various mechanisms for applying selective protection for each bearer, each packet and each Access Point Name (APN) are disclosed. Additionally, the method for identifying a secured and a non secured bearer has also been disclosed. | 2015-05-21 |
20150143464 | Method and device for the connection to a remote service - The present invention relates to the field of the connection to a secure remote service from a terminal and notably of the establishment of a connection between the secure remote service and a security device connected to the terminal. A security device including a security element is connected to the terminal via a physical or virtual local network. When trying to access a secure remote service, a software module is automatically downloaded onto the terminal, without requiring particular rights, from the secure remote service for the discovery and the interaction with the security device. In this way, it is not necessary to install drivers or other specific software in order to enable the use of the secure element when trying to access a secure remote service. | 2015-05-21 |
20150143465 | SYSTEMS AND METHODS FOR SECURITY TIERING IN PEER-TO-PEER NETWORKING - A method may also include receiving from each of one or more of potential peer information handling systems a connection request comprising a peer minimum acceptable security level for the peer information handling system. The method may additionally include comparing the peer minimum acceptable security level to a security level of the information handling system. The method may further include completing a peer-to-peer connection between the information handling system and the peer information handling system if the minimum acceptable security level is not higher than that of the security level of the information handling system. | 2015-05-21 |
20150143466 | DISABLING PROHIBITED CONTENT AND IDENTIFYING REPEAT OFFENDERS IN SERVICE PROVIDER STORAGE SYSTEMS - Objects in a shared storage system can be marked as including prohibited content. Incidents that result in objects being so marked can be stored in an incident history associated with a user responsible for those objects. The incident history can be processed to identify repeat offenders and modify access privileges of those users. However, when objects are shared by one user with another user, prohibited content is blocked from being shared, while the remainder of the shared objects can be accessed by the other user. Functions that allow sharing of content are implemented so as prevent sharing of prohibited content with another user, while allowing other content to be shared. If a group of files or objects is shared, then the presence of prohibited content in one object in the group results in that prohibited content not being shared, but the remaining files or objects are still shared. | 2015-05-21 |
20150143467 | SYSTEM AND METHOD FOR FACILITATING COMMUNICATION BETWEEN A WEB APPLICATION AND A LOCAL PERIPHERAL DEVICE THROUGH A NATIVE SERVICE - The disclosure relates to systems and methods for facilitating communication between a web application and a local peripheral device through a native service where the local peripheral device is locally connected to a computer having the native service. To access data associated with the local peripheral device, a browser may make a cross-domain request to the native service that resides in a domain that is different from the domain that served the web application. Prior to sending the actual cross-domain request, the browser may send a pre-flight cross-domain request to the native service. The native service may send a response to the pre-flight request to the browser. The response may comprise information related to whether the cross-domain request can be serviced by the native service. The browser may send the cross-domain request to the native service, which may comprise functions to be executed on the local peripheral device. | 2015-05-21 |
20150143468 | SYSTEM AND METHOD FOR FACILITATING FEDERATED USER PROVISIONING THROUGH A CLOUD-BASED SYSTEM - The disclosure relates to systems and methods for provisioning a new user to a cloud-based system through a pre-registration process where the cloud-based system generates a tokenized resource identifier based on the user's registration information provided by an external service provider and through a registration process where the user accesses the cloud-based system using the tokenized resource identifier and the cloud-based system completes the registration of the user when the user's registration information in the cloud-based system is verified against the corresponding registration information maintained by the external service provider. Once the registration is complete, data related to the registered user may be synchronized between the cloud-based system and the external service provider. | 2015-05-21 |
20150143469 | SECURE DATA TRANSMISSION - A system may include a first network in which user device(s) and a HIP server are communicably coupled. The first network may include a secure data administrator, such as a medical data system, that stores secure data. In some implementations, at least one of the user devices may include a web module and communicate with a web server through a second network. At least one of the user device may be restricted from communicating with the secure data administrator, so the user device may request data stored in the secure data administrator through the HIP server. The user device may base the requests for the data on information received from the web server. | 2015-05-21 |
