Patents - stay tuned to the technology

Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


23rd week of 2015 patent applcation highlights part 61
Patent application numberTitlePublished
20150156194CERTIFICATE STATUS DELIVERY THROUGH A LOCAL ENDPOINT - Techniques are disclosed for locally distributing online certificate status protocol (OCSP) responses to a client computer. A certificate authority (CA) proactively sends OCSP responses to an agent application (e.g., an antivirus application configured to handle OCSP responses) residing in the client computer. The agent application stores the OCSP responses in a cache. Thereafter, when a browser application sends an OCSP request to the CA, the agent application intercepts the request and determines whether a corresponding OCSP response is locally cached. If so, the agent application sends the cached OCSP response to the browser application. If not, the agent application retrieves the corresponding OCSP response from the CA and sends the response to the browser application.2015-06-04
20150156195METHOD FOR PROTECTING DATA ON A MASS STORAGE DEVICE AND A DEVICE FOR THE SAME - A method for protecting data on a mass storage device. The device has a security module and a data storage area configured to be switched between a protected state, in which accessing the data storage area is forbidden and an unprotected state, in which accessing the data storage area is authorized. Switching the data storage area from the protected state to the unprotected state by sending a request to a remote server, receiving a one-time password on a communication device, in response to the sent request, providing the received one-time password to the security module, authorizing access to the data storage area by the security module, once the provided one-time password is deemed valid by the security module.2015-06-04
20150156196WEARABLE ELECTRONIC DEVICE AND METHOD FOR CONTROLLING SAME - The present invention relates to a wearable electronic device and to a method for controlling same, wherein the device includes: at least one lens; a display device allowing information to be displayed on the lens; a sensing unit obtaining bio-information of a user; and a control unit performing user authentication by using the obtained user bio-information to control functions of the wearable electronic device according to the user authentication result.2015-06-04
20150156197SYSTEM AND METHOD FOR TRANSFERRING ELECTRONIC INFORMATION - A system for collecting and transferring electronic information includes one or more servers, having one or more centralized databases for storing or retrieving the data, connected to a network, one or more computing devices connected to the servers via the network for retrieving the data from the centralized databases, and a plurality of biometric devices connected to the servers via the network, located at different locations. Each biometric device comprises a system for identifying users based on biometric data of the users, a system for storing the biometric data and activity information of the users, and a system for sending the biometric data and activity information to the servers, in communication with the servers in real time via the network.2015-06-04
20150156198TECHNIQUES FOR AUTHENTICATION VIA A MOBILE DEVICE - Techniques for authentication via a mobile device are provided. A mobile device is pre-registered for website authentication services. A user encounters a website displaying an embedded code as an image alongside a normal login process for that website. The image is identified by the mobile device, encrypted and signed by the mobile device and sent to a proxy. The proxy authenticates the code and associates it with the website. Credentials for the user are provided to the website to automatically authenticate the user for access to the website bypassing the normal login process associated with the website.2015-06-04
20150156199REDUCED AUTHENTICATION TIMES IN CONSTRAINED COMPUTER NETWORKS - In one embodiment, a capable node in a low power and lossy network (LLN) may monitor the authentication time for one or more nodes in the LLN. The capable node may dynamically correlate the authentication time with the location of the one or more nodes in the LLN in order to identify one or more authentication-delayed nodes. The node may then select, based on the location of the one or more authentication-delayed nodes, one or more key-delegation nodes to receive one or more network keys so that the key-delegation nodes may perform localized authentication of one or more of the authentication-delayed nodes. The capable node may then distribute the one or more network keys to the one or more key-delegation nodes.2015-06-04
20150156200APPARATUS AND METHOD FOR SECURE AND SILENT CONFIRMATION-LESS PRESENCE FOR PUBLIC IDENTITIES - An apparatus and method for providing access to a first user's public identity in a communication network are provided. The method includes receiving, from the first user, a first request message for at least one second user connection, receiving, from the at least one second user, a second request message for a first user connection, and providing, by the system server, access to the first user's public identity for the at least one second user and sharing the at least one second user's respective public identity with the first user.2015-06-04
20150156201METHOD FOR SHARING A MEDIA COLLECTION IN A NETWORK ENVIRONMENT - A method of acquiring rights to content to be burned to a CD, comprising defining a first content set; defining a second content set comprised of content selected from the first content set whose content attributes match those selected by a user; identifying as a third content set that content in the second content set for which DRM rights sufficient to permit the content to be burned to CD are not currently possessed; allowing a user to authorize obtaining rights for members of the second content set for which rights permitting the content to be burned to CD are not currently possessed; obtaining rights which allow at least a subset of the third content set to be burned to CD; and, allowing the content defined in the second content set and for which appropriate rights have been obtained to be burned to CD.2015-06-04
20150156202Privilege Separation - In one implementation, an interposer library is installed on an embedded system or another type of computing system. The system may be configured to host web services or route data packets. A processor, executes processes of the system, and the interposer library intercepts data indicative of relationships of the processes. An access map is generated based on relationships of the processes of the system. The system is modified according to a set of procedures derived from the access map. The set of procedures may be derived by the processor or the access map. The set of procedures may be a minimum privilege solution that minimizes the privilege level of each process to a lowest privilege possible while maintaining the requisite functions of the process.2015-06-04
20150156203Secure Browsing Via A Transparent Network Proxy - A system for providing secure browsing via a transparent network proxy is disclosed. The system may receive, from a client, a request to access a resource. The request may include an identifier that may be utilized to locate the resource. Once the request is received, the system may determine if the resource is not trusted, such as if the identifier is determined to be unknown or suspicious. If the resource is determined to not be trusted by the system, the system may forward the request to a virtual machine manager that may select a browser virtual machine from a pool of browser virtual machines. After the browser virtual machine is selected, the browser virtual machine may stream a rendering of the resource to the client based on the request. The rendering of the resource may be provided in lieu of the actual resource.2015-06-04
20150156204ACCESSING STORAGE UNITS OF A DISPERSED STORAGE NETWORK - A method begins with a group of storage units of a dispersed storage network (DSN) receiving a common access request. The method continues with each storage unit of the group of storage units interpreting the access request to determine whether the storage unit is an intended recipient of the access request, where storage units of a sub-set of storage units of the group of storage units are intended recipients. The method continues with each storage unit of the sub-set of storage units determining a type of the access request and a level of the access request. When the access request is a read request, the method continues with each storage unit of the sub-set of storage units retrieving each encoded data slice having an identifier of its slice address substantially matching the a given identifier of the level to produce a retrieved set of encoded data slices.2015-06-04
20150156205POLICY ENFORCEMENT OF CLIENT DEVICES - A method may include sending, by a client device, an access request to an authentication server device. The access request may include a request to access an administered resource. The method may include in response to the client device not complying with an administrative policy associated with the administered resource, receiving, from the authentication server device, one or more instructions regarding installation of a client application, receiving, by the client device, a client application in accordance with the instructions, and installing the client application on the client device.2015-06-04
20150156206Information Infrastructure Management Tools With Extractor, Storage and Data Release Control Functions and Segmental Data Stores - Method and system of organizing and processing data in a distributed computing system having designated, distributed data stores for sensitive content (e.g., trade secrets) or select content (e.g., critical content). Sensitive/select data is extracted via configurable filters and stored in the designated data stores, sometimes subject to security controls, with limiting distribution functions and controlled release of the sensitive/select data. Distribution is limited due to designated, configurable filters.2015-06-04
