33rd week of 2015 patent applcation highlights part 63 |
Patent application number | Title | Published |
20150229592 | SENDING AND RECEIVING MESSAGE STREAMS FROM OR TO ONE OR MORE COMMUNICATION APPLICATIONS, SERVICES, DEVICES OR INTERFACES - A system for transmission, reception and accumulation of the knowledge packets to plurality of channel nodes in the network operating distributedly in a peer to peer environment via installable one or more role active Human Operating System (HOS) applications in a digital devise of each of channel node, a network controller registering and providing desired HOS applications and multiple developers developing advance communication and knowledge management applications and each of subscribers exploiting the said network resources by leveraging and augmenting taxonomically and ontologically classified knowledge classes expressed via plurality search macros and UKID structures facilitating said expert human agents for knowledge invocation and support services and service providers providing information services in the preidentified taxonomical classes, wherein each of channel nodes communicating with the unknown via domain specific supernodes each facilitating social networking and relationships development leading to human grid which is searchable via Universal Desktop Search by black box search module. | 2015-08-13 |
20150229593 | EMAIL-BASED SOFTWARE DELIVERY - A method, apparatus, and program product are disclosed for dividing, by a processor, a code segment into one or more portions that together form the code segment, generating a plurality of email messages, combining one or more portions of the code segment into an email message of the plurality of email messages, and sending the plurality of email messages to a client to be reassembled on the client. | 2015-08-13 |
20150229594 | MESSAGE CHALLENGE RESPONSE - A system and method are disclosed for registering a email sender for the purpose of sending an email message to an email receiver including receiving a challenge message wherein the challenge message includes a machine answerable question; processing the challenge message to determine that it is a challenge message sent for the purpose of authorizing delivery of the email message; analyzing the question to determine a valid response to the challenge message; and sending the valid response that includes the answer wherein a nontrivial amount of resources are required to send the valid response. | 2015-08-13 |
20150229595 | SYSTEMS AND METHODS FOR SPAM FILTERING - Systems and methods to reduce false positives in spam filtering. In one aspect, a method includes automatically generating profiles for persons identified in messages, such as incoming and outgoing emails. Messages flagged as spam can be checked against the profile to identify false positives. | 2015-08-13 |
20150229596 | EMAIL THREADING METHOD AND ELECTRONIC DEVICE THEREFOR - An email threading method and an electronic device are provided. The email threading method includes executing an email application, receiving a first email based on the email application, determining arrival of a second email pertaining to the first email at an email server, displaying, when a request is detected, the second email, threading the second email and an email being composed, and transmitting the threaded email to a mail server. | 2015-08-13 |
20150229597 | METHODS FOR OBTAINING A NAVIGATION TRACK BETWEEN A FIRST AND A SECOND LOCATION AT A CLIENT DEVICE USING LOCATION INFORMATION OBTAINED FROM A SERVER DEVICE AND RELATED DEVICES AND COMPUTER PROGRAM PRODUCTS - A client device is operated to obtain a navigation track between a first location and a second location by establishing a communication connection with a server device and receiving a message that contains information associated with the first location and/or the second location from the server device. The information is associated with a navigation module on the client device. The information associated with the first location and/or the second location is processed using the navigation module to obtain the navigation track between the first location and the second location. | 2015-08-13 |
20150229598 | METHOD AND SYSTEM OF SYNCHRONING AN UNREAD MESSAGE IN INSTANT COMMUNICATION - A method and a system of synchronizing an unread message of instant communication are disclosed. The method includes: obtaining information of an unread message in each dialogue associated with an instant messaging account from a server when the account is logged in via a current terminal; and displaying the information of the unread message in the current terminal, wherein the unread message is a message with time information that is larger than a first time stamp in each dialogue, the first time stamp being time information of a most recently read message in each dialogue submitted by the instant messaging account, and the first time stamp corresponding to each dialogue of the instant messaging account being stored in the server. The embodiments of the present disclosure avoid the problem of repeatedly sending unread messages among different terminals and the problem of failing to synchronize statistical information of the unread messages, thus reducing the system resource occupancy in a server and a terminal, achieving a seamless synchronization of information associated with the unread messages among the different terminals, and improving the experience of a user. | 2015-08-13 |
20150229599 | METHODS AND SYSTEMS FOR SHARING EMAIL IN A MULTITENANT DATABASE SYSTEM - A method for sharing an email in a multi-tenant database system is provided. The method receives, at one or more computer systems associated with the multi-tenant database system, the email from a first user; determines, at the one or more computer systems, a database object associated with the email; maps, at the one or more computer systems, the email to the associated database object; and provides viewing access to the email to a second user with access rights to the database object. | 2015-08-13 |
20150229600 | Method, Apparatus, And System For Automatically Prompting User To Sign Up For Microblog - A method, apparatus, and system for automatically prompting a user to sign up for a microblog. The method includes acquiring follow requests that are sent by multiple microblog users to a to-be-invited use. The method also includes creating pre-follow relationships according to the follow requests, and saving the pre-follow relationships between the to-be-invited user and the microblog users that send the follow requests, to generate a pre-follow relationship table. The method also includes sending, in a case in which the number of all pre-follow relationships corresponding to the to-be-invited user is greater than or equal to a first threshold, a prompt message to the to-be-invited user, so as to prompt the to-be-invited user to sign up for the microblog. | 2015-08-13 |
20150229601 | NETWORK ACCESS DEVICE AND METHOD FOR AUTOMATICALLY ESTABLISHING CONNECTION TO A WIDE AREA NETWORK - A network access device (NAD) is configured to automatically establish a connection to a WAN. The NAD tests IP configurations according to a first priority scheme at least until a currently best scoring one of the IP configurations is selected for use to communicate over the WAN. The testing of the IP configurations includes transmitting requests according to a first priority scheme and tracking any replies reflecting which IP configurations are valid. The first priority scheme is for selecting among IP configurations for testing and prioritizing a first type of IP configuration over a dynamically determined type of IP configuration. Which IP configurations of the dynamically determined type that are to be tested are determined by attempting to obtain DHCP leases using different VLAN IDs according to a second priority scheme of VLAN IDs to include in DHCP requests. | 2015-08-13 |
20150229602 | Method for Continuous, Frame-Specific Click-Stream Recording - A method for tracking a user's movements between network addresses can include, subsequent to a request for a (current) network address from a user, receiving the network address and an identifier for a region associated with the network address. The method can also include locating a record that contains the identifier for the region and a time that immediately precedes the request for the network address from the user. The record may further contain a prior network address. The method can further include generating an entry for a table that includes the identifier for the region, the current network address, and the prior network address. A server computer or a client computer can generate the entry. Improved accountability and improved user profile accuracy can be obtained with the method. A data processing system readable medium can comprise code that includes instructions for carrying out the method. | 2015-08-13 |
20150229603 | URI SERVICE SYSTEM AND METHOD - A URI-redirection via machine-scannable-code system and method are provided herein. | 2015-08-13 |
20150229604 | DYNAMIC DHCP FOR WI-FI CONNECTIVITY IN A VEHICLE - A system and a method using the system for wireless communication using a vehicle telematics unit, including the steps of: prior to a vehicle telematics unit establishing a network connection, assigning a temporary internet protocol (IP) address having a short-term lease duration to a mobile device to permit communication between the telematics unit and the mobile device; and if the network connection is not established prior to the expiration of the short-term lease duration, renewing the temporary IP address, wherein the renewal lease duration is shorter than the earlier lease duration. | 2015-08-13 |
