35th week of 2015 patent applcation highlights part 70 |
Patent application number | Title | Published |
20150244699 | METHOD FOR PEER TO PEER MOBILE CONTEXT AUTHENTICATION - The invention is a system and a method for achieving private, personalized, real-time authentication of one or more networked peer users and their mobile or wearable electronic computing devices through holistic contextual verification of the device, location, proximity, knowledge and behavioral attributes for a defined session, event, object or resource access or mutual user and device identity context verification. | 2015-08-27 |
20150244700 | DISTRIBUTION METHOD, DISTRIBUTION APPARATUS, AND TERMINAL APPARATUS - A distribution method is disclosed. In a distribution method, a program to which a first signature is applied is divided. Control information including restore information pertinent to restoring the program and a second signature to secure divisional files of the program is attached to at least one of the divisional files. Each of the divisional files is sent via the Internet. | 2015-08-27 |
20150244701 | AUTHENTICATION BASED ON PREVIOUS AUTHENTICATIONS - A method and system for authenticating a user to a target server. A request is received from a user computer system to authenticate the user for access to a target server at level N of N levels (N≧2). Each record of a stored authentication plan associated with the user has authentication records each having information relating to authentication of the user for access to N−1 target servers at respective levels 1 through N−1. Each record of a received current authentication plan for the user has authentication records each having current information relating to authentication of the user for access to the N−1 target servers at respective levels 1 through N−1. It is determined that there is at least a partial match between the stored and current authentication plans, and in response, the user is authenticated for access to the target server at level N. | 2015-08-27 |
20150244702 | SYSTEMS AND METHODS FOR SHARING INFORMATION OVER A PRIVATE NETWORK - There is provided a system for sharing information held by personnel within an organization, the system being implemented on a private computer network of the organization. The system has components including a database that connects to the private computer network. The database stores information (such as knowledge, skills and experience) held by personnel of the organization, and also the contact details of the personnel. Also included in the system are remote computers capable of connecting to the private computer network and a computer configured to search the database. The system allows a user of a remote computer to interrogate the database for a desired information, and where the desired information is held by one or more personnel the user of is presented with the name and/or contact details of the personnel holding the desired information. | 2015-08-27 |
20150244703 | CROSS INSTANCE USER AUTHENTICATION ARCHITECTURE - In accordance with disclosed embodiments, there are provided methods, systems, and apparatuses for implementing a cross instance user authentication architecture in an on-demand service environment including, for example, means for receiving a login request at a global Virtual Internet Protocol (VIP) address for the host organization from a client device; forwarding the login request received at the global VIP address to one of a plurality of datacenters within the host organization; determining the selected datacenter is a non-home-geo datacenter for a user associated with the login request received from the client device; establishing a back-end link from the non-home-geo datacenter to a home-geo datacenter for the user; forwarding the login request from the non-home-geo datacenter to the home-geo datacenter via the back-end link for authentication of the client device at the home-geo datacenter responsive to the login request received from the computing device; and returning a response to the client device from the non-home-geo datacenter upon successful authentication of the login request at the home-geo datacenter, wherein the response specifies a re-direct to the home-geo datacenter for the user. Other related embodiments are disclosed. | 2015-08-27 |
20150244704 | TECHNIQUES TO AUTHENTICATE USER REQUESTS INVOLVING MULTIPLE APPLICATIONS - Techniques to authenticate user requests involving multiple applications are described. An apparatus may comprise a logic circuit, and a user interface component operative on the logic circuit to present to a user content from a primary application, handle user commands directed to the primary application, and verify the user to a secondary application using an identifier value that is generated by the primary application for authenticating the user. In one embodiment, the user interface component submits the identifier value to the secondary application in a request for certain content. After determining whether the identifier value is valid, the secondary application provides the requested content or deny the user's request. Other embodiments are described and claimed. | 2015-08-27 |
20150244705 | IMPLEMENTING SINGLE SIGN-ON IN A TRANSACTION PROCESSING SYSTEM - A single sign-on is implemented in an online transaction processing system. A security token extracted from a transaction request is received. The security token is validated and, in response to a positive validation, security information is extracted. The security information is processed to validate the transaction request and a set of validation attributes is generated. The set of validation attributes is stored in a read-only data object. A transaction server is notified of the read-only data object to authorize processing of the transaction request by the transaction server. | 2015-08-27 |
20150244706 | SECURITY OBJECT CREATION, VALIDATION, AND ASSERTION FOR SINGLE SIGN ON AUTHENTICATION - A security object creation and validation system provides an additional factor of authentication. An authentication system as described herein provides secure two-factor authentication, such as for IT resources in an organization. The authentication system can perform generation of a security object (such as an X.509 object, Java object, persistent browser token, or other digital certificate); registration of the generated security object or of an existing security object (such as a near field communication identifier, smart card identifier, OATH token, etc.); validation of the security object as part of an authentication process; and assertion of the identity of the security object to native network resources (such as web resources, network resources, cloud resources, mobile applications, and the like) that may accept the security object. The authentication system may provide user interfaces to allow users and administrators to manage registered device inventory and revoke security objects. | 2015-08-27 |
20150244707 | PROVISIONING DIGITAL CERTIFICATES IN A NETWORK ENVIRONMENT - A method for provisioning digital certificates in a compute service environment may include authorizing a customer entity for using and/or controlling a network resource in the compute service environment. Upon completing the authorization, a digital certificate may be issued to the customer entity. The digital certificate may be associated with the network resource and may be issued for a limited duration period. The use and/or control of the network resource by the customer entity may be monitored. Reissuance of the digital certificate may be conditioned on whether the customer entity is still using and/or controlling the network resource in the compute service environment. If the customer entity is still using and/or controlling the network resource in the multi-tenant environment, the digital certificate may be automatically reissued for another limited duration period. The automatically reissuing may take place without receiving a certificate reissue request from the customer entity. | 2015-08-27 |
20150244708 | SECURE SERVICE DELEGATOR - Systems and methods for a secure service delegator. In some embodiments, an Information Handling System (IHS) operated by a manufacturer of a client device provided to a customer enterprise may include a processor and a memory coupled to the processor. The memory may include program instructions stored thereon that, upon execution by the processor, cause the IHS to: receive, from the client device via a secure connection, a request to obtain a provisioning credential; identify a delegate provisioning server associated with the customer enterprise; and enable the client device to access the delegate provisioning server and to retrieve the provisioning credential from the delegate provisioning server. | 2015-08-27 |
20150244709 | SECURE COMPONENT CERTIFICATE PROVISIONING - A system and method for secure component provisioning implements a three-way transaction to thwart fraudulent component provisioning when a certificate requester is not fully trusted. A certificate authority receives a certificate request for a component from a contract manufacturer and then issues the certificate, sending the issued certificate to a final assembly point for provisioning of the component. | 2015-08-27 |
20150244710 | SECURE DATA HANDLING BY A VIRTUAL MACHINE - A system for executing a virtual machine instance is provided. An executing environment ( | 2015-08-27 |
20150244711 | METHOD AND APPARATUS FOR AUTHENTICATING CLIENT CREDENTIALS - An apparatus and method for storing authentication information on an electronic device are provided. The method includes receiving, by the electronic device, a unique key and a certificate matching the unique key in a secure environment of the electronic device, storing the unique key and the certificate matching the unique key in a secure environment of the electronic device, and wherein at least one of the unique key and the certificate matching the unique key identifies the electronic device. | 2015-08-27 |
