32nd week of 2014 patent applcation highlights part 79 |
Patent application number | Title | Published |
20140223490 | APPARATUS AND METHOD FOR INTUITIVE USER INTERACTION BETWEEN MULTIPLE DEVICES - Method and system for providing intuitive user interaction for sharing among multiple devices is provided, where a remote device without intuitive user interaction is connected to a local device configured with intuitive user interaction; a thumbnail control scheme in which display images of remote device screen are rendered in local device's screen and intuitive method to allow user to quickly interact with remote side application is provided; generic remote control scheme in which local device is acting as an external user interaction peripheral device of remote device is provided; and a region enhancement mode is provided by having areas pre-defined in the remote device, and having the pre-defined areas' respective layouts resized, reconfigured and mirrored in the local device, while the touch events that have occurred in the mapped areas in the local device are remapped and sent to an application that is rendered in the remote device. | 2014-08-07 |
20140223491 | CONSUMER ACCESS SYSTEMS AND METHODS FOR PROVIDING SAME - Apparatus and methods for providing enhanced consumer access to information sources and controllable entities. An Access device can be a stand alone device such as a DVD player in which the DVD disk contains the back-end information network. Other Access devices obtain the back-end information network from remote sources. By way of a specific example, the consumer can then view a game and interactively select every television camera located at the game venue. | 2014-08-07 |
20140223492 | DIGITAL DOWNLOADING JUKEBOX SYSTEM WITH USER-TAILORED MUSIC MANAGEMENT, COMMUNICATIONS, AND OTHER TOOLS - A digital downloading jukebox system including a mechanism for delivering custom services to a recognized user, including services for creating playlists, communicating with others, accessing other features, etc. is provided. In some exemplary embodiments, after a user is recognized, the jukebox system allows users to access a special front-end via an Internet-enabled device or on an actual jukebox. Then, the user may, for example, create playlists, share songs with friends, send messages to friends, and access other value-added content. Such a system preferably learns about networks of friends, and enables managers to send similar messages to regular customers and/or others known to the system. In some exemplary embodiments, changes via a first user interface on a first device are reflected on second user interface on other properly-configured devices. | 2014-08-07 |
20140223493 | SYSTEM FOR PRESENTING MEDIA CONTENT - A system that incorporates teachings of the present disclosure may include, for example, a process that monitors consumption of media content of equipment of a user. A tout message associated with a media content item is constructed based on the consumption. The tout message includes information including a selectable link. The selectable link provides instructions to direct a media processor of the subscriber to access the media content item without receiving additional input from equipment of the subscriber. A mobile communication device of the subscriber is selected based on a determined likelihood of reaching the subscriber, and the tout message is transmitted to the mobile communication device. Other embodiments are disclosed. | 2014-08-07 |
20140223494 | INTERACTIVE TELEVISION PROGRAM GUIDE SYSTEM WITH PAY PROGRAM PACKAGE PROMOTION - A system is provided that allows a user to select a pay program for purchase from a program guide. The program guide determines whether the selected program is part of a package of pay programs. If the selected program is part of a package, information regarding the package is provided to the user so that the user may decide whether to purchase the package. If the selected program is part of several packages, information for all packages is provided. The system automatically sets reminders for packages containing repetitive programming. The system monitors whether the user has watched any of the programs in such packages. When the user watches a program from the package, the remaining reminders are cancelled. If a user does not watch any programs in a package of any type, purchase of the package is cancelled and the user is provided with the opportunity to reschedule. | 2014-08-07 |
20140223495 | ON-DEMAND MOBILE WIRELESS BROADCAST VIDEO DELIVERY MECHANISM - A mobile broadcast service center and a mobile wireless network to deliver broadcast video to mobile wireless devices is described. When the mobile broadcast service center receives a request to deliver a broadcast video channel to a target mobile wireless device, it designates as target an intermediate node in the network that serves the target mobile wireless device. The mobile broadcast service center first determines if an existing channel bundle is routed to the target intermediate node. If this first determination is negative, the mobile broadcast service center routes a new channel bundle to the target intermediate node, including the requested broadcast video channel. If the first determination is positive, the mobile broadcast service center then determines if the requested broadcast video channel is in the existing channel bundle. If this second determination is negative, then it adds the requested broadcast video channel to the existing channel bundle. | 2014-08-07 |
20140223496 | MOBILE COMMUNICATION TERMINAL, MOBILE COMMUNICATION METHOD, MOBILE COMMUNICATION PROGRAM, AND RECORDING MEDIUM - A mobile communication terminal for receiving broadcasting waves of television broadcasting, the mobile communication terminal including a graph displaying unit configured to display a graph that has at least an axis of an azimuth direction in which the mobile communication terminal is facing and an axis of a reception level of the broadcasting waves at the azimuth direction and that shows the reception level currently being detected and the reception level detected in the past such that the reception level currently being detected is plotted in the central part of a screen of the mobile communication terminal, and a graph updating unit configured to update the graph according to a change of the azimuth direction in which the mobile communication terminal is facing or according to a change of the reception level. | 2014-08-07 |
20140223497 | Apparatus and Method for Displaying Moving Images in a Motor Vehicle, and Motor Vehicle - A device for displaying moving images in a motor vehicle displays moving images in a first or second mode. In the first mode the moving images are displayed with normal playback parameters and the refresh rate in the second mode is lower than in the first mode. One of the first and second modes is selected based on a speed of the motor vehicle. | 2014-08-07 |
20140223498 | Content Control in a Networked Environment - Methods, systems, and products control presentation of media content within a networked environment of multiple devices. Interaction rules are used to determine which ones of the devices interact with each other. Further rules may define what media content is playable by each one of the devices in the networked environment. | 2014-08-07 |
20140223499 | GATEWAY MODULE - A gateway module according to the disclosure includes an Ethernet connector for receiving a broadcasting signal and a network signal through a coaxial cable to separate to the broadcasting signal from the network signal, a network switch for selecting at least one from a plurality of internal communication networks to transmit the separated network signal to the selected communication network, and an interface part for receiving and transmitting the separated network signal to a TV, in which the gateway module is mounted on one surface of the TV. | 2014-08-07 |
20140223500 | METHOD AND SYSTEM FOR TRANSMITTING WIRELESSLY VIDEO IN PORTABLE TERMINAL - A method and a system for transmitting a video wirelessly in a portable terminal are provided. The method includes connecting a data channel to transmit a multimedia data and a control channel to transmit a control command when activating a wireless video transmission mode which may transmit the multimedia data wirelessly, and transmitting a transmission requested multimedia data to a reception terminal through the data channel when transmission of the multimedia data is requested, and transmitting a current volume information to the reception terminal through the control channel. | 2014-08-07 |
20140223501 | WIRELESS COMMUNICATION CHANNEL OPERATION METHOD AND SYSTEM OF PORTABLE TERMINAL - A wireless communication channel operation method and a system of the portable terminal for preventing data loss when switching between different wireless video transmission modes are provided. The method includes transmitting multimedia data to a recipient terminal on a communication channel of a second transmission mode in a wireless video transmission mode, the wireless video transmission mode supporting a first and second transmission modes, receiving buffer state information from the recipient terminal, pausing, when a request for switching to the first transmission mode is detected, transmission of the multimedia data to the recipient terminal, determining the buffer state information, waiting, when the buffer state information indicates presence of multimedia data in a reception buffer of the reception terminal, for completion of playing of the multimedia data in the reception buffer, and switching to the first transmission mode after the multimedia data in the reception buffer is played completely. | 2014-08-07 |