20150229605 | Method and Apparatus for Registering Terminal - Provided are a method and an apparatus for registering a terminal. The method includes: after a gateway receives a registration request of a peripheral of a terminal, the gateway authenticating and verifying the peripheral of the terminal; after the authentication and verification are passed, the gateway initiating a remote registration request to a machine-to-machine (M2M) service platform or an M2M application, the remote registration request being used for requesting the M2M service platform or the M2M application to register the peripheral of the terminal to the M2M service platform or the M2M application. Based on the technical solutions, technical problems such as low security and privacy in M2M network communications in the related art are solved, and registration of a terminal is locally verified, thereby further improving the security and privacy in M2M network communications. | 2015-08-13 |
20150229606 | SECURELY VIRTUALIZATING NETWORK SERVICES - Services in a network device are added through providing virtual environments. Virtualization allows services based on other platforms or architectures to be run with minimum modification and in a secure manner. Connecting services to the host through a stateful firewall allows dynamic integration, and passes only traffic of interest to the service. Virtualization allows services written for different instruction architectures to be supported. Multiple virtualized environments each supporting a service may be run. | 2015-08-13 |
20150229607 | BILATERAL FIREWALL TRAVERSAL METHOD FOR ADVANCED DOMAIN NAME SYSTEM - The present invention provides an Advanced Domain Name System for implementing method of data transfer between TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) in transport layer for IP protocols in application layer of the Communications Protocol, and also provides bilateral firewall traversal method between a PC and a server for traversing NAT (Network Address Translator) firewall. | 2015-08-13 |
20150229608 | METHOD FOR CONFIGURING NETWORK NODES OF A TELECOMMUNICATIONS NETWORK, TELECOMMUNICATIONS NETWORK, PROGRAM AND COMPUTER PROGRAM PRODUCT - A method for configuring network nodes of a telecommunications network includes configuring a remote network node of a plurality of remote network nodes based on a first set of configuration parameters; authenticating the remote network node based on an encryption information obtained from an encryption information infrastructure; configuring a firewall entity of a plurality of firewall entities based on a second set of configuration parameters, wherein the configuration of the firewall entity is initiated by the remote network node based on an initial configuration message being sent directly or indirectly from the remote network node to the firewall entity; and authenticating the configuration of the firewall entity based on the encryption information of the remote network node, the encryption information being obtained by the firewall entity directly or indirectly from the remote network node with the initial configuration message. | 2015-08-13 |
20150229609 | EVALUATING A QUESTIONABLE NETWORK COMMUNICATION - Identifying a questionable network address from a network communication. In an embodiment, a network device receives an incoming or outgoing connection request, a web page, an email, or other network communication. An evaluation module evaluates the network communication for a corresponding network address, which may be for the source or destination of the network communication. The network address generally includes an IP address, which may be obtained from the payload section of a network packet. The evaluation module determines one or more properties of the network communication, such as time of day, content type, directionality, or the like. The evaluation module then determines whether the properties match or are otherwise allowed based on properties specified in the white list in association with the IP address. | 2015-08-13 |
20150229610 | EVENT AGGREGATION IN A DISTRIBUTED PROCESSOR SYSTEM - A method in a security device for processing network flows includes storing local counter values for one or more events and providing global event counters to maintain event statistics for events in the security device. In one embodiment, the method stores local counter value of an event for each packet processor reporting the event in a counter memory and the method sums the local counter values of an event stored in the counter memory to generate the global counter sum value for the event. In another embodiment, the method compares the global counter sum to a threshold value to put the event in a conforming state or non-conforming state. The method sends a multicast message to the interested packet processors indicating an event has transitioned to a non-conforming state. | 2015-08-13 |
20150229611 | KEYWORD ORDERED STORAGE, SEARCH AND RETRIEVAL ON ENCRYPTED DATA FOR MULTIUSER SCENARIO - A method and system for a multi-user searchable encryption system over ordered keywords is disclosed. The system includes a key generation server which issues a primary key to a user terminal device and a secondary key to a proxy server. A trapdoor is sent by the user terminal and received by the proxy server. The trapdoor is encrypted at the proxy server. The proxy server receives cypher text from the user terminal and sends the cypher text to the database server. A search keyword inputted by the user at the user terminal is used to perform a lookup in encrypted data. | 2015-08-13 |
20150229612 | SECURE PROTOCOL FOR PEER-TO-PEER NETWORK - A wireless computing device operating as a controller of a peer-to-peer group configured to generate unique master keys for each device joining the group. The wireless computing device may use the unique master keys to selectively remove remote devices from the group such that the remote device cannot later rejoin the group. Other remote devices, each possessing a master key that remains valid, can disconnect from the group and later reconnect to the group without express user action. To support such behavior, the wireless device may provide a user interface through which a user may manage connected remote devices by providing commands to selectively disconnect or remove remote devices from the group. | 2015-08-13 |
20150229613 | METHODS AND APPARATUS TO PROVIDE EXTENDED OBJECT NOTATION DATA - Methods and apparatus to provide extended object notation data are disclosed. An example apparatus includes a data handler having a first input to receive object data and a first output to output an object notation key-value pair for the object data; a string processor having a second input coupled to the first output and a second output to convey the object notation key-value pair without string literals; and a hashing and encryption handler having a third input coupled to the second output and a third output to convey the key-value pair signed with a private key, to convey the key-value pair encrypted with a public key, and to convey an indication that the encrypted key-value pair is encrypted in a key of the encrypted key-value pair. | 2015-08-13 |
20150229614 | DATA ENCRYPTION CIPHER USING ROTATING PORTS - A streaming one time pad cipher using rotating ports for data encryption uses a One Time Pad (OTP) to establish multiple secure point-to-point connections. This can be used to implement a streaming OTP point-to-point firewall, virtual private network or other communications facility for communicating secure information across one or more insecure networks. | 2015-08-13 |
20150229615 | PRIVACY SYSTEM - The disclosure relates generally to mobile device applications, and more particularly, to a privacy system for a mobile device application. In one embodiment, a computer-implemented method of sending and receiving encrypted messages between users within an associated group of users is provided. The method includes: receiving a first message from a first user within the group of users, wherein the first message includes proprietary information; encrypting the first message into ciphertext; transforming the ciphertext into a second message, wherein the second message includes quotidian information; and sending the second message to a second user within the group of users. Once the second user receives the second message, the second user will assay the second message to be an encryption of an unknown first message. The second message is received from the second user, and is decrypted into the first message, which is displayed to the second user. | 2015-08-13 |
20150229616 | HOME NETWORK CONTROLLING APPARATUS AND METHOD TO OBTAIN ENCRYPTED CONTROL INFORMATION - A network control apparatus and method is provided. The method includes operations of informing a server of capability information including an encryption/decryption method, wherein the server provides the network control apparatus with control information used to control a network device using a general-purpose control web application, transmitting to the server a control information requesting message that requests the control information, receiving from the server the control information which has been encrypted using the encryption/decryption method, decrypting the encrypted control information according to the encryption/decryption method, and transmitting a control command for controlling the network device according to the decrypted control information. | 2015-08-13 |
20150229617 | Method and System for Metadata Analysis and Collection with Privacy - A system and method for metadata analysis and collection with privacy is disclosed. According to one embodiment, a trusted third party (TTP) system generates and transmits authorization keys to a government agency (GA) system and a communication service provider (CSP) system. The TTP system receives index records referencing records of subscribers from the CSP system and ingests the index records received from the CSP system. The TTP system receives a target index request from the GA system and sends a metadata record request to the CSP system based on the target index request. The CSP system sends metadata records to the TTP system, and the TTP system delivers the metadata records to the GA system. The metadata records are encrypted with encryption keys shared between the GA system and the CSP system such that the TTP system cannot decrypt the metadata records. | 2015-08-13 |