20150156207NETWORK SERVICE SYSTEM AND NETWORK SERVICE UTILIZING METHOD THEREOF - A network service system and a network service utilizing method thereof are provided. The network service system includes a network service providing apparatus and a network service using apparatus. The network service providing apparatus provides a machine-readable code. The network service using apparatus parses the machine-readable code to obtain an identification and a key. The network service providing apparatus transmits an encrypted message to the network service using apparatus based on the identification. The network service using apparatus decrypts the encrypted message into service information by the key and uses a service of the network service providing apparatus after connecting to the network service providing apparatus according to the service information.2015-06-04
20150156208Identity and Trustworthiness Verification Using Online and Offline Components - Methods and systems for verifying the identity and trustworthiness of a user of an online system are disclosed. In one embodiment, the method comprises receiving online and offline identity information for a user and comparing them to a user profile information provided by the user. Furthermore, the user's online activity in a third party online system and the user's offline activity are received. Based on the online activity and the offline activity a trustworthiness score may be calculated.2015-06-04
20150156209Process Using Universal Sanitization to Prevent Injection Attacks - Injection attacks, particularly SQL Injection (SQLi), remains the top risk in software, despite extensive research on methods to prevent these attacks. A novel process is set forth that would prevent injection attacks in all cases, including secondary injection, without interfering with legitimate queries. The technique is based on a simple algorithm for sanitizing input character data, rather than on a particular technology. As such, this sanitizing solution would apply to all programming languages and databases, including NoSQL databases. An alternative approach, using the sanitized version of the data in order to determine whether the original input character data contains potentially malicious data, is also set forth.2015-06-04
20150156210PREVENTING URL CONFUSION ATTACKS - Methods and apparatus are disclosed for detecting illegitimate or spoofed links on a web page. Illegitimate links can be detected by receiving a web link that includes link text and a link address, generating normalized link text based upon the link text, wherein characters in the link text that are visually similar are represented by a single normalized character identifier in the normalized text, determining whether the normalized link text is in the format of a link address, and determining that the text is safe when the normalized link text is not in the format of a link address. The techniques disclosed herein further involve determining whether the normalized link text matches the link address, determining that the text is safe when the normalized link text matches the link address, and determining that the text is unsafe when the normalized link text does not match the link address.2015-06-04
20150156211Method for Predicting and Detecting Network Intrusion in a Computer Network - A method of detecting an internet attack against a computing device is disclosed. The method of detecting an internet attack against a computing device comprising the steps of receiving a plurality of incoming network packets; extracting a plurality of incoming feature packets based on the plurality of incoming network packets; predicting a predicted incoming feature packet based on the plurality of incoming feature packets; obtaining a first classification data based on one of the incoming feature packets using a first classifier; obtaining a second classification data based on the predicted incoming feature packet by using a second classifier; and performing at least one remedy action if the first classification data or the second classification data identifies the internet intrusion attack; wherein each of the plurality of incoming feature packets and the predicted incoming feature packet comprise a plurality of incoming features and a plurality of predicted features respectively.2015-06-04
20150156212System and Method for Tamper Resistant Reliable Logging of Network Traffic - A network interface device includes a memory and a processor operable to receive a malicious packet marker, store the malicious packet marker to the memory, monitor network data packets flowing in the network interface device, determine that a packet matches the malicious packet marker, and store log information from the packet to the memory.2015-06-04
20150156213ANALYSIS OF TIME SERIES DATA - The systems and methods described herein relate to storing values, such as sketches, that represent time indexed data related to network traffic. The model may be indexed by multiple sets of keys and time range values. It is an advantage that the index is essentially repeated for different time intervals. Utilization of the sketches avoids prohibitively large amounts of network traffic from overwhelming the monitoring computing device(s). Further, the probabilistic representative accuracy of the sketches is dynamically configurable. The time indexed data may represent data traffic on a computer network. The time indexed data may be data packets sent on the network. In one or more embodiments the time indexed data may be sketches that represent and/or approximate the data packets. Further, it is contemplated herein that the accuracy of the sketches' representation may be dynamically configurable.2015-06-04
20150156214DETECTION AND PREVENTION OF ONLINE USER INTERFACE MANIPULATION VIA REMOTE CONTROL - A method for determining if a web browser is being operated by a local human or a remote agent, based on analysis of certain aspects of how the different users interact with a webpage. By employing various detection mechanisms, one is able to evaluate the user's actions in order to predict the type of user. The predictions are made by acquiring information on how the user loads, navigates, and interacts with the webpage and comparing that information with statistics taken from a control group. Performance metrics from all webpages containing similar elements are compiled by analysis servers and made available to the operator of a webpage through a variety of reporting mediums. By compiling such performance metrics, the method helps combat and prevent malicious automated traffic directed at advertisements and other aspects of a given webpage.2015-06-04
20150156215SYSTEM AND METHOD FOR DETECTING AND EVICTING MALICIOUS VEHICLES IN A VEHICLE COMMUNICATIONS NETWORK - In a vehicle communication network, some vehicles may be used by attackers to send false information to other vehicles which may jeopardize the safety of other vehicles. Vehicles should be able to detect malicious communications activities and to mitigate the impact of malicious vehicles by evicting (eliminating) suspected malicious vehicles from the system. Evicting a vehicle is to ignore the messages sent from the vehicle for a specified time period. Voting and sacrifice principles are combined using a mathematical model based on the “Mafia Game”. The Mafia Game model focuses on the relative size of the group of attackers within a neighborhood necessary to dominate the entire network in the neighborhood (i.e., to eventually evict all the innocent vehicles).2015-06-04
20150156216VERIFYING APPLICATION SECURITY VULNERABILITIES - Verifying application security vulnerabilities includes receiving a source code to analyze, performing a static analysis using the received source code and generating a vulnerability call trace for the received source code. Responsive to a determination that all static analysis results are not validated, mock objects are generated using the vulnerability call trace and a unit test is created using the generated mock objects. The unit test is executed using the generated mock objects and responsive to a determination that an identified vulnerability was validated; a next static analysis result is selected. Responsive to a determination that all static analysis results are validated, results and computed unit tests are reported.2015-06-04
20150156217METHOD AND APPARATUS FOR DETERMINING PRIVACY POLICY FOR DEVICES BASED ON BRAIN WAVE INFORMATION - An approach is provided for processing sensor data to determine an identification of at least one object. The approach involves determining brain wave data associated with at least one user during an exposure of the at least one object to at least one user. The approach also involves processing the brain wave information to determine a sensitivity information of the at least one user to the at least one object. The approach further involves causing a configuration of one or more privacy policies of at least one device based, at least in part, on the sensitivity information.2015-06-04
20150156218SECURITY INFRASTRUCTURE FOR CLOUD SERVICES - A framework for handling a secure interaction between components in a cloud infrastructure system that wish to transfer information between each other during processing of a customer's subscription order is described. The framework orders the security zones of components based on security levels and protects the transfer of information between components in security zones with different security levels. The assignment of a component to a security zone is based upon the sensitivity of the data handled by the components, the sensitivity of functions performed by the component, and the like.2015-06-04
20150156219SECURITY ENFORCEMENT IN VIRTUALIZED SYSTEMS - A system includes a virtual machine (VM) server and a policy engine server. The VM server includes two or more guest operating systems and an agent. The agent is configured to collect information from the two or more guest operating systems. The policy engine server is configured to: receive the information from the agent; generate access control information for a first guest OS, of the two or more guest operating systems, based on the information; and configure an enforcer based on the access control information.2015-06-04