20140223502 | Method of Operating an IP Client - An IP client device that is connected to a display device for presentation of AV content pulls AV content for a user-selected service from a server and presents the AV content to the user. Concurrently, the IP client device pulls a selected version of AV content for an additional service from a server that hosts multiple versions of the AV content for the additional service, the multiple versions providing the AV content for the additional service at different bit rates, and temporarily storing the selected version of the AV content for the additional service in a memory. In response to a request from the user for presentation of the AV content for the additional service, the IP client device reads the selected version of the AV content for the additional service from the memory and presents the AV content for the additional service to the user. | 2014-08-07 |
20140223503 | Methods, Systems and Apparatus for Configuring a System of Content Access Devices - Methods, systems, and apparatus to configure a system of content access devices and direct signals, content, and communications between devices are described. Capabilities of one or more devices are obtained, content formats of a requested content item are obtained, and a source device and a receiving device are determined based on the obtained capabilities and the obtained content formats. A signal and/or content item are directed from the source device to the receiving device. | 2014-08-07 |
20140223504 | CABLE DISTRIBUTION NETWORKS - Methods and systems are provided for cable distribution networks, in which a headend may generate one or more downstream signals for communication in a distribution network associated with the headend. The generating of the one or more downstream signals may comprise combining data and/or video for one or more service groups, from signals corresponding to a plurality of services, with the combining being performed in digital domain. The distribution network comprises a cable distribution network, such as a hybrid fiber-coaxial (HFC) based network. The plurality of services comprises cable television (e.g., DOCSIS) services, VOD services, SDV services, OOB services, and/or broadcast television services. The headend may control feedback from the distribution network, and may control the combining performed therein based on the received control feedback. The control feedback may be received from, for example, fiber nodes and/or user equipment in the distribution network. | 2014-08-07 |
20140223505 | METHOD AND APPARATUS FOR CONTROL OF ELECTRONIC MEDIA - Devices and methods are provided for managing media content across multiple communication systems and related devices. In various embodiments, a client node detects a first media content stream being presented. The client node then generates and provides a content stream identification request message to the control system. In response, the control system provides content identification data associated with the first content stream to the client node, which processes it to generate and provide a content request message to a control server node. | 2014-08-07 |
20140223506 | METHOD AND APPARATUS FOR DETERMINING BASE PCR IN MULTIPLE IMAGES FOR BROADCASTING SERVICE BASED ON MULTIPLE IMAGES - There is disclosed a method of synchronizing a first image and a second image forming multiple images in broadcasting service based on the multiple images. The method includes receiving a stream regarding the first stream and a stream regarding the second stream through a plurality of channels, obtaining the first image and the second image by decoding the stream regarding the first stream and the stream regarding the second stream and obtaining a base Program Clock Reference (PCR) descriptor in at least one of the stream regarding the first stream and the stream regarding the second stream, selecting a base stream based on the base PCR descriptor and determining a base PCR based on the base PCR descriptor, and synchronizing the first image and the second image based on the base PCR. | 2014-08-07 |
20140223507 | CLOUD-BASED SECURITY POLICY CONFIGURATION - Systems and methods for configuring security policies based on cloud are provided. According to one embodiment, security parameters are shared on cloud by security devices. A first network appliance may fetch one or more security parameters shared by a second network appliance from a cloud account. Then the first network appliance automatically creates a security policy that controlling a connection between the first network appliance and the second network appliance based at least in part on the one or more security parameters. | 2014-08-07 |
20140223508 | Dynamically Constructed Capability for Enforcing Object Access Order - Proposed is a Capability Management System (CMS) in a distributed computing environment that controls access to multiple objects by multiple subjects based upon a specified access order. A capability is dynamically constructed when the capability is needed. After the capability is used to access an object, a new capability is generated. In the alternative, multiple capabilities for enforcing an access order are generated independently of each other. The new capability is then employed by the same or another subject to access the object according to a prescribed access sequence. In this manner, at any particular time there is one capability valid to access the object by the appropriate subject. In addition, the capability includes information for verifying the authenticity of the capability and for specifying an expiration time associated with the capability. The technology may also be enhanced by providing a linkage between capabilities intended for use in a sequence. | 2014-08-07 |
20140223509 | SYSTEM AND METHOD FOR INDIRECT INTERFACE MONITORING AND PLUMB-LINING - A method is provided in one example embodiment that includes monitoring a first interface, monitoring a second interface, and taking a policy action if the second interface is not executed before the first interface. In more particular embodiments, monitoring the second interface may include walking a call stack associated with the first interface. Moreover, a program context for calling code associated with the second interface may be identified and acted upon. | 2014-08-07 |
20140223510 | SYSTEM AND METHOD FOR PROVIDING DIVERSE SECURE DATA COMMUNICATION PERMISSIONS TO TRUSTED APPLICATIONS ON A PORTABLE COMMUNICATION DEVICE - A system for providing first and second trusted applications diverse permission to communicate via a secure element. The system comprising first digital identifier and digital token operably associated with the first trusted application; a second digital identifier and digital token operably associated with the second trusted application. The system further includes a card services module that provides an application programming interface to the secure element supported by a secure data table including first and second sets of permissions. The card services module issues one or more commands to the secure element based on a first action requested by the first trusted application in conjunction with the presentation of the first digital token only if the one or more commands will not violate the first set of permissions. A method is also disclosed. | 2014-08-07 |
20140223511 | AUTHENTICATION SWITCH AND NETWORK SYSTEM - An authentication switch monitors a failure of an external server, and redirect information to a Web server that holds authentication information registration screen data is provided to a terminal using a monitoring result. A life-and-death monitoring control unit for monitoring life and death of an external Web server is disposed within an authentication switch to monitor the life and death of the external Web server. An authentication processing unit within the authentication switch switches the redirect information on the basis of a life-and-death monitoring table of the external Web server provided in the life-and-death monitoring control unit in response to an authentication request from the terminal, and enables web authentication even when the external Web server is in failure. | 2014-08-07 |
20140223512 | CUSTOMIZING SECURITY ROLE IN DEVICE MANAGEMENT SYSTEM, APPARATUS AND METHOD - Systems, apparatuses and methods are provided for managing information technology devices in an information technology environment in which at least some of the devices are connected to a network, and access of each user in the information technology environment is customized in a convenient manner. | 2014-08-07 |
20140223513 | Securing Communication over a Network Using Client Integrity Verification - A method for protecting application servers from network-based attacks and verifying the security posture of end client systems is disclosed. A trust broker system receives a request from a user agent associated with a client system remote from the trust broker to connect to applications and resources associated with the trust broker. The trust broker system verifies the integrity of the client system and verifies the identity of a user of the client system. The trust broker system then determines the access level permitted to the identified user and based on the access level. The trust broker system establishes a connection with the user agent and transmits session information to the server system. The trust broker system sends the user agent connection information, wherein the connection information enables the requesting user agent to connect to the requested server system. | 2014-08-07 |
20140223514 | Network Client Software and System Validation - A method for validating a client system is disclosed. A trust broker system receives a request to connect to a server system from a previously authorized client system, wherein the client system has an associated user agent. The trust broker system determines the machine fingerprint associated with the client system, wherein the fingerprint is a digital value that represents all software installed on the client system. Based on the machine finger print, the trust broker determines whether the client system has software installed since the previous authorization. In accordance with a determination that the client system does have newly installed software, the trust broker system transmits instructions to evaluate the newly installed software and receives the results of the evaluation from the client system establishes an encrypted connection with the first client system. | 2014-08-07 |
