Patents - stay tuned to the technology

Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


27th week of 2015 patent applcation highlights part 72
Patent application numberTitlePublished
20150188910POLICY GROUP BASED FILE PROTECTION SYSTEM, FILE PROTECTION METHOD THEREOF, AND COMPUTER READABLE MEDIUM - A policy group based file protection method is provided and includes the following steps. A file management driver is executed on the client device of the client. The identity data associated with a client is transmitted to the server when connection between the client and the server is established. The server determines whether the client belongs to a policy group according to the identity data. When the server determines that the client belongs to a policy group, the server transmits a certificate of the policy group to the client device. When the file management driver detects a request for executing a file open procedure, the file management driver determines whether to allow a file access application executing the file open procedure and opening the file based on the certificate received, wherein the request is executed by the file access application installed in the client device.2015-07-02
20150188911SYSTEM AND METHOD FOR BIOMETRIC PROTOCOL STANDARDS - A one-time certificate is provided that enables an initial two-way secured communication session between a user computing device and a trusted server. An initial secured communication session is established by the trusted server with the user computing device after receiving the one-time certificate. The trusted server receives identification information associated with the user of the user computing device, wherein the identification information includes a representation of the user's identity that has been confirmed as a function of biometrics and further includes a representation of the user computing device. Moreover, the trusted server generates a replacement certificate that is unique to the combination of the user and the user computing device, and transmits the replacement certificate to the user computing device. Thereafter, a two-way secured communication session is established, by the trusted server, with the user computing device each time the replacement certificate is received by the trusted server.2015-07-02
20150188912SYSTEM AND METHOD FOR BIOMETRIC PROTOCOL STANDARDS - An initial certificate is provided that enables an initial two-way secured communication session between a user computing device and a trusted server. An initial secured communication session is established by the trusted server with the user computing device after receiving the one-time certificate. The trusted server receives identification information associated with the user of the user computing device, wherein the identification information includes a representation of the user's identity that has been confirmed as a function of biometrics and further includes a representation of the user computing device. Moreover, a replacement certificate is generated that is unique to the combination of the user and the user computing device, and transmits the replacement certificate to the user computing device. Thereafter, a two-way secured communication session is established, by the trusted server.2015-07-02
20150188913METHOD AND APPARATUS FOR PROVIDING CLIENT-SIDE SCORE-BASED AUTHENTICATION - Methods, apparatus, and systems for generating and verifying one time passwords in connection with a risk assessment are disclosed. The risk assessment may comprise a client-side risk assessment. The risk assessment may also comprise a server-side risk assessment.2015-07-02
20150188914INFORMATION PROCESSING APPARATUS, METHOD OF CONTROLLING THE SAME, STORAGE MEDIUM AND INFORMATION PROCESSING SYSTEM - An information processing apparatus holds a first script for acquiring authentication information stored in an external apparatus, and acquires authentication information as a result of causing the first script to execute in an execution step in a case where a second script is included in the received screen information, and displays an input screen in a state in which the authentication information acquired is set.2015-07-02
20150188915System And Method For Verifying Identity Information Using A Social Networking Application - A method of verifying identity information is performed at a computer server using a social networking application. The computer server receives an identity verification request from a first terminal. The first terminal is associated with a first account of the social networking application and the identity verification request includes information of a verification code and a second account of the social networking application. The computer server then forwards information of the verification code to a second terminal associated with the second account of the social networking application. Upon receipt of a response from the second terminal, the computer server establishes a relationship between the first account and the second account after verification of the response from the second terminal using the verification code such that the second terminal can interact with the first terminal through the social networking application.2015-07-02
20150188916VPN CONNECTION AUTHENTICATION SYSTEM, USER TERMINAL, AUTHENTICATION SERVER, BIOMETRIC AUTHENTICATION RESULT EVIDENCE INFORMATION VERIFICATION SERVER, VPN CONNECTION SERVER, AND COMPUTER PROGRAM PRODUCT - According to one embodiment, there is provided a VPN connection authentication system including a user terminal that is used by a user, an authentication server that is connected to the user terminal and configured to communicate with the user terminal, a biometric authentication result evidence information verification server that is incorporated in the authentication server or is connected to the authentication server and configured to communicate with the authentication server, an authentication information management DB configured to be writable from the authentication server, and a VPN connection server that is connected to the user terminal by VPN and configured to communicate with the user terminal.2015-07-02
20150188917Client Authentication During Network Boot - A mechanism for performing a network boot sequence and provisioning a device may generate a command by a server and have the command executed by the device. The command may be used to verify the authenticity of the device, and may be used to establish ownership of the device. After authenticity and, in some cases ownership is established, bootable software may be downloaded and executed. The device may be provisioned with software applications.2015-07-02
20150188918METHOD AND SYSTEM OF AUTHENTICATING A NETWORK DEVICE IN A LOCATION BASED VERIFICATION FRAMEWORK - A method and system of authenticating a network device includes providing identification information of a first network device to a second network device and a third network device. The identification information includes location information of the first network device and a timestamp. The method includes verifying the location information of the first network device by a hyberbolic verification scheme. The verification is performed by the second network device and the third network device. The method includes authenticating the first network device based on the verification.2015-07-02
20150188919OPERATIONAL SUPPORT FOR NETWORK INFRASTRUCTURES - Systems and methods that facilitate operational support for network infrastructures are discussed. The disclosed system and method facilitate a unified view of the current state of the network and networked devices including real-time log monitoring and for providing metrics for long term system planning. One such method can include the acts of automatically discovering a device deployed on a network, receiving device and network related data in real-time, determining whether a device is authorized, terminating device network access, filtering device data, validating device configuration, configuring a device and providing an output for use by a user. The disclosed system and method can be utilized, for example, to reduce the time involved in troubleshooting and resolving network issues, for establishing a baseline for network performance and for network capacity planning.2015-07-02
20150188920New Diameter Signaling for Mobile IPv4 - The invention consists of a new registration and authentication protocol for between a Mobile Node and a Home Agent. The new protocol uses a novel messaging sequence to request registration, authentication and authorization of the Mobile Node when it is located on a foreign network, and the novel protocol will avoid some of the standard registration and authentication protocol messages in order to eliminate the problems associated with re-transmission errors.2015-07-02
20150188921LOCAL DISTRIBUTION NODE IN A CONTENT DISTRIBUTION NETWORK - Methods and systems to improve the efficiency of a content delivery system. A local distribution node is introduced to the network, between the content provider and the end user device (i.e., the leaf node). The local distribution node is responsible for servicing a localized subset of the leaf nodes that would otherwise be serviced by a conventional server of the content delivery system. Requests for content are received at the local distribution node from leaf nodes, and content is received at the local distribution node for transmission to the leaf node(s). Content may be cached at the local distribution node to allow faster service of subsequent requests for this content. Caching may also be used to make the channel surfing process more efficient. If demand is high, a leaf node may be promoted to serve as an additional local distribution node. Leaf nodes may also share content among themselves. Bandwidth may be allocated and reallocated by the local distribution node for the local population of leaf nodes.2015-07-02