20150244712 | GENERATION AND DISTRIBUTION OF SECURE OR CRYPTOGRAPHIC MATERIAL - A user having remote device wants to access an application that requires that the user possess a user application cryptographic credential. If the application needs to verify the identity of the user, the user's remote device performs a cryptographic operation using the user application cryptographic credentials, and sends the result to the application. A configuration for securely distributing the user application cryptographic credentials includes at least one gateway located at an enterprise that is under the control of an enterprise administrator, and a controller that is not located at the enterprise but can be configured by the enterprise administrator to cooperate with the at least one gateway. | 2015-08-27 |
20150244713 | PASSWORD SCHEME THAT CAN BE USED FOR SECURITY OF MODEMS IN AN INDEPENDENTLY OPERATED CABLE SYSTEM THAT IS SCALABLE WITH DYNAMICALLY CHANGEABLE PASSWORDS - A password scheme is provided that can be used for security of cable modems in a cable network. In the system, the password is unique to each modem, the password is not fixed for the life of the device, is not shared across cable systems, is easily recoverable after a compromise, and is changed periodically based on some type of configuration. In the system each modem creates its own random password. Then the modem encrypts the password using a public key provided by the cable system and stores the encrypted password in a Management Information Base (MIB) operated by the cable system. The MIB operator decrypts the encrypted password corresponding to the public key and recovers the password. The cable operator uses the password to log in remotely to the modem. If a compromise or change of the public key or password occurs, the password is regenerated using the same procedure. | 2015-08-27 |
20150244714 | AUTOMATIC SECURITY PARAMETER MANAGEMENT AND RENEWAL - A method of automatic security parameter renewal including determining if a security parameter satisfies a renewal condition and automatically updating the security parameter when the renewal condition is satisfied. | 2015-08-27 |
20150244715 | DEVICE SECURITY UTILIZING CONTINUALLY CHANGING QR CODES - A method provides device access security via use of periodically changing Quick Response (QR) codes. The method includes: generating ( | 2015-08-27 |
20150244716 | SECURING CLIENT-SPECIFIED CREDENTIALS AT CRYPTOGRAPICALLY ATTESTED RESOURCES - Methods and apparatus for securing client-specified credentials at cryptographically-attested resources are described. An indication is obtained that resources deployed for execution of a compute instance of a multi-tenant computing service at an instance host of a provider network meet a client's security criteria. An encrypted representation of credentials to be used at the compute instance to implement operations on behalf of a client is received at the instance host. The credentials are extracted from the encrypted representation using a private key unique to the instance host, used for the operations, and then removed from the instance host without being saved in persistent memory. | 2015-08-27 |
20150244717 | TRUSTED VIRTUAL COMPUTING SYSTEM - In a computing environment that includes multiple virtual machines performing computing tasks for a same entity, the integrity of each of the virtual machines may be synchronized between different virtual machines to create a trusted logic virtual domain for a user. | 2015-08-27 |
20150244718 | BIOMETRIC AUTHENTICATION - Instead of requiring key exchange between a trusted biometric application in a TEE and an external application outside of the TEE that provides access to a secured function, the trusted application is preconfigured with security data such as (in a first implementation) authentication credentials (e.g. a PIN) or (in a second implementation) a cryptographic key. This security data is then used to authenticate a biometric validation obtained by the trusted application to the external application. | 2015-08-27 |
20150244719 | GESTURE-AND EXPRESSION-BASED AUTHENTICATION - A user can define a gesture-based input mode with respective input value to establish an authentication protocol to unlock a computer or govern other computer behavior. As an alternative or in addition, the user can define a second input mode based on face recognition plus IR sensing satisfying a threshold to ensure a live person is being imaged for authentication, and/or face recognition plus a particular facial expression such as a smile and wink. | 2015-08-27 |
20150244720 | SECURITY MANAGEMENT METHOD AND APPARATUS FOR GROUP COMMUNICATION IN MOBILE COMMUNICATION SYSTEM - The present invention relates to a security management method and an apparatus for group communication when a terminal interacts and communicates with a mobile communication system. The security management method for group communication performed in a server, which manages the group communication in the mobile communication system according to one embodiment of the present invention, includes the steps of: generating a session security key for session protection in the group communication, and mapping the session security key to a group identifier for identifying a specific group to which a terminal using the group communication belongs; transmitting the group identifier and the session security key to the terminal; and generating a traffic key for protecting traffic and transmitting the group identifier and the traffic key to the terminal. | 2015-08-27 |
20150244721 | SYSTEM AND METHOD FOR REMOTE DEVICE RECOGNITION AT PUBLIC HOTSPOTS - Described are various embodiments of a system and method in which device-identifying data can be used to uniquely recognize and optionally track and report on device activity at one or more hotspot locations by way of the creation and management of a device profile uniquely associated with such devices and stored in a network accessible knowledge base. | 2015-08-27 |
20150244722 | MOBILE TERMINAL, NETWORK NODE SERVER, METHOD AND COMPUTER PROGRAM - Methods of operating a network node in a wireless local area network, a mobile terminal and a server, respectively, are disclosed. Corresponding computer programs, as well as a network node, a mobile terminal and a server are also disclosed. The network node establishes connection with the mobile terminal; and sends at least one network name to the mobile terminal, wherein the at least one network names correspond to possible public land mobile networks, PLMNs, based on the determined AAA information. The mobile terminal can thus display the network name. | 2015-08-27 |
20150244723 | WLAN user fixed network accessing method and system - A method for a Wireless Local Area Network (WLAN) user to access a fixed network is disclosed, which includes: after the WLAN user is authenticated successfully, a Broadband Network Gateway (BNG) sends obtained user subscription information to a WLAN device; and after the WLAN device performs related configuration according to the user subscription information, a WLAN user terminal accesses a network. A system for a WLAN user to access a fixed network is also disclosed. The present disclosure can solve the problem that a WLAN network cannot perceive the user subscription information and further cannot provide differentiated services based on different users and different subscription information because a WLAN user passes through BNG authentication. | 2015-08-27 |
20150244724 | SERVICE AUTHORIZATION METHODS AND APPARATUSES - An apparatus and method to authorize Application Programming Interface (API) or method level access in system and application services are provided. The method includes receiving a request for access to a service from another service or an application via an interface accessible by the other service or the application, and determining whether to authorize the request based at least in part on a specified policy. | 2015-08-27 |
20150244725 | PARENTAL CONTROLS - A web service platform to improve end-user engagement in a captive audience environment. Mobile and web-based clients allow application users to authorize and approve usage of entitlements of other users, including their children, based upon preconfigured rules and the proximity between the user requesting and the user approving authorization to use the entitlement. | 2015-08-27 |
20150244726 | SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR SECURITY VERIFICATION OF COMMUNICATIONS TO TENANTS OF AN ON-DEMAND DATABASE SERVICE - In accordance with embodiments, there are provided mechanisms and methods for security verification of communications to tenants of an on-demand database service. These mechanisms and methods for security verification of communications to tenants of an on-demand database service can enable embodiments to allow tenants to selectively implement security measures with respect to inbound communications, etc. The ability of embodiments to provide such feature may allow tenants to efficiently and effectively implement security measures for in-bound emails. | 2015-08-27 |
20150244727 | METHOD FOR AUTHENTICATING A SECURITY ELEMENT BY SUPERIMPOSING N SHARED COLOUR IMAGES, AND SECURITY ELEMENT IMPLEMENTING SAID METHOD - A method for authenticating a security element by superimposing N shared colour images in order to obtain at least one target colour may include a phase of constructing an authenticator system that includes a step of selecting a target colour; a step of selecting a series of N decomposition colours which, by means of superimposition, together enable the target colour to be obtained; and a step of recording the N shared images each with a decomposition colour from the series. A security element comprising at least one shared image may be obtained according to the method. | 2015-08-27 |