20150143470 | MANAGING AN INTERFACE BETWEEN AN APPLICATION AND A NETWORK - According to an implementation, an interface between an application and a network is managed, for instance, by an interface manager. The interface manager is to receive a request from the application for access to the network, determine privileges assigned to the application, and provide the application with a level of access to the network that corresponds to the determined privileges assigned to the application. | 2015-05-21 |
20150143471 | METHOD FOR ESTABLISHING RESOURCE ACCESS AUTHORIZATION IN M2M COMMUNICATION - A method for establishing a resource access authorization in M2M communication is provided. When an entity including a terminal, a gateway and an end user as client in a first M2M service provider domain attempts to access resource located in terminal or gateway in second M2M service provider domain, the method includes receiving client credential allocated from M2M Authentication Server (MAS1) in first M2M service provider domain by performing client registration to Network Service Capabilities Layer (NSCL1) in first M2M service provider domain by client, requesting an authorization to access resource to resource owner through NSCL (NSCL2) in second M2M service provider domain based on information about Universal Resource Identifier (URI) of resource by client, verifying client through MAS1 by the resource owner, authorizing client to access the resource by the resource owner, and issuing access token to the client by MAS (MAS2) in second M2M service provider domain. | 2015-05-21 |
20150143472 | METHOD FOR ESTABLISHING RESOURCE ACCESS AUTHORIZATION IN M2M COMMUNICATION - A method for establishing a resource access authorization in M2M communication is provided. When an entity including a terminal, a gateway and an end user as client in a first M2M service provider domain attempts to access resource located in terminal or gateway in second M2M service provider domain, the method includes receiving client credential allocated from M2M Authentication Server (MAS1) in first M2M service provider domain by performing client registration to Network Service Capabilities Layer (NSCL1) in first M2M service provider domain by client, requesting an authorization to access resource to resource owner through NSCL (NSCL2) in second M2M service provider domain based on information about Universal Resource Identifier (URI) of resource by client, verifying client through MAS1 by the resource owner, authorizing client to access the resource by the resource owner, and issuing access token to the client by MAS (MAS2) in second M2M service provider domain. | 2015-05-21 |
20150143473 | ELECTRONIC DEVICE AND METHOD FOR UPDATING AUTHENTICATION INFORMATION IN THE ELECTRONIC DEVICE - An electronic device and method for updating authentication information in the electronic device is provided. The electronic device includes a short-range communication unit configured to provide a short-range communication and a controller configured to update information for authentication information from advertisement service information received from an Access Point (AP) identified through the short-range communication unit, download authentication information using the update information for authentication information, and connect the electronic device to the AP based on the authentication information. | 2015-05-21 |
20150143474 | PROCEDE ET DISPOSITIFS D'AUTHENTIFICATION POUR ACCEDER A UN COMPTE UTILISATEUR D'UN SERVICE SUR UN RESEAU DE DONNEES - An authentication method for accessing a user account of a service ( | 2015-05-21 |
20150143475 | Operation Processing Method and Device - A method and a device are provided in the field of network technology. In the method, a first server receives an operation request including a second server identifier and second account information. According to the second server identifier and the second account information, the first server determines whether associated account information is available in a predetermined three-party associating relationship. Upon determining that the associated account information is available, the first server obtains the associated account information for use as first account information. Based on the first account information, the first server responds to the operation request. During the process of providing services for a terminal by the second server, the first server obtains the first account information according to the second server identifier, the second account information, and the predetermined three-party associating relationship. The first server responds to the operations of the terminal based on the first account information. | 2015-05-21 |
20150143476 | SYSTEM AND METHOD FOR ADDING CONTEXT TO PREVENT DATA LEAKAGE OVER A COMPUTER NETWORK - Systems and methods for adding context to prevent data leakage over a computer network are disclosed. Data is classified and contextual information of the data is determined. A transmission policy is determined in response to the classification and contextual information. The data is either transmitted or blocked in response to the classification and the contextual information | 2015-05-21 |