20150188922PARALLEL ON-PREMISES AND CLOUD-BASED AUTHENTICATION - A method for parallel authentication comprises receiving a download request from a client computer system to download a document stored in a first storage system. The first storage system is coupled to the client computer system via a network. The first storage system is coupled with a second storage system via the network. The download request includes a first token associated with the first storage system and a second token associated with the second storage system. The first storage system is configured to authenticate the download request based on the first token and the second token. Based on successful authentication, the first storage system is configured to authorize the client computer system to download the document.2015-07-02
20150188923Authorizing A Computing Device Across Services - Services may be accessed across a network. In order to provide access to the services, a user or more particularly a user's device may be authorized to access the requested service based on an IP address associated with the service request. A subscriber identifier is determined based on the IP address of the request and used to authorize the requested service.2015-07-02
20150188924ASSESSING A SECURITY STATE OF A MOBILE COMMUNICATIONS DEVICE TO DETERMINE ACCESS TO SPECIFIC TASKS - Methods for assessing the current security state of a mobile communications device to determine access to specific tasks is presented. A security component on a server is configured to receive a request to access services from a mobile communications device for a specific task. The security component on the server is further configured to determine whether a security state for the mobile communications device is acceptable for access to the services. Based on the security state for the mobile device being determined to be acceptable for access to the services, access to the services is granted and a determination is whether the security state is acceptable for access to the specific task requested. Based on the security state being determined to be acceptable for access to the specific task requested, access to the specific task requested is granted by the server security component.2015-07-02
20150188925INTERNET ACCESS AUTHORIZATION AND REGULATION SYSTEMS AND METHODS FOR CONTROLLED ENVIRONMENT OF AN INSTITUTIONAL FACILITY - Access and regulations systems to facilitate safe and secure access of web content by residents of an institutional facility such as a correctional facility includes an administrator workstation to define authorized and prohibited web content, a resident workstation displaying on a predetermined list of web content, and a server receiving and processing the authorized and prohibited web content and requests made by institutional residents.2015-07-02
20150188926REPUTATION BASED ACCESS CONTROL - Approaches for providing reputation based access control are provided. Specifically, at least one approach includes: identifying a requesting subject requesting access to a controlled resource; retrieving a reputation of the subject stored as a virtual attribute in a reputation-based access control database, the reputation comprising a value for skill for operating with the requested controlled resource; determining whether the subject is a known security risk; modifying a reputation of the subject and an associate in the case that a security risk of the subject meets a threshold; modifying the reputation of the subject based on at least one of: peer feedback and expert opinion, in the case that the subject is not a known security risk; retrieving a policy of the requested controlled resource; determining if the reputation of the subject meets the policy, and if so, allowing the subject access to the resource, and if not, denying the access.2015-07-02
20150188927CROSS PROVIDER SECURITY MANAGEMENT FUNCTIONALITY WITHIN A CLOUD SERVICE BROKERAGE PLATFORM - Implementation of cross provider security in accordance with the disclosures made herein enables users of a system (e.g., a cloud services brokerage platform) in a cloud environment provides for system-managed provisioning and management of keys to cloud resources thereby allowing the user to manage data security and enable secured access to their cloud resources. To this end, cross provider security management functionality in accordance with the disclosures made herein can include provisioning system-generated keys across different regions in a provider, provisioning cloud brokerage system-generated keys across different providers; and associating (i.e., managing) the keys from the system to a hardware security module. The keys can be managed by/though a variety of different resources (e.g., brokering system, VDC, user group concepts, etc).2015-07-02
20150188928PRIVATE-PUBLIC CHAT FUNCTIONALITY - There is disclosed a system and a method for public-private chat functionality. The method includes initiating a private chat between a first chat participant using a first computing device and a second chat participant using a second computing device and receiving a request to convert the private chat into a public chat available for viewing by a plurality of non-participating chat viewers, the request from the first computing device. The method further includes receiving an acceptance of the request to convert from the second computing device, automatically sending a notification to followers of at least one of the first chat participant and the second chat participant that the public chat is about to commence, and enabling access to the chat by the plurality of non-participating chat viewers.2015-07-02
20150188929SIGNATURE VALIDATION INFORMATION TRANSMISSION METHOD, INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND BROADCAST DELIVERY APPARATUS - [Object] To improve a quality of a service that uses an application capable of processing broadcast data and an application information table that manages an operation of the application.2015-07-02
20150188930DETECTING MALICIOUS RESOURCES IN A NETWORK BASED UPON ACTIVE CLIENT REPUTATION MONITORING - Systems and methods for detecting malicious resources by analyzing communication between multiple resources coupled to a network are provided. According to one embodiment, a method of client reputation monitoring is provided. A monitoring unit executing on a network security device operable to protect a private network observes activities relating to multiple monitored devices within the private network. For each of the observed activities, a score is assigned by the monitoring unit based upon a policy of multiple polices established within the monitoring unit. For each of the monitored devices, a current reputation score is maintained by the monitoring unit based upon the score and a historical score associated with the monitored device. A monitored is classified by the monitoring unit as potentially being a malicious resource based upon the current reputation score for the monitored device.2015-07-02
20150188931DETECTING MALICIOUS CIRCUMVENTION OF VIRTUAL PRIVATE NETWORK - An embodiment directed to a method is associated with a VPN that may be used to access resource servers. Upon determining that the VPN has been accessed by a specified client, resource servers are identified, which each has an address and may receive traffic routed from the client through the VPN. The method further comprises sending a message corresponding to each identified resource server to the client, wherein the message to corresponding to a given one of the identified resources is intended to cause a response to be sent from the client to the address of the given identified resource server. Responses to respective messages sent to the client are used to determine whether a route for traffic from the client to the VPN has been compromised.2015-07-02
20150188932APPARATUS, SYSTEM, AND METHOD FOR IDENTIFYING A MAN-IN-THE-MIDDLE (MITM) CONNECTION - An apparatus and method for identifying a Man-In-The-Middle (MITM) connection are provided. The method includes browsing a website using a terminal operatively connected to a network, determining a security level of the website according to characteristics of the website, determining whether the security level of the website is consistent with the stored information relating to the security of the website, and providing an indication that the network has an elevated likelihood of having an MITM if the security level of the website is inconsistent with the stored information relating to the security of the website.2015-07-02
20150188933DYNAMIC SELECTION OF NETWORK TRAFFIC FOR FILE EXTRACTION AND SHELLCODE DETECTION - A method for network security includes, in a computer network that exchanges traffic among multiple network endpoints using one or more network switches, configuring at least one network switch to transfer at least some of the traffic for inspection. Only a portion of the traffic, which is suspected of carrying executable software code, is selected from the transferred traffic. The selected portion of the traffic is inspected, so as to verify whether any of the executable software code is malicious.2015-07-02