20150244728 | METHOD AND DEVICE FOR DETECTING MALICIOUS URL - Examples of the present disclosure provide a method and device for detecting a malicious URL, the method includes: a URL detection request is received, contents of a page addressed by a URL in the URL detection request are analyzed, and it is determined that whether the page is a non-text page; when the page is a non-text page, a page image of the page, which is displayed in a browser and addressed by the URL in the URL detection request, is obtained, image detection is performed on the page image, and a page attribute of the URL in the URL detection request is obtained, whether the URL is a malicious URL is determined based on the page attribute of the URL in the URL detection request. | 2015-08-27 |
20150244729 | SYSTEMS AND METHODS FOR OPTIMIZING SCANS OF PRE-INSTALLED APPLICATIONS - A computer-implemented method for optimizing scans of pre-installed applications may include (1) identifying, on a client device, a plurality of applications that are subject to scan-based assessments, (2) determining that the plurality of applications were pre-installed on the client device via a system image for the client device, (3) generating a fingerprint that represents the system image, and (4) fulfilling the scan-based assessments for the plurality of applications by transmitting the fingerprint that represents the system image to an assessment server and receiving, in response, an assessment of the system image. Various other methods, systems, and computer-readable media are also disclosed. | 2015-08-27 |
20150244730 | System And Method For Verifying And Detecting Malware - A system configured to detect malware is described. The system including an infection verification pack configured to perform behavior detonation; identify a malware object based on machine-learning; and select one or more persistent artifacts of the malware on the target system based on one or more algorithms applied to behavior traces of the malware object to select one or more persistent artifacts of the malware on the target system. | 2015-08-27 |
20150244731 | Method And Device For Identifying Abnormal Application - A method and device for identifying an abnormal application are provided. The method includes executing abnormal applications, obtaining dynamic behavior information of the abnormal applications, inputting the dynamic behavior information of the abnormal applications into a preset detection network, obtaining a behavior rule of the dynamic behavior information via the detection network, and identifying a detected application according to the behavior rule to determine whether the detected application is an abnormal application. | 2015-08-27 |
20150244732 | Systems And Methods For Malware Detection And Mitigation - Systems and methods for monitoring malware events in a computer networking environment are described. The systems and methods including the steps of identifying a plurality of suspect objects comprising data about network transactions or computer operations suspected of being linked to a security risk; transmitting the suspect objects to an inspection service operating on one or more general purpose digital computers, wherein the inspection service inspects the suspect objects using a plurality of inspection methods to create digital information about the nature of the potential threat posed by the suspect objects; transmitting said digital information to an analytical service operating on one or more general purpose digital computers, wherein the analytical service performs a plurality of analytical algorithms to categorize the suspect objects with one or more scores for each suspect object based on their security threat; transmitting said one or more scores to a correlation facility which aggregates a plurality of scores, optionally with other information about each suspect objects, into the form of aggregate data representing one or more aggregate features of a plurality of suspect objects; and generating an infection verification pack (IVP) comprising routines which, when run on an end-point machine within the computer networking environment, will mitigate a suspected security threat. | 2015-08-27 |
20150244733 | SYSTEMS AND METHODS FOR BEHAVIOR-BASED AUTOMATED MALWARE ANALYSIS AND CLASSIFICATION - Embodiments relate to systems and methods for behavior-based automated malware analysis and classification. Aspects relate to platforms and techniques which access a set of samples of malware, and extract or capture a set of low-level behavioral artifacts produced by those samples. The low-level artifacts can be used to organize or identify a set of features, based upon which the sample can be classified and/or clustered into different labels, groups, or categories. The artifacts and/or features can be analyzed by one or more selectable algorithms, whose accuracy, efficiency, and other characteristics can be compared to one another for purposes of performing a classification or clustering task. The algorithm(s) can be selected by a user to achieve desired run times, accuracy levels, and/or other effects. | 2015-08-27 |
20150244734 | AUTOMATED INTELLIGENCE GRAPH CONSTRUCTION AND COUNTERMEASURE DEPLOYMENT - Techniques for providing information security threat assessment and amelioration are disclosed. The techniques may include obtaining fundamental data, obtaining document data, preparing fundamental instance nodes from the fundamental data, preparing document nodes from the document data, preparing edges between at least some of the nodes, storing the nodes and the edges in a manner that reflects a graph structure, and causing to be displayed at least a portion of a graph defined by at least one node and at least one edge. | 2015-08-27 |
20150244735 | SYSTEMS AND METHODS FOR ORCHESTRATING RUNTIME OPERATIONAL INTEGRITY - Instrumented networks and platforms having target subjects (devices, transactions, services, users, organizations) are disclosed. A security orchestration service generates runtime operational integrity profiles representing and identifying a level of threat or contextual trustworthiness, at near real time, of subjects and applications on the instrumented target platform. Systems and methods use a graphical user interface (GUI) console to orchestrate operational integrity of a platform. In an embodiment, a method presents a data center-level runtime operational integrity dashboard and remediation controls for infected systems in a display of a platform having a network trust agent, an endpoint trust agent, and a trust orchestrator. The method receives runtime integrity metrics for trust vectors and displays risk indicators based on the confidence level of received integrity metrics in the GUI. The method provides remediation controls for threat containment and risk mitigation and displays remediation status and progress results and malware analytics in the GUI. | 2015-08-27 |
20150244736 | Method and Computing Device for Processing Data - Disclosed is a method for processing data, which includes: obtaining grade of a plug-in; assigning the plug-in into one of a plurality of categories according to the grade of the plug-in; and displaying at least one operation indication and recommended operation information based on the category the plug-in belongs to. A computing device for processing data is also disclosed. | 2015-08-27 |
20150244737 | DETECTING MALICIOUS ADVERTISEMENTS USING SOURCE CODE ANALYSIS - A method for software code analysis includes receiving in a computer ( | 2015-08-27 |
20150244738 | Method and Apparatus for Monitoring Malicious Link Injection Into Website Source Code - A method for monitoring malicious link injection into website source code, may include: monitoring a modification operation on a website source code file and obtaining a changed code segment; analyzing the changed code segment to extract an external link; determining whether the external link is a suspicious or malicious link; and sending an alarm message if it is determined that the external link is a suspicious or malicious link. According to the method for monitoring malicious link injection into website source code, changed content of source code can be monitored in real time, so as to effectively prevent a common type of virus transmission manner in which a malicious redirection website address is injected into page code of a legal website after a system write permission is obtained by using a vulnerability of an operating system or a third-party application. In addition, the present disclosure further provides a related apparatus. | 2015-08-27 |
20150244739 | NETWORK SECURITY ELEMENTS USING ENDPOINT RESOURCES - A method and apparatus for network security elements using endpoint resources. An embodiment of a method includes receiving a request for access to a network at an endpoint server. The method further includes detecting that the request for access to the network includes a request that is unauthorized. The request for access to the network is directed to a network security element. | 2015-08-27 |
20150244740 | METHOD FOR PROVIDING WIRELESS APPLICATION PRIVILEGE MANAGEMENT - A method for providing an administration policy to a user device comprising a plurality of applications, the method comprising centrally generating the administration policy to be implemented in the user device, the administration policy comprising at least one of an application administration policy to be used by at least one of the plurality of applications and a client administration policy for the user device; and providing the generated policy to the user device. | 2015-08-27 |