20150156220A SYSTEM AND METHOD FOR SECURING THE DATA AND INFORMATION TRANSMITTED AS EMAIL ATTACHMENTS - A system for securing data and information transmitted via entails is disclosed. The system includes a sender-side device from which an email including a first code is transmitted. The first code comprises instructions for manipulating server-side processing of the email. The system includes a filter module which determines whether the first code is present within the email, and subsequently transmits the email to a processing server in case if the first code is present within the email. The system includes a processing server which processes the email in accordance with the instructions specified in the first code and generates a first link, thereby enabling the email sender to access and modify the access policy for the email. The processing server further authenticates the intended recipient of the email via an OTP before enabling the intended recipient to access the parts of the email.2015-06-04
20150156221IMS INBOUND ROAMER AND SHORT NUMBER DIALING - Network nodes for an access network and a home network of a first UE are described for use when routing an originating call from the first UE in the access network including an IMS network. A network node receives a SIP INVITE message associated with the originating call from the first UE, and including a called party number associated with the call. It determines whether the first UE is visiting the access network and whether the called party number is associated with the access network. A query to a database is performed, the database comprising a plurality of called party numbers, as to whether the called party number is allowable for use in the access network when the UE is visiting and when the called party number is associated with the access network. Instructing the home network to route the originating call to the access network when a response from the query indicates the called party number is allowable for use in the access network. The home network receives the instruction and routes the originating call to the access network for further processing.2015-06-04
20150156222Communication Device and Non-Transitory Computer-Readable Medium - A non-transitory computer-readable medium stores computer-readable instructions performing processes including a determination, a setting, a first generation, a second generation and a transmission operations. The determination operation determines whether a communication state is a first or second state based on at least one of transmission data transmitted by the communication device to a conference server and reception data received by the communication device from the conference server. The setting operation sets a combined time to a first or second period of time in response to the determination operation. The first generation operation generates sound data corresponding to the combined time, by sequentially compressing sampling data corresponding to the combined time in an order of storage in a first storage portion. The second generation operation generates a packet including the sound data. The transmission operation transmits the packet to the conference server at a cycle corresponding to the combined time.2015-06-04
20150156223NETWORK PROXY LAYER FOR POLICY-BASED APPLICATION PROXIES - A system and method for providing a network proxy layer are disclosed. The network proxy layer may receive a connection establishment event for a client connection of an application session and send the client connection event to an application proxy for the application session, the application proxy being associated with an application of a server. Upon establishment of the client connection, the network proxy layer may receive one or more data packets from the client connection. The network proxy layer may further receive a connection establishment event for a server connection of the application session of the server, and receive one or more data packets from the server connection.2015-06-04
20150156224PROCESSING MESSAGES WITH A DEVICE SERVER OPERATING IN A TELEPHONE - A system that incorporates teachings of the present disclosure may include, for example, a computer-readable storage medium in a telephone having computer instructions to execute a web server application in the telephone. The web server application can be operable to detect an incoming plain old telephone service call, identify a calling party identifier from the incoming plain old telephone service call, and direct one of a plurality of devices detected by web server application to present the calling party identifier. Other embodiments are disclosed.2015-06-04
20150156225SYSTEMS AND METHODS FOR SHARING IMAGE DATA - At least one server connects with clients via networks such that each client communicates using a different network. The server divides an image based on an application into portions. The server assigns version numbers to the portions such that each version number corresponds to a different portion. The server generates lists that include the version numbers, wherein each list corresponds to a different client. The server shares the image by transmitting image data to each client separately based on the respective list. The server receives update(s) for the image and identifies portion(s) that has changed based on the update. The server assigns an updated version number to the identified changed portion and generates updated lists that include the updated version numbers for the clients such that each updated list corresponds to a different client. The server transmits updated image data to each client separately based on the respective updated list.2015-06-04
20150156226SYSTEM AND METHOD FOR INTERNET PUBLISHING - Disclosed herein are systems and methods for internet publishing. In some aspects, the systems and methods may be implemented by software designed for users such as, for example, small businesses, to manage and implement an online digital strategy. A digital web-based platform, for example, may be used to establish and expand the online presence of a brand. In some aspects, the systems and methods may be implemented to publish, syndicate, and monetize content in an automated and seamless manner from a single interface as well as to monitor and respond to information relevant to such content.2015-06-04
20150156227Synchronize Tape Delay and Social Networking Experience - An approach that delays presentation of social media communications corresponding to an event is provided. In the approach, social media communications received during an initial presentation of the event are stored. A time delay associated with each of the social media communications is recorded with the time delay being from the start time of the initial presentation of the event. During subsequent playback of the event, the approach retrieves the stored social media communications and presents the retrieved social media communications based upon the time delay associated with each of the communications from the start time of the subsequent event playback.2015-06-04
20150156228SOCIAL NETWORKING INTERACTING SYSTEM - A computer-implemented is described. The method can include receiving, at a computing device having one or more processors, a first input from a first user. The first input can be indicative of a first avatar representing the first user. The method can also include receiving, at the computing device, a second input from a second user. The second input can be indicative of a second avatar representing the second user. The method can also include receiving, at the computing device, a third input from one of the first user and the second user. The third input can be indicative of a primary virtual environment for the first avatar and the second avatar. The method can also include outputting, at the computing device, a first video to the first user of the primary virtual environment. The first video can be representative of a first first-person viewpoint of the primary virtual environment. The method can also include outputting, at the computing device, a second video to the second user of the primary virtual environment. The second video can be representative of a second first-person viewpoint of the primary virtual environment different than the first first-person viewpoint. The method can also include including, at the computing device, only nonstrategic content in the first video and the second video.2015-06-04
20150156229TERMINAL APPARATUS, INFORMATION PROCESSING SYSTEM AND INFORMATION PROCESSING METHOD - A terminal apparatus has a first setting of displaying a portion of information designated by an information processing apparatus and a second setting of being able to display another portion. The terminal apparatus receives transmission information converted from the information by the information processing apparatus to include a portion to be displayed first and transmission information converted from the information to include another portion; stores the transmission information thus received; and displays, in a case of the first setting, the designated portion and displays, in a case of the second setting, a portion based on an operation performed on the terminal apparatus. The terminal apparatus receives, upon switching from the second setting to the first setting, the transmission information corresponding to the designated portion based on whether already receiving the transmission information corresponding to the designated portion.2015-06-04
20150156230METHOD AND SYSTEM FOR SOCIAL COLLABORATIVE CURATION - A social learning and exploration platform to learn about both specific and everyday concepts by exploring an organized collection of multiple flips or media, called flips. Users of the system have the ability to explore a number of categories of content, create and assimilate curated content across those categories, define sets of questions and explore concepts with flips. The system invites crowdsourced perspectives on any concept and expands anyone's search query through invited or crowd sourced collaboration (gain exposure to new facets of a concept through collaborative set creation).2015-06-04