20140223515 | Securing Organizational Computing Assets over a Network Using Virtual Domains - A method for connecting to a trust broker system is disclosed. The electronic device stores encrypted identifying information for a plurality of client systems authorized to interact with the server system, wherein the encrypted identifying information is changed per client system per session. The electronic device creates a plurality of virtual domains; each virtual domain representing a set of services and information distinct from the other virtual domains. The electronic device stores permissions associated with each respective client system in the plurality of client system. The electronic device receives a request from a first client system, including encrypted identifying information associated with the first client system, for information associated with a first virtual domain and then retrieves stored permissions of the first client system based on the encrypted identifying information. The electronic device determines whether the first client system is permitted to access the requested first virtual domain. | 2014-08-07 |
20140223516 | AUTHORIZATION FLOW INITIATION USING SHORT-TERM WIRELESS COMMUNICATION - In general, aspects of the disclosure are directed towards techniques for initiating an authorization flow with a user to enable a user interface-limited client computing device to obtain access to protected resources hosted by a resource service. In some aspects, a computing device comprises at least one processor. The computing device also comprises a short-range wireless communication module operable by the at least one processor to receive, using short-range wireless communication, an authentication request from a client device. The computing device also comprises an authorization module operable by the at least one processor to receive authorization to provide at least one security credential to the client device, wherein the authorization module is further configured to, responsive to receiving the authorization, send an indication of the authorization to an authentication service. | 2014-08-07 |
20140223517 | DATA PROCESSING AND STORAGE DEVICE - A device for processing and storing data is disclosed, which comprises a primary controller, a primary memory, a security element (SE), and at least one universal port, wherein the device for processing and storing data further includes a first additional port, via which the security element (SE) can directly interacts with a second external device to complete the processing and access of the data. The security element (SE) in the device for processing and storing data disclosed herein can work independently without being effected by the condition whether the primary memory is performing the data read/write process, and supports the single wire protocol (SWP). | 2014-08-07 |
20140223518 | AUTHENTICATION AND AUTHORIZATION METHOD AND SYSTEM - An authentication and authorization method and system are provided. The method includes: receiving an authentication request transmitted from a first device; transmitting the authentication request to an authentication and authorization server subsystem; authenticating the authentication request and generating authentication information; generating an authorization request used to request a second device for authorization according to the authentication information; and authenticating the authorization request, generating an authorization information and transmitting the authorization information to the first device through an authentication and authorization client subsystem so that the first device communicates with the second device directly according to the authorization information. | 2014-08-07 |
20140223519 | Platform for Providing a Social Context to Software Applications - The present invention provides a system and method for providing a social context to software applications. According to one embodiment of the invention, a user of a social network authorizes access by an external software application to information available in the social network. At some time later, the user of the social network uses an application designed by a third-party software developer. The application contacts the social network provider for permission to access the information available in the social network. If access has been authorized, the application incorporates the information from the social network into its interaction with the user, providing a social context to the user's interaction with the application. | 2014-08-07 |
20140223520 | GUARDIAN CONTROL OVER ELECTRONIC ACTIONS - A method for guardian control over an electronic action includes registering one or more guardians and at least one mobile communication device associated with each guardian with an authorization module hosted on an authorization server. Each mobile communication device is identified by a unique hardware identification number. An authentication request for a supervised client that is attempting to perform the electronic action at a site is received by the authorization server from a site. A confirmation request is sent from the authorization server to the mobile communication device requesting the guardian to confirm the action. The action is authorized upon receiving confirmation from the mobile communication device. | 2014-08-07 |
20140223521 | ALLOWING ACCESS TO UNDERLYING HARDWARE CONSOLES TO CORRECT PROBLEMS EXPERIENCING BY USER - A method, system and computer program product for providing access to underlying hardware consoles to correct problems experiencing by a user. The administrative server receives a request from the user to access a managing system configured to provide access to the underlying hardware consoles that are combined together to service a user's computing requirements. The administrative server presents a list of managing systems for the user to connect that were identified as being able to address the problem(s) the user is experiencing. The administrative server then enables access to managing systems selected in the list in response to the user providing appropriate authentication credentials. An interface is then provided to the user by the selected managing systems to select the underlying hardware consoles to access. In this manner, the user is provided access to the underlying hardware consoles in an easy manner without presenting numerous options and configurations. | 2014-08-07 |
20140223522 | PASSIVE SECURITY ENFORCEMENT - Technology is described for enabling passive enforcement of security at computing systems. A component of a computing system can passively authenticate or authorize a user based on observations of the user's interactions with the computing system. The technology may increase or decrease an authentication or authorization level based on the observations. The level can indicate what level of access the user should be granted. When the user or a component of the computing device initiates a request, an application or service can determine whether the level is sufficient to satisfy the request. If the level is insufficient, the application or service can prompt the user for credentials so that the user is actively authenticated. The technology may enable computing systems to “trust” authentication so that two proximate devices can share authentication levels. | 2014-08-07 |
20140223523 | SYSTEM AND METHOD FOR NFC PEER-TO-PEER AUTHENTICATION AND SECURE DATA TRANSFER - A reader device may generate a first identifier. The reader device may transmit the first identifier to a mobile device. The reader device may receive encrypted data and unencrypted data from the mobile device in which the encrypted data includes a second identifier. The reader device may evaluate whether the first identifier and the second identifier correspond to one another. | 2014-08-07 |
20140223524 | KEY UPDATING METHOD AND SYSTEM THEREOF - A key updating method and system are provided. In the method, (1) a back-end authentication system receives a current dynamic password generated by a dynamic token and authenticates the current dynamic password, and if the authentication succeeds, generates key updating information and goes to (2); (2), the back-end authentication system generates a first updating key according to the key updating information and a first initial key stored therein and copies the first updating key to a buffer of the first initial key; the dynamic token obtains and authenticates the key updating information, and if the authentication succeeds, generates a second updating key according to the key updating information and a second initial key stored in the dynamic token and copies the second updating key to a buffer of the second initial key; or if authentication fails, quits the key updating. The solution avoids risk incurred by accidental key leakage. | 2014-08-07 |
20140223525 | Access to Vaulted Credentials Using Login Computer and Mobile Computing Device - According to an example computer-implemented method, a password management server receives an access request message from a login computer at which a resource requiring vaulted credentials has been requested. The access request message identifies the requested resource and the login computer. A session identifier (ID) is generated for enabling release of the vaulted credentials. The session ID is linked to the login computer and to the requested resource. The session ID is transmitted to the login computer. Responsive to receiving a value indicative of the session ID from a mobile computing device, the password management server transmits the vaulted credentials to the login computer or to the mobile computing device. | 2014-08-07 |