20150244741 | CLOUD BASED MOBILE DEVICE MANAGEMENT SYSTEMS AND METHODS - The present disclosure relates to cloud based mobile device management (MDM) systems and methods to use the “cloud” to pervasively manage mobile devices. The cloud based MDM systems and methods provide an ability to manage mobile devices with or without MDM clients while no requiring an MDM appliance or service at the enterprise. This provides a “no hardware, no software” deployment. In an exemplary embodiment, a client-less implementation leverages the ActiveSync protocol proxied through distributed cloud nodes to enforce mobile policies. In another exemplary embodiment, a client-based implementation uses a platform specific application and associated application programming interfaces (API) to connect managed mobile devices and provide MDM features through the cloud. Advantageously, the cloud based MDM systems and methods provide reliability and resiliency, elasticity, lower cost, mobility, integration of management and security, and agility over conventional MDM based solutions. | 2015-08-27 |
20150244742 | APPARATUS AND METHOD FOR ESTABLISHING SEAMLESS SECURE COMMUNICATIONS BETWEEN COMPONENTS IN AN INDUSTRIAL CONTROL AND AUTOMATION SYSTEM - A method includes establishing, using a connection policy at a first device, a security association with a second device of an industrial process control and automation system. The method also includes, once the security association is established, activating a process data policy at the first device. The security association is established during first and second types of negotiations. The process data policy is activated during the second type of negotiation without the first type of negotiation. The second type of negotiation is faster than the first type of negotiation. The connection policy defines a communication channel between the devices using a non-process communication port of the first device. The process data policy defines a communication channel between the devices for real-time industrial process data. The first type of negotiation could include an IKE main mode negotiation, and the second type of negotiation could include an IKE quick mode negotiation. | 2015-08-27 |
20150244743 | RISK ASSESSMENT FOR MANAGED CLIENT DEVICES - Disclosed are various embodiments that assess the risk of applications. In one embodiment, operations for an application are identified. A profile assigned to a usage category for the application is obtained. The number of times that at least one rule in the profile is violated is determined. A remedial action is initiated in response to the number of times that the at least one rule is violated exceeding a predefined threshold. | 2015-08-27 |
20150244744 | SYSTEM, METHOD, AND COMPUTER-READABLE MEDIUM FOR BY-PASSING THE PUBLIC SWITCHED TELEPHONE NETWORK WHEN INTERCONNECTING AN ENTERPRISE NETWORK AND A CARRIER NETWORK - A system, method and computer-readable medium by-passing the public switched telephone network when routing a call from a carrier network to an enterprise network are provided. A carrier gateway server is communicatively coupled with an enterprise gateway server. The enterprise gateway server is adapted to publish direct inward dial numbers assigned to enterprise extensions to the carrier gateway server. Once published, call setups originated in the carrier network may be routed directly to an enterprise network having a terminal assigned the dialed number of the call setup. Advantageously, the carrier network operator does not incur any inter-connect fee from any public switched network operator | 2015-08-27 |
20150244745 | Method and Apparatus for Identifying a Subscriber Home Domain in a Communication Network - A method, apparatus and computer-readable medium for identifying a subscriber home domain in a communication network are described. A national subscriber profile is partitioned into regions and a NAPTR resource record is modified to identify in which region a particular subscriber is located. In response to a calling party requesting that a connection to a called party be established, a database is queried to provide a modified NAPTR record which identifies the region in which the called party is located. A connection can then be established without polling each region. | 2015-08-27 |
20150244746 | Multimedia Session Call Control Method and Application Server - A multimedia session call control method and an Application Server (AS). The multimedia session call control method includes these steps: a multi-UE party performs a multimedia session with a peer under control of an AS; a master UE of the multi-UE party establishes a session with a third party under control of the AS; and the AS binds a call leg between a slave UE of the multi-UE party and the AS to the session established with the third party. | 2015-08-27 |
20150244747 | METHODS AND SYSTEMS FOR SHARING HOLOGRAPHIC CONTENT - Methods and systems are described herein for a media guidance application that presents holographic media content using a holographic interface and monitors the user and/or area about the holographic interface for user interactions that may cause the media guidance application to execute a media guidance function such as instructing another holographic interface to generate for display a portion of the holographic media content. | 2015-08-27 |
20150244748 | ENHANCING COLLABORATION IN REAL-TIME GROUP CHAT SYSTEM AND METHOD - A method, computer program product, and computer system for maintaining, between a plurality of participating computing devices, a collaboration session that includes a group instant messaging session within an object, wherein the plurality of participating computing devices includes a host computing device and one or more non-host computing devices in the group instant messaging session. A first sub-object of a plurality of sub-objects is generated within the object, wherein the first sub-object is rendered on the host computing device and the one or more non-host computing devices. Permission is assigned to the host computing device to edit content in the first sub-object, wherein the content in the first sub-object is rendered on the host computing device and the one or more non-host computing devices, and wherein the non-host computing devices are precluded from editing the content in the first sub-object. | 2015-08-27 |
20150244749 | METHOD AND SYSTEM FOR MANAGING A VIRTUAL MEETING - A computer-implemented method, computer-readable medium and system for managing a virtual meeting are disclosed. Invitees for a virtual meeting may be automatically determined based upon a selection of one or more groups made using a graphical user interface. Each invitee may be notified of the virtual meeting. Users may conveniently attend the virtual meeting. A recording of the virtual meeting may then be made accessible to members of one or more groups selected using the graphical user interface. In this manner, the setup of a virtual meeting and the distribution of a recording of the virtual meeting can be improved. | 2015-08-27 |
20150244750 | GENERATING CONSOLIDATED SOCIAL CONTENT FOR A USER OF A SOCIAL NETWORKING SYSTEM - To generate dynamic relationship-based content personalized for members of a social networking system, at least one action of one or more members of the social networking system is associated with relationship data for the one or more members to produce consolidated data. One or more elements associated with the consolidated data is identified and used to aggregate the consolidated data. Further exemplary methods comprise weighting by affinity the aggregated consolidated data to generate dynamic relationship-based content personalized for the members of the web-based social network. | 2015-08-27 |
20150244751 | APPARATUS AND METHOD FOR RELAYING DATA OF A MEDIA CONTENT OF WHICH SECTION INFORMATION IS CARRIED BY LIST INFORMATION - A terminal according to the present invention comprises a relaying unit. The relaying unit requests list information of sections to a remote site with respect to a content selected by an arbitrary entity and receives it therefrom. Then, the relaying unit receives sections pertaining to the content by requesting them to a remote site with reference to information included in the received list information. When a request for list information of the content is received from another entity, the relaying unit draws up list information for sections listed in the received list information and provides it to the another entity as a response to the received request. While drawing up the list information, the relaying unit changes remote source information about an arbitrary section listed in the received list information to local source information including a pathname assigned to a repository allocated for storing data of the arbitrary section. | 2015-08-27 |
20150244752 | Systems and Methods for Duplex Communication - A closed circuit video communication device includes an input/output configured to receive a streaming video signal on a first dedicated physical communication channel and to send upstream communication on the first dedicated physical communication channel; a video output configured to send the streaming video signal on a second dedicated physical communication channel; and a command input configured to receive commands on a third dedicated physical communication channel and to provide the commands to the input/output for sending as upstream communication on the first dedicated physical communication channel | 2015-08-27 |
20150244753 | REPRODUCING DEVICE, EXTERNAL DEVICE, AND REPRODUCING METHOD OF CONTENT - A reproducing device acquires a content information including a content ID and a number of reproduction times of a content from an external device. The reproducing device determines a reproduction order of the content based on the number of reproduction times. Then, the reproducing device acquires the content corresponding to the reproduction order from the external device via communication network to reproduce the content in the reproducing device. Thus, operations of a user are reduced when the content recorded in the external device is reproduced in the reproducing device. | 2015-08-27 |