20150156231METHOD AND A SERVER OF RESERVING CONFERENCE HARDWARE RESOURCES - One embodiment disclosed herein is a reservation method comprising receiving an invitation message to a conference from a device associated with the organizer of the conference, the invitation message identifying at least one participant distinct from the organizer, a search process performed on behalf of the participant(s) identified in the invitation message, of searching for conference hardware resources appropriate for the conference and for the participant(s), a reservation process performed for the participant(s), of reserving the hardware resource(s), if any, identified during the search process, and sending a notification message to the device(s) of the participant(s) specifying the server hardware resource(s).2015-06-04
20150156232SYSTEM AND METHOD FOR GENERATING AND MERGING ACTIVITY-ENTRY REPORTS UTILIZING ACTIVITY-ENTRY HIERARCHY AND HIERARCHICAL INFORMATION OF THE ACTIVITY-ENTRIES - The invention provides for a system and method for activity-entry reporting and activity-entry report generation by utilizing a drag and drop mechanism that allows users to merge submitted activities in order to generate new activities. These activities are contained within activity reports that can be modified and merged by other users in an effort to develop combined activity reports that maintain the traceability of the merged activities.2015-06-04
20150156233METHOD AND SYSTEM FOR OPERATING A COLLABORATIVE NETWORK - A method and system for operating a collaborative network of participants attending an event/meeting presentation in person employs a web-based control server connected online with participants using their personal networked computer devices. The control server sends a question or prompt to and receives inputs from participants via the display screens of their personal networked computer devices, and calculates aggregated results of participant users' inputs for display on the event/meeting display screen, then sends a next question or prompt to the participants for a next activity step of the group activity. Real-time group interactivity of participants in the event/meeting presentation is enabled through mobility and convenience of participants using their networked personal computer devices such as smartphones for participating in the group activity.2015-06-04
20150156234SCALABLE IP-SERVICES ENABLED MULTICAST FORWARDING WITH EFFICIENT RESOURCE UTILIZATION - Methods, apparatus and data structures are provided for managing multicast IP flows. According to one embodiment, active multicast IP sessions are identified by a network device. A data structure is maintained by the network device and contains therein information regarding the multicast sessions, including a first value for each of the multicast sessions, at least one chain of one or more blocks of second values and one or more transmit control blocks (TCBs). Each first value is indicative of a chain of one or more blocks of second values. Each second value corresponds to an outbound interface (OIF) participating in the multicast session and identifies a number of times packets associated with the multicast session are to be replicated. The TCBs have stored therein control information to process or route packets. Each second value is indicative of a TCB that identifies an OIF of the network device through which packets are to be transmitted.2015-06-04
20150156235System and Method For Delivering Content Over a Multicast Network - A system for delivering content over a network includes a server. The server is configured to divide the content into multiple segments, to create multiple data streams using the segments of the content, and to transmit each of the data streams via a respective multicast session, wherein a copy of each of the multiple segments is transmitted during a single time slot of the multicast session.2015-06-04
20150156236Synchronize Tape Delay and Social Networking Experience - An approach that delays presentation of social media communications corresponding to an event is provided. In the approach, social media communications received during an initial presentation of the event are stored. A time delay associated with each of the social media communications is recorded with the time delay being from the start time of the initial presentation of the event. During subsequent playback of the event, the approach retrieves the stored social media communications and presents the retrieved social media communications based upon the time delay associated with each of the communications from the start time of the subsequent event playback.2015-06-04
20150156237Video Streaming System, Computer Device, and Video Streaming Method - A video streaming system includes a mobile device and a computer device. The mobile device includes a camera module, a mobile network module, and a client module. The camera module captures the video data. The client module is electrically connected the camera module and the mobile network module, controls the operation of the camera module, compresses the video data into the streaming data, and transmits the streaming data through the mobile network module. The computer device includes a computer network module and a virtual device. The computer network module is connected to the mobile network module. The virtual device is electrically connected to the computer network module. When the computer network module network is connected to the mobile network module through the network, the computer network module receives the streaming data transmitted by the client module and decompresses the streaming data to restore the video data.2015-06-04
20150156238RAPIDLY INITIALIZING AND DYNAMICALLY ADJUSTING MEDIA STREAMS - A device may generate a media stream to be shared with other users by building a media graph, comprising a series of interconnected processing units that perform various processing tasks. However, the time involved in generating the media graph may delay the initialization of the media stream, and adjusting properties of the media stream (such as resolution or codec) may result in an interruption of the media stream while a new media graph is built. Instead, a media graph cache may be provided to cache a set of media graphs, which may be interchangeably selected for rapid initialization and adjusting of media stream properties. The media component (e.g., a videocamera) may also be configured to promote rapid adjustments to some media stream properties, while maintaining other properties (e.g., field of view and white balance) for a smooth transition between media stream property sets.2015-06-04
20150156239DYNAMIC CONTENT DELIVERY SYSTEMS AND METHODS FOR PROVIDING SAME - Content delivery systems and related methods can provide dynamic content across a network, based on detected network performance. An exemplary content delivery system can comprise a content request unit, a detection unit, and a transmission unit. The content request unit can receive and process content requests from clients, and can instruct the transmission unit to provide the requested content. The detection unit 2015-06-04
20150156240DYNAMIC VIRTUAL CHUNKING OF STREAMING MEDIA CONTENT - Techniques are disclosed for a client device to stream a user-selected media file from a content server. The client device may create a playlist of dynamic virtual chunks to represent a single media stream file on a streaming media server. The playlist itself may be generated from an index in the header of a given stream defining what chunks, or segments of multiplexed audiovisual content, are present within that stream. The playlist of dynamic virtual chunks provides the playback engine on the client device with a list of individual files that may be requested from the streaming server independently of one another, despite the stream being stored on the server as a single media stream file.2015-06-04
20150156241SUPPORT FOR A NEW INSERT STREAM (ISTREAM) OPERATION IN COMPLEX EVENT PROCESSING (CEP) - One embodiment of the invention includes a method of processing streaming data. The method includes initializing a stream of data and setting a time interval to apply to the stream of data. The time interval comprises a window for analyzing the data within the stream of data. The method further includes identifying one or more columns within the stream of data, designating one or more of the columns to be monitored for differences within the data over the time interval, and monitoring the designated columns over the time interval. Further, the method includes determining that at least one value from at least one of the designated columns has changed and in response to at least one value changing, outputting the changed values from the designated columns.2015-06-04
20150156242APPARATUS FOR TRANSMITTING BROADCAST SIGNALS, APPARATUS FOR RECEIVING BROADCAST SIGNALS, METHOD FOR TRANSMITTING BROADCAST SIGNALS AND METHOD FOR RECEIVING BROADCAST SIGNALS - Disclosed herein is a method for sending a broadcast signal. The method includes formatting input streams into multiple data pipes (DPs). Formatting the input streams into the multiple DPs includes splitting the input streams into multiple data streams, deleting a null packet included in a data stream, and forming a baseband frame (BBF) by adding a header to the data stream. The baseband frame includes a deleted null packet (DNP) field indicative of the number of deleted null packets, and the DNP field comprises at least one of a first DNP or a second DNP.2015-06-04
20150156243CONTROLLING RESOURCE USAGE OF ADAPTIVE STREAMING SESSIONS FOR TRANSMISSION VIA A RADIO ACCESS NETWORK2015-06-04
20150156244Communication and/or Creation of Taste - A system or process for performance of taste, by means of, a standalone or network computer, or a phone, and/or a “taste-device” named or classified a “TASTEDEV”, or “MOBILE TASTEDEV”, is the subject of this invention. Taste information in a machine-device or taste-device, comprising an operating system, program, application, service, or platform, is communicated with means comprising of a connection to a taste-device with means comprising of a device driver, for performance of taste. The performance of taste by means of a machine-device and/or a taste-device, comprises, a user, client, user-client, host, machine-device, or taste-device, processing, storing, communication, and/or creation, of taste, by means comprising of a network.2015-06-04