20140223526 | SYSTEM AND METHOD FOR PROVIDING PRIVACY IN SMART METER DEPLOYMENT - Privacy-preserving smart metering for a smart grid. Issuing a privacy-enhanced credential to a consumer node having smart meter. Operating the consumer node to associate an id with the credential and to use the id to report usage. Other systems and methods are disclosed. | 2014-08-07 |
20140223527 | CLIENT APPLICATION ASSISTED AUTOMATIC USER LOG IN - Some systems allow a user to access content using both a native client application and a web interface. In these systems, the client application authorized to access a user account can assist with automatically logging a user into the web interface through the use of authentication tokens. In response to an authentication request, the client application can select a token and split it into multiple parts. One piece can be embedded in a URL and a second piece can be stored in a file. The file can also contain browser executable instructions that when executed combine the two pieces to re-create the token and send the re-created token to a server to authenticate the user. The client application can forward the URL to the browser, which can direct the browser to the file. The browser can execute the instructions thereby authenticating the user. | 2014-08-07 |
20140223528 | CERTIFICATE INSTALLATION AND DELIVERY PROCESS, FOUR FACTOR AUTHENTICATION, AND APPLICATIONS UTILIZING SAME - A process/method is provided, which facilitates the secure, streamlined and authenticated installation of an end user's personally associated electronic identification, such as but not necessarily limited to Public Key Infrastructure digital certificates, a biometric authentication system, a location-based authentication system, a token-based system, and any ancillary software necessary for facilitating electronic security approaches associated with these technologies onto Mobile Devices with minimal Mobile Device end user interaction and without need for sending the personally associated electronic identification across potentially insecure communication protocols. The invention utilizes proprietary communication between Mobile Device software applications, personally associated electronic identification authority servers, and web-based application servers to verify Mobile Device identity and to authenticate end user credential factors and requests for end user credential factors with minimal end user interaction. The disclosed process/method may provide a system for verifying identity by authenticating Mobile Device end users via the submission of multiple credential factors. | 2014-08-07 |
20140223529 | Method of Sharing Credential and Wireless Communication System thereof - A method of sharing credential in a wireless communication system comprising a first user equipment, a second communication device and a network, includes transmitting a temporal credential and a credential custody request, from the first communication device, to the network; transmitting first custody information, by the network, to the first communication device; transmitting a credential acquiring request and second custody information, by the second communication device, to the network; and determining whether to transmit the temporal credential to the second communication device according to the second custody information. | 2014-08-07 |
20140223530 | Secure Network Deployment - In one embodiment, a Manufacturer Installed Certificate (MIC) and a personal identification number are sent to a call controller to request a configuration profile. When the configuration file is received, the IP phone is provisioned according to the configuration profile. | 2014-08-07 |
20140223531 | Smartphone based identification, access control, testing, and evaluation - A suite of testing and evaluation tools that run in conjunction with a smartphone that can be used to both enroll, and for subsequent enrollees, to gain secure access so that the program may measure, track and report on tests, including activities, that may indicate general health and wellness status. Here, the word “smartphone” includes any handheld or mobile device containing at least one processor. The smartphone can be used as the platform for this suite of tools that can include applications that run independently on the smartphone device, but can also include sensors and other data acquisition tools that can be peripheral to the smartphone and connected by wire or wirelessly. | 2014-08-07 |
20140223532 | INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING DEVICE, AND AUTHENTICATION METHOD - An information processing system includes a receiving unit that receives user identification information and organization identification information from an external device, and an authentication unit that performs authentication of the user identification information and the organization identification information received by the receiving unit using a first storage unit storing one or more sets of user identification information in association with organization identification information. When the authentication unit receives a federated authentication request to access an external service from the external device that is authenticated, the authentication unit sends a federated authentication response to the external device if the organization identification information received from the external device and the external service designated in the federated authentication request are associated with each other in a second storage unit storing the organization identification information in association with information on one or more external services that have established a trust relationship for authentication. | 2014-08-07 |
20140223533 | Mobile Credentials for Resources Management in Collaborative Applications - One or more servers may receive a meeting request from a computer. The one or more servers may transmit a meeting invitation a participant. The participant may accept or decline the meeting invitation. If the participant accepts the meeting invitation, the one or more servers may transmit a credential to the mobile device of the participant. | 2014-08-07 |
20140223534 | MANAGING AN ENVIRONMENT OF A VIRTUAL SPACE BASED ON CHARACTERS MADE ACCESSIBLE RESPONSIVE TO CORRESPONDING TOKENS BEING DETECTED - Objectives, an environment, and/or a theme associated with a virtual space may be managed based on characters made accessible responsive to corresponding tokens being detected. Tokens, including a first token associated with a first character or a second token associated with a second character, may be detected based on signals received from one or more token readers. The first character may be made accessible in the virtual space responsive to the first token being detected and the second character may be made accessible in the virtual space responsive to the second token being detected. Responsive to one or both of the first token being detected or the second token being detected, a given objective associated with the virtual space may be effectuated in the virtual space, an environment of the virtual space may be modified, and/or a theme of the virtual space being modified. | 2014-08-07 |
20140223535 | INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING DEVICE, AND AUTHENTICATION INFORMATION MANAGEMENT METHOD - An information processing system includes a receiving unit configured to receive from an external device a use initiation request designating user specific information and organization identification information, and an authentication unit configured to issue authentication information indicating that authentication has been completed in a case where the user specific information and the organization identification information designated in the use initiation request are stored in association with each other in a first storage unit that stores one or more sets of user specific information in association with the organization identification information. The authentication unit receives a new authentication information issuance request designating the authentication information and issues new authentication information that can be used even after a user termination request designating the authentication information is made. | 2014-08-07 |
20140223536 | INFORMATION PROCESSING SYSTEM - An information processing system includes multiple network segments to which one or more information processors are connectable. The network segments includes a first network segment to which at least one first information processor configured to store predetermined information is connected, a second network segment to which at least one second information processor is connected, and a third network segment to which at least one third information processor is connected. The second network segment includes multiple predefined application programming interface (API)s, and the at least one second information processor executes a process corresponding to a called one of the APIs using the predetermined information stored in the at least one first information processor. In response to receiving a request from outside the information processing system, the at least one third information processor controls a process corresponding to the request by calling one of the APIs which corresponds to the request. | 2014-08-07 |
20140223537 | Securing Communication over a Network Using Client System Authorization and Dynamically Assigned Proxy Servers - A method for securing communication over a network is disclosed. A trust broker system receives a request to connect to applications and resources from a client system. The trust broker system determines whether the client system is authorized to connect to the requested applications and resources. In response to determining the client system has authorization to connect to the requested applications and resources, the trust broker system determines, from a plurality of potential proxy servers, a proxy server associated with the requested server system and transmits an identification value for the client system to the requested server system. The trust broker system then transmits the identification value to the client system and transmits contact information for the determined proxy server to the client system, wherein all communication between the client system and the requested server system passes through the proxy server. | 2014-08-07 |