20150229618 | System and Method for Securing Source Routing Using Public Key based Digital Signature - Embodiments are provided for securing source routing using public key based digital signature. If a protected source route is tampered with, a public key based method allows a downstream node to detect the tampering. The method is based on using digital signatures to protect the integrity of source routes. When creating a source route for a traffic flow, a designated network component computes a digital signature and adds the digital signature to the packets. When the packets are received at a node on the route, the node uses the digital signature and a public key to verify the source route and determines accordingly whether the source route has been tampered with. If tampering is detected, the receiving node stops the forwarding of the packets. | 2015-08-13 |
20150229619 | TRUSTED EXECUTION WITHIN A DISTRIBUTED COMPUTING SYSTEM - Methods for enforcing confidentiality and integrity of code and data while running the code over the data in a distributed computing system are described. In an embodiment each machine which processes data within the system provides a secure sub-system which is protected from other parts of the machine and which receives encrypted data and encrypted code, processes the data using the received code and outputs encrypted data. When establishing the secure sub-systems, keys are exchanged between the client and secure sub-systems and the secure sub-systems provide an attestation confirming the identity of the code running in the secure sub-systems and confirming that the code is running on genuine secure sub-systems. In another embodiment a data-flow computation system is described in which chunks of input data, each comprising an identifier, are authenticated/encrypted. The identifiers are used within the system to confirm that each chunk is processed exactly once. | 2015-08-13 |
20150229620 | KEY MANAGEMENT IN MACHINE TYPE COMMUNICATION SYSTEM - A MTC device ( | 2015-08-13 |
20150229621 | ONE-TIME-PAD DATA ENCRYPTION IN COMMUNICATION CHANNELS - The present disclosure provides method and apparatus for protecting data transmitted in the communication channels between plurality of sender-devices and plurality of receiver-devices. The protection is achieved by using encryption with one-time-pad encryption keys, where such keys are distributed using one or more special media servers, and the protection of communications between such media server and plurality of devices is achieved using personal one-time-pad keys. | 2015-08-13 |
20150229622 | SHUTTING DOWN ACCESS TO ALL USER ACCOUNTS - Disclosed is a system and associated method or restricting access to a user's account via one or more account access channels. The system typically includes a processor, a memory, and an access restriction module stored in the memory. The module is typically configured for: integrating one or more account access channels associated with the user's account with an access restriction procedure; receiving a request from the user to implement the access restriction procedure; based on receiving the request from the user to implement the access restriction procedure, implementing the access restriction procedure, wherein implementing the access restriction procedure comprises restricting access to the user's account via the account access channel(s). | 2015-08-13 |
20150229623 | USER AUTHENTICATION BASED ON HISTORICAL TRANSACTION DATA - Embodiments are directed to systems, methods and computer program products for providing user authentication based on transaction data. Embodiments receive from a user, a request to execute a user action associated with an application, wherein execution of the user action requires validation of authentication credentials; collect a transaction set of data comprising information related to transactions conducted by the user; collect a location set of data comprising information related to a physical location of the user; determine a transaction proximity score associated with the user and the transactions; determine a level of authentication associated with the determined transaction proximity score; determine which authentication types are associated with the level of authentication; request authentication credentials; receive authentication credentials from the user; validate the authentication credentials, thereby resulting in a successful validation of the authentication credentials; and, in response to the successful validation of the authentication credentials, execute the user action. | 2015-08-13 |
20150229624 | USER AUTHENTICATION BASED ON HISTORICAL USER BEHAVIOR - Embodiments are directed to systems, methods and computer program products for providing user authentication based on historical user patterns. Embodiments receive from a user, a request to execute a user action associated with an application, wherein execution of the user action requires validation of authentication credentials; collect a set of data comprising information related to usage patterns associated with the apparatus of the user; determine a user pattern score associated with the user; determine a level of authentication; determine which authentication types are associated with the level of authentication; request authentication credentials corresponding to the authentication types; receive authentication credentials from the user; validate the authentication credentials, thereby resulting in a successful validation of the authentication credentials; and, in response to the successful validation, execute the user action. | 2015-08-13 |
20150229625 | AUTHENTICATION LEVEL OF FUNCTION BUCKET BASED ON CIRCUMSTANCES - Embodiments are directed to systems, methods and computer program products for assigning a level of authentication to an authentication bucket. Embodiments determine a current level of authentication corresponding to a first authentication bucket comprising a plurality of mobile banking functions; collect a set of circumstantial data corresponding with the apparatus; determine a circumstances score based at least in part on the set of circumstantial data; and determine whether the current level of authentication corresponding to the first authentication bucket is appropriate based at least in part on the circumstances score. | 2015-08-13 |
20150229626 | Applying Geographical Limitations to Control Actions Of A Security System - Apparatus for applying geographical limitations to control actions of a security system is described. The apparatus receive location data from a user device, determines whether location data has the user device within a predetermined distance range from the security system and cause a message to be sent to the security system to perform the control action specified in the request when the processor determines that the user device is within the predetermined distance range. | 2015-08-13 |
20150229627 | COMMUNICATION APPARATUS, COMMUNICATION SYSTEM, METHOD OF CONTROLLING COMMUNICATION APPARATUS, AND STORAGE MEDIUM - A communication apparatus comprises an obtainment unit configured to obtain authentication information from each of a first other communication apparatus and a second other communication apparatus; an authentication unit configured to, based on the authentication information obtained by the obtainment unit, perform authentication processing; and a provision unit configured to provide, based on a result of the authentication processing, information of a third other communication apparatus associated with the first other communication apparatus to a fourth other communication apparatus associated with the second other communication apparatus. | 2015-08-13 |
20150229628 | SYSTEM, METHOD AND ARCHITECTURE FOR PROVIDING INTEGRATED APPLICATIONS - A hosted application may be integrated into a multi-tenant system with minimal user efforts. Responsive to a first click from a user, an integrated applications container (IAC) may call an IAC proxy server requesting installation of the hosted application. The IAC proxy server may send an installation request to an application registry and receive an object containing an authorization universal resource locator (URL). The IAC proxy server may provide an interface to an authorization server and redirect the user's browser to the authorization URL. The authorization server may receive a second click from the user, indicating an authorization for the hosted application to access resources associated with the user in the multi-tenant system. The authorization server may operate to obtain an access token and communicating the authorization to the application registry which, in turn, may indicate completion of the installation of the hosted application into the multi-tenant system. | 2015-08-13 |
20150229629 | Method and System for Identity-Based Authentication of Virtual Machines - A cloud computing system configured to run virtual machine instances is disclosed. The cloud computing system assigns an identity to each virtual machine instance. When the virtual machine instance accesses initial configuration resources, it provides this identity to the resources to authenticate itself. This allows for flexible and extensible initial configuration of virtual machine instances. | 2015-08-13 |
20150229630 | Systems And Methods For Managing Disclosure Of Protectable Information - A server and one or more portals cooperate with a first registered agency, an administrator of the first registered agency, a second agency, and an administrator of the second registered agency to determine whether access to protectable information should be granted to a registered requester. | 2015-08-13 |