20150156245NAVIGATION AND COMMUNICATION SYSTEM FOR A MEANS OF TRANSPORT - A navigation and communication system for a transportation device, comprising a server with a processor and an interface configured to provide a virtual marketplace which is accessible by a group of users, the server being configured to receive a data set from a first user of the group of users, the data set comprising user related information and information about a location the user related information relates to, the server being further configured to transmit the data set to a device of a second user of the group of users.2015-06-04
20150156246SYSTEM AND METHOD FOR ZERO LATENCY BROWSING - A system replicates Internet websites on a large number of user computers having browsers. The system includes a gateway platform having a gateway server and a cache. In the broadcast mode, the gateway server periodically or continuously images broadcast data (e.g., popular websites), compresses the website images, and stores the compressed website images in the gateway cache. The gateway server then broadcasts all of the compressed broadcast data to all (millions) of the user computers over a broadcast device (such as a satellite), for subsequent display by the user in the browser. In the unicast mode, the user requests unicast data (e.g., less-popular websites or websites having highly user-customized information) at the browser. The gateway server images that one web page, compresses the unicast data, and transmits the compressed unicast data over the broadcast device substantially in real time to the one requesting user computer.2015-06-04
20150156247Client-Side Bulk Uploader - Methods, systems and computer-readable storage mediums encoded with computer programs executed by one or more processors for providing client-side bulk uploading are disclosed. A selection of files is uploaded from a user device to a server over a network. The files are accessed to obtain metadata associated with each file. The metadata includes information by which the files are clustered and is accessible via a network. The files are clustered on the user device based on the metadata. The files of each cluster are associated with cluster information identifying the cluster to which a respective file belongs. The files, along with the clustering information, are uploaded, and one or more of the accessing, clustering and associating are performed in parallel with the uploading.2015-06-04
20150156248SYSTEM FOR CREATING AND DISTRIBUTING CONTENT TO MOBILE DEVICES - A system for creating content for mobile devices facilitates the creation and dissemination of content to a plurality of mobile devices and computers. Content can comprise of multiple panels, and each panel, in addition to video, graphics and text, can have an ordered set of audio and video (voice, music, etc.) provided, which are played back in a mobile device by a content client component in the specified order for each of the panels. A computer or PC comprising the content creator functionality is used to generate content and communicate it to a content distribution server.2015-06-04
20150156249PROVIDING NOTIFICATIONS REGARDING THE MULTICAST OF SCHEDULED CONTENT OR POPULAR CONTENT - One or more server devices may determine a measure of popularity of multiple content items; select particular content to be provided via a multicast channel when the measure of popularity of the particular content satisfies a threshold; generate a notification regarding the availability of the particular content; and provide the notification to one or more user devices for display on the one or more user devices to notify respective users regarding the availability of the content. The notification may be received by the one or more user devices outside of a multicast control channel. The one or more servers may transmit the particular content via the multicast channel.2015-06-04
20150156250SYSTEM AND METHOD FOR VIRTUALIZATION OF NETWORKING SYSTEM SOFTWARE VIA EMULATION - A network application may be run on a host computer using a target protocol stack by launching a network application on the host computer, opening a target protocol stack library on the host computer before opening a host computer system library and using the target protocol stack library to divert interface calls associated with the network application to a target protocol stack, whereby the network application runs on the host computer as if it were running directly on a computer on which the target protocol stack is available. A network environment may be simulated including wireless communication between a plurality of mobile devices. Multiple instances of the target protocol stack library may be opened to divert interface calls associated with the network application to the target protocol stack. A hardware test bed may be emulated to which the network application may be applied.2015-06-04
20150156251Method, Client and Cloud Server for Realizing Complex Software Service - A method, client, cloud server, and system for realizing complex software services are provided. The method includes: after receiving software service information required by a user to be provided, a client sending a request to a cloud server, wherein, the request carries the software service information required by the user to be provided; and after receiving the request, the cloud server selecting a corresponding cloud-end functional module to interact with the client according to the software service information required by the user to be provided, and providing the software service for the user. The embodiment of the present document solves the contradiction between software user demand and software user purchasing power, and the user can enjoy more abundant, powerful, steady and secure software and hardware resource services.2015-06-04
20150156252Providing Clients Access To A Server Service Using An OPC Unified Architecture (OPC-UA) - A method for providing clients with access to a service of a server in a network using an OPC-UA, the server service making available varying values of at least one variable to the clients, wherein a client registers for the server service by sending a subscription request for the server service to the server which sets up a subscription structure including a unique subscription ID as well as a TCP/IP multicast group associated with the subscription structure and including a unique multicast address, and there server communicates the multicast address and the subscription ID to every client submitting a subscription request to register for the server service, the server additionally sends each change in value of each variable of the server service to the multicast address over a network via a multicast message so that all clients registered for the server service receive the same multicast message.2015-06-04
20150156253Methods and Networks for Dynamically Changing an Operational Mode of Node Operations in a Wireless Node Network - Improved methods and networks of components are described for dynamically changing an operational mode of node operations in a wireless node network having at least a plurality of master nodes and a server. A method begins with a first master node detecting an environmental change related to the first master node, such as when the first master node loses reception of a location signal due to surrounding structure. In response to the detected environmental change, changing an operational mode for the first master node to a temporary ID node mode where the first master node no longer can self-determine its location. The first master node operating in the temporary ID node mode then notifies the server that the first master nodes is operating in the temporary ID node mode, and associates with a second master node.2015-06-04
20150156254Proximity Based Adaptive Adjustment of Node Power Level in a Wireless Node Network - Improved methods and apparatus are described for adaptive adjustment of node power level in a wireless node network having a plurality of nodes and a server. In a method, the server or a master node in the network may detect a proximate condition relative to a first of the nodes and adjust the node power of the first node accordingly. More specifically, the server or master node may detect if either a number of other nodes operating proximate a first of the nodes exceeds a neighboring node threshold, or if the first node is located in an RF restricted area, or if a signal strength level near the first node exceeds a signal strength threshold. If so, the server may adapt an output power setting on the first node from an original level to an adapted level.2015-06-04
20150156255RELAY SERVER AND STORAGE MEDIUM - A relay server configured to relay service provision from a service provision server to a communication apparatus. The relay server is configured to perform receiving, in a case that a predetermined instruction is provided to the communication apparatus, a request for specific screen data from the communication apparatus, receiving, in a case that the request for the specific screen data is received, first folder relation information related to a first folder, which is a target folder of past data communication, from a database separately configured from the service provision server and the communication apparatus, generating the specific screen data by which a folder name of the first folder received by using the first folder relation information is preferentially displayed on the communication apparatus, and supplying the generated specific screen data to the communication apparatus.2015-06-04
20150156256SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR PERFORMING ONE OR MORE MAINTENANCE TASKS ON A REMOTELY LOCATED COMPUTER CONNECTED TO A SERVER COMPUTER VIA A DATA NETWORK - A method and computer executable program code are disclosed for performing one or more maintenance tasks on a remotely located computer connected to a server computer via a data network.2015-06-04