20150143477 | MAJOR MANAGEMENT APPARATUS, AUTHORIZED MANAGEMENT APPARATUS, ELECTRONIC APPARATUS FOR DELEGATION MANAGEMENT, AND DELEGATION MANAGEMENT METHODS THEREOF - A major management apparatus, an authorized management apparatus, an electronic apparatus for delegation management, and delegation management methods thereof are provided. The major management apparatus generates a first and a second delegation deployment messages and respectively transmits them to the authorized management apparatus and the electronic apparatus. The authorized management apparatus encrypts an original authorized operation message into an authorized operation message by an authorization key included in the first delegation deployment message and transmits the authorized operation message to the electronic apparatus. The original authorized operation message includes an operation task message and a right level. The electronic apparatus decrypts the authorized operation message into the original authorized operation message by the authorization key included in the second delegation deployment message and performs an operation according to the operation task message and the right level. | 2015-05-21 |
20150143478 | WIRELESS SERVER ACCESS CONTROL SYSTEM AND METHOD - A wireless server access control system comprising a wireless server generating a local wireless communications network, the wireless server having a processor and a plurality of redundant data memory devices. A first wireless device coupled to the wireless server through the local wireless communications network. An access control system operating on the wireless server, the access control system configured to generate a user control on a user interface of the first wireless device to allow a user to permit or deny access to the processor and the data memory devices of the wireless server by a second wireless device through the local wireless communications network. | 2015-05-21 |
20150143479 | Strong Identity Management and Cyber Security Software - A security software comprises administrative module for configuring access levels and creating types of accounts and application server for domain filtering by checking against friendly and unfriendly inbound, outbound and exception lists. Hard filtering either approves, terminates requests or re-routes request without the user's knowledge. Soft filtering passes disapproved requests and sends an e-mail alert to authorized recipients. Content filtering includes checking a content of a requested document against a friendly, unfriendly list and exception list. Hard filtering passes or rejects the requested document. Soft filtering passes the requested document or rejects or approves by highlighting its content. Options include e-mail filtering that checks subject, sender's address and domain against an unfriendly, friendly and exception list. e-mail alert for hard filtering, inbound privacy shield, a pop up blocker, the application server acts as proxy server with proxy chaining capabilities. | 2015-05-21 |
20150143480 | METHOD AND SYSTEM FOR MAINTAINING DATA IN A SUBSTANTIATED STATE - A method for substantiating a data message for use in a system includes adding discovery information to the data message related to the origin of the data message, validating the data message to comply with an industry standard, authenticating the data message to determine who transmitted the data message, and authorizing the transmission of the data message based on access rights. A method for generating a substantiated system is also described. | 2015-05-21 |
20150143481 | APPLICATION SECURITY VERIFICATION METHOD, APPLICATION SERVER, APPLICATION CLIENT AND SYSTEM - The disclosure discloses an application security verification method, an application server, an application client, and a system, wherein the application security verification method includes: detecting by an application server, an occurrence of a default security risk event on an application client; obtaining by the application server, default verification information associated with a login account of the application client; and sending by the application server, the default verification information to the application client in order to verify the application client. A user of an application client may therefore verify the security of the application client and the application server, thereby effectively prevents any forged and illegal APP from threatening the security of the user's private information and financial information. | 2015-05-21 |
20150143482 | Secure Computer Architectures, Systems, and Applications - Secure computer architectures, systems, and applications are provided herein. An exemplary system includes a legacy environment which is an off-the-shelf computing system, a trusted environment device that communicates with a network, and at least one peripheral that is communicatively coupled with the trusted environment device or having an authentication module. | 2015-05-21 |