20150229631 | Caller Validation - A computer system supports a validation system that enables a business client to validate a business associate who has called the client using a pass phrase. The computer system manages one or more pass phrases that have been previously configured by the business client. The client can then challenge a caller (the purported business associate) with the phrase or keyword to make sure the caller is actually the authorized business associate before providing any sensitive information. Management of phrases and/or keywords may include a computer-executable process where in the client may set up phrases (for example, a challenge question and a corresponding answer) or keyword through an on-line application, telephone, e-mail or any other suitable communication mechanism. The business client may have an option to change, delete or create phrases and/or keywords at any time through appropriate security measures. | 2015-08-13 |
20150229632 | SECURITY DEVICE AND CONTROLLING METHOD THEREOF - A security device and controlling method thereof are provided. The security device includes: a storage configured to store a plurality of passwords, wherein a complexity of the passwords increases according to a security level; an inputter configured to receive a password input by a user; a detector configured to detect a security level of the received password by comparing the received password and the plurality of passwords stored in the storage; and a controller configured to provide an authority to access an element of an electronic device connected with the security device according to the detected security level. | 2015-08-13 |
20150229633 | METHOD FOR IMPLEMENTING LOGIN CONFIRMATION AND AUTHORIZATION SERVICE USING MOBILE USER TERMINAL - The present invention relates to a method of controlling a login access to a web server. The method enables a user to actively prevent an illegal login to a web server by transmitting a message indicating a login to the web server to a user terminal and blocking and restricting the re-login of the web server by the same user ID and password for a set access control time if a login to the web server by an illegal third-party is confirmed, and personal information to be efficiently protected by notifying the login to the web server and performing a forcible logout from the web server using only a user ID and a user terminal number. | 2015-08-13 |
20150229634 | IMAGE FORMING APPARATUS CAPABLE OF EXECUTING AUTHENTICATION PROCESSING, METHOD OF CONTROLLING THE SAME, AND STORAGE MEDIUM - An image forming apparatus that is capable of executing authentication processing improved in security of a command including authentication information, which is received over a network from an external apparatus. A CPU receives a command including authentication information via a network. The CPU determines whether or not authentication information included in the received command is a hash value. The CPU causes processing in accordance with the received command to be executed depending on authentication performed based on the authentication information when it is determined that the authentication information is a hash value, and causes the processing not to be executed when it is determined that the authentication information is not a hash value. | 2015-08-13 |
20150229635 | METHOD AND SYSTEM FOR CREATING A VIRTUAL SIP USER AGENT BY USE OF A WEBRTC ENABLED WEB BROWSER - A method for creating a virtual SIP user agent by use of a webRTC enabled web browser ( | 2015-08-13 |
20150229636 | SINGLE SIGN-ON PROCESSING FOR ASSOCIATED MOBILE APPLICATIONS - Systems, methods and computer-readable media are disclosed for performing single sign-on processing between associated mobile applications. The single sign-on processing may include processing to generate an interaction session between a user and a back-end server associated with a mobile application based at least in part on one or more existing interaction sessions between the user and one or more back-end servers associated with one or more other mobile applications. In order to establish an interaction session with an associated back-end server, a mobile application may leverage existing interaction sessions that have already been established in connection with the launching of other associated mobile applications. | 2015-08-13 |
20150229637 | TERMINAL AUTHENTICATION SYSTEM AND METHOD FOR VEHICLE NETWORK CONNECTION - A terminal authentication method for vehicle network connection is disclosed. The terminal authentication method includes acquiring unique identification information of a terminal, generating a certificate of network authentication using the unique identification information, copying the generated certificate of network authentication in the terminal, and performing authentication of the terminal access to a network using a network authentication application in the terminal and the copied certificate of network authentication. | 2015-08-13 |
20150229638 | MOBILE CLOUD SERVICE ARCHITECTURE - Techniques are described for implementing a cloud computer system to facilitate communication between a computing device (e.g., a mobile computing device) and enterprise computer systems. In certain embodiments, the cloud computer system may receive, from a computing device, a request for a service provided by an enterprise computer system. The cloud computer system may determine security authentication of a user for the requested service. A security protocol may be determined for a requested enterprise computer system and a security token may be generated for the request according to the determined security protocol. The request may be sent to the requested enterprise computer system. In some embodiments, security authentication for a request to an enterprise computer system may be determined based on previous authentication. The cloud computer system may be configured to communicate with several different enterprise computer systems according to their supported protocols (e.g., communication protocol and/or security protocol). | 2015-08-13 |
20150229639 | System and Method for Using Credentials of a First Client Station to Authenticate a Second Client Station - Described are methods that allow credentials of a first client station to authenticate a second client station. An exemplary method includes associating a first client station with a second client station, the first client station including credential information, the associating authorizing the second client station to use the credential information, transmitting, by the second client station, an association request to a network, the network utilizing the credential information to authorize a connection, the second client station configured to perform a proxy functionality for requests received from the network to be forwarded to the first client station and responses received from the first client station to be forwarded to the network, determining, by the network, whether the credential information received from the second client station is authenticated and establishing a connection between the second client station and the network using the credential information of the first client station. | 2015-08-13 |
20150229640 | SECURITY MODEL FOR INDUSTRIAL DEVICES - Systems and/or methods are described relating to a security model that provides interoperability with foreign security domains while remaining scalable to small embedded devices. A security token service is provided, which is configured to issue, renew, and/or validate security tokens in response to a token request. A communication protocol, corresponding message structures, and the security tokens are defined in accordance with protocol buffer definitions. | 2015-08-13 |
20150229641 | MIGRATION OF A SECURITY POLICY OF A VIRTUAL MACHINE - According to an example, an apparatus for Virtual Machine (VM) security policy migration includes a migration detecting module, a locating module and a security policy managing module. The migration detecting module is to receive a VM migration report from a VM management apparatus, wherein the VM migration report includes a location parameter of a VM. The locating module is to determine, according to the location parameter of the VM and a locating function, an old security device and a new security device that the VM belongs to before and after the migration. If the old security device and the new security device are not the same security device, a notification is transmitted to the security policy managing module, and a security policy of the VM on the old security device is issued to the new security device. | 2015-08-13 |
20150229642 | CONTROLLING ACCESS TO STORAGE DEVICES SHARED BY HOST SYSTEMS - To control access to a source storage device shared by a plurality of host systems, methods and systems include confirming a presence of an application on each host system of the plurality of host systems accessing the storage device. After confirming the presence of the application on each host system accessing the storage device, the application is run allowing each host system to access the storage device. A request is received from a new host system to access the storage device. A presence of the application is verified on the new host system. If the presence of the application is verified on the new host system, the new host system is provided with access to the storage device. If the presence of the application is not verified on the new host system, the new host system is denied access to the storage device. | 2015-08-13 |
20150229643 | Sensor Sharing Control - A mechanism is provided for sensor sharing control dynamically. One or more sensor use permissions are received from one or more sensor provider terminals. For each sensor use permission, a sensor use permission is recorded in an authorization policy thereby forming a set of authorization policies. A use request is recorded for sensor use request information received from a sensor user terminal in a request policy. A search is performed for any authorization policy in the set of authorization policies that matches the request policy. Responsive to identifying the authorization policy that matches the request policy, a list of sensors included in the sensor use permissions of an authorization policy that matches the request policy is created. The list of sensors is transmitted to the sensor user terminal, where the search is performed again dynamically when the request policy or one of the set of authorization policies is changed. | 2015-08-13 |