20150188934CONTROL LOOP CONTROL USING BROADCAST CHANNEL TO COMMUNICATE WITH A NODE UNDER ATTACK - In one embodiment, a control loop control using a broadcast channel may be used to communicate with a node under attack. A management device may receive data indicating that one or more nodes in a computer network are under attack. The management device may then determine that one or more intermediate nodes are in proximity to the one or more nodes under attack, and communicate an attack-mitigation packet to the one or more nodes under attack by using the one or more intermediate nodes to relay the attack-mitigation packet to the one or more nodes under attack.2015-07-02
20150188935ATTACK MITIGATION USING LEARNING MACHINES - In one embodiment, techniques are shown and described relating to attack mitigation using learning machines. A node may receive network traffic data for a computer network, and then predict a probability that one or more nodes are under attack based on the network traffic data. The node may then decide to mitigate a predicted attack by instructing nodes to forward network traffic on an alternative route without altering an existing routing topology of the computer network to reroute network communication around the one or more nodes under attack, and in response, the node may communicate an attack notification message to the one or more nodes under attack.2015-07-02
20150188936SYSTEM AND METHOD FOR REAL-TIME MALWARE DETECTION BASED ON WEB BROWSER PLUGIN - According to a method and system for real-time malware detection based on web browser plugin, the method and system may connect a web server of a web site through a web browser module, execute a security module through a browser plugin of the web site, update a database for a browser cache of the web site from the web server by the security module, cache a web content of the web site from the web server, match cache data of the web content with the database, and warn about the web content if data matched with the cache data of the web content does not exist in the database.2015-07-02
20150188937Method And Apparatus For Improving Network Security - A method and an apparatus for improving network security are provided. The method includes obtaining, by a control node, alarm information, where the alarm information includes address information of an attack source that attacks a subnet of at least two subnets and identification information of the attacked subnet of the at least two subnets, using, by the control node, the alarm information to sort the attack sources in descending order of threat levels, and using a sorting result as a blacklist, and sending, by the control node, the obtained blacklist to at least one subnet that is not attacked yet in the network system. The method and apparatus are applicable to collaborative defense among multiple subnets.2015-07-02
20150188938SCENE IDENTIFICATION SYSTEM AND METHODS - Certain embodiments are directed to a system for high security delivery of real time video containing an authentication signature or unique identifier.2015-07-02
20150188939METHOD AND APPARATUS FOR DETERMINING SECURITY INFORMATION OF AN UNKNOWN FILE IN A CLOUD SECURITY SYSTEM - A method for determining security information of an unknown file in a cloud security system is provided. The method includes: a cloud security serving end receives file security querying information reported by a cloud client end when a preconfigured monitoring point is triggered, wherein the file security querying information comprises identifier information and behavior information of a file; creates a behavior sequence of the file within a lifecycle according to the file security querying information of the file, analyzes the behavior sequence of the file within the lifecycle, and determines file security information of the file according to an analyzed result.2015-07-02
20150188940SYSTEM AND METHOD FOR SECURITY AND QUALITY ASSESSMENT OF WIRELESS ACCESS POINTS - A computer-implemented method for security risk assessment of wireless access point devices, the computer-implemented method comprising: receiving signals from one or more wireless access points by two or more mobile wireless devices visiting said access points, obtaining Basic Service Set Identifiers (BSSID) of visited access points and reporting values derived from BSSID and from an identifier of corresponding mobile device to a first database, receiving a request for a security risk assessment of evaluated wireless access point, said request containing value derived from BSSID of the evaluated access point, searching the first database for one or more entries corresponding to the evaluated access point, and processing search results to assess security risk of the evaluated access point, said processing comprises computing a component of said risk dependent on the count of unique identifiers of mobile devices reported for the evaluated access point.2015-07-02
20150188941METHOD AND SYSTEM FOR PREDICTING VICTIM USERS AND DETECTING FAKE USER ACCOUNTS IN ONLINE SOCIAL NETWORKS - A system and method for predicting victims and detecting fake accounts in OSNs, comprising: a feature-based classifier for predicting victims by classifying, with a classification probability, a target variable of each user in the OSN social graph; a graph-transformer for transforming the social graph into a defense graph by reassigning edge weights to incorporate victim predictions using the classification probability, a graph-based detector for detecting fake users by computing through the power iteration method a probability of a random walk to land on each node in the defense graph after 0(log n) steps, assigning to each node a rank value equal to a node's landing probability normalized by the node degree, sorting the nodes by their rank value and estimating a detection threshold such that each node whose rank value is smaller than the detection threshold is flagged as representing a fake account.2015-07-02
20150188942SYSTEM AND METHOD FOR DETECTING ADDRESS RESOLUTION PROTOCOL (ARP) SPOOFING - There are provided a system and method for detecting Address Resolution Protocol (ARP) attacks. The ARP spoofing attack detection system includes: a reception module which receives an ARP packet, and which determines whether the received ARP packet is an unsolicited ARP packet; a transmission module which creates, if the ARP packet is an unsolicited ARP packet, an ARP request packet corresponding to the unsolicited ARP packet, and which broadcasts the ARP request packet; and a detection module which determines, if an ARP response packet corresponding to the ARP request packet is received, whether an input port of the ARP response packet is identical to an input port of the unsolicited ARP packet, and which determines that an ARP spoofing attack has occurred if the input port of the ARP response packet is not identical to the input port of the unsolicited ARP packet.2015-07-02
20150188943Virtual private network (VPN)-as-a-service with delivery optimizations while maintaining end-to-end data security - A mechanism to facilitate a private network (VPN)-as-a-service, preferably within the context of an overlay IP routing mechanism implemented within an overlay network. A network-as-a-service customer operates endpoints that are desired to be connected to one another securely and privately using the overlay IP (OIP) routing mechanism. The overlay provides delivery of packets end-to-end between overlay network appliances positioned at the endpoints. During such delivery, the appliances are configured such that the data portion of each packet has a distinct encryption context from the encryption context of the TCP/IP portion of the packet. By establishing and maintaining these distinct encryption contexts, the overlay network can decrypt and access the TCP/IP flow. This enables the overlay network provider to apply one or more TCP optimizations. At the same time, the separate encryption contexts ensure the data portion of each packet is never available in the clear at any point during transport.2015-07-02
20150188944SYSTEM AND METHOD FOR HARDWARE-BASED TRUST CONTROL MANAGEMENT - A trust control management method for security, operable on a computer system generates a unique Trust ID value by combining user-defined values with hardware-specific values associated with the user's computer system and storing the Trust ID value in a memory register physically associated with the hardware of the computer system. A Trust Control Suite (TCS) operable with a server OS/hypervisor maintains a database of user-defined values and hardware-specific values for computer systems clustered in a trusted computing pool. An attestation procedure is performed by the trust control server combining the user-defined values with the hardware-specific values from its database and comparing it to the user-stored Trust ID value stored in the memory register associated with a user's computer system. Depending on whether it is a match or mismatch, the TCS can determine if it is a trusted computer or not, and can take appropriate alerts and policy actions.2015-07-02
20150188945Method and System for Providing Transparent Trusted Computing - A method performed at an electronic device with one or more processors and memory includes obtaining a public record including a plurality of commit nodes, where a respective commit node of the plurality of commit nodes includes: (i) a set of blobs corresponding to a collection of data; (ii) at least one cryptographic hash of one of the set of blobs; and (iii) at least one additional cryptographic hash of a parent node. The method includes: caching the public record; and obtaining, at a time after the obtaining, information corresponding to a new commit node, where the new commit node: includes a cryptographic hash of a parent node; and is associated with an updated collection of data. The method includes validating the new commit node; and in accordance with a determination that the new commit node is valid, updates the cached public record to include the new commit node.2015-07-02