20150244754 | TECHNOLOGIES FOR MULTI-USER INTERACTIVE MEDIA STREAMING - Technologies for streaming multi-user broadcasts include a broadcast management server configured to receive multimedia data captured of a user from a remote computing device. The broadcast management server streams a multimedia broadcast including the multimedia data captured of the user to other users. Additionally, the broadcast management server is configured to receive a request to participate in the streamed multimedia broadcast from another user. Multimedia data captured of the other user is received in response to a determination that the request to participate in the streamed multimedia broadcast is accepted. The broadcast management server merges the multimedia data captured of the first and second users to generate a merged multimedia broadcast, which is streamed to other users. The broadcast management server also generates a broadcast feed for users. The broadcast feed includes streaming multimedia broadcasts and streaming merged multimedia broadcasts corresponding to other users. Other embodiments are described and claimed. | 2015-08-27 |
20150244755 | METHOD, APPARATUS, AND HOME NETWORK SYSTEM FOR PRESENTING MULTIPLE IMAGES, AND MOBILE TERMINAL - A method for presenting multiple images from a DMS (digital media server), in a same DMR (digital media renderer) includes: sending a first uniform resource identifier URI list setting message to the DMR, so that the DMR acquires, according to the first URI list setting message, multiple images corresponding to multiple URIs from the DMS; and sending a media playback message to the DMR, so that the DMR presents the multiple images together according to the media playback message. According to the method provided in the embodiments of the present invention, multiple images can be shared and presented at the same time between home network media devices, which makes it very convenient to compare the multiple images, thereby helping a user select a best image and make, in a scenario where it is required to perform an illustration on multiple images, a better comparison explanation and illustration on the images. | 2015-08-27 |
20150244756 | Method, Apparatus and System for Determining Terminal That is to Share Real-Time Video - A method for determining a terminal that is to share real-time video is provided. The method includes sending, by a calling terminal, sharing request information; receiving, by the calling terminal, response information that is sent by at least one called terminal according to the requirement information of the calling terminal; and determining, by the calling terminal according to the response information, a sharing terminal that is to perform real-time video sharing. According to the method for determining a terminal that is to share real-time video in the embodiments of the present invention, a user can be helped to share a real scene of an area in real time, and acquire optimal video information by means of cooperative interaction. The present invention further discloses an apparatus for determining a terminal that is to share real-time video and a real-time video sharing system. | 2015-08-27 |
20150244757 | Transcoding Method and System, and Distributed File Apparatus - A transcoding method used in a computer network comprises: receiving, by a task manager in the computer network, a transcoding task, where the transcoding task has task information; generating task dispatch information according to the task information; and separately acquiring, according to the task dispatch information, source data of media segments corresponding to a media file, parallelly transcoding the source data into data in a target format by using multiple transcoders, and storing the data into a storage server in the computer network, where the transcoder includes a processor of the storage server. Distributed transcoding is completed by using an idle CPU of a storage server, so that not only costs of hardware are reduced and an existing resource is fully used, but also transmission and copying of data are greatly accelerated, thereby improving transcoding efficiency. | 2015-08-27 |
20150244758 | SLICE-AND-STITCH APPROACH TO EDITING MEDIA (VIDEO OR AUDIO) FOR MULTIMEDIA ONLINE PRESENTATIONS - Systems and methods for driving workflow and dynamic configuration of streaming media in an electronic slide-based presentation may be provided. Software may be provided to create audio/video presentations using a slideshow. A user may record a live audio/video narration of the slideshow. The audio/video narration (e.g. a live stream) may be recorded simultaneously while a user is advancing the slideshow. Markers may be dynamically inserted in real-time as the live stream is recording, for slicing, such that the recording may be split into slices in response to advancing the next slide. Such slices may be mapped to corresponding slides of the slideshow. Re-recordings may be generated such that they can be dynamically stitched as part of the stream. Once the narration is completed, a final audio/video stream recording may be compiled and uploaded to a cloud-based server, where presentation is generated incorporating the slideshow and audio/video recording. | 2015-08-27 |
20150244759 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND PROGRAM - An information processing apparatus includes a communication unit and a control unit. The communication unit is communicable with a plurality of client apparatuses over the same network that are capable of buffering and reproducing data transmitted from a server by progressive download. The control unit is capable of regularly obtaining buffer time information indicating a buffer time that expresses an amount of data buffered by the plurality of client apparatuses using a time necessary for reproduction of the data. Further, the control unit is capable of determining a client apparatus whose buffer time is minimum among the plurality of client apparatuses as a priority apparatus to which the data should be preferentially transmitted. | 2015-08-27 |
20150244760 | EFFICIENT BITRATE ADAPTATION IN VIDEO COMMUNICATIONS OVER IP NETWORKS - Systems and methods of dynamically adapting multimedia data transmit rates of data senders to available bandwidths of data receivers, in which the available bandwidths are estimated by the data senders using at least reception quality feedback information provided in real-time transport control protocol (RTCP) report packets. The data senders can obtain several bandwidth estimation parameters, such as a packet loss ratio and a round trip delay, from the reception quality feedback information, as well as multimedia data transmit rates from the data senders to the data receivers, and obtain estimates of the available bandwidths of the data receivers using at least the bandwidth estimation parameters and multimedia data transmit rates. Further, using the estimated available bandwidth, the data senders can dynamically adapt the multimedia data transmit rates to the available bandwidths for more reliably achieving the quality of experience (QoE) desired and/or required for multimedia data transmissions. | 2015-08-27 |
20150244761 | COMMUNICATING CONTROL INFORMATION WITHIN A REAL-TIME STREAM - Providing control information is disclosed. A real-time streaming communication channel is established with a communication party using a real-time streaming protocol. It is determined that control information is to be provided to the communication party. The control information is encapsulated using the real-time streaming protocol. The encapsulated control information is marked as including control information content. Streaming content is provided to the communication party via the real-time streaming communication channel using the real-time streaming protocol. The marked encapsulated control information is provided via the real-time streaming communication channel. | 2015-08-27 |
20150244762 | EFFICIENT VIDEO DELIVERY - Efficient video delivery is disclosed. In some embodiments, at least a part of a video stream received from a video source is converted to a dividable video format file. The dividable video format file is split into a sequence of small files, and one or more of the sequence of small files is published. | 2015-08-27 |
20150244763 | Generic Cloud Service For Publishing Data To Be Consumed By RSS Readers - Data from applications is published using a web feed document such as according to the Really Simple Syndication (RSS) protocol. The applications can be information technology (IT) services, such as an Application Performance Management program and a Service Desk program, which are used by an organization. The data is received at an Application Programming Interface (API) and stored in a database in a format which is usable by the web feed document. For example, the data can provide a parameter name, parameter label, severity and user type which are associated with placeholder elements in the web feed document. The user type may be used to restrict the publishing of certain parameters to certain users based on their business roles in an organization. The feed server may provide additional details in response to the user selecting a hyperlink in the web feed document. | 2015-08-27 |