20140223538 | METHOD AND APPARATUS FOR PROVIDING NETWORK ACCESS TO A USER ENTITY - A method for providing network access to a plurality of user entities through an access point, said access point comprising a LAN interface and a broadband network interface, the method comprising the following steps at a gateway device: establishing a second secure communication link with said access point; receiving an IP address allocation request from one of said plurality of user entities via said second secure communication link; accessing a AAA server to verify whether a successful authentication of said one of said plurality of user entities on the basis of data related to a mobile subscription associated with said one of said plurality of user entities has already taken place; and upon successful verification, completing an IP address allocation scheme with said one of said plurality of user entities and enabling relaying of data between said one of said plurality of user entities and a PDN; wherein said gateway device is adapted to aggregate a plurality of instances of second secure communication links from different access points towards said PDN. | 2014-08-07 |
20140223539 | INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, AND COMPUTER PROGRAM PRODUCT - An information processing system includes a receiving unit and a determining unit. The receiving unit receives an application request to request an application for a service. The application request includes first information identifying a type of the service. When the receiving unit receives the application request, the determining unit determines third information indicating an authority to use the service by combining the first information included in the application request and second information used for identifying a user to whom the service is to be provided. | 2014-08-07 |
20140223540 | FIREWALL INTERFACE CONFIGURATION TO ENABLE BI-DIRECTIONAL VOIP TRAVERSAL COMMUNICATIONS - Methods and systems for an intelligent network protection gateway (NPG) and network architecture are provided. According to one embodiment, a firewall provides network-layer protection to internal hosts against unauthorized access by hosts of an external network by performing network address translation (NAT) processing of Internet Protocol (IP) addresses. The firewall changes data in headers of VoIP packets and corresponding data contents of the VoIP packets, to enable bi-directional VoIP communications. An external VoIP interface of the firewall receives incoming VoIP packets having a user alias (e.g., an email address) and an indication regarding a VoIP port of external interface. The packets are directed to an appropriate internal host by the firewall performing port address forwarding based on the port indication to an appropriate media gateway within the internal network that maintains a mapping of user aliases to private addresses of the internal hosts. | 2014-08-07 |
20140223541 | METHOD FOR PROVIDING SERVICE OF MOBILE VPN - Disclosed is a method for providing mobile virtual private network (VPN) services. An operation method of a group and tunnel manager (GTM) for providing mobile VPN services includes receiving a first message for registering information of a VPN group from a gateway, generating tunnel information between the GTM and the gateway based on the first message, and transmitting a packet based on the tunnel information. Accordingly, a private address may be used even in a mobile VPN, and therefore a VPN site may be configured even in an environment where a public address is difficult to use, or a flexible VPN site may be configured. | 2014-08-07 |
20140223542 | SECURE NOTE SYSTEM FOR COMPUTING DEVICE LOCK SCREEN - Techniques are disclosed for recording secure notes from the lock screen of a computing device. A note recording user interface may be accessed from the lock screen to allow a user to leave a note, such as a text, video, audio, or drawn note, or some combination thereof. The notes left using the note recording user interface may be saved such that only the intended recipient can access them, for example, after unlocking the computing device, thereby preventing others from seeing previously saved notes. The secure note system may include a retrieve notes function that allows users and/or recipients to retrieve the recorded notes directly from the lock screen of the computing device used to record them. The secure note system may also be configured to send notifications to inform the recipient when a secure note has been recorded (e.g., email or text message including copy of note). | 2014-08-07 |
20140223543 | COMPUTING DEVICE INCLUDING A PORT AND A GUEST DOMAIN - A first guest domain and an isolated peripheral related task. A peripheral related task to communicate with the peripheral and prevent the first guest domain from communicating with the peripheral. | 2014-08-07 |
20140223544 | INFORMATION PROCESSING APPARATUS, METHOD FOR CONTROLLING INFORMATION PROCESSING APPARATUS, AND STORAGE MEDIUM - When an input prediction function is used, a character string which a user does not want to display is prevented from being displayed as an input candidate while suppressing a load on the user. | 2014-08-07 |
20140223545 | METHOD FOR THE DYNAMIC CREATION OF AN EXECUTION ENVIRONMENT FOR AN APPLICATION TO SECURE THE APPLICATION, ASSOCIATED COMPUTER PROGRAM PRODUCT AND COMPUTING APPARATUS - A method for the dynamic creation of an execution environment for an application to be secured, in order to secure the application, is implemented by a computing apparatus including an information processing unit and a memory. The memory is associated with the information processing unit and includes an operating system, the application to be secured and a security library including at least one security function, The operating system includes a set of unsecured function libraries, the application to be secured being adapted, during its execution, to call a function of the unsecured function library. The method including loading the security library, substituting, from among the function call(s) associated with the application to be secured, at least one call to an unsecured function with a call to a corresponding function of the security library, and launching the application to be secured after the substitution step. | 2014-08-07 |
20140223546 | ACCESS CONTROL SYSTEM AND METHOD WITH GPS LOCATION VALIDATION - An access control system and method with location validation are provided. The method can include receiving a request from an authentication factor, identifying a location module associated with the authentication factor, identifying a location of the location module, and determining whether the location module is within a predetermined distance from the authentication factor or a control system, including an access panel of the control system, that received the request from the authentication factor. When the location module is within the predetermined distance from the authentication factor or the control system that received the request from the authentication factor, the method can include granting the request received from the authentication factor. However, when the location module is not within the predetermined distance from the authentication factor or the control system that received the request from the authentication factor, the method can include denying the request received from the authentication factor. | 2014-08-07 |
20140223547 | ALTERNATE GAME-LIKE MULTI-LEVEL AUTHENTICATION - The disclosed embodiments provide a convenient way for users to access segregated work spaces on mobile devices. A game-like multi-level interactive approach is used to prompt users for input to verify their identity. Multiple identity verification attributes can be collected at each level of interaction. Authentication is achieved when a settable level of user identification confidence is reached. This can potentially reduce the amount of interaction needed as compared to requiring a user to type in a long, cryptic password. | 2014-08-07 |
20140223548 | ADAPTING CONTENT AND MONITORING USER BEHAVIOR BASED ON FACIAL RECOGNITION - The invention is directed to systems, methods and computer program products for adapting content and monitoring user behavior based on facial recognition. An exemplary method comprises: receiving, at a first device, image data from a second device; determining whether the image data substantially matches second image data in a database of image data; in response to determining the image data substantially matches the second image data, determining an account associated with the image data; determining a first set of data associated with the account; and transmitting the first set of data to the second device, wherein the first set of data is used to configure an application being executed on the second device. | 2014-08-07 |
20140223549 | Passwords for Touch-Based Platforms Using Time-Based Finger Taps - A gesture-based method is disclosed for authenticating a user. More specifically, the user of an information handling system is prompted to enter a passcode finger tap sequence input gesture via a touch-sensitive device. The finger tap sequence input gesture is processed to generate a passcode finger tap sequence. The passcode finger tap sequence is then compared to a previously-generated authentication finger tap sequence. If the two finger tap sequences match, then the user is authenticated. | 2014-08-07 |