20150188946SYSTEM AND METHOD FOR AUTOMATIC CONTROL OF SECURITY POLICIES BASED ON AVAILABLE SOFTWARE LICENSES - Disclosed are system, methods, and computer program product for applying security policies based on available licenses to a plurality of devices. An example method includes determining, by a processor, one or more criteria for a device relating to a priority of the device in the network for application of the security policies; determining numeric values for each of the one of more criteria; determining a coefficient for the device based on the numeric values; determining the priority of the device based on the coefficient of the device and respective coefficients of the plurality of devices; designating a security policy for the device based on the priority of the device; determining availability of a license for a software applying the designated security policy to the device; and when the license for the software that applies the designated security policy is available, applying the designated security polity to the device.2015-07-02
20150188947SYSTEM AND METHODS FOR AUTOMATIC DESIGNATION OF ENCRYPTION POLICIES FOR USER DEVICES - Disclosed are system, methods, and computer program product for designation of encryption policies for user devices. An example method includes determining one or more criteria for the user device related to encryption requirements of the user device; determining numeric values for each of the one of more criteria; determining a coefficient for the device based on the numeric values; determining an encryption policy for the device based on the coefficient; and applying the determined encryption policy to the device.2015-07-02
20150188948METHOD AND SYSTEM FOR BLOCKING CONTENT - A content blocking method of a user device is provided. The method includes receiving a policy from a profile server; receiving a content access request; determining a category where content corresponding to the access request belongs; and blocking the content corresponding to the access request, if the determined category corresponds to a category that is set to be blocked in the policy.2015-07-02
20150188949CLOUD-BASED NETWORK SECURITY - A method for managing the use of gateways on a network includes authenticating a user, determining and managing a path between a user computing device and a destination computing device, the path including at least one of the gateways, and managing user traffic on the path according to a policy associated with the user.2015-07-02
20150188950Method and Apparatus for Identifying an IMS Service - A method of indicating the IP Multimedia Subsystem communication service(s) to which a Session Initiation Protocol message relates, the method comprising including one or more communication service identifier(s) in the Session Initiation Protocol message as a Feature Tag of the message.2015-07-02
20150188951METHOD AND AN APPARATUS FOR INITIATING A SESSION IN HOME NETWORK SYSTEM - A method and apparatus for initiating a session in a home network system are disclosed. A method for initiating a session over a HDBaseT network includes transmitting, by a initiation entity, a session initiation request message for initiating the session to at least one session partner selected by the initiation entity over an Ethernet network, and receiving a session initiation response message acting as a response to the session initiation request message from the at least one session partner over the Ethernet network. The session initiation request message includes a first source reference field for identifying the initiation entity and a second final target reference (FTR) field for identifying the at least one session partner.2015-07-02
20150188952APPARATUS AND METHOD FOR COMPUTER CONTROLLED CALL PROCESSING APPLICATIONS IN PACKET SWITCHED TELEPHONE NETWORKS - A method is presented comprising transmitting, from an application computer communicably connected to a call controller which is connected to a data network, packetized messages indicative of telephone calls in progress at an endpoint of the data network, or indicative of such endpoint, and transmitting, from the call controller to the application computer, packetized messages indicative of a variety of information contained in, or relevant to, the telephone calls so as to process such information for a variety of applications. Apparatus to implement the method is also presented.2015-07-02
20150188953APPARATUS AND METHOD FOR COMPUTER CONTROLLED CALL PROCESSING APPLICATIONS IN PACKET SWITCHED TELEPHONE NETWORKS - A method is presented comprising transmitting, from an application computer communicably connected to a call controller which is connected to a data network, packetized messages indicative of telephone calls in progress at an endpoint of the data network, or indicative of such endpoint, and transmitting, from the call controller to the application computer, packetized messages indicative of a variety of information contained in, or relevant to, the telephone calls so as to process such information for a variety of applications. Apparatus to implement the method is also presented.2015-07-02
20150188954PRESENTING MEDIA DATA TO COMMUNICATION CLIENTS IN THE COURSE OF A COMMUNICATION DATA EXCHANGE - A system for presenting media data to communication clients in the course of a communication data exchange between the communication clients in a telecommunication network includes: a storage engine, configured to store a plurality of media data files; an application control server, configured to receive media data file selection signals from at least one of the communication clients in the course of the communication data exchange, and to select media data files from the storage engine based on the received media data file section signals; and a communication processing server, configured to exchange media data with the communication clients and to retrieve the selected media data files from the storage engine, for simultaneously presenting the retrieved media data files at the communication clients in the course of said communication data exchange.2015-07-02
20150188955PREDICTING VIEWING ACTIVITY OF A POSTING TO AN ACTIVITY STREAM - A method, system and/or computer program product predicts viewing activity of a new posting to an activity stream. A first computer transmits a new posting to an activity stream in a second computer, where the new posting is available to a potential viewer set. Based on identified viewer information about one or more members of the potential viewer set, a prediction is made of viewing activity of the new posting by the potential viewer set. This predicted viewing activity is based on identified viewer information about members of the potential viewer set, and describes a predicted likelihood of the potential viewer set viewing the new posting. The derived predicted viewing activity of the new posting by the potential viewer set is then presented at the first computer.2015-07-02
20150188956Unified Communication Device - In some implementations, a computing device may receive a user-selection to initiate a real-time communication session with a second computing device. The first computing device may authenticate user credentials. The computing device may send a request to the second computing device to initiate the real-time communication session using a web browser application. The real-time communication session may be initiated in response to receiving an acceptance message to the request. The real-time communication session may include at least one of an audio stream or a video stream.2015-07-02
20150188957COMPUTER-IMPLEMENTED METHOD AND SYSTEM FOR ENABLING ANONYMOUS COMMUNICATION BETWEEN NETWORKED USERS BASED ON COMMON SEARCH QUERIES - A computer-implemented method and system for enabling anonymous communications between networked users based on common search queries is disclosed. The present invention relates to a computer-implemented system and method for receiving a first search query from a first user, receiving a second search query from a second user, at least the first user or the second user being unidentified, determining if the first search query and the second search query fit within a match criteria, and establishing a communication link between the first user and the second user if the first search query and the second search query fit within the match criteria.2015-07-02
20150188958Song Lyric Processing With User Interaction - A computer-implemented system (and method and computer readable storage medium) are disclosed for processing interactions with song lyrics. The system is configured to provide for display on a screen of a computing device the song lyrics. The system detects a selection of a segment of the song lyrics and provides for display a menu of options for interacting with the selected segment of the song lyrics. The system receives a selection of an option from the menu of options and updates, in a user interaction database, a data field corresponding to the selected segment with the selected option from the menu of options. The system executes the selected option from the menu of options.2015-07-02
20150188959TECHNIQUES FOR POPULATING A CONTENT STREAM ON A MOBILE DEVICE - Techniques for populating a content stream of a mobile application are described. A content request for content to be presented in a personalized activity or content stream of a member of a social networking service is communicated from a mobile computing device to a content server. The content request includes a member identifier, location information indicating the current location of the member, and/or an activity status identifier indicating an inferred physical activity state of the member. Using the information received with the content request, a content selection and relevance module will process the request and provide contextually relevant content for presentation in the member's activity or content stream, at the mobile device.2015-07-02