20150156257APPLICATION SERVICE PROVIDING METHOD AND SYSTEM, AND RELATED DEVICE - The present invention discloses an application service providing method and system, and a related device, including: receiving a service providing request sent by a smart device, where the service providing request carries device information of the smart device; determining capability information of the smart device according to the device information; and returning, to the smart device, interaction element code that is corresponding to the capability information and is of an application service, so that the smart device provides the application service by running the interaction element code. By using the solutions provided in the embodiments of the present invention, complexity for a user to use a same application service on all types of smart devices is reduced, difficulty for a developer in developing an application program, corresponding to a same application service, for all types of smart devices is reduced, development costs are reduced, and development efficiency is improved.2015-06-04
20150156258DEVICE MANAGEMENT DEVICE AND RECORDING MEDIUM - A device management apparatus is connected to a device and an asset management device via a network. The device management apparatus includes a processor that executes steps of: acquiring a device information of the device via the network in accordance with a communication protocol that suits for the device; detecting at least one event concerning installation, movement, addition, change, or disposal with respect to the device based on the acquired information and internal information stored in the device management apparatus; transforming both identification information of the device and device information corresponding to the one of the events detected into data that enables the asset management device to manage the data; and transmitting transformed data to the asset management device via the network.2015-06-04
20150156259LOAD BALANCING APPARATUS, INFORMATION PROCESSING SYSTEM, METHOD AND MEDIUM - In an information processing system that determines a replication target server as a replication target of session information by using a predetermined algorithm, a load balancer that determines an allocation target server for communication includes: an allocation target determination unit that determines the allocation target server as an allocation target of the communication from among a plurality of servers; and a communication allocation unit that allocates the communication to the determined allocation target server.2015-06-04
20150156260PORTABLE ELECTRONIC DEVICE AND PROGRAM - A portable electronic device includes a topology control section that controls a topology of a P2P network. The topology control section controls, when the portable electronic device functions as a root node, acceptance or rejection of connection of another portable electronic device that functions as an non-associated node to each node under control of the portable electronic device, and controls, when the portable electronic device functions as a branch node or a leaf node, acceptance or rejection of connection of the other portable electronic device that functions as the non-associated node to the portable electronic device according to the control of a root node.2015-06-04
20150156261Methods and apparatus for cycle accurate time stamping at line rate throughput - Methods and apparatus may be used to provide cycle accurate time stamping at line rate throughput. This may be done, for example, to allow a NTP processing device to process timing requests at line rate throughput without packets being dropped and/or without overflowing a buffer. The NTP processing device may be able to handle timing request such as ARP request, NTP request, a combination thereof, or the like. The NTP processing device may be able to receive and process timing requests, such as NTP requests or ARP requests, at a line rate throughput. The NTP processing device may be able to generate timing responses, such as NTP responses or ARP responses, at line rate throughput.2015-06-04
20150156262ENSURING PROPERLY ORDERED EVENTS IN A DISTRIBUTED COMPUTING ENVIRONMENT - A first event occurs at a first computer at a first time, as measured by a local clock. A second event is initiated at a second computer by sending a message that includes the first time. The second event occurs at a second time, as measured by a local clock. Because of clock error, the first time is later than the second time. Based on the first time being later than the second time, an alternate second time, that is based on the first time, is used as the time of the second event. When a third system determines the order of the two events, the first time is obtained from the first computer, and the alternate second time is obtained from the second computer, and the order of the events is determined based on a comparison of the two times.2015-06-04
20150156263POLICY-BASED MANAGEMENT OF STORAGE FUNCTIONS IN DATA REPLICATION ENVIRONMENTS - A method for managing storage functions in a data replication environment is disclosed. In one embodiment, such a method includes continually monitoring for changes to a storage configuration at a secondary site. Upon detecting changes to the storage configuration at the secondary site, the method transmits remote metadata describing the changes to the primary site and stores the remote metadata at the primary site. The method then initiates a storage management function at the primary site which is mirrored to the secondary site. In order to perform the storage management function, the method reads the remote metadata at the primary site to determine the storage configuration at the secondary site. The method then performs the storage management function at the primary site in a way that takes into account the storage configuration at the secondary site. A corresponding apparatus, system, and computer-readable medium are also disclosed and claimed herein.2015-06-04
20150156264FILE ACCESS OPTIMIZATION USING STRATEGICALLY PARTITIONED AND POSITIONED DATA IN CONJUNCTION WITH A COLLABORATIVE PEER TRANSFER SYSTEM - A processor-implemented method for optimizing a file transfer is provided. The method may include receiving at least one file transfer request associated with a file. The method may further include acquiring, for the at least one file transfer request, a plurality of service level objectives associated with the file. The method may also include distributing a plurality of file segments associated with the file to at least one storage component associated with a shared storage infrastructure, wherein the distributing is based on a determining of at least one resource capability associated with the at least one storage component. Additionally, the method may include directing a complete transfer of the plurality of file segments associated with the file from the at least one storage component based on a file request for the file.2015-06-04
20150156265METHOD AND SYSTEM FOR INTERGRATING MULTIPLE MULTI-MEDIA COMPUTER APPLICATIONS INTO A SINGLE MULTI-MEDIA COMPUTER APPLICATION READER - A communications system comprising a computer device connected to a communications network. The computer device having one or more computer-based multimedia applications downloaded from the communications network. The computer-based multimedia applications being connected to respective servers through the communications system and the computer device. The computer device also having a computer-based multimedia application reader downloaded from the communications network that communicates with one or more of the computer-based multimedia applications. The computer-based multimedia application reader capable of copying all multimedia files stored in the computer device and/or the computer-based multimedia applications. The computer-based multimedia application reader is also connected to a respective server through the communications network and/or computer device, which is capable of storing all multimedia files copied by said computer-based multimedia application reader.2015-06-04
20150156266DISCOVERING CLOUD-BASED SERVICES FOR IOT DEVICES IN AN IOT NETWORK ASSOCIATED WITH A USER - The disclosure relates to discovering and offering cloud-based services for Internet of Things (IoT) devices in an IoT network. In particular, an IoT gateway or other suitable device can discover information (e.g., device classes) about the IoT devices in the IoT network, discover cloud-based services tagged with the discovered information about the IoT devices, and offer the discovered cloud-based services in the IoT network. Accordingly, in response to receiving a request to invoke a discovered cloud-based service from an IoT device and/or a user associated with the IoT network, the IoT gateway may connect to the appropriate IoT devices to fetch any required data associated with the requested cloud-based services, pass the fetched data to publishers or providers associated with the requested cloud-based services, and return a result from the invoked cloud-based services to the IoT devices in the IoT network.2015-06-04
20150156267METHODS AND SYSTEMS FOR MANAGING A TASK BASED ON GEOGRAPHICAL LOCATIONS - The present application discloses a location based task management method. A computational device obtains first location information concerning one or more geographical locations where a first client device has been located, and assigns a task to the first client device based on the one or more geographical locations. The task includes a task performance location. The computational device then receives from the first client device a first message that includes second location information corresponding to the task performance location and at least one additional information item. The at least one additional information item is captured by first client device at or near the task performance location after completing the task. The progress of the task is then managed based on the second location information, the at least one additional information item and a time difference between the assignment of the task and the receipt of the first message.2015-06-04
20150156268Suggesting Topics For Social Conversation - A method and system for suggesting conversation topics to a participant in a social conversation. A conversation log is maintained for the participant, containing records of the times, durations, and parties of previous conversations. When the participant engages in a subsequent conversation with a party, the conversation log is searched to obtain the time of the most recent previous conversation with that party. Social media and other publications subsequent to that time are searched for subjects that can be presented to the participant as topics of conversation. In contrast to other schemes related to conversational topics, no voice analysis of the conversations is required.2015-06-04