20150244764 | METHOD AND DEVICE FOR ACCESSING A WEBSITE - A method for use in a router, includes: obtaining a destination web address and destination post content; generating a post request in accordance with the destination post content; sending the post request to the destination web address; receiving a return message returned from the destination web address in accordance with the post request; judging whether the received return message is a predetermined return message; and if the received return message is not the predetermined return message, continuing to send the post request to the destination web address until the received return message is the predetermined return message. | 2015-08-27 |
20150244765 | Method for processing requests and server device processing requests - The invention relates to a server and a method for processing requests when several requests compete within the same connection having fixed resources. Conventionally, a priority scheme provides priority values for a priority parameter that express priorities relatively to the priorities of other requests, meaning that a relative allocation of resources is obtained for each request. To achieve a better control on the server by the client, the invention provides specific possible values for the priority parameter that correspond to respective processing profiles. Each processing profile represents specific server behaviour for resources allocation, by defining a predefined amount of resources. Thus, the client may choose between using the specific possible values to control the exact amount of resources that will be allocated by the server to process some specific requests, and using the other possible values that correspond to a relative allocation of resources as already done in known techniques. | 2015-08-27 |
20150244766 | SYSTEM AND METHOD FOR PROVIDING PRIVATE SESSION-BASED ACCESS TO A REDIRECTED USB DEVICE OR LOCAL DEVICE - Restricting access to a device from a server, where the device is remote to the server and is connected locally to a client that is remote to the server, is described. The operations may include facilitating interception, at the server, of a function call to create a symbolic link; facilitating determination that the intercepted function call to create the symbolic link corresponds to a device object associated with the device that is remote to the server and is connected locally to a client that is remote to the server; facilitating obtaining configuration data indicating whether access to the device is to be restricted; and facilitating creation of the symbolic link in a local namespace of an object manager namespace of the server, upon obtaining configuration data indicating that access to the device is to be restricted. | 2015-08-27 |
20150244767 | SYSTEMS AND METHODS FOR QUALITY OF SERVICE OF ICA PUBLISHED APPLICATIONS - The present invention is directed towards systems and methods for providing discovery of applications for classification of a network packet for performing QoS and acceleration techniques. Remote display protocol traffic associated with a new application not previously included in a list of predetermined applications may be parsed for application information, and the new application may be added to the application list. The remote display protocol traffic may then be classified according to the new application, and network performance may be enhanced and optimized by providing QoS and acceleration engines with packet- or data-specific information corresponding to the newly identified application. | 2015-08-27 |
20150244768 | CREATING AND MANAGING READ ORDER INSTRUCTION FILES - A method includes a computing device receiving read source content from at least one content provider; the computing device creating a read order file for the received read source content in accordance with at least one selected criteria; the computing device packaging the read order file into a computer readable schema file; and delivering the computer readable schema file to at least one user device. | 2015-08-27 |
20150244769 | CONTENT DELIVERY SYSTEM - A method may include starting a content delivery micro edge server module to generate a content delivery micro edge server on a web server. The content delivery micro edge server is a virtualized edge server associated with a service provider and the web server is associated with a host entity that is different than the service provider. The method may include partitioning web server capacity associated with the web server into the content delivery micro edge server and host entity assigned web server capacity. The method also includes activating at least one application associated with the content delivery micro edge server to provide content delivery services. The method includes registering, with the service provider, the content delivery micro edge server to provide content delivery services. The method further includes receiving a request for content to be provided to a client device, and delivering the content to the client device. | 2015-08-27 |
20150244770 | PHOTO MEDIA PLAYING METHOD AND PHOTO MEDIA PLAYING SYSTEM FOR PLAYING PHOTO MEDIA FILE OF SOCIAL NETWORKING SITE IN AREA NETWORK - A photo media playing method for playing photo media files of a social networking site in an area network is provided. Firstly, the digital media server logins into the social networking site. Moreover, plural album data, plural photo media data and plural media thumbnails corresponding to the social networking site are previously stored in the digital media server. Then, an active control device is connected to the digital media server, so that the plural media thumbnails may be viewed by the user. After one of the plural media thumbnails is selected, the photo media file corresponding to the selected media thumbnail is transmitted from the digital media server to the area network. Consequently, the photo media file is played by the active control device of the area network. | 2015-08-27 |
20150244771 | System and method for interconnecting and enforcing policy between multiple disparate providers of application functionality and data centers and/or end-users - A system and method for interconnecting and enforcing policy between multiple disparate providers of application functionality, data centers or end-users. A network system comprising one or more Perimeter Points of Presence (P/PoP) configured to interconnect and enforce policy between a plurality of entities, each of which provides at least one function, the one or more Perimeter Points of Presence (P/PoP) comprising: a network interface component configured to accept physical or virtual connections or both; a plurality of functions layers for processing data, wherein the function layers can be configured to provide a customized virtual perimeter for the entities. The one or more Perimeter Points of Presence (P/PoP) are configured to receive data via a connection to the Perimeter Points of Presence (P/PoP); process the data using at least one of the function layers configured as a data processing policy for the entity; and transmit the processed data as policy compliant data from the one or more Perimeter Points of Presence (P/PoP) to a destination connected to the Perimeter Points of Presence (P/PoP). | 2015-08-27 |
20150244772 | FAST RENDERING OF CONTENT USING A MOBILE USER DEVICE - A user device including a client application (client) that enables rendering of content by a content rendering application (CRA). The client is configured for receiving user input indicating that a predefined portion of the content file is to be rendered, the portion starting at a specific time within the duration of the content file, sending to a server of the service provider an HTTP client request message requesting a playlist for the requested portion of the content file, providing to the CRA an instruction to request the playlist from the client, receiving from the server of the service provider an HTTP client response message comprising the requested playlist and storing the received playlist in a memory within the UD, receiving from the CRA an HTTP player request message requesting the playlist, and responding to the request by sending am HTTP player response message including the playlist obtained from the memory. | 2015-08-27 |
20150244773 | DIAGNOSIS AND OPTIMIZATION OF CLOUD RELEASE PIPELINES - Provided are methods and systems for providing users with a tool that can offer recommendations on how to optimize the development and performance of their applications. A diagnosis and optimization method, system, and engine captures various data associated with, for example, building, deploying, releasing, and running a user's application, and utilizes such data to generate recommendations/suggestions as to how the user can best balance high release productivity, ease of management, and cost optimization. The methods and systems utilize the end-to-end story of a user's development process (e.g., from the time the user submits code to when the application is actually up and running) to generate recommendations as to ways that the user can optimize their system including, for example, how the user can layout their application topology differently, reduce latency, increase data locality, or optimize billing costs. | 2015-08-27 |
20150244774 | METHOD AND APPARATUS FOR MANAGING CONNECTION USING DUMMY HTTP - A method for managing connections using a dummy HTTP, the method comprising: upon receiving an HTTP request from a client, establishing, by a Web server, a connection to a Web application server to transmit the HTTP request to the Web application server over the connection; transmitting, by the Web server, an HTTP response received from the Web application server to the client; and continuing, by the Web server, the connection by exchanging a dummy HTTP request and a dummy HTTP response with the Web application server when a count of a duration time of the connection reaches a preset survival check time. | 2015-08-27 |