20150188960SYSTEM AND METHOD FOR ONLINE MEDIA CONTENT SHARING - Systems and methods are provided for sharing media content through websites and mobile applications to connect individuals worldwide by providing an ability for individuals to create, share and listen to one or more of audio, digital, and/or visual broadcasts from around the world. The systems and methods for sharing media content provide an online platform environment for receiving requests from a client side application or hardware, such as received from a mobile application or website, and for transmitting data by a server side application or hardware, related to the received media content. The systems and methods implement a hands-free social media experience in the online platform environment that enables access to audio broadcasts through a network. The mobile application also has an advertising component where a user can record an advertisement or dedication and calendar the recorded advertisement or dedication into a broadcast schedule of the user's choosing.2015-07-02
20150188961ON BOARD VEHICLE MEDIA CONTROLLER - The present disclosure describes a microprocessor executable media controller operable to receive a media stream from a remote node, the received media stream being for an occupant associated with an on board vehicle input/output system, identify which on board vehicle input/output systems are restricted due to operator command and/or as a result of a governing law, and provide the media stream, in compliance with any restriction, to a selected input/output system associated with the occupant.2015-07-02
20150188962Systems and Methods for Playing Adaptive Bitrate Streaming Content by Multicast - Systems and methods for playing adaptive bitrate streaming content by multicast in accordance with embodiments of the invention are disclosed. In one embodiment, a method of receiving and playing back adaptive bitrate streaming content using a playback device includes receiving an adaptive streaming session description including information about a piece of adaptive streaming content and information for accessing a multicast session of the piece of adaptive streaming content using a playback device, receiving portions of a first alternative stream of the piece of adaptive streaming content sent to a first multicast group that includes the playback device using the playback device, computing a bandwidth measurement using the playback device, and switching to a second alternative stream of the piece of adaptive streaming content based upon the computed bandwidth measurement using the playback device.2015-07-02
20150188963Systems and Methods for Distributing Adaptive Bitrate Streaming Content by Multicast - Systems and methods for distributing adaptive bitrate streaming content by multicast in accordance with embodiments of the invention are disclosed. In one embodiment, a process of distributing adaptive bitrate streaming content includes generating an adaptive streaming session description including information about a piece of adaptive streaming content and information for accessing a multicast session of the piece of adaptive streaming content using a content server, sending portions of alternative streams of the piece of adaptive streaming content to a multicast group of playback devices using the content server, and sending bandwidth measurement data with which a playback device can calculate available bandwidth to a playback device using the content server.2015-07-02
20150188964Rendering rated media content on client devices using packet-level ratings - A content delivery system provides packet-level ratings of media content for use by client devices in rendering the media content thereon. A client device can store a permission level and compare the permission level with respective rating levels included in received media packets. The media content within the received media packets is rendered on the client device on the condition that the permission level compares favorably with the associated rating level and blocked on the condition that the permission level compares unfavorably with the associated rating level.2015-07-02
20150188965METHODS AND APPARATUS FOR CLIENT AGGREGATION OF MEDIA IN A NETWORKED MEDIA SYSTEM - A network client aggregates media items available in a media system. The network consists of a plurality of nodes, including at least two media server nodes. A client node generates an internal request to obtain a list of media items available in the media system. In response, the client node generates a request for a list of media items from each individual media server node on the network. Each media server node sends their list of media items to the client node. The client node aggregates the lists of media items from each of the media server nodes. Thus, a list of media items available on the media system is aggregated to a requesting client node in the media system.2015-07-02
20150188966PLACESHIFTING LIVE ENCODED VIDEO FASTER THAN REAL TIME - Systems, methods and devices are described to encode, deliver and playback a placeshifted media stream via the Internet or another network. The media stream is appropriately encoded at a quality level (e.g., at a bit rate, frame rate, resolution, etc.) that allows content to be delivered faster than it is played back. This sort of “faster than real time” encoding allows the placeshifted media stream to be buffered at the remote device for more effective performance.2015-07-02
20150188967SEAMLESS INTEGRATION OF AUDIO CONTENT INTO A CUSTOMIZED MEDIA STREAM - The present disclosure provides a system for delivering contextually relevant streaming media content embodied in a mobile device, wherein the media stream includes one or more media content segments content selected from a plurality of media content segments content based on listener preferences. The system is configured to integrate media, such as music, from a listener's mobile device seamlessly into the customized media stream. In addition, the listener may rewind the customized streaming media to any time point within the customized streaming media.2015-07-02
20150188968ELECTRONIC DEVICE AND PLAYBACK METHOD OF STREAMING MEDIA THEREOF - An electronic device and a playback method of streaming media thereof are provided. The electronic device is within the local area network (LAN), and a media server and a plurality of playback devices are also within the LAN. The media server provides the streaming media to a first playback device for playback. The electronic device includes a first communication unit, a second communication unit and a processing unit. The second communication unit is connected to the media server via the LAN. When the first communication unit is connected with the first playback device based on a first communication protocol, the processing unit receives the playback information of the streaming media, and when the first communication unit is connected with a second playback device based on a second communication protocol, the processing unit transmits the playback information to the second playback device to continue playing of the streaming media.2015-07-02
20150188969UPLOAD OPERATION USING MULTIPLE CONNECTIONS - A client system requests to upload an input data stream to a server system. The input data stream is split to a sequence of chunks. The chunks are transferred in parallel by a number of connections from the client system to the server system. At the server system, the transferred chunks are merged into an output stream according to the sequence. The output stream represents the rebuilt input stream.2015-07-02
20150188970Methods and Systems for Presenting Personas According to a Common Cross-Client Configuration - Disclosed herein are methods and systems for presenting personas according to a common cross-client configuration. An embodiment takes the form of a method that includes extracting a persona from video frames being received from a video camera. The method also includes transmitting an outbound stream of persona data that includes the extracted persona. The method also includes receiving at least one inbound stream of persona data, where the at least one inbound stream of persona data includes one or more other personas. The method also includes presenting a full persona set of the extracted persona and the one or more other personas on a user interface according to a common cross-client persona configuration. The method also includes presenting one or more shared-content channels on the user interface according to a common cross-client shared-content-channel configuration.2015-07-02
20150188971DATA STREAM MONITORING - A computer platform and network for sharing of data streams and demographic information of users browsing the Internet with content providers and advertisers. The technology further relates to a graphical user interface for representing data streams and selectively recorded data elements for individuals and groups of individuals in both linear and popular (most visited) views. The technology still further includes permitting an intentional delay in recording data elements via the graphical interface, with controls for the user to control or override the delay.2015-07-02