20140223550 | TWO PHASE PASSWORD INPUT MECHANISM - An apparatus and method for a two phase password input mechanism are provided. The method includes resetting a password entry, displaying a password entry screen, inputting a password element of a plurality of password elements, determining whether the entered password is complete, determining whether the entered password is correct when the entered password is complete, and if the entered password is correct, unlocking the mobile device. The plurality of password elements include at least two elements that cannot be observed from a same viewpoint. | 2014-08-07 |
20140223551 | ELECTRONIC DEVICE AND CONTROL METHOD FOR ELECTRONIC DEVICE - An electronic device includes a base and a cover rotatably attached to the base. An identification unit is located on the cover. The identification unit is used to sense a gesture to rotate the cover relative to the base. The disclosure further offers a control method for the electronic device. | 2014-08-07 |
20140223552 | AUTHENTICATION SYSTEM AND METHOD THEREFOR - An authentication system is disclosed. The system comprises means for receiving an authentication request associated with the transaction wherein the request comprises data identifying a communication device associated with a user authorised to perform the transaction; means for sending a Mobile Application Part, MAP, protocol request message in response to the authentication request; means for receiving, in response to the MAP protocol request, data indicative of whether a communication sent to the communication device will be forwarded to a different communication device. The received data indicative of whether a communication sent to the communication device will be forwarded to a different communication device is used in determining whether to authenticate the transaction. | 2014-08-07 |
20140223553 | Location based process-monitoring - Disclosed are systems, apparatus, devices, methods, computer program products, and other implementations, including a method that includes determining location of a device, and controlling monitoring of behavior of one or more processes executing on the device based on the determined location of the device to identify potential one or more security-risky processes from the monitored one or more executing processes. In some embodiments, controlling the monitoring of the behavior of the one or more processes may include one or more of, for example, adjusting frequency of the monitoring of the one or more processes based on the determined location of the device, adjusting level of detail obtained for the monitored behavior of the one or more processes based on the determined location of the device, and/or adjusting features being observed for the monitored one or more processes based on the determined location of the device. | 2014-08-07 |
20140223554 | DYNAMIC OPERATIONAL WATERMARKING FOR SOFTWARE AND HARDWARE ASSURANCE - This disclosure addresses systems and methods for the protection of proprietary information by monitoring operational watermarks of an apparatus. A monitoring device may receive logical or physical watermark data from a defended apparatus. Watermark data may include any operational or environmental variable related to the defended apparatus. The monitoring device may maintain a baseline profile for the defended apparatus that includes watermark data. During monitoring of the defended apparatus by the monitor device, changes in the watermark data may be analyzed to determine if the baseline should be dynamically updated, or if the change indicates an anomaly. Anomalies may indicate an attempt to tamper with the defended apparatus. In response to the change that indicates an anomaly, the monitoring device may scrub the contents of the defended apparatus. In an embodiment, the monitoring device may also scrub its own memory in response to an anomaly. | 2014-08-07 |
20140223555 | METHOD AND SYSTEM FOR IMPROVING SECURITY THREATS DETECTION IN COMMUNICATION NETWORKS - Method and system for improving the detection of security threats in a communication network, including security devices which generate security events. The present invention assigns a dynamic tag to each event according to the description of the event, and the tags related to the same security threat are clustering forming a data model pattern. An artificial intelligence algorithm, learning from known real information, analyzes said patterns and decides whether an alarm should be generated or not. | 2014-08-07 |
20140223556 | Method for Detecting Attacks and for Protection - A method is provided for attack detection and protection of a set of virtual machines in a system, which includes at least one first host server hosting said set of virtual machines. The method includes: receiving an attack detection message regarding a virtual machine, triggering a first migration of the virtual machine from the first host server toward a security system, and receiving an attack treatment message regarding the migrated virtual machine. | 2014-08-07 |
20140223557 | PERMANENT LOCKOUT ATTACK DETECTION - This document discusses, among other things, an attack detection module configured to permanently shut down a slave device after a number of consecutive attacks. | 2014-08-07 |
20140223558 | METHOD AND DEVICE FOR INTEGRATING MULTIPLE THREAT SECURITY SERVICES - A method and device for integrating multiple threat security services are disclosed. The method may comprise parsing an incoming packet at a current layer and analyzing the packet with respect to multiple threat security services and so that one or more threat security services needed by the packet may be determined. According to an exemplary embodiment, the current layer may be a layer in a protocol stack constructed based on the multiple threat security services. With this method, integrated multiple threat security services may filter application data and parse network packet data via a single integrated entity, and thus the efficacy of filtering application data may be improved while computation overhead may be reduced. | 2014-08-07 |
20140223559 | Systems, methods, and devices for defending a network - Certain exemplary embodiments comprise a method comprising: within a backbone network: for backbone network traffic addressed to a particular target and comprising attack traffic and non-attack traffic, the attack traffic simultaneously carried by the backbone network with the non-attack traffic: redirecting at least a portion of the attack traffic to a scrubbing complex; and allowing at least a portion of the non-attack traffic to continue to the particular target without redirection to the scrubbing complex. | 2014-08-07 |
20140223560 | MALWARE DETECTION VIA NETWORK INFORMATION FLOW THEORIES - Access is obtained to a plurality of information flow theories for a plurality of malicious programs. The information flow theories include differences in information flows between the malicious programs, executing in a controlled environment, and information flows of known benign programs. Execution of a suspicious program is monitored by comparing runtime behavior of the suspicious program to the plurality of information flow theories. An alarm is output if the runtime behavior of the suspicious program matches at least one of the plurality of information flow theories. | 2014-08-07 |
20140223561 | Domain-specific Hardwired Symbolic Machine - A domain-specific hardwired symbolic machine is disclosed that processes information via the flexible formation and hardwired mapping of symbols from one or more domains onto other such domains, computing and communicating with improved security because it has no CPU, no Random Access Memory (RAM), no instruction registers, no Instruction Set Architecture (ISA), no operating system (OS) and no applications programming. The machine may learn, e.g. from its users, via hardwired analysis of domain faults with associated recovery. The machine may modify itself according to interaction with its authorized authenticated users with self-modification via learning within application-specific, user-specific constraints hardwired into the original machine, eliminating configuration management and computer programming. | 2014-08-07 |
20140223562 | System and Method for Distributed Denial of Service Identification and Prevention - Systems and methods for discovery and classification of denial of service attacks in a distributed computing system may employ local agents on nodes thereof to detect resource-related events. An information later agent may determine if events indicate attacks, perform clustering analysis to determine if they represent known or unknown attack patterns, classify the attacks, and initiate appropriate responses to prevent and/or mitigate the attack, including sending warnings and/or modifying resource pool(s). The information layer agent may consult a knowledge base comprising information associated with known attack patterns, including state-action mappings. An attack tree model and an overlay network (over which detection and/or response messages may be sent) may be constructed for the distributed system. They may be dynamically modified in response to changes in system configuration, state, and/or workload. Reinforcement learning may be applied to the tuning of attack detection and classification techniques and to the identification of appropriate responses. | 2014-08-07 |
20140223563 | DYNAMIC PROVISIONING OF PROTECTION SOFTWARE IN A HOST INSTRUSION PREVENTION SYSTEM - Methods and apparatus for optimizing security configurations of a set of computers are disclosed. A set of local servers, each functioning as a deep-security manager supporting a respective subset of the computers, maintains protection software containing filters and rules for deploying each filter. A local server receives updated protection software from a central server. Each local server interrogates each computer of its subset of computers to acquire computer-characterizing data and applies relevant rules to determine an optimal set of filters for each computer. Each rule adaptively determines required characterizing data elements from each computer for determining an optimal security configuration. A local server updates the security configuration of a computer to suit changes in the operational environment of the computer. | 2014-08-07 |