20150143483 | Device and Method for Identity Authentication Management - The invention discloses a device for identity authentication management comprising a client and a background. The client includes terminal unit and fingerprint sensor, which includes a collection and recognition device for collecting fingerprint information and a memory for storing fingerprint information and user information corresponding to the fingerprint information, and terminal unit is used for registering or recognizing the fingerprint information collected by the fingerprint sensors. The background includes an identity authentication server interconnecting with the terminal units and multiple application management areas interconnecting with identity authentication server and including application units and application information. When the fingerprint information is registered or recognized by the terminal units, the identity authentication server generates or compares the user information corresponding to the fingerprint information, and then in the application management areas operations on the application units or application information can be performed for users. | 2015-05-21 |
20150143484 | SYSTEM AND METHOD FOR MANAGING TOKENS AUTHORIZING ON-DEVICE OPERATIONS - A system and method can support on-device operation management. A token issuer on a backend server, and/or a tool, can generate an authorization token, which is bound to a user of one or more devices using a unique identifier (ID) that is assigned to the user. The unique ID can be known and/or shared between the an on-device authorizing entity and the token issuer. Then, the on-device authorizing entity can verify the authorization token before granting an execution of one or more protected on-device operations. Furthermore, the on-device authorizing entity may not grant the execution of the one or more protected on-device operations, when the unique ID is erased from the device. | 2015-05-21 |
20150143485 | CLOUD SECURITY MANAGEMENT SYSTEM - A purpose of the invention is to accomplish ensuring security and the like when a user program is executed in a cloud environment. The present system comprises a user terminal | 2015-05-21 |
20150143486 | Simplified Wi-Fi Setup - A method enables a simple and convenient secured connection to a secured wireless network by individual passwords generated by requesting clients, and a confirmation of the owner or operator (Wi-Fi hot spot) of the secured wireless network. Each requesting client automatically generates its own individual password. A routing device of the secured wireless network generates a request which is submitted to a confirmation authority such that the owner or operator of the secured wireless network can decide whether to agree to the request. An answer of the owner or operator submitted via the confirmation authority to the routing device enables the secured connection between the requesting client and the secured wireless network. The owner or operator of the secured wireless network does not need to remember a special password in order to enable the secure connection. The subject innovation includes such requesting clients, routing devices and systems. | 2015-05-21 |
20150143487 | SYSTEMS AND METHODS FOR AUTHENTICATING AN AVATAR - Systems and methods for authenticating an avatar are provided. This system is useful with an avatar having an identifier, virtual environments, and a user who uses the avatar in the virtual environments. Transoms are generated, each with a unique identifier configured to exist in a specific location, and registered with an identity provider. The transom initiates a request. An offer is conveyed that includes the transom identifier, the location and the avatar identifier. The avatar is then authenticated by a shared secret. The identity provider then responds to the offer with avatar identification information, including reputation information. Reputation information is for the avatar and the user, and is compiled from external avatar data sources by using a trust matrix. An avatar gallery is generated by linking each avatar owned by each user to the account and compiling avatar profiles from the account, and the reputation information. The avatar profiles are searchable, and include micro formats. | 2015-05-21 |
20150143488 | INFORMATION SHARING SYSTEM AND INFORMATION SHARING METHOD - An information sharing system according to an embodiment includes an information processing system and a terminal and display device connected to the information processing system via a network. The information processing system is composed of one or more information processing apparatuses. The display device is equipped with a display unit on which an image is displayed. The display device includes a first identification-information acquiring unit that acquires identification information for identifying the display device on the network. The terminal acquires the identification information from the display device, and accesses a storage service and acquires access information, and transmits the acquired identification information and access information to the information processing system. The information processing system performs communication with the display device via the network on the basis of the identification information transmitted from the terminal, and accesses the storage service by using the access information transmitted from the terminal. | 2015-05-21 |