20150188972METHODS AND SYSTEMS FOR IMPROVING ERROR RESILIENCE IN VIDEO DELIVERY - A multimedia transceiver apparatus continuously generates a model of a video scene, and then uses the generated model to estimate missing sections (e.g., image frames) of the video stream by morphing and/or modifying available uncorrupted video data based on the model. By estimating the missing sections, the subjective quality of video under error conditions (e.g., image frame loss, image frame corruption, video signal interruption, etc.) is improved.2015-07-02
20150188973REMOTE DESKTOP VIDEO STREAMING ALPHA-CHANNEL - A method includes preparing images of a remote desktop including an open cloud-application window object corresponding to an instance of a network-hosted application executing on a network, encoding the images of the remote desktop as image frames in a video stream, and transmitting the video stream over the network to a computing device. The images the remote desktop are encoded such that when decoded, reconstructed, and displayed on a local desktop of the computing device, the open cloud-application window object corresponding to the instance of the network-hosted application executing on the network has the appearance and behavior of an open window corresponding to a natively-operating application on the local desktop of the computing device.2015-07-02
20150188974METHOD AND A SYSTEM FOR SMOOTH STREAMING OF MEDIA CONTENT IN A DISTRIBUTED CONTENT DELIVERY NETWORK - A method and a system for smooth streaming of media content in a distributed content delivery network, including encoding original media files; providing the encoded original media files to an indexer entity; calculating, the indexer entity, index jump tables for all the encoded original media files; ingesting the index jump tables and the encoded original media files to an origin server; requesting an end user to a SSS a stream fragment; retrieving, the SSS from the origin server, a specific index jump table associated to the requested stream fragment, and using the table to find out and retrieve, from the origin Server, a needed encoded original media file block; and retrieving, the SSS, the requested stream fragment out of the encoded media file block, and sending the requested stream fragment to the end user.2015-07-02
20150188975DISTRIBUTING METADATA TO PEER DEVICES - This document describes techniques (2015-07-02
20150188976IDENTIFYING AND TRANSITIONING TO AN IMPROVED VOIP SESSION - Qualities of each of first and second sessions for voice over internet protocol communication between endpoints are assessed and compared, and the endpoints signaled to select the session having the higher assessed quality as a current or primary session for further data packet communication between the endpoints, and to remove the lower quality session from use as a session for the further data packet communication between the endpoints, or to use the lower quality session as a secondary session for data communication between the endpoints. More particularly, the assessed qualities of each of the current and second sessions meet a basic requirement defined to provide voice over internet protocol data packet communication between the endpoints.2015-07-02
20150188977Verifying Content Rendering on a Client Device - Accuracy of rendering server-provided content at a client device can be automatically verified. To this end, content can be provided in a non-image format to the client device via a communication network, such that the client device renders the content to generate a rendered image. The content is rendered using a canonical rendering component to generate an expected rendered image. An expected result corresponding to the expected rendered image is generated, and the expected result can be be compared to verification data generated based on the rendered image to determine whether the client device correctly generated the rendered image.2015-07-02
20150188978HIERARCHICAL ORGANIZATION FOR SCALE-OUT CLUSTER - Performing a distributed data operation. A method includes receiving a request for one or more data operations from a first computing system, such as a client. The method further includes determining a number of node endpoints that can be used to satisfy the query. Based on the number of node endpoints, the method further includes selecting a plan from the group consisting essentially of a flat data operation plan, a hierarchical data operation plan or a combination of partially flat/partially hierarchical data operation plan. The request for one or more data operations is serviced using the selected data operation plan.2015-07-02
20150188979METASEARCH REDIRECTION SYSTEM AND METHOD - Methods, systems, and computer program products for redirecting a user from a metasearch website to a service provider website. A first uniform resource locator (URL) may be received from a client device at a redirection system. The first URL may have a first format including a plurality of fields containing information related to a product distributed at the website of the service provider. A second uniform resource locator (URL) may be generated from the fields of the first URL. The second URL may have a second format that is predetermined by the service provider. The client device may be provided access to the website of the service provider using the second URL.2015-07-02
20150188980Systems and Methods for Hosted Application Marketplaces - Systems and methods for hosted application marketplaces in accordance with embodiments of the invention are described. In one embodiment, a hosted application marketplace server system includes a processor and a memory storing hosted application marketplace application, wherein the hosted application marketplace application directs the processor to obtain request data describing a request for hosted application data, wherein the request data includes user profile data and computing device capability data, identify a computing device based on the user profile data, determine compatible application data based on the request data, wherein the compatible application data identifies a set of applications that are compatible with the computing device based on the computing device capability data, generate hosted application data based on the compatible application data; and transmit the hosted application data in response to the obtained request data.2015-07-02
20150188981PAGE PROCESSING METHOD, APPARATUS, AND SYSTEM - A page processing method, an apparatus, and a system are provided. The method includes: generating a parsing policy table according to a page attribute or a client attribute or both received from a client browser, where the parsing policy table is used to determine a parsing manner for a page that a user requests to access, and the parsing manner includes parsing on a web server or parsing on the client browser or both; determining, according to the parsing policy table, the parsing manner for the page that the user requests to access; and parsing, according to the parsing manner, the page that the user requests to access. According to the embodiments of the present invention, a parsing policy table is generated, so that different parsing manners may be selected according to an actual network or a service situation, which achieves flexible page processing and improves page processing efficiency.2015-07-02
20150188982METHOD AND APPARATUS FOR REMOTE CONTROL OF DEVICES OVER NETWORK - The invention is a way to remote control apparatuses over internet in a cost effective and easy manner so that it is easy for non-technical users to setup and use. The method uses, a mobile computer, such as a contemporary ‘smart-phone’, with wireless internet connection and an audio port to control apparatuses and also allows local and remote operators, if manned, to exchange text, voice and video modes of communication as well.2015-07-02
20150188983DYNAMICALLY LAUNCHING A SERVER-BASED APPLICATION ON A MOBILE DEVICE - In an aspect of the disclosure, a method and system for launching a mobile device application is disclosed including launching an application on a mobile device and transmitting a request to a remote computing device for receiving data to create a user interface for the application. The method and system further includes receiving the requested data at the mobile device and creating the user interface on the mobile device using the requested data. Also disclosed is a method of data synchronization in which data is synchronized from an application on a mobile device to an identical application on a remote computing device. The method includes establishing a communicative link between the mobile device and the remote computing device, synchronizing an application through the communicative link allowing the application to be used on the mobile device when the communicative link is discontinued and synchronizing the application upon reestablishing the communicative link.2015-07-02
20150188984OFFLOADING AUGMENTED REALITY PROCESSING - A system and method for offloading augmented reality processing is described. A sensor external to a viewing device of a user tracks a location and an orientation of the viewing device. The location and orientation are defined relative to predefined references of a physical environment local to the user. A server receives a request from the viewing device to offload at least one of a tracking process and an augmented reality rendering process. The augmented reality rendering process is based on an augmented reality database. The server generates offloaded processed data based on the request and the location and the orientation of the viewing device. The offloaded processed data is streamed to the viewing device. A visualization of the offloaded processed data is generated in the viewing device.2015-07-02