20140223564 | SYSTEM AND METHOD FOR PATTERN MATCHING IN A NETWORK SECURITY DEVICE - A pattern matching system for a network security device includes a pattern matching card configured to generate a pattern matching result by matching data of a received packet with a pre-stored pattern of a signature pattern table, and an analyzing engine configured to copy the packet and transfer the copied packet to the pattern matching card and configured to detect a bad traffic based on packet analysis information of the packet and the pattern matching result received from the pattern matching card. The analyzing engine is configured to detect a bad traffic based on a pattern matching result for a single packet and packet analysis information during a single-packet-based analysis and is configured to detect a bad traffic based on a pattern matching result for successive packets and packet analysis information during a multi-packet-based analysis. | 2014-08-07 |
20140223565 | Apparatus And Method For Identifying Similarity Via Dynamic Decimation Of Token Sequence N-Grams - An apparatus for identifying related code variants or text samples includes processing circuitry configured to execute instructions for receiving query binary code, processing the query binary code to generate one or more query code fingerprints comprising compressed representations of respective functional components of the query binary code, generating token sequence n-grams of the fingerprints, hashing the n-grams, partitioning samples by length to compare selected samples based on length, and identifying similarity via dynamic decimation of token sequence n-grams. | 2014-08-07 |
20140223566 | SYSTEM AND METHOD FOR AUTOMATIC GENERATION OF HEURISTIC ALGORITHMS FOR MALICIOUS OBJECT IDENTIFICATION - A server-based system for generation of heuristic scripts for malware detection includes an automatic heuristics generation system for generating heuristic scripts for curing malware infections; a log database containing logs of events from user computers, including detection of known malicious objects and detection of suspicious objects; a safe objects database accessible containing signatures of known safe objects; a malicious objects database containing signatures of known malicious objects. The system retrieves suspect object metadata from the log database and generates the heuristic script based on data from the safe and malicious objects databases. For multiple computers having the same configuration and having the same logs, only one log common to all the multiple computers is transmitted and only one heuristic script is distributed to the multiple computers. A different and specific heuristic script is distributed to those computers that have a different log than the common log. | 2014-08-07 |
20140223567 | INCIDENT TRIAGE ENGINE - An incident triage engine performs incident triage in a system by prioritizing responses to incidents within the system. One prioritization method may include receiving attributes of incidents and assets in the system, generating cumulative loss forecasts for the incidents, and prioritizing the responses to the incidents based on the cumulative loss forecasts for the incidents. Another prioritization method may include determining different arrangements of incidents within a response queue, calculating cumulative queue loss forecasts for the different arrangements of incidents within the response queue, and arranging the incidents in the response queue based on the arrangement of incidents that minimizes the total loss to the system over the resolution of all of the incidents present in the response queue. | 2014-08-07 |
20140223568 | METHOD FOR SECURELY CHECKING A CODE - A method and a circuit system are provided for securely checking a first code word. The method uses at least one code checker, and provides that the first code word to be checked is transferred into a second code word prior to entry into the code checker. | 2014-08-07 |
20140223569 | System on Chip with Embedded Security Module - An embedded security module includes a security processor, volatile and non-volatile memory, and an interface. The security processor includes transistors formed in one or more semiconductor layers of a semiconductor die, and implements one or more security-related functions on data and/or code accessed by the security processor. The volatile memory is fabricated on the same semiconductor die as the security processor and stores the data and/or code accessed by the security processor. The non-volatile memory includes non-volatile storage cells disposed above each semiconductor layer of the semiconductor die, and securely stores at least one of the data and/or code accessed by the security processor and security information relating to the data and/or code accessed by the security processor. The interface is fabricated on the same semiconductor die as the security processor and provides a communication interface for the security processor. | 2014-08-07 |
20140223570 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING SYSTEM, AND LICENSE MANAGEMENT METHOD - An information processing system including one or more information processing apparatus includes one or more service providing units to provide a service to a first terminal device; and a license management unit to manage a license temporarily registered from a second terminal device. The service providing unit includes a first storage unit to preserve license information of the license managed by the license management unit; a second storage unit to store a copy of the license information; and a validation unit to receive a request to make the license valid from the first terminal device, to make the temporarily registered license information stored in the second storage unit valid, and to request to make the temporarily registered license information preserved in the first storage unit valid. The service is provided for the first terminal device based on the license having made valid. | 2014-08-07 |
20140223571 | PROGRAMMABLE DISPLAY - A programmable display that is connected to a control apparatus controlling apparatuses and that functions as a user interface for the control apparatus, includes a display processing unit displaying, on a display unit, a screen and display objects arranged in the screen; and a storing unit storing, concerning each of a candidate screen, which is a candidate of the screen, and a candidate display object, which is a candidate of the display objects, setting security level information for specifying a level to which the candidate screen or the candidate display object belongs among levels obtained by ranking security in a horizontal division manner and setting security group information for specifying a group to which the candidate screen or the candidate display object belongs among groups obtained by dividing security in a vertical division manner over the levels. | 2014-08-07 |
20140223572 | MESSAGE SERVICE PROVIDING METHOD, AND APPARATUS AND SYSTEM THEREFOR - The present invention relates to a message service providing method, and more specifically, to a message service providing method, and an apparatus and a system therefor capable of selective message protection by extracting a part corresponding to confidential information when the confidential information is included in a message received from a partner, and setting a protection function for only the extracted part. | 2014-08-07 |
20140223573 | DIGITAL CONTENT DELIVERY - Digital content delivery are disclosed. An example method includes receiving personal information associated a user and receiving a first request from the user to receive first content digitally. The first content is to be generated by a first content creator. The method includes, based on the personal information and the first request received, registering the user with a content distributor to enable the user to receive the first content digitally, the content distributor being different than the first content creator and conveying the first request to the first content creator for the user to receive first content digitally. | 2014-08-07 |
20140223574 | SECURE DATA ACCESS - Technologies are generally disclosed for methods and systems for providing secure document storage and retrieval services. In an example embodiment, a method includes receiving an exclusive address at which to send secure links, receiving a request to store a document, storing the document with a remote storage service, receiving location information from the remote storage service, transmitting the location information at which the document is stored to the exclusive address, and updating the location information dynamically. | 2014-08-07 |
20140223575 | PRIVACY PROTECTION IN RECOMMENDATION SERVICES - The present subject matter discloses a system and a method for privacy protection to protect the confidential and personal information of end users using a client device ( | 2014-08-07 |
20140223576 | Method and System for Improving the Data Security of Cloud Computing - A method and system for improving the data security of cloud computing comprising: users establishing an index information table for physical LUN devices available to cloud computing service instances, and setting mapping rules of virtual LBA address space for virtual LUN devices and physical LBA address space for data storage according to the index information table; according to the mapping rules, users establishing and saving a mapping relationship between virtual LBA address space and physical LBA address space for data storage; according to the mapping relationship, acquiring storage position information of actual data mapping to the virtual LBA address space pointed by read/write requests, and completing I/O redirection. The system includes an establishment module, setting module, establishment and saving module, and redirection module. The invention enables data owners to master metadata generation method, preservation method and position, and LUN devices of user data not to be illegally mounted, thus guaranteeing security of user data. | 2014-08-07 |