20150143489 | TOKEN FOR SECURING COMMUNICATION - In general, the invention relates to a method for performing a command on a token. The method includes receiving a first command authentication message digest (CAMD), a command, and scrambled data from a sender, and making a first determination that the sender is allowed to send commands to the token. The method further includes, based on the first determination, generating a second CAMD on the token using the command, the scrambled data, and an Administrative Command Authentication Secret (ACAS), making a second determination that the first CAMD and the second CAMD match, and based on the second determination, performing the command by the token. | 2015-05-21 |
20150143490 | Method And System Using A Cyber ID To Provide Secure Transactions - A method and system for securing a user transaction involving a subscriber unit (“SU”) (having a processor, memory, and a display configured to accept user input), a credential information manager (“CIM”) (having a processor and memory), and a transaction service provider (“TSP”) (having a processor and memory). A cyber identifier (“CyberID”), a subscriber identifier (“SubscriberID”), and subscriber information, each associated with the user, is stored in the CIM. A transaction request is sent from the SU to the TSP, which creates a transaction identifier (“TID”), stores it in the TSP memory and transmits it to the SU. The SU transmits an authentication request, the TID, and SubscriberID to the CIM, which authenticates the SubscriberID and verifies the TID to the TSP. The TSP verifies the TID and reports it to the CIM, which transmits the CyberID and subscriber information to the TSP, and transmits a transaction authorization to the SU. | 2015-05-21 |
20150143491 | WEB BASED SYSTEM THAT ALLOWS USERS TO LOG INTO WEBSITES WITHOUT ENTERING USERNAME AND PASSWORD INFORMATION - Internet user passwords are securely managed. A formation component can enable a user to create a master account on a web server, the master account comprising a master username and password. An access component can enable the user to access a plurality of password protected websites from a web browser or non-browser software application resident on the user's computing device when the user logs into the master account by entering the valid master username and password. A selection component can log the user into a website of the plurality of password protected websites when the user selects a hyperlink associated with the website, selects a linked image associated with the website, or selects the website from a pulldown list contained in a toolbar of a web browser. A display component can open a web browser or tab associated with the website. | 2015-05-21 |
20150143492 | SYSTEM AND METHOD FOR IDENTIFYING COLLABORATORS ON A SHARED MOBILE DEVICE - A method, computer program product, and system is provided for identifying collaborators on a shared mobile device. In an implementation, a method may include receiving, by a shared mobile device, an identifier input including one or more biometric identifiers associated with a user. The method may also include receiving, by the shared mobile device, a collaborative content input from the user, the collaborative content input being associated with at least a portion of collaborative content. The method may further include comparing the one or more biometric identifiers associated with the user with biometric identifiers of a plurality of users of the shared mobile device. The method may further include, when the identifier input including the one or more biometric identifiers associated with the user matches a biometric identifier of an identified user of the plurality of users of the shared mobile device, associating the identified user with the collaborative content input. | 2015-05-21 |
20150143493 | ELECTRONIC DEVICE AND LOGIN METHOD THEREOF - An electronic device and a login method thereof are provided. The method includes the following steps. A first user information is received. A login authentication message corresponding to the first user information is obtained according to the first user information. A current sequence combination corresponding to a plurality of function buttons being pressed is received, and the function buttons are used for controlling the electronic device to execute a plurality of functions correspondingly. The current sequence combination is compared with a preset sequence combination of function buttons in the login authentication message. Whether a login process of the first user information is completed is determined. Accordingly, difficulties in entering a password may be solved by the function buttons on a remote controller, and an identity authentication may be simplified and quickly completed, so as to provide a better user experience for the user. | 2015-05-21 |
20150143494 | CONTINUOUS IDENTITY AUTHENTICATION METHOD FOR COMPUTER USERS - The present invention provides a continuous identity authentication method. This method transforms the behavior records of different time intervals of the system user into a text format, and uses a resampling technique to generate a large number of articles of different lengths in order to have behavior records of the system user in different lengths of time, then using a document classification technique to build a matrix. In the end, building behavioral models of different time periods of the system's user using Minimum Enclosing Ball technology. The behavioral models can then learn the behavior of the legitimate system user and continuously check whether the system is currently operated by the legitimate system user or not. | 2015-05-21 |