20150229644 | ACCESS CONTROL METHOD AND ACCESS CONTROL SYSTEM - Provided is an access control method of a terminal which is coupled with an administration device in a schedule storage unit, location information corresponding to a timestamp of a possessor of a terminal. The terminal acquires location information and timestamp information, and transmits to the administration device an identifier of the possessor of the terminal, the location information, and the timestamp information. The administration device compares the received user's identifier, the received location information, and the received timestamp information, with location information which corresponds to the timestamp of the possessor. If it is determined that a conflict has occurred with the location information and the timestamp information, a current task state of the possessor is estimated from history information of a person associated with the possessor, and the task state is transmitted to the terminal. The terminal controls access to applications and data according to the received task state. | 2015-08-13 |
20150229645 | CLOUD SERVICE CUSTOM EXECUTION ENVIRONMENT - Techniques are described for implementing a cloud computer system to provide access to a custom execution environment for execution of custom executable instructions. Users may be able to configure one or more different types of template execution environments, e.g., a virtual machine environment, each of which can be used to establish a type of custom execution environment. Users may configure the template execution environment with regard to settings, states, resources, permissions, or other criterion related to an execution environment. Upon request, a custom execution environment (e.g., a child execution environment) may be established for running one instance of a custom executable instruction. The custom execution environment may be based on the template execution environment. The custom execution environment may provide a secure, isolated environment for execution of a custom executable instruction. Access permissions for the custom execution environment may be configurable depending on a type of execution environment desired. | 2015-08-13 |
20150229646 | SYSTEMS AND METHODS FOR PROVIDING NETWORK SECURITY USING A SECURE DIGITAL DEVICE - A system may include a traffic interception module configured to intercept network traffic of a host device. A traffic virtualization module may be configured to generate a virtual file on the host device containing the intercepted network traffic. A security system interface module may be configured to provide the virtual file to a secure digital security system over a virtualized file interface coupling the host device to the secure digital security system, and to receive instructions to allow or to deny the network traffic from the secure digital security system over the virtualized file interface. A traffic access management module may be configured to allow or to deny the network traffic based on the instructions. | 2015-08-13 |
20150229647 | DOCUMENT EVENT NOTIFICATIONS BASED ON DOCUMENT ACCESS CONTROL LISTS - A content management system manages documents such that a document is received and stored in the content management system. Access privileges (e.g., an Access Control List) to the document are defined for one or more users of the content management system. An occurrence of a document life cycle event with respect to the document is detected and a distribution list is generated for notifying the one or more users of the document life cycle event based on the access privileges of the one or more users. | 2015-08-13 |
20150229648 | DOCUMENT EVENT NOTIFICATIONS BASED ON DOCUMENT ACCESS CONTROL LISTS - A content management system manages documents such that a document is received and stored in the content management system. Access privileges (e.g., an Access Control List) to the document are defined for one or more users of the content management system, An occurrence of a document life cycle event with respect to the document is detected and a distribution list is generated for notifying the one or more users of the document life cycle event based on the access privileges of the one or more users. | 2015-08-13 |
20150229649 | Systems and Methods for Network Filtering in VPN - Described are systems and methods for managing network packet traffic between a client device and an enterprise server. A list of enterprise-authorized applications is maintained. Data packets, such as TCP and UDP data packets, communicated from applications running on the device are analyzed to determine an originating application corresponding to each packet. The originating application is compared to the list of authorized applications, and a VPN tunnel is created for the packet to access the enterprise server if the corresponding originating application is an authorized application. | 2015-08-13 |
20150229650 | USER AUTHENTICATION BY GEO-LOCATION AND PROXIMITY TO USER'S CLOSE NETWORK - Embodiments provide user authentication based on proximity to a close network of a user. Embodiments receive from a user a request to execute a user action associated with an application, wherein execution of the user action requires validation of one or more authentication credentials; collect a set of data comprising information related to a physical location of the user; determine a close network score associated with the user; determine a level of authentication associated with the close network score; determine which one or more authentication types are associated with the level of authentication associated with the close network score; request one or more authentication credentials corresponding to the determined one or more authentication types; receive credentials from the user; validate the credentials, thereby resulting in a successful validation of the credentials; and, in response to the successful validation of the credentials, execute the user action. | 2015-08-13 |
20150229651 | METHODS AND SYSTEMS FOR CONTROLLING ACCESS TO COMPUTING RESOURCES BASED ON KNOWN SECURITY VULNERABILITIES - Methods and systems are provided for fine tuning access control by remote, endpoint systems to host systems. Multiple conditions/states of one or both of the endpoint and host systems are monitored, collected and fed to an analysis engine. Using one or more of many different flexible, adaptable models and algorithms, an analysis engine analyzes the status of the conditions and makes decisions in accordance with pre-established policies and rules regarding the security of the endpoint and host system. Based upon the conditions, the policies, and the analytical results, actions are initiated regarding security and access matters. In one described embodiment of the invention, the monitored conditions include software vulnerabilities. | 2015-08-13 |
20150229652 | METHOD AND APPARATUS FOR REPORTING A VIRUS - According to an example, a client device determines at least one virus sample according to at least one anti-virus engine, transmits sample information of the at least one virus sample to a server, such that the server determines a first virus sample set needs to be reported according to the sample information of the at least one virus sample and a predefined sample information list in the server, and returns to the first virus sample set to the client device. The client device receives the first virus sample set needs to be reported and performs a virus reporting operation according to the virus sample set. | 2015-08-13 |
20150229653 | Device, System and Method for Processing Virus Files - A device for processing a virus file, including a memory, and a processor in communication with the memory, the memory stores a virus file information providing instruction, a cleaning instruction, an isolating instruction and a transferring instruction, which are executable by the processor; the virus file information providing instruction indicates to provide virus file information; the cleaning instruction indicates to clean a virus file in a User Equipment (UE) corresponding to the virus file information, based on the virus file information; the isolating instruction indicates to provide isolation space, and utilize the isolation space to isolate the virus file, and the transferring instruction indicates to transfer the virus file, which is cleaned based on the cleaning instruction, to the isolation space. | 2015-08-13 |
20150229654 | SECURED TRANSACTIONS IN INTERNET OF THINGS EMBEDDED SYSTEMS NETWORKS - A secure network enabled device has a distinct security module and lacks a human user input interface. The security module is formed in an integrated circuit. The security module is initialized. Data is electronically communicated to and from the secure network enabled device via at least one transceiver. The security module is configured to test the integrity of a subset of the data communicated to the secure network enabled device, and the security module is configured to test the integrity of a transaction protocol, which governs the stream of data bits of the data communicated to the secure network enabled device. | 2015-08-13 |