20150156269SERVER DEVICE AND INFORMATION PROCESSING METHOD - A server device includes an acquisition unit which acquires contextual information of a client device; a Web site specification unit which specifies a Web site according to the contextual information; a temporary storage unit which temporarily stores Web content that is acquired from the Web site; a communication unit which transmits the Web content that is stored in the temporary storage unit to the client device; and a control unit which controls operations of the entire server device.2015-06-04
20150156270CONTENT TRANSMISSION DEVICE - Devices used in mobile environments are making increasing demands for access to in-home content while commuting or traveling away from home. A content-receiving device that accesses an in-home content transmission device from outside the home: determines a method for establishing secure communication with a router in advance inside the home; executes a first authentication with the content transmission device and registration processing needed during access from outside the home; and registers information relating to the content-receiving device and out-of-home access information with the content transmission device. When utilizing the content-receiving device outside of the home to access the in-home content transmission device, the content transmission device sends content to the content-receiving device only when the content-receiving device is registered with the content transmission device, and only when second authentication is successful using the out-of-home access information therebetween.2015-06-04
20150156271SYSTEMS AND METHODS FOR IDENTIFYING A PROCESSOR FROM A PLURALITY OF PROCESSORS TO PROVIDE SYMMETRICAL REQUEST AND RESPONSE PROCESSING - Described herein is a method and system for distributing request and responses across a multi-core system. Each core executes a packet engine that further processes data packets allocated to that core. A flow distributor executing within the multi-core system forwards client requests to a packet engine on a core that is selected based on a value generated when a hash is applied to a tuple comprising a client IP address, a client port, a server IP address and a server port identified in the request. The packet engine selects a first IP address and a first port of the core, and determines whether a hash of a tuple comprising those values identifies the selected core. A modification is then made to the client request so that the client request includes a tuple comprising the first IP address, the server IP address, the first port and the server port.2015-06-04
20150156272MANAGING A DISTRIBUTED CACHE FOR VIRTUAL MACHINES - A processing device of host may receive desktop image data for a first client device that includes a graphical object. The processing device may determine an object identifier of the graphical object and a device identifier of a second client device associated with the graphical object. The processing device may provide the object identifier and the device identifier to the first client device.2015-06-04
20150156273PERSONALIZED CONTENT DELIVERY USING PEER-TO-PEER PRECACHING - A method and apparatus for peer-to-peer video precaching is described. In one embodiment, the method comprises building a user profile, periodically checking for new content of objects in the user profile, maintaining a data base of available objects and location of said objects, and determining the download location of an object requested by a user.2015-06-04
20150156274SYSTEMS AND METHODS FOR MANAGING SHARED CONTENT BASED ON SHARING PROFILES - Content items stored in an online content management service can be organized and shared. Content items can be associated with sharing profiles that include various sharing-specific metadata, such as details of how an item is shared or with whom it is shared. In some embodiments, the metadata stored in the sharing profiles can be used to organize shared content into shared folders automatically and/or to sort a list of content items.2015-06-04
20150156275METHOD AND SYSTEM FOR REMOTE ACTIVATION AND MANAGEMENT OF PERSONAL SECURITY DEVICES - Managing a Personal Security Device (PSD) includes retrieving proprietary information from a remote storage location using a first Remote Computer System, providing at least one Client as a host to the PSD and establishing a communications pipe over a first network between the PSD and the Remote Computer System. The communications pipe communicates with the PSD through the Client. Managing a PSD also includes transmitting the proprietary information from the Remote Computer System to the PSD by sending a PSD-formatted message through the communications pipe, where the proprietary information provided in the PSD-formatted message and passing through the Client is at least partially inaccessible by the Client, processing the PSD-formatted messages at the PSD to extract the proprietary information and storing the proprietary information in the PSD.2015-06-04
20150156276DISTRIBUTED DATA-BASED CONCURRENT PROCESSING METHOD AND SYSTEM, AND COMPUTER STORAGE MEDIUM - A distributed data-based concurrent processing by a control terminal obtaining data block information corresponding to a submitted operation; a task processing terminal sending a task processing request to the control terminal; the control terminal finding a data block that is unassigned and is distributed in the same server where the task processing terminal is distributed, and assigning the found data block to the task processing terminal. The control terminal determines a server having the fewest data blocks that are being processed by the task processing terminal and assigning an unassigned data block to the task processing terminal on the determined server if the data block that is unassigned and is distributed in the same server where the task processing terminal is distributed is not found. The task processing terminal processes the data block assigned by the control terminal according to a flow.2015-06-04
20150156277DYNAMIC NETWORK DEVICE PROCESSING USING EXTERNAL COMPONENTS - A network device may receive information regarding a service set identifying service to apply to a data flow received via a particular interface of the network device; receive the data flow via the particular interface; identify a service to provide to the data flow based on the information regarding the service set; identify a processing device to process the data flow; and provide the data flow to the processing device. The processing device may be different than the network device and may process the data flow, on behalf of the network device, to form a processed data flow. The processed data flow may include the data flow with the service applied to the data flow. The network device may further receive the processed data flow from the processing device and transmit the processed data flow toward a destination device.2015-06-04
20150156278METHODS AND SYSTEMS FOR BANDWIDTH-EFFICIENT REMOTE PROCEDURE CALLS - A local device obtains at least one instruction for execution by a remote device (e.g., instructions to render a game screen of a video game). A packet representing the at least one instruction is created, and released towards the remote device. Creation of the packet involves consulting a packet dictionary to determine whether a packet index has already been assigned to the at least one instruction. If this is the case, the packet is formulated so that it contains the packet index; otherwise, the packet is formulated to include a function identifier and a set of parameters, which are associated with the at least one instruction. Since fewer bits are needed to encode the packet index than to encode the function identifier and the set of parameters, transmitted packets can be condensed when they represent at least one instruction for which a packet had previously been transmitted.2015-06-04
20150156279BROWSER-BASED ANALYSIS OF CONTENT REQUEST MODE PERFORMANCE - Features are disclosed for selecting preferred content request modes on a client computing device when initiating content requests. The request modes may correspond to direct requests (e.g., requests made from a client device directly to a content sever hosting requested content) or to indirect requests (e.g., requests made from the client device to the content server via an intermediary system). The preferred request modes made be based on a statistical analysis of performance data (e.g., prior content load times) observed or recorded by the client computing device in connection with prior content requests. Randomly selected request modes may be used to provide additional data for performance analysis.2015-06-04
20150156280PERFORMANCE-BASED DETERMINATION OF REQUEST MODES - Features are disclosed for determining preferred content request modes for client computing devices when initiating content requests. The request modes may correspond to direct requests (e.g., requests made from a client device directly to a content sever hosting requested content) or to indirect requests (e.g., requests made from the client device to the content server via an intermediary system). The preferred request modes made be based on a statistical analysis of performance data (e.g., prior content load times) obtained from one or more client computing devices for a given content item, group of content items (e.g., domain), and the like.2015-06-04
20150156281Uploading and Transcoding Media Files - In one embodiment, a method includes by a host computing server, receiving from a client computing device, a request to upload a multimedia file from the client computing device to a service; by the host computing server, identifying one or more third-party transcoding servers, wherein the transcoding servers are configured to receive and transcode multimedia files from client computing devices and store the transcoded multimedia files; by the host computing server, sending to the client computing device, a reply that comprises addresses of the third-party transcoding servers and job configuration information, wherein the job configuration information specifies one or more upload policies and comprises an access token enabling the client computing device to access the transcoding servers.2015-06-04