20150244775 | WORK FLOW MANAGEMENT FOR AN INFORMATION MANAGEMENT SYSTEM - Disclosed herein are systems and methods for managing information management operations. The system may be configured to employ a work flow queue to reduce network traffic and manage server processing resources. The system may also be configured to forecast or estimate information management operations based on estimations of throughput between computing devices scheduled to execute one or more jobs. The system may also be configured to escalate or automatically reassign notification of system alerts based on the availability of system alert recipients. Various other embodiments are also disclosed herein. | 2015-08-27 |
20150244776 | Method and System for Communication Between Machine to Machine M2M Service Provider Networks - Machine-to-Machine (M2M) communication has been described for communication in a single network in among others publications from the European Telecommunications Standards Institute (ETSI). The publications describe a single network with defined entities, a resource structure and protocols. According to the invention, a solution is described for communication between entities residing in different M2M networks. Entities or applications residing in a first M2M network requiring information of an entity in another second M2M network submit a request with a target ID pointing to the entity in the second M2M network. The request is forwarded to the network node of the first network. The network node of the first network checks whether the target ID matches with an entity of a second network that according to a Domain Name Server (DNS) lookup has an address of a second network node of the second M2M network. On a match the request is routed towards the retrieved second network node of the second M2M network. The second network node routes the request further towards the second entity according to registration information stored in its resources. On reception of the request the second entity processes the request and returns a reply via the path created by the previous steps. | 2015-08-27 |
20150244777 | MASSIVELY DISTRIBUTED CLOUD-BASED PLATFORM PROVIDING FEATURES AS A SERVICE TO SUPPORT MOBILE AND WEB APPLICATIONS - A method and apparatus for implementing a massively distributed cloud-based platform providing features as a service to support mobile and web applications via native client SDKs. Functionality is fully featured hosted remotely but called natively allowing a consistent logic across a plurality of devices and applications. The platform is a highly distributed process based computational and data systems cluster whereby each node manages a set of messaging channels supporting multiple concurrent endpoints. | 2015-08-27 |
20150244778 | Assembling of Isolated Remote Data - A method, system and product for securely storing data file at a remote location by splitting and reassembling said files is provided. AIR Storage is a technique comprising splitting into two separate halves a complete file that is stored on a client platform in order to form two separate data split files (DSF); storing a first DSF at a remote location, referred to as a remote DSF, wherein the remote location comprises a network server; storing a second DSF on a local device, referred to as a local DSF, wherein the local device comprises an external memory operably connected to said client platform, wherein said remote DSF and local DSF lose the ability to display informative content; reassembling the two halves to rebuild said complete file, wherein the splitting and assembling are performed in Random Access Memory on said client platform; and displaying said reassembled file on said client platform. AIR ware is a processing unit located on the client platform, whose main function is to split the complete file into the remote DSF and local DSF, to make the DSFs lose their ability to display informative content, and to separately send the different DSFs on the local device operably connected to said client platform and on the network server. When the complete file needs to be used, AIR ware then collects the two different DSFs from both locations according to user instructions, and reassembles the two different DSFs into said complete file on the client platform. | 2015-08-27 |
20150244779 | DISTRIBUTED PERSONAL ANALYTICS, BROKER AND PROCESSING SYSTEMS AND METHODS - Provided are computer systems, methods, and non-transitory computer-readable medium configured to determine whether the message is allowed to be presented to a user by checking the message with a user profile stored in the storage medium with associated rules. Analytics can be performed on the message and its associated logic and/or data content to identify portions of the message to be presented to the user. | 2015-08-27 |
20150244780 | SYSTEM, METHOD AND COMPUTING APPARATUS TO MANAGE PROCESS IN CLOUD INFRASTRUCTURE - A system, method and computing apparatus to manage process(es) in a cloud computing infrastructure are provided. Application nodes are connected to at least one administration node in a cloud computing infrastructure. The application nodes are configured upon instruction from the administration node to run a process or set of processes for at least one service, to perform the following: initiating a first process on each of the application node by at least one of the administration node; initiating at least one process other than the first process on each of the application nodes by the first process through a first procedure; monitoring operational statuses of all the processes other than the first process through the first procedure, by the first process in each of the application nodes; and the status of all the processes other than the first process is communicated to the at least one administration node. | 2015-08-27 |
20150244781 | SYSTEMS AND METHODS FOR POLICY BASED INTEGRATION TO HORIZONTALLY DEPLOYED WAN OPTIMIZATION APPLIANCES - The present disclosure presents systems and methods for policy based redirection of network traffic, by an intermediary device, to a horizontally deployed WAN device. An intermediary receives a request from a client to access a server. The request was previously modified by a first WAN device to include information in a first option field of a transport layer. The intermediary may determine, responsive to a redirection policy, to send the request to a second WAN optimization device deployed horizontally from the intermediary, instead of the server. The intermediary transmits the request to the second WAN optimization device, while maintaining the information from the first option field. The intermediary device receives the request including the information in the first option field identifying the first WAN optimization device to the second WAN optimization device. The intermediary receives a modified request from the second WAN device, the modified request determined by the intermediary to be sent to the destination server. | 2015-08-27 |
20150244782 | SERVER FOR DISTRIBUTED CONTROLLER SYSTEM - A server is provided in a network system that controllers control switches based on information given from an application. The server includes queues, each of which is associated with the switches, to store information given from the application directed to the associated switch, a receiver to receive, from each controller, destination information including queue designating information and information for transmitting information read from the queue designated by the queue designating information to one of the controllers being a destination of the read information, and a transmitter to transmit the information read from each of the queues to one of the controllers to control at least one of the switches associated with each of the queues based on the destination information. | 2015-08-27 |
20150244783 | SCANNER WEB SERVICE FOR WEB APPLICATION AND SCANNER DRIVER COMMUNICATION - A computer system with a scanner web service set up as a local host is provided. An HTTP message is received from a client-side web application code client-side running in a web browser on the computer system by the scanner web service. A message based on the received HTTP message is sent to a scanner driver that is in communication with a scanner connected to or integrated with the computer system. Scanned image information is received from the scanner driver, and is provided to the client-side web application code running the web browser. | 2015-08-27 |
20150244784 | SERVER AND METHOD, NON-TRANSITORY COMPUTER READABLE STORAGE MEDIUM, AND MOBILE CLIENT TERMINAL AND METHOD - Systems and methods for operating in connection with mobile devices are described. The mobile devices may move between online and offline areas. In some instances, a prediction may be made as to when a mobile device will enter an offline area. The prediction may be based on sensor information. Data or a key may be transferred to the mobile device prior to entering the offline area. | 2015-08-27 |
20150244785 | DATA TRANSMISSION IN CLOUD-BASED SYSTEM - Technologies are generally described for a data transmission scheme for a cloud-based system. In some examples, a data transmission system may include a communication speed determination unit configured to determine communication speed between a server and multiple client devices connected to the server; a client classification unit configured to classify each of the multiple client devices based at least in part on the communication speed determined by the communication speed determination unit; and a data transmission unit configured to transmit a predetermined portion of data to one or more of the client devices connected to the server. | 2015-08-27 |