20150188985DEVICE AND METHOD FOR UNIDIRECTIONAL DATA TRANSFER - A method for unidirectional data transfer between a first open network and a second protected network. Data is transferred from a sender desk connected to the open network to a receiver desk connected to the protected network via at least one transmission path comprising a physical data diode. A file is transmitted from the sender desk to the receiver desk, packet by packet, upon arrival of the packets at the sender desk. The numbering of packets is used to reconstruct the file at the receiver desk. Data is transmitted on N (N>=2) parallel transmission paths, each protected by a physical diode. Data is received by the receiver desk in N buffer memories.2015-07-02
20150188986INFORMATION PROCESSING APPARATUS, CONTROL METHOD, AND STORAGE MEDIUM - Provided is an information processing apparatus that establishes first communication connection with a server device, acquires information indicating whether or not content has been generated from the server device which dynamically generates the content, establishes second communication connection with the server device, and acquires the generated content. The information processing apparatus maintains the second communication connection until the content is completely acquired.2015-07-02
20150188987PARALLEL INFORMATION SYSTEM UTILIZING FLOW CONTROL AND VIRTUAL CHANNELS - Embodiments of a data handling apparatus can include a network interface controller configured to interface a processing node to a network. The network interface controller can include a network interface, a register interface, a processing node interface, and logic. The network interface can include lines coupled to the network for communicating data on the network. The register interface can include lines coupled to multiple registers. The processing node interface can include at least one line coupled to the processing node for communicating data with a local processor local to the processing node wherein the local processor can read data to and write data from the registers. The logic can receive packets including a header and a payload from the network and can insert the packets into the registers as indicated by the header.2015-07-02
20150188988ELECTRONIC DEVICES, AND FILE SHARING METHODS THEREOF - File sharing methods for electronic devices with a display unit and a compass sensor are provided, wherein the electronic device is wirelessly connected to a nearby device. First, a file-sharing request is received from the nearby device, wherein the file-sharing request includes a first geographic data of the nearby device, angle information indicating a sliding-out angle relative to the first geographic data, and a file. A second geographic data is then obtained from the sensor unit of the electronic device. It is determined a first angle for receiving the file according to the first geographic data, the angle information and the second geographic data and the file is received from the first angle.2015-07-02
20150188989SEAMLESS CLUSTER SERVICING - Embodiments are directed to progressively migrating source computer nodes where the source computer nodes perform a computer-implemented service. In one embodiment, a computer system determines that execution of the performed service is to be migrated from the source computer nodes to target computer nodes. The computer system groups the source computer nodes into multiple source subgroups, where each source subgroup includes at least one source computer node. The computer system then schedules creation of target subgroups of target nodes. These target subgroups include at least one source computer node and, themselves, correspond to a source subgroup. The computer system activates a first target subgroup corresponding to a first source subgroup, and deactivates the first source subgroup. In this manner, the first target subgroup replaces the first source subgroup. Still further, the target subgroups are scheduled to be created only after the first source subgroup has been deactivated.2015-07-02
20150188990ASSOCIATING NETWORK-HOSTED FILES WITH NETWORK-HOSTED APPLICATIONS - A method includes establishing a registry in which a filename extension of a file or document is associated with at least one network-hosted application that is capable of processing files having that filename extension. The method further includes configuring a cloud computing service to respond to a user-selection, on a personal computing device, of a network-hosted file having a particular filename extension for processing by using the registry to select a network-hosted application that is capable of processing files having that particular filename extension.2015-07-02
20150188991SIMULATED TETHERING OF COMPUTING DEVICES - Various aspects of the subject technology relate to systems, methods, and machine-readable media for simulating tethering of computing devices. A system is configured to updating, via communications with a server over a network, application data stored in a memory and receiving, from an offline device, a request for application data for a second application running on the offline device. In response to receiving the request, the system transmits, to the offline device, the application data requested for the first application running on the virtual tethering device, wherein the application data is configured to be used by the second application data running on the offline device.2015-07-02
20150188992THIN/ZERO CLIENT PROVISIONING AND MANAGEMENT USING CENTRALIZED MANAGEMENT SOFTWARE - Present disclosure relates to a desktop cloud manager configured to manage thin client computers. The desktop cloud manager includes: XMS server processor, XMS communication interface for communicating between desktop cloud manager and thin client computers, thin client computer database for storing thin client computers and peripherals information; and non-volatile memory storing an XMS server operating system, and firmware having thin client management software. When executed by XMS server processor, thin client management software firmware performs one or more of following operations: (a) connecting to thin client computers through a cloud, (b) discovering thin client computers using UPnP protocol, (c) registering thin client computers at thin client computer database, (d) detecting management modes of thin client computers, (e) provisioning functionalities of thin client computers according to management modes, (f) configuring device settings of the peripherals attached to thin client computers, and (g) managing and controlling thin client computers connected through cloud.2015-07-02
20150188993SYSTEM AND METHOD OF STORING AND DISTRIBUTING DATA - A system and method for the upload, storage, and distribution of information. In particular, the embodiments are directed to systems and methods for uploading, storing, managing and distributing personal information. The system includes an interface where a user inputs personal information, identifies one or more recipients of such information, designates a time for distributing such information to the recipient upon the occurrence of an event, namely the death or incapacitation of the user. The user designates one or more individuals to confirm the occurrence of an event to the computer system which triggers the distribution of user's information in accordance with user's prepared instructions.2015-07-02
20150188994DYNAMIC CONTENT DELIVERY - Aspects of the present disclosure relate to the generation and delivery of content including unique and shared components. A content delivery network service provider can obtain requests for content from client computing devices. Based on information provided in the request or otherwise managed by executable code on the client computing device, the CDN service provider obtains one or more pieces of content that may be shared by more than one user or client computing devices. Additionally, the CDN service provider obtains one or more pieces of content that will not be shared by more than one user or more than one client computing device. Responsive to the content request, the CDN service provider can combine the one or more pieces of shared content and the one or more pieces of unique content and deliver the combined content to the requested client computing device.2015-07-02
20150188995DEPLOYING PROGRAMS IN A CLUSTER NODE - A dependency between a program to be deployed in a node in a cluster and other programs to be deployed in the cluster is obtained by one or more processors, which also obtain an IP address and connection information of a sub/pub server. A client computer connects to the sub/pub server, and subscribes to the sub/pub server for a message describing other programs on which the program is dependent. In response to obtaining the message of other programs on which the program is dependent from the sub/pub server, the program is deployed.2015-07-02
20150188996VIRTUAL OBJECT GENERATING APPARATUS AND METHOD FOR DATA DISTRIBUTION SERVICE (DDS) COMMUNICATION IN MULTIPLE NETWORK DOMAINS - Provided herein is a method and apparatus for generating a virtual object for DDS (Data Distribution Service) communication in multiple network domains, the apparatus including: a communicator for receiving EDP (Endpoint Discovery Protocol) information on a remote Endpoint from a remote network domain separated physically or logically; and a virtual object generator for matching the EDP information on the remote Endpoint and information included in the remote network domain prestored in a database, and for generating a virtual object corresponding to the remote Endpoint.2015-07-02