20140223577 | METHOD AND SYSTEM FOR AUTHENTICATING OPTICAL DISC APPARATUS - Provided are a method and system for authenticating an optical disc apparatus. The method includes capturing an image code attached to the optical disc apparatus, acquiring authentication information on the optical disc apparatus by using the image code, comparing information received from the optical disc apparatus with the authentication information on the optical disc apparatus, and authenticating the optical disc apparatus according to a comparison result. | 2014-08-07 |
20140223578 | SECURE DATA DELIVERY SYSTEM - A secure data provider controls access to one or more data sources on behalf of a requesting party. A negotiated query is transmitted to one or more of the data sources associated with the request based, at least in part, on the information being requested. The response to the query is modified based, at least in part, on an authorization level of the requesting party, and the modified response is transmitted to the requesting party. | 2014-08-07 |
20140223579 | Software and Method for Securing Information Online - A method for securing information online comprises prompting a user to enter personal information and financial information just one time or the first time only, storing the personal information and financial information, prompting the user to indicate a limited quantity of the personal information and financial information to be shared with a client web server, providing a limited-time password usable at the client web server, receiving a request from the client web server for information regarding the user based at least in part on use of the one-time password by the user at the client web server, and providing the limited quantity to the client web server. | 2014-08-07 |
20140223580 | METHOD OF AND APPARATUS FOR PROCESSING SOFTWARE USING HASH FUNCTION TO SECURE SOFTWARE, AND COMPUTER-READABLE MEDIUM STORING EXECUTABLE INSTRUCTIONS FOR PERFORMING THE METHOD - A method and apparatus for processing software using a hash function to secure the software includes generating a first identifier using a hash function, from a first serial number, based on a user input; and generating a security execution file by combining the first identifier with the software, wherein the first serial number is authentication information used to verify an access right to the software. The method and apparatus further include, in response to receiving an outside request for access to the software, requesting information proving an access right; generating a second identifier using the hash function, from a second serial number that is included in the received information proving the access right; and in response to a determination that the second identifier matches the first identifier, allowing an access to the software. | 2014-08-07 |
20140223581 | IDENTITY VERIFICATION SYSTEMS AND METHODS - Systems and methods for authenticating the identity of a user prior to giving access to confidential data at a user interface via a network are described. In an exemplary implementation in an Internet environment, a server hosts an application providing selective access by the user to confidential data related to the user. The user provides initial data to the application as part of a request to access the confidential data. At least one database having the confidential data stored therein is accessed by the server to retrieve confidential data relating to the user located in the database based on the initial data received from the client interface. An exam creation function causes the server to create an exam comprising at least one question based at least in part on a portion of the confidential data relating to the user. This function creates the exam based on at least one exam definition. An exam administration function causes the server to transmit the exam to the client interface for presentation to the user. The user is granted access to the confidential data subsequent to determination that the user successfully passed the exam. | 2014-08-07 |
20140223582 | Digital Receipt for Use with an Interoperable Keychest - There is provided a system and method for a digital receipt for use with an interoperable keychest. There is provided a method for online registration of a digital receipt associated with a content, comprising performing a transaction to obtain from a first distributor the content encrypted by a title key and a first digital rights management (DRM) license usable with the first distributor to access the title key, receiving from the first distributor the digital receipt associated with the content including information relevant to the transaction, and transmitting the digital receipt to the interoperable keychest acting as a central key repository (CKR) for an online registration of the digital receipt associated with the content. Authorized media distributors may then generate new DRM licenses using the CKR, enabling interoperable content playback of the same universal file across different media distributors and clients. | 2014-08-07 |
20140223583 | SYSTEM, METHOD, AND PROGRAM PRODUCT FOR DIGITAL PRODUCTION MANAGEMENT - Systems, methods, and program products for managing digital production from one or more production devices with one or more sources providing inputs of production designs and/or production options are disclosed. | 2014-08-07 |
20140223584 | SMART WALLET - A smart wallet that can only be exclusively opened by an authorized individual through biometric authentication is disclosed. The smart wallet also has a security system associated therewith to prevent the smart wallet from being lost or stolen. The system comprises a fob key configured to send periodic wireless transmissions to the smart wallet device having the ability for approximate range detection. Various embodiments include audible, visual and vibrational indications for authentication, battery power and range detection. | 2014-08-07 |
20140223585 | TRANSCEIVER LOCKING ASSEMBLY - A transceiver locking assembly includes at least one processor device, a network device, in a network environment, in communication with the least one processor device, a transceiver in communication with the network device; a transceiver port, coupled to the network device, defining a first slot opening in at least one of a variety of positions of the transceiver port and configured for selectively receiving the transceiver, and a dynamically controlled locking mechanism coupled to the transceiver port. The dynamically controlled locking mechanism is selectively positioned into the first slot opening to lock the transceiver into the network device or selectively removed away from the first slot opening to unlock the transceiver from the network device. | 2014-08-07 |
20140223586 | ALWAYS-AVAILABLE EMBEDDED THEFT REACTION SUBSYSTEM - A system comprising a platform protected by an always-on always-available security system is described. In one embodiment, the system includes a risk behavior logic to detect a potential problem, a core logic component to provide logic to analyze the potential problem and to move the platform to a suspecting mode when the potential problem indicates a theft suspicion, and the security action logic, to send periodic alerts to a security server when the platform is in the suspecting mode, the alert including movement related data, such that the security server can take an action to protect the platform. | 2014-08-07 |
20140223587 | TRANSCEIVER LOCKING ASSEMBLY - A transceiver locking assembly includes at least one processor device, a network device, in a network environment, in communication with the least one processor device, a transceiver in communication with the network device; a transceiver port, coupled to the network device, defining a first slot opening in at least one of a variety of positions of the transceiver port and configured for selectively receiving the transceiver, and a dynamically controlled locking mechanism coupled to the transceiver port. The dynamically controlled locking mechanism is selectively positioned into the first slot opening to lock the transceiver into the network device or selectively removed away from the first slot opening to unlock the transceiver from the network device. | 2014-08-07 |
20140223588 | A2M FRAGMENTS AND APPLICATIONS THEREOF - The application relates to a polypeptide, the amino acid sequence of which is the sequence of a sub-fragment of the C-terminal thioester-cleaved fragment of human alpha-2-macroglobulin (A2M), wherein the molecular weight of said polypeptide is of 36 to 44 kDa, and wherein the first N-terminal amino acid of said polypeptide is an amino acid, which, in the full length sequence of said human A2M, is at a position 1,098 or 1,085 or 1,084 or 1,083, and the last C-terminal amino acid of said polypeptide is an amino acid, which, in the full length sequence of said human A2M, is one of the last twenty C-terminal amino acids. This polypeptide is differently abundant depending on the stage of liver fibrosis. The application also relates to means deriving therefrom and to the application thereof, notably in the field of hepatitis. | 2014-08-07 |
20140223589 | ANIMAL MODELS OF DUCHENNE MUSCULAR DYSTROPHY - The present invention provides transgenic, large non-human animal models of Duchenne muscular dystrophy, Becker muscular dystrophy, and DMD-associated dilated cardiomyopathy, as well as methods of using such animal models in the identification and characterization of therapies for Duchenne muscular dystrophy, Becker muscular dystrophy, and DMD-associated dilated cardiomyopathy. | 2014-08-07 |