20150229655 | SYSTEMS AND METHODS FOR INFORMING USERS ABOUT APPLICATIONS AVAILABLE FOR DOWNLOAD - A computer-implemented method for informing users about applications available for download may include (1) identifying, through sharing functionality provided by an operating system, shared content that identifies an application hosted by an application distribution platform, (2) in response to identifying the shared content, obtaining security information about the identified by the shared content, and (3) informing, prior to a user downloading the application, the user of the obtained security information about the application to enable the user to make an informed decision about whether to download the application. Various other methods, systems, and computer-readable media are also disclosed. | 2015-08-13 |
20150229656 | SYSTEMS AND METHODS FOR DISTRIBUTED THREAT DETECTION IN A COMPUTER NETWORK - A method and apparatus for distributed threat detection in a computer network is described. The method may include receiving, by a threat detection system of a first computer network, a request for a service from a threat sensor of a second computer network, the service requested of the threat sensor within the second computer network from a network element of the second computer network. The method may also include emulating the service identified in the request to generate a response to the request, and sending the response to the threat sensor for forwarding to the network element within the second computer network. Furthermore, the method may include analyzing one or more communications between the threat detection system and the network element during emulation of the service requested by the network element to determine whether the network element is a threat to the second network. | 2015-08-13 |
20150229657 | METHOD AND SYSTEM FOR DYNAMIC PROTOCOL DECODING AND ANALYSIS - A method for dynamically decoding protocol data on a computer system is provided using a protocol decoder, which inspects and analyzes protocol data received by the computer system. A protocol decoding program controls the decoding and analysis process. The method may be used by an intrusion prevention system to identify anomalous protocol data that may cause harm to applications receiving the data. | 2015-08-13 |
20150229658 | SMART POWER BACKGROUND TO VALIDATE USER - Technologies are generally described to implement intrusion detection based on smart power background. In some examples, upon detection of an attempt to access a resource, a power line ambiance may be determined at a location of a device on which the attempt to access the resource is executed. The power line ambiance may be based on a connection of the device and/or one or more other devices at the location to a power line. The captured/received power profiles may identify device signatures enabling generation of a digest of the location. An intrusion detection system (IDS), may receive the digest of the location and compare the digest to previous digests associated with an authorized client of the resource to evaluate an authenticity of the attempt. If the authenticity of the attempt is suspicious, the IDS may elevate security by employing one or more verification levels and/or one or more authentication techniques. | 2015-08-13 |
20150229659 | PASSIVE DETECTION OF MALICIOUS NETWORK-MAPPING SOFTWARE IN COMPUTER NETWORKS - A method includes, in a computer network that includes multiple endpoints, configuring a network element to forward one or more specified packets from a selected endpoint to a detection unit. A malicious network-mapping software running on the selected endpoint is identified by analyzing the forwarded packets in the detection unit. | 2015-08-13 |
20150229660 | Method for Monitoring Security in an Automation Network, and Automation Network - An automation network includes a plurality of data processing devices that are connected to one another for data communication. At least one data processing device in a first state, from the plurality of data processing devices, is preconfigured such that it generates corresponding messages upon identifying one or more security-relevant events. The messages are transmitted to at least one first software tool configured to record and evaluate the messages to determine whether there is a security-relevant attack on the automation network. The messages are transmitted to a second software tool configured to record and evaluate the messages and to determine whether the corresponding messages are generated by the at least one data processing device. | 2015-08-13 |
20150229661 | METHOD AND SYSTEM FOR CONFIDENT ANOMALY DETECTION IN COMPUTER NETWORK TRAFFIC - The present invention relates to systems and methods for detecting anomalies in computer network traffic with fewer false positives and without the need for time-consuming and unreliable historical baselines. Upon detection, traffic anomalies can be processed to determine valuable network insights, including health of interfaces, devices and network services, as well as to provide timely alerts in the event of attack. | 2015-08-13 |
20150229662 | METHOD AND APPARATUS FOR IDENTIFYING A THREATENING NETWORK - A system and method for identifying a threatening network is provided. The system comprises a network movement before/after algorithm that provides a graphical plot of changes in networks' communications activity from before to after a key event occurs, so that an analyst is able to identify anomalous behavior; a network progression algorithm that provides a graphical plot to analyze behavior in small increments of time without specification or emphasis upon a particular event, so that the analyst is able to see a trend in behavioral changes; a statistical network anomaly ranking algorithm that provides as output a ranked list of the networks; and an anomaly trend graphs algorithm that analyzes and visualizes the networks' anomaly scores over time, so that the analyst is able to see which networks are consistently suspicious, which networks accumulate more suspiciousness in response to an event, and which networks are trending toward more suspiciousness. | 2015-08-13 |
20150229663 | NETWORK INFRASTRUCTURE OBFUSCATION - A shadow network, which can be a virtual reproduction of a real, physical, base computer network, is described. Shadow networks duplicate the topology, services, host, and network traffic of the base network using shadow hosts, which are low interaction, minimal-resource-using host emulators. The shadow networks are connected to the base network through virtual switches, etc. in order to form a large obfuscated network. When a hacker probes into a host emulator, a more resource-intensive virtual machine can be swapped in to take its place. When a connection is attempted from a host emulator to a physical computer, the a host emulator can step in to take the place of the physical computer, and software defined networking (SDN) can prevent collisions between the duplicated IP addresses. Replicating the shadow networks within the network introduces problems for hackers and allows a system administrator easier ways to identify intrusions. | 2015-08-13 |
20150229664 | ASSESSING SECURITY RISKS OF USERS IN A COMPUTING NETWORK - Various embodiments assess security risks of users in computing networks. In one embodiment, a set of input data is obtained. The set of input data comprises at least one of security item interaction data, training interaction data, and technical information for each of a set of users in a plurality of users associated with an entity. The security item interaction data comprises at least one action performed by each of the set of users with respect to at least one computing network-based security item presented to each of the set of users. The set of input data to is compared to a plurality of security risk scoring metrics. Based on this comparison, a security risk score for each of the set of users with respect to a computing network is calculated. | 2015-08-13 |
20150229665 | Social Network Data Removal - A computer-implemented method includes receiving a risk threshold from a protected social entity, and scanning data that is maintained across multiple social networks, where scanning includes identifying data that is associated with the protected social entity. One or more characteristics of the identified data is determined, and based on the one or more characteristics of the data identified across the multiple social networks, a risk to the protected social entity is determined. A request to a social network for the removal of the data associated with the risk is submitted. | 2015-08-13 |
20150229666 | SOCIAL NETWORK PROFILE DATA REMOVAL - A computer-implemented method includes receiving a request to remove data that is associated with a protected social entity. The data maintained on one or more social networks is scanned, where scanning includes identifying data that is associated with one or more social entities. One or more characteristics of the identified data are determined, and a reference to the identified data that indicates the characteristic, is generated for each of the one or more characteristics. A match between the one or more generated references and one or more stored references is identified, where the one or more stored references each reference one or more characteristics associated with the protected social entity, and where the one or more stored references are stored in one or more social risk databases. A request to the one or more social networks to remove the identified data associated with the one or more generated references is submitted. | 2015-08-13 |
20150229667 | SELF-DESTRUCTING CONTENT - Protecting sensitive content, such as business critical documents or other computer files, is disclosed. In various embodiments, upon receiving an indication that a threat pattern associated with a content item has been matched, the protected content “self-destructs”, such as y rendering the content item inaccessible, e.g., at a client and or to a particular user or group of users. | 2015-08-13 |
20150229668 | DEFENSE AGAINST DNS DoS ATTACK - Managing denial-of-service attacks by intercepting a query by a client software executed by a computer to resolve at a DNS server a network address associated with a target computer system, determining if the DNS server is under denial-of-service attack, and providing to the client software, in response to the query, an alternate network address associated with the target computer system if the DNS server is under denial-of-service attack. | 2015-08-13 |