20150188997METHOD AND APPARATUS FOR CONTROLLING ELECTRONIC DEVICES IN PROXIMITY - An electronic device and method are disclosed, including a communication interface adapted to allow communicative coupling with a plurality of electronic devices, and a processor, implementing the method, which includes: identifying an application to be executed in the first electronic device, selecting candidate devices from the plurality of electronic devices having at least one function associated with execution of the application, selecting a second electronic device from among the candidate devices based a factor including at least one of: status information of each of the candidate devices, position information of each of the candidate devices in relation to at least one of a user or the first electronic device, and at least one property of data associated with the at least one function of the candidate devices, and executing the application in the first electronic device utilizing the at least one function of the second electronic device.2015-07-02
20150188998TRANSMITTING AND DISPLAYING SCREEN CONTENT - A projecting terminal and a displaying terminal use a point-to-point connection interface provided by a web-based operating system (OS) to establish a point-to-point communication link. The projecting terminal uses a screen visiting interface provided by the web-based OS to access a screen content, converts the screen content into screen content data in real-time, and transmits the screen content data through the communication link. The displaying terminal receives the screen content data and uses a content displaying control provided by the web-based OS to display the screen content data onto a screen. The present techniques enable two devices that are equipped with the web-based OS to implement screen projecting, expand the usage of the screen projecting technology, and are easy for implementation.2015-07-02
20150188999System and method to extend the capabilities of a web browser to improve the web application performance - The present invention discloses a method and system to boost the web application performance by taking the snapshot of given web application along with web server and database configuration and deploying it into the client computing device and then modifying the actual web application URL by appending “L” in the beginning of URL scheme name and adding an entry in the computer file to map the given web application hostname to the Local host IP address. Anytime the user activates a link that uses the registered protocol (LHTTP or LHTTPS), the browser will route the action to the locally hosted web application URL and let user know that the request is served by locally hosted web server instead of the actual server. The user interactions on the locally hosted web application are tracked and updated in the actual web application server(s).2015-07-02
20150189000METHOD, SYSTEM AND DEVICE FOR DISTRIBUTED APPLICATION EXECUTION BETWEEN ELECTRONIC DEVICES AND CLOUD - A method system and device for distributed application execution. The system aims to automatically analyze and split application into application blocks to be run in the most appropriate place based on a set of resources optimizations constraints, combined with end user or provider defined set of rules. Each application can be analyzed in separated way and the results of the analysis might be shared with all the parties participating to the application execution optimization scheme. This way, the overhead during the execution is reduced and the resources are spread and shared.2015-07-02
20150189001METHOD AND SYSTEM FOR TRANSMITTING RESULT OF EXAMINATION OF SPECIMEN FROM MEDICAL DEVICE TO DESTINATION - Provided are a method and system for transmitting an examination result of a specimen from a medical device to a destination. The method of transmitting the examination result from the medical device to the destination includes: examining the specimen by using the medical device; receiving destination information indicating the destination to which the examination result will be transmitted, wherein the receiving is performed by the medical device; and transmitting the examination result to the destination corresponding to the destination information, wherein the transmitting is performed by the medical device.2015-07-02
20150189002INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD AND PROGRAM - An information processing apparatus including a search unit configured to access a server storing a plurality of contents therein, and search for a desired content from among the plurality of contents, a recognition unit configured to recognize a reproduction apparatus which is capable of reproducing a content stored in the server, an instruction unit configured to instruct the reproduction apparatus to reproduce the content having been searched for by the search unit, and an acquisition unit configured to acquire reproduction information relating to the content having been reproduced by the reproduction apparatus.2015-07-02
20150189003WRITE ACCESS TO A VARIABLE IN A SERVER - A method for optimizing repeated write access by a client to at least one variable in a server via OPC UA, wherein a call method for repeated write access is provided on the server, the call method includes notification of an access time interval and at least one variable for the repeated write access, the client calls the call method on the server, the server is notified of an access time interval and the at least one variable for the repeated write access in the process, where the server creates a data structure for the repeated write access and maintains said data structure during the access time interval, values of the at least one variable which are to be written are transmitted to the server by the client during the access time interval, and the server allocates each value transmitted by the client to the associated variable.2015-07-02
20150189004METHOD AND FARM LOAD BALANCING DEVICE FOR ESTABLISHING A BI-DIRECTIONAL SERVER TO SERVER COMMUNICATION AND COMPUTER PROGRAM THEREOF - The method comprises creating a single point in a communication flow, by a first farm load balancer, that both communication sessions requested by a client server A and a client server B at a network layer will pass through; creating stickiness based on said communication session requests and creates a bi-directional affinity by correlating the communication session requests of different sessions and maintaining a correlation mapping.2015-07-02
20150189005MACHINE-TO-MACHINE SERVICE BASED ON COMMON DATA FORMAT - A method, a device, and a non-transitory storage medium having instructions to establish a connection with the simple sensor device; receive sensor data from the simple sensor device via the connection; convert the sensor data into common data of a common data format, wherein the common data includes metadata that supports an ontology; store the common data; and transmit the common data to a network device of a network.2015-07-02
20150189006DEVICE PAIRING VIA A CLOUD SERVER - Methods for device pairing via a cloud server are provided. In one aspect, a method includes sending an initial signal from a first device to a second device. The method includes sending a notification from the first device of a set of communication capabilities of the first device. The method also includes receiving an indication of a common communication capability between the first and second devices. The method includes initiating pairing of the first device and the second device using the common communication capability in response to the received indication. Systems and machine-readable media are also provided.2015-07-02
20150189007METHOD AND APPARATUS FOR SENSOR DATA PROCESSING - In accordance with an example embodiment of the present invention, there is provided an apparatus comprising at least one processor and computer program code, configured to cause the apparatus to at least transmit to a sensor node a request for processed sensor data, the request comprising an identity of a second node capable of processing sensor data, and receive a message enabling access to the processed sensor data, wherein the second node is comprised in the same peer network as the apparatus. The apparatus may also be configured to receive from the second node an indication that the second node has data processing capability it is willing to provide.2015-07-02
20150189008DATA COMMUNICATION SYSTEM AND METHOD - A data communication system includes a centralized server arrangement coupled via a communication network arrangement to a plurality of client devices. The centralized server arrangement and the plurality of client devices exchange data. The system allocates the data into a primary type of data and at least a secondary type of data. The primary data is communicated substantially immediately within the system, and the at least secondary data is communicated in the system in association with corresponding acknowledgements (ACK) in response to receipt and processing of the at least secondary type of data at one or more of the client devices. At least one of the one or more client devices is optionally a wireless-enabled mobile communication device or a wirelessly-connected personal computer (PC).2015-07-02
20150189009DISTRIBUTED MULTI-LEVEL STATELESS LOAD BALANCING - A capability is provided for performing distributed multi-level stateless load balancing. The stateless load balancing may be performed for load balancing of connections of a stateful-connection protocol (e.g., Transmission Control Protocol (TCP) connections, Stream Control Transmission Protocol (SCTP) connections, or the like). The stateless load balancing may be distributed across multiple hierarchical levels. The multiple hierarchical levels may be distributed across multiple network locations, geographic locations, or the like.2015-07-02
Website © 2025 Advameg, Inc.