20150156282RECORDING MEDIUM HAVING STORED IMAGE DISPLAY CONTROL PROGRAM, INFORMATION PROCESSING SYSTEM, AND IMAGE DISPLAY CONTROL METHOD - The image display control program described below is stored on a recording medium. The program causes a client computer to execute a process including, detecting a stopping signal indicating that operations performed on an image have been stopped, performing control so as not to display images based on image data packets that are received after the detection, opening a second communication port that is different from a first communication port that communicates the image data packets, when the stopping signal is detected, transmitting, to a server via the first communication port, the stopping signal and port identification information of the second communication port, receiving, via the second communication port, a current still image corresponding to the stopping of the operations that the server transmits in response to the stopping signal, and displaying the current still image after an image that has been displayed immediately before the stopping of the operation.2015-06-04
20150156283SYSTEM AND METHOD FOR CONTROLLING A NETWORKED DISPLAY - Methods and systems for controlling a networked display via a client device are provided. The client device and the networked display are connected by a network. A session is initiated between the client device and the networked display, and a remote user interface is transmitted from the networked display to the client device. Interactivity with the remote user interface is detected at the client device, and input data is transmitted from the client device to the networked display based on the interactivity with the remote user interface. The input data is interpreted at the networked display so as to cause a change in a state of an application being executed by the networked display. And the remote user interface is updated based on the changed state of the application executed by the networked display.2015-06-04
20150156284METHODS AND APPARATUSES FOR A UNIFIED COMPRESSION FRAMEWORK OF BASEBAND SIGNALS - A method and apparatus provides a parameter estimation processor configured to estimate parameters used to compress data for transmission over a serial data link. The parameter estimation processor includes a processor. The processor includes user programmable inputs. The user programmable inputs set an input data packet length, a target compression ratio, and a resampling factor and allow filter parameters to be set. Input data information is received from an input data buffer of a data sample compressor. The processor performs a function that: (a) adjusting a target compression ratio by a first compression ratio to determine a remaining compression ratio when the resampling operation is enabled; (b) estimating a set of compression parameters that are used to achieve the remaining compression ratio, the set of compression parameters includes an attenuation value, filter order, a type of encoding; and (c) sends the set of compression parameters to the data sample compressor. The data sample compressor applies the compression parameters to a packet of input data and outputs a plurality of compressed data words.2015-06-04
20150156285MESSAGE TUNNELING IN INDUSTRIAL NETWORKS - A networking system is discussed. The system may be used for industrial networks where access to field device data is valuable. Commands, such as read or write requests to particular field device data, may be encapsulated within messages conforming to an object-oriented protocol, such as, for example, Common Industrial Protocol (CIP). Responses to the commands may also be encapsulated within CIP messages. The encapsulated commands and responses may be transmitted between various devices of an industrial network, including a controller and a gateway device, such as a multiplexer, of the industrial network. Encapsulating the commands and responses may provide a tunneling mechanism allowing a controller complete access to the data of the field devices in communication with the gateway device.2015-06-04
20150156286MESSAGE TUNNELING IN AN INDUSTRIAL NETWORK - A networking system is discussed. The system may be used for industrial networks where access to field device data is valuable. Commands, such as read or write requests to particular field device data, may be encapsulated within application layer protocol messages, such as MODBUS messages. Responses to the commands may also be encapsulated within MODBUS messages. The encapsulated commands and responses may be transmitted between various devices of an industrial network, including a controller and a gateway device, such as a multiplexer, of the industrial network. Encapsulating the commands and responses may provide a tunneling mechanism allowing a controller complete access to the data of the field devices in communication with the gateway device.2015-06-04
20150156287COMMUNICATION METHOD, INFORMATION PROCESSING APPARATUS, COMMUNICATION SYSTEM, PROGRAM, NODE, AND COMMUNICATION TERMINAL - A communication method for identifying a packet flow based on a predetermined rule and processing a packet belonging to the identified packet flow includes: determining an identifier for identifying a plurality of packet flows as a group; and adding the identifier to a packet belonging to the plurality of packet flows and setting in a second node a plurality of second rules for forwarding the packet to a first node in which a first rule for identifying the plurality of packet flows based on the identifier is set. The amount of information stored in a communication apparatus for processing packet flows is reduced.2015-06-04
20150156288PARSER FOR PARSING HEADER IN PACKET AND RELATED PACKET PROCESSING APPARATUS - A parser is used for parsing a header in a packet. The parser includes a plurality of horizontal field selectors, a plurality of comparators, and a content addressable memory (CAM) based device. Each of the horizontal field selectors is configured to select a first bit group. The comparators are coupled to the horizontal field selectors, respectively. Each of the comparators is configured to compare a first bit group selected by a corresponding horizontal field selector with a designated value to generate a comparison result. The CAM based device is configured to receive a plurality of comparison results generated from the comparators, and use the comparison results as a first input search data.2015-06-04
20150156289ROCE PACKET SEQUENCE ACCELERATION - A method, network device and system for remote direct memory access (RDMA) over Converged Ethernet (RoCE) packet sequence acceleration are disclosed. The network device comprises one or more functionality components for communicating with a host system. The host system is configured for implementing a first set of functionalities of a network communication protocol, such as RoCE. The one or more functionality components are also operable to implement a second set of functionalities of the network communication protocol.2015-06-04
20150156290ELECTRONIC DEVICE HAVING AUTOMATICALLY EJECTABLE INPUT PEN - An electronic device is provided. The electronic device includes a input pen including at least one magnet, a housing including a pen guide path for inserting the input pen, at least one electromagnet installed around the pen guide path, wherein the at least one electromagnet is installed to react to the magnetism of the magnet while the input pen is completely inserted into the pen guide path, and at least one processor supplying power having the same polarity as the magnet to the electromagnet according to an automatic ejection event of the input pen to push the magnet out of the electronic device.2015-06-04
20150156291TOUCH SCREEN COVER - A touch screen cover for a hand-held wireless communication device having a touch-sensing user interface and a telephone operational mode, in which, during an incoming call, a swipe-sensing user control zone of the user interface is activated together with a call-information display. The touch screen cover includes a protective panel, that in a shielding configuration, overlays a majority of the touch-sensing user interface of the hand-held wireless communication device. The protective panel has a touch-communicating portion that overlays at least part of the swipe-sensing user control zone of the user interface of the hand-held wireless communication device in the shielding configuration, the touch-communicating portion configured to receive a swiping touch engagement on an exposed outer surface thereof and responsively impart a sweeping capacitance-induced user actuation of the swipe-sensing user control zone.2015-06-04
20150156292MEMORY SYSTEM FOR PORTABLE TELEPHONE - A memory system is constituted of a file storage flash memory storing a control program required for a control portion and a large amount of data, and a random access memory storing a program used by the control portion and functioning as a buffer memory for received data. Thus, a memory system for a portable telephone capable of storing a large amount of received data at high-speed and allowing reading of the stored data at high-speed is provided.2015-06-04
20150156293MOBILE TERMINAL - Disclosed is a mobile terminal. The mobile terminal of the present invention comprises: a front case having a keypad-accommodating portion; a rear case attachably/detachably coupled to a rear surface of the front case; an intermediate case which is interposed between the front case and the rear case and assembled to the front case and the rear case, and at one side of which a main PCB is assembled; a keypad having a plurality of key buttons and made of a flexible material, accommodated in the keypad-accommodating portion of the front case; and a touch screen arranged on the front case in the vicinity of the keypad. As the mobile terminal of the present invention has both the keypad and the touch screen, operating convenience is improved in terms of storage, maintenance and information management as compared to conventional mobile terminals.2015-06-04
Website © 2025 Advameg, Inc.