20150244786 | Method And Apparatus For Managing Multimedia Resource And Multimedia Player - A method and an apparatus for managing multimedia resources and a multimedia player is described. The method includes obtaining, by a multimedia application, multimedia resource information. The multimedia resource information includes information of a multimedia resource that has not been downloaded to a local end. The method further includes detecting, by the multimedia application, whether a network environment on the local end includes a downloadable link and downloading automatically, if a detection result is yes, the corresponding multimedia resource through the downloadable link according to the information of the multimedia resource that has not been downloaded to the local end. | 2015-08-27 |
20150244787 | FRONT-END HIGH AVAILABILITY PROXY - In particular embodiments, a method includes receiving a first connection from a client and assigning the client a unique socket. The method further includes selecting, from a plurality of execution hosts, a first execution host for the first connection based at least in part on load-balancing information associated with the execution hosts. Each execution host includes a unique general client engine. The method further includes launching a first transcoding remote desktop client instance at the first execution host in association with the general client engine of the first execution host. The method further includes receiving a second connection from the client, the second connection being associated with the unique socket of the first connection, launching a second transcoding remote desktop client instance at the first execution host in association with the general client engine of the first execution host, and updating the load-balancing information. | 2015-08-27 |
20150244788 | GENERIC TRANSCODING SERVICE WITH LIBRARY ATTACHMENT - In particular embodiments, a method includes, by a computing device, receiving a connection from a client and assigning the client a unique socket. The method further includes launching a generic transcoding service attached to a runtime library, and the runtime library may be able to intercept system calls from a specific instance of an application executing on a remote client for exporting to the client. The method further includes receiving a termination of the connection by the client and updating load-balancing information. | 2015-08-27 |
20150244789 | INFORMATION PROCESSING SYSTEM AND INFORMATION PROCESSING METHOD - An information processing system includes a terminal device and a server device. When recommending subsidiary contents, recommended contents are extracted at the server, and recommended content information is returned to the terminal device. At the terminal device, a recommendation order is set regarding the recommended contents which the recommended content information indicates, upon which the recommended contents are presented, such that recommended content extracting processing and recommendation order setting processing is dispersed among the server device and terminal device. | 2015-08-27 |
20150244790 | Opportunistic Crowd-Based Service Platform - A method and apparatus for providing an opportunistic crowd based service platform is disclosed. A mobile sensor device is identified based on a current location and/or other qualities, such as intrinsic properties, previous sensor data, or demographic data of an associated user of the mobile sensor device. Data is collected from the mobile sensor device. The data collected from the mobile sensor device is aggregated with data collected from other sensor devices, and content generated based on the aggregated data is delivered to a user device. | 2015-08-27 |
20150244791 | SYSTEM AND METHOD OF DELIVERING DATA THAT PROVIDES SERVICE DIFFERENTIATION AND MONETIZATION IN MOBILE DATA NETWORKS - An exemplary system according to the present disclosure comprises a lower tier Radiolet™ that is in communication with a local switching office of a mobile data network, and an upper tier Radiolet™ that is in communication with the lower tier Radiolet™ and an Internet datacenter. In operation, the upper tier Radiolet™ receives data extracted from the Internet datacenter and distributes at least a portion of the received data to the lower tier Radiolet™. At the lower tier Radiolet™, the portion of received data is stored. The lower tier Radiolet™ then receives a data request (relating to a portion of received data) and in turn, transmits data from the portion of received data to a source of the data request. The lower tier Radiolet™ is located closer to the source of the data request than the Internet datacenter to improve application performance and efficiency of network as well as datacenter. | 2015-08-27 |
20150244792 | DYNAMIC ALLOCATION OF A WORKLOAD ACROSS A PLURALITY OF CLOUDS - A method of allocating cloud resources. A user interface can be presented to a user. The user interface can be configured to receive a user selection of a change of context for at least one of a plurality of workloads allocated to at least one cloud. Responsive to receiving the user selection of the change of context for the workload, via a processor, a service level agreement applicable to the workload can be dynamically changed from a first service level agreement to a second service level agreement, while the workload remains in an available state. | 2015-08-27 |
20150244793 | APPARATUS AND METHOD FOR DETERMINING GROUP OWNER IN ESTABLISHMENT OF WI-FI DIRECT CONNECTION - A method and a first device for determining a group owner during establishment of a local-wireless communication connection are provided. The method includes searching for a second device that supports the local-wireless communication connection; searching, if the second device is found, for services supportable by the second device; determining an intent value of the first device corresponding to a group owner authority with respect to a service to be connected among the found supportable services; transmitting, to the second device, a negotiation message including the determined intent value of the first device; receiving, from the second device, a negotiation message including an intent value of the second device; and determining, from among the first device and the second device, a device having the group owner authority by comparing the determined intent value of the first device with the intent value of the second device. | 2015-08-27 |
20150244794 | SYSTEMS AND METHODS FOR PROVIDING A USER WITH A SET OF INTERACTIVITY FEATURES LOCALLY ON A USER DEVICE - Providing a user with an interactive user interface that may fully enable interactions regardless of connectivity status may be provided. In some embodiments, one or more content items may be selected by a user of the user devices and may be queued for upload to a content management system. The content items may be organized into one or more collections of content items with other content items already stored in a user account on the content management system, such as images having similar geo-temporal characteristics. A set of interactivity features may be available to the user for interacting with the queued content item. This may provide the user with the seamless feeling as if the content items have been uploaded to the content management system and the user may be interacting with the content items on the content management system, even if the upload has not been completed. | 2015-08-27 |
20150244795 | DATA SYNCING IN A DISTRIBUTED SYSTEM - Disclosed are systems, computer-readable mediums, and methods for receiving a start replication message to replicate a source volume to a replicated volume. A source system forwards I/O requests to the replica server. A data structure associated with the replicated volume is initialized. A write request is received from the source system. The write data is written to the replicated volume and the data structure is updated. Source metadata associated with the source volume is received. The source metadata is compared with prior metadata associated with a prior point-in-time image of the source volume to determine blocks of data that have changed since the prior point-in-time image of the source volume. A first block is determined to not be retrieved based upon the data structure. A second block is determined to be retrieved based upon the data structure. The second block is received and written to the replicated volume. | 2015-08-27 |
20150244796 | Extensible Self-Service Terminal (SST) Server - Methods and a system for an extensible Self-Service Terminal (SST) server are provided. A first Virtual Machine (VM) of a first SST cooperates with a second VM of a second SST to logically act as a local server within an establishment where the first SST and the second SST are situated. Each VM self-manages the local server as new VMs are added and other VMs are removed from participation within the local server. In an embodiment the local server includes: fault tolerance, failover processing, dynamic additions of VMs, and dynamic contraction by removal of some VMs from the local server. | 2015-08-27 |
20150244797 | METHOD AND ARCHITECTURE FOR APPLICATION MOBILITY IN DISTRIBUTED CLOUD ENVIRONMENT - A method for moving application related records ( | 2015-08-27 |
20150244798 | DATA STORAGE SYSTEM WITH REMOVABLE DEVICE AND METHOD OF OPERATION THEREOF - A data storage system, and a method of operation thereof, includes: an interface module for creating a login credential for storing on a removable storage device; a backup module, coupled to the interface module, for transferring data for an automatic backup of the removable storage device to a remote backup system based on the login credential and a status of the removable storage device; and a close module, coupled to the backup module, for disconnecting an application from a cloud backup service for closing a connection between a computing device and the remote backup system with the data from the automatic backup. | 2015-08-27 |