20150229669 | METHOD AND DEVICE FOR DETECTING DISTRIBUTED DENIAL OF SERVICE ATTACK - A method and device for detecting a DDoS attack are provided. The method includes: acquiring data messages received by a server in a real-time manner, and parsing each of the data messages received by the server within a preset time period to extract a feature from the data message; obtaining a ratio of the number of data messages in each protocol type to a total number of the data messages based on the extracted feature; determining whether the ratio of the number of data messages in each protocol type to the total number of the data messages conforms to the ratio baseline corresponding to the protocol type; and determining that the DDoS attack occurs in the server in a case that the obtained ratio does not conform to the ratio baseline corresponding to the protocol type. | 2015-08-13 |
20150229670 | SYSTEMS AND METHODS FOR DETECTING AND PREVENTING FLOODING ATTACKS IN A NETWORK ENVIRONMENT - A method for processing network traffic data includes receiving a packet, and determining whether the packet is a previously dropped packet that is being retransmitted. A method for processing network traffic content includes receiving a plurality of headers, the plurality of headers having respective first field values, and determining whether the first field values of the respective headers form a first prescribed pattern. A method for processing network traffic content includes receiving a plurality of packets, and determining an existence of a flooding attack without tracking each of the plurality of packets with a SYN bit. | 2015-08-13 |
20150229671 | METHODS AND APPARATUS FOR ENHANCING BUSINESS SERVICES RESILIENCY USING CONTINUOUS FRAGMENTATION CELL TECHNOLOGY - A method for enhancing resiliency of a service includes: decomposing at least one component associated with the service into a plurality of corresponding smaller elements; encrypting the elements to generate a corresponding plurality of encrypted elements; decomposing each of the encrypted elements into a corresponding plurality of smaller fragments; replicating each of the fragments; encapsulating the fragments into respective intelligent components, each of the intelligent components corresponding to a given one of the encapsulated fragments, each of the intelligent components being configured to independently determine a location of a first storage element in which to store itself; storing each of the intelligent components; and moving the intelligent components from the first storage element location to a second storage element location. | 2015-08-13 |
20150229672 | Online Music Networking System - An online music networking system that utilizes the internet for coordinating the sharing and listening of music includes a computer having a processor connected to network such as the internet. The system includes a player database that includes player records associated with a plurality of “players” who wish to share music with others through the network. A music database includes music records associated with respective players in the player database. A listener database is includes listener records associated with a plurality of “listeners” who wish to listen to music that is associated with respective players. The player may select to listen to a selected one of his music files as a live stream through the internet. A listener may also listen to the same live stream by becoming a “follower” of the player or selected music file, but may not exercise any control over it. | 2015-08-13 |
20150229673 | APPARATUS AND METHOD FOR DIAGNOSING MALICIOUS APPLICATIONS - An apparatus for diagnosing malicious applications includes: a signature storage unit which stores malicious application executable files, which can be run in a mobile operating system, and common feature information of variant files derived from said malicious application executable files as signature data for diagnosing maliciousness; an information collection unit which collects information corresponding to common feature information from executable files which are targeted for diagnosis and are diagnosed as malicious or not; a diagnosis determination unit which compares the corresponding information collected by the information collection unit with the common feature information stored in the signature storage unit in order to determine whether the application executable files are malicious; and a result provision unit which provides the results of the determination of whether the application executable files are malicious from the diagnosis determination unit. | 2015-08-13 |
20150229674 | PAYMENT CARD INDUSTRY (PCI) COMPLIANT ARCHITECTURE AND ASSOCIATED METHODOLOGY OF MANAGING A SERVICE INFRASTRUCTURE - A system to ensure compliance with data security standards includes a security appliance to perform multiple security functions, with the security appliance including an initial configuration. The system further includes a display unit to provide information of compliance performance of the system on a secure basis. The system also includes a control unit to monitor compliance performance in real-time and to implement additional procedures required based on the monitored compliance to ensure compliance with data security standards. | 2015-08-13 |
20150229675 | LAWFUL INTERCEPTION FOR 2G/3G EQUIPMENT INTERWORKING WITH EVOLVED PACKET SYSTEM - A method, system, and a computer program product for reducing consumption of resources for lawful interception or retention data related to traffic concerning a 2G/3G target mobile connected to a telecommunications network interworking with Evolved Packet System is provided. A first parameter value in traffic for which lawful interception or data retention has been activated is detected at a first node. Based on at least the first parameter value, whether the traffic will be intercepted or retained at a second node crossed by the traffic is evaluated. If the second node will intercept or retain the traffic, the first node foregoes a lawful interception request or retention of intercepted data. | 2015-08-13 |
20150229676 | Communication Receiver - A communication receiver, comprising a first client being configured for reception according to the dynamic adaptive streaming over the hypertext transfer protocol (DASH), and a second client being configured for reception according to the File Delivery over Unidirectional Transport (FLUTE) protocol, wherein the first client is configured to provide a retrieve pattern to the second client, and wherein the second client is configured to retrieve a media content according to the retrieve pattern. | 2015-08-13 |
20150229677 | TRUNKING COMMUNICATION SYSTEM, TRUNKING SERVER, ACCESS NETWORK AND TRUNKING COMMUNICATION METHOD - A trunking communication system, a server, an access network and a trunking communication method are disclosed. The system includes a trunking management server and an access network, the trunking management server includes a trunking call service control module and a connected trunking call media gateway module, where: the trunking call media gateway module is configured to receive service data sent through the access network by a trunking UE, and forward the service data according to a communication type of the service data for implementing user plane communication of the trunking UE; and the trunking call service control module is configured to receive a communication request sent through the access network by a trunking UE, and perform call control and bearer management on the trunking UE according to a communication type of the communication request for implementing control plane communication of the trunking UE. | 2015-08-13 |
20150229678 | INTERNET TELEPHONY WITH INTERACTIVE INFORMATION - A subscriber ( | 2015-08-13 |
20150229679 | DISTRIBUTED MUSIC COLLABORATION - A system for enabling collaboration between musicians includes a server configured to be connected to remote clients via a wide area network. The server is configured to receive session tracks associated with a session, each of the session tracks containing data representative of music created by a music source during the session, and to store those session tracks in a session database that includes a plurality of session data units. Each of the session data units includes session tracks for a session and session metadata associated with the session tracks. The server is further configured to receive instructions from a user to modify the session metadata, and to also provide data representative of the session tracks as modified by the session metadata. | 2015-08-13 |
20150229680 | MOBILE DEVICE FOR PERFORMING MONITORING ON COOPERATIVE SITUATION, METHOD OF PERFORMING MONITORING ON COOPERATIVE SITUATION USING SAID MOBILE DEVICE, AND SYSTEM FOR PERFORMING MONITORING ON COOPERATIVE SITUATION INCLUDING SAID MOBILE DEVICE - A mobile apparatus includes a cooperator detector, a cooperation planner and a cooperation processor. The cooperator detector selects a cooperating mobile apparatus among adjacent mobile apparatuses. The cooperation planner determines a cooperation plan for operating cooperative context monitoring with the cooperating mobile apparatus. The cooperation processor operates the context monitoring based on the cooperation plan. Accordingly, the resource may be efficiently used and the range of the context monitoring may be enlarged. | 2015-08-13 |