20150143495 | CAPTCHA PROVISION METHOD AND PROGRAM - [Problem] To selectively provide, in accordance with a user terminal a CAPTCHA that can be easily executed by an operator of the user terminal. [Solution] A web server ( | 2015-05-21 |
20150143496 | MULTI-FACTOR AUTHENTICATION - Methods, systems and devices for multi-factor authentication (MFA) are described. An MFA device includes a plurality of tiles, a frame to hold the tiles and a stylus movable over the frame and the tiles. Each of the tiles includes at least one of visible indicia and tactile indicia, for representing a notation, and at least one track of acoustic code generation indicia. The acoustic code generation indicia of each tile, on being swiped, generate a complex sound waveform that encodes a composite binary pattern. The composite binary pattern comprises information blocks including a device identifier block for a device identifier associating the MFA device with a user, a biometric block for at least a part of a biometric pattern of the user, and a data block for the notation of the corresponding tile. | 2015-05-21 |
20150143497 | IDENTITY AUTHENTICATION BY USING HUMAN BIOLOGICAL CHARACTERISTIC - A human biological characteristic file corresponding to a particular identity is received and used as a base file. A characteristic code to be authenticated is obtained according to a human biological characteristic of a person who requests identity authentication when an identity authentication request corresponding to the particular identity is received. A base characteristic code is collected from a base file. A collecting algorithm applied for collecting the base characteristic code is the same as or matches an algorithm applied for obtaining the characteristic code. The present techniques determine whether the base characteristic code and the characteristic code correspond to a same human biological characteristic. If a result is positive, the identity authentication request is verified. The present techniques implement communication between different terminal devices of different manufacturers and effectively improve user experiences, thereby efficiently and conveniently implementing remote identity authentication. | 2015-05-21 |
20150143498 | OFFLINE AUTHENTICATION - A method including determining, by a processing device, whether a computer system is able to access an authentication server, in response to determining that the computer system is able to access the authentication server, requesting a first set of credentials, authenticating the first set of credentials, assigning a user a first role for performing operations on the computer system in view of the first set of credentials, and in response to determining that the computer system is unable to access the authentication server, requesting a second set of credentials different from the first set of credentials, authenticating one or more credentials provided by the user, and assigning the user a second role for performing operations on the computer system in view of the one or more credentials, wherein the first role specifies a first type of access to at least one object on the computer system, and the second role specifies a second type of access to the at least one object, wherein the first type of access is different from the second type of access. | 2015-05-21 |
20150143499 | SINGLE SIGN-ON FOR DISPARATE SERVERS - A system includes authentication of a user with a first server, reception of a request from the user to authenticate the user with a second server, requesting, from the first server, in response to receiving the request, user credentials to access the second server, reception of the user credentials from the first server, and transmission of the user credentials to the second server. | 2015-05-21 |
20150143500 | SYSTEMS AND METHODS FOR SECURE OPERATION OF AN INDUSTRIAL CONTROLLER - A method of securing an industrial control system includes operating the industrial control system in an open mode, wherein communications between a plurality of devices of the industrial control system are unencrypted when the industrial control system is in the open mode. The method includes exchanging security tokens between the plurality of devices of the industrial control system. The method further includes ceasing operating the industrial control system in the open mode and instead operating the industrial control system in a secure mode, wherein the communications between the plurality of devices of the industrial control system are encrypted using the security tokens when the industrial control system is operating in the secure mode. | 2015-05-21 |
20150143501 | PATH SELECTION IN A MULTI-SERVICE AND MULTI-TENANT SECURE CLOUD ENVIRONMENT - A device and method are provided to provide multi-exit firewall capabilities for cloud server or cloud service deployments without prior knowledge of reachability information of a client device where the client device may belong to one of several networks accessing the cloud server or cloud service. The reachability information may be derived based on flow of data to and from the client device in response to a data transfer initiation request. A firewall connection table may be updated to record routability to the client device comprising the derived reachability information. The recorded reachability information in the connection table may be used for the data transfer with the client device instead of a default route in a routing table. | 2015-05-21 |
20150143502 | SYSTEM AND METHOD FOR AUTOMATED CONFIGURATION OF APPLICATION FIREWALLS - In a system for configuring a web application firewall, one or more parameters of the firewall are adjusted such that a test configured for exposing a vulnerability of an application protected by the application firewall is blocked by the firewall and another test configured to invoke functionality of the application but that does not expose or exploit any security vulnerability is not blocked by the firewall. A notification is provided to a user if such a firewall configuration is not found after a specified number of attempts. | 2015-05-21 |
20150143503 | SYSTEMS AND METHODS FOR CONTENT MANAGEMENT IN AN ON-DEMAND ENVIRONMENT - The technology disclosed relates to hosting legacy data sources in a cloud environment. In particular, it relates to providing users with flyweight access to content stored in legacy content repositories from within cloud based applications. It uses full-duplex secure transport tunnels and repository-specific connectors to traverse security layers and access the content repositories. It also creates virtual objects representing the content in the content repositories and embeds them in the cloud based applications. | 2015-05-21 |
20150143504 | SECURE AND LIGHTWEIGHT TRAFFIC FORWARDING SYSTEMS AND METHODS TO CLOUD BASED NETWORK SECURITY SYSTEMS - A method implemented by an agent operating on a mobile device communicating to a cloud-based system includes opening up local listening sockets on the mobile device; redirecting outgoing traffic from all application on the mobile device except the agent to the local listening sockets; and forwarding the outgoing traffic from the local listening sockets to the cloud-based system with additional information included therein for the cloud-based system. | 2015-05-21 |
20150143505 | METHOD AND SYSTEM FOR COMMUNICATING OVER A SEGMENTED VIRTUAL PRIVATE NETWORK (VPN) - An approach for providing secure communication services is disclosed. A secure data tunnel from a source node to a destination node is established via a plurality of secure segments across a data communications network. A data path is established via the secure data tunnel, where the data path supports a performance enhancing mechanism that improves performance of data communications over the data path. The performance enhancing mechanism multiplexes data packet flows from the source node for transmission over the data path, and performs one or more of connection startup latency reduction, acknowledgment message spoofing, window sizing adjustment, compression and selective retransmission. | 2015-05-21 |
20150143506 | INFORMATION PROCESSING APPARATUS, METHOD OF CONTROLLING THE SAME, AND STORAGE MEDIUM - In an information processing apparatus and a method of controlling the same, settings for prohibiting an access to a removable medium is performed, and even if the setting is set, the access to the removable medium is permitted in a case where the information processing apparatus is activated in the maintenance mode. | 2015-05-21 |
20150143507 | METHOD AND APPARATUS FOR STORING, SHARING, AND/OR ORGANIZING PERSONAL INFORMATION - Embodiments of the subject invention relate to systems and methods for presenting and managing user information. Specific embodiments allow creating, editing, presenting, and storing user information. In a more specific embodiment, the systems and methods can be used to provide a digital safe deposit box (DSDB) that allows users to save, maintain, update, and/or share information about themselves and/or their organization. Specific embodiments provide a personal financial solution that is designed for customers interacting with professional institutions, such as accounting firms, banks, and insurance agencies, and/or interacting with family members and people that may need to access certain documents. Embodiments of the invention provide individuals, based on permission granted/allocated to them, access to specific information, while providing safety from fraud. | 2015-05-21 |
20150143508 | SYSTEMS AND METHODS FOR AUTHENTICATING ACCESS TO AN OPERATING SYSTEM BY A USER BEFORE THE OPERATING SYSTEM IS BOOTED USING A WIRELESS COMMUNICATION TOKEN - Certain embodiments herein relate to authenticating access to an operating system by a user before the operating system is booted. Such authentication may be performed by processing information received from a wireless communication token via Near Field Communication (NFC), in one embodiment. The received information may be processed to determine credentials for accessing the operating system, which if validated, may be sent to a Basic Input Output System (BIOS) which may boot the operating system in response. The BIOS may also perform various other functions if authentication is successful, such as decrypting a hard disk on which an operating system is installed before booting the operating system. According to this configuration, a decryption key may be received from the wireless communication token and subsequently sent to the BIOS to enable the decryption and subsequent booting of the operating system. | 2015-05-21 |