20150229681 | TRANSMISSION SYSTEM, TRANSMISSION MANAGEMENT APPARATUS AND NON-TRANSITORY COMPUTER-READABLE INFORMATION RECORDING MEDIUM - A transmission system that manages sessions established among a plurality of transmission terminals. The transmission system includes a terminal information request signal transmission part that transmits, from a first transmission terminal, a terminal information request signal to request information for identifying a third transmission terminal currently establishing a session with a second transmission terminal that is designated by a user as a destination; and a display part that carries out display in such a manner that the user can determine whether to allow the third transmission terminal to establish a session with the first transmission based on information received in response to the terminal information request signal. The information includes first information for identifying a transmission terminal eligible to establish a session with the first transmission terminal and second information that is the information for identifying the third transmission terminal currently establishing the session with the second transmission terminal. | 2015-08-13 |
20150229682 | SYSTEM AND METHOD OF MONITORING, CONTROL AND CONFIGURATION OF SECURITY AND LIFESTYLE DEVICES - A social networking site that communicates with a plurality of human users can also communicate with a plurality of non-human users. Information from one of the non-human users can be automatically received at the site and evaluated. Commands can be automatically transmitted to another of the non-human users in response to the evaluation. A human readable indicator can be posted at a page of the site. | 2015-08-13 |
20150229683 | SOCIAL NETWORK SITE INCLUDING INTERACTIVE DIGITAL OBJECTS - A social network site with enhanced user interaction functionality. In one implementation, a method includes providing a personal page corresponding to a first user, wherein the personal page includes a digital pet module region comprising a representation of an animate object, an indicator of a current state of the animate object, an action selector control, and an action history comprising a user identifier of a previous user and an action selected by the previous user using the action selector control; receiving an indication of a selected action from a current user; modifying the state of a digital pet object based on the selected action; and causing a browser client to render the digital pet module region, the modified state, and an updated action history including an identification of the current user and the action selected by the user. | 2015-08-13 |
20150229684 | SYSTEM AND METHOD FOR EARLY MEDIA BUFFERING USING PREDICTION OF USER BEHAVIOR - A system and method for early media buffering using prediction of user behavior. In accordance with an embodiment, a user interface displays a plurality of media options from which particular options can be selected. A click determination logic is configured so that a first event associated with a particular option, such as a click event, is passed singly to a media application without trapping for the possibility of a double-click. The media application interprets the first event as a likely selection by a user of the particular option, and uses information associated with the likely selection to begin buffering a corresponding media content. If a second event associated with the particular option is received within a subsequent time interval, then the second event is treated, like a double-click, as confirmation of the user's selection, and the corresponding media content is streamed from its media content buffer. | 2015-08-13 |
20150229685 | SYSTEM AND METHOD FOR DELIVERING AN AUDIO-VISUAL CONTENT TO A CLIENT DEVICE - For delivering an audio-visual content to a client device, an interconnecting device interconnecting a first network to a second network, the client device being connected to the second network, an equipment adapted to provide the audio-visual content being connected to the first network, said equipment performs: receiving, from the client device, a first request for receiving the audio-visual content; transmitting a redirecting message to the client device, said redirecting message redirecting the client device toward an agent implemented in the interconnecting device. Furthermore, said agent performs: receiving, from the client device, a second request for receiving the audio-visual content; acting as a relay between said equipment and the client device. | 2015-08-13 |
20150229686 | RETRIEVAL AND DISPLAY OF RELATED CONTENT USING TEXT STREAM DATA FEEDS - Mechanisms are provided for retrieving and presenting related content using text stream data feeds. Text stream data feeds such as caption information associated with media content or conversations associated with social networking applications are aggregated and used to retrieve related media content, text documents, and advertisements. Text stream data feeds that a user is exposed to may indicate that the user is interested or at least primed for particular types of related content. In particular examples, an inverse vector space search engine is used to determine particular pieces of related content and categories of interest. Post filtering may also be applied to the results. | 2015-08-13 |
20150229687 | Active Requesting of Information for Pseudo-Live Performance - Mass amounts of information, such as entire libraries of songs or movies, for example, may be stored locally near end-users, and this information may be accessed and reproduced in response to commands received from a transmitting station via a network. When a radio or television station desires to transmit a song or movie, for example, the radio or television station can, rather than transmitting the entire song or movie, merely transmit a command for reproducing the song or movie. An end-user's performance reproduction device, such as an enhanced radio or a television set, then accesses and reproduces the locally stored song or movie. Since the radio or television station need not transmit the entire performance, network traffic can be significantly reduced. The performance reproduction device may actively request information from the radio or television station when fresh or additional information is needed. | 2015-08-13 |
20150229688 | METHOD AND DEVICE FOR PLAYING STREAMING MEDIA, AND NON-TRANSITORY STORAGE MEDIUM - The present invention discloses a method and a device for playing streaming media, and a non-transitory storage medium, and the method comprises: obtaining an index file of a media stream, wherein the media stream includes the index file and at least two slice files, and time information and address information of each of the at least two slice files are recorded in the index file; obtaining all slice files of the media stream according to the index file; combining and converting all the slice files obtained into a local media file; and playing the local media file by a local media player, wherein, the local media file is of a format supported by the local media player. By the present invention, a media stream of a format not supported by the local media player can be played by the local media player. | 2015-08-13 |
20150229689 | SYNCHRONIZING FILTER METADATA WITH A MULTIMEDIA PRESENTATION - A method, system and apparatus for applying and synchronizing filter information with a multimedia presentation, such as a movie provided in a video-on-demand context, to suppress objectionable content. In one example, filter information, which includes an indicia of a portion of the multimedia presentation including objectionable content and a type of suppression action, is provided on either a set-top-box or a video-on-demand server. A user selects a particular video-on-demand presentation, and the selection is transmitted to the set-top-box. Filtering may take place at the set-top-box side such that the complete video-on-demand movie is transmitted to the set-top box and then content suppression, such as skipping, muting, cropping, and blurring, takes place at the set-top-box. Alternatively, some or all suppression may take place at the server such that some or all of the objectionable content is not transmitted to the set-top-box. Additionally, whether in a video-on-demand, DVD, or other environment it may be necessary to synchronize filter with the multimedia content so that the proper objectionable content is suppressed. | 2015-08-13 |
20150229690 | MEDIA SOURCE IDENTIFICATION - A server machine and a first device (e.g., a television) are configured to access a stream of media (e.g., a broadcast channel) from a media source (e.g., a broadcaster). The server machine generates a representation (e.g., a fingerprint) of the stream of media and stores the representation. The first device plays the stream of media (e.g., for a user) and generates an analog signal based on the stream of media. A second device (e.g., a mobile device of the user) is configured to receive the analog signal and generate a representation of the analog signal. The second device provides the representation of the analog signal to the server machine, which may compare the representation of the stream of media to the representation of the analog signal. Based on the comparison, the server machine may provide an identifier of the media source to the second device. | 2015-08-13 |
20150229691 | APPARATUS AND METHOD FOR MANAGING MEDIA CONTENT - A system that incorporates teachings of the present disclosure may include, for example, a server having a controller to monitor for media content from a first source that is distributable where the media content is adjusted for distribution to a plurality of communication devices that are associated with a user and a portion of the plurality of communication devices use different communication protocols from another portion of the plurality of communication devices, obtain content metadata from the media content, receive a request for information associated with the media content from a first communication device of the plurality of communication devices of the user, compile the information from the content metadata based at least in part on a user profile associated with the user, and transmit the information to the first communication device. Other embodiments are disclosed. | 2015-08-13 |