37th week of 2015 patent applcation highlights part 65 |
Patent application number | Title | Published |
20150256497 | TERMINAL DEVICE, SERVER, AND METHOD OF PROVIDING MESSAGING SERVICE - A terminal device is provided. The terminal device includes an input unit configured to receive an input of a user command inviting a non-subscriber of a messaging service to join a messaging group, and a communication unit configured to transmit a request for invitation information to a server, when the invitation information is received from the server, to transmit an invitation message including the invitation information and an application installation Uniform Resource Locator (URL) to a non-subscriber terminal, and when a join result of the non-subscriber joining the messaging service is received, to transmit a request for an invitation of the non-subscriber to the messaging group. | 2015-09-10 |
20150256498 | Proposed Message Disposition Viewport Apparatus and Method for Timed Operation - A message post-processing apparatus provides an optional instrumented viewport to a message recipient to store message dispositions such as archive, reply-to, forward, open, move, delete, and each elapsed time-to-disposal (TTD) from display. The instrumented viewport also displays a proposed disposition and a proposed TTD, which may be overridden within the instrumented viewport. A timer is initialized to TDD when each message is substantially within the viewport. Absent user intervention, a disposer circuit performs the proposed operation on the message upon expiration of the TTD. The proposed TTD and disposition is derived from analyzing the history and quality of similar messages among recipient's dispositions. When a recipient changes the treatment of a message, the apparatus stores the new disposition and TTD for future reference. A synthesizer circuit transforms message body and headers and proposed TTD and disposition into a message précis. | 2015-09-10 |
20150256499 | RANKING, COLLECTION, ORGANIZATION, AND MANAGEMENT OF NON-SUBSCRIPTION ELECTRONIC MESSAGES - A user who is considering unsubscribing from content from a publisher of the content may be presented with an alternative, which if selected by the user, allows the user to access the content on a non-subscription-based domain (e.g., a web site, a web page, or using an APP executing on a client device). A unsubscribe request by the user may unsubscribe the user from the subscribed-to-domain of the publisher and may transition the user to the non-subscription-based domain or provide the user with a selectable link (e.g., hyperlink) to the non-subscription-based domain. A backend system (e.g., an administrator) may receive unsubscribed to content from publishers (e.g., from a frontend system) and may rank the content for presentation on a brand page or other format on the non-subscription-based domain. Collection, organization, publisher status and content status may be directed by the backend system. | 2015-09-10 |
20150256500 | ALERT FOR MESSAGES "STUCK" IN A MESSAGE QUEUE WITHIN A MESSAGING APPLICATION - A system and method to provide a message handling system (eg email) user an alert when one or more messages remain in the outbox of the message handling system after the message transmission process has completed more than a user definable number of times or has been in the outbox longer than a user definable amount of time. Once alerted the user will have the option to take one or more actions (independent of the system and method) to remove the message or messages from the outbox. | 2015-09-10 |
20150256501 | Graphical User Interface, Method, Computer Program and Corresponding Storage Medium - The invention provides a graphical user interface which can be used simultaneously by remote users each having at least one display screen, said graphical user interface comprising a virtual space ( | 2015-09-10 |
20150256502 | METHOD AND SYSTEM FOR PROCESSING SOCIAL NETWORK INFORMATION - Embodiments of the present invention disclose a method and system for processing social network information. The method includes: establishing a list of posted information for each user; adding received newly-posted information of a user to the list of posted information of the corresponding user; acquiring, after receiving an access request of a client, the list of associated users of a user designated in the access request; separately reading a predetermined amount of information from the list of posted information of each user in the list of associated users; and returning all the read information posted by the associated users to the client. | 2015-09-10 |
20150256503 | Generating Guest Suggestions For Events In A Social Networking System - Social networking system users may create events where a group of other users invited to the event meet at a specified time and location. The social networking system suggests users to invite to an event based on a prediction that the users would attend the event if invited. Various factors may be used to make the prediction, such as an affinity between the inviting user and the other users, the availability of the other users at the time of the event and/or the proximity of the other users to the location of the event. An inviting user receives the suggested users and selects suggested users to invite to the event or invitations may be automatically sent to the suggested users by the social networking system. | 2015-09-10 |
20150256504 | DISTRIBUTED SYNCHRONIZATION DATA IN A MESSAGE MANAGEMENT SERVICE - A message management service that acts as intermediary between a messaging service and a client device can generate a synchronization data bundle for a message that includes an external message identifier usable to retrieve the message from the messaging service. The message management service can send the synchronization data bundle to the client along with the message, and the client can store the synchronization data bundle for each message in its local data store. The client can later return the synchronization data bundle to the message management service, which can use information contained therein to facilitate synchronization and related operations. | 2015-09-10 |
20150256505 | ELECTRONIC MAIL MONITORING - An extraction section ( | 2015-09-10 |
20150256506 | METHOD AND ELECTRONIC DEVICE FOR PERFORMING MESSAGE EXCHANGE - A method and electronic device are provided for easily performing message exchange with other vehicles while travelling. An electronic device includes: a display control unit that displays a plurality of stylized (and fixed) phrase messages in a first display region of a display unit, and displays a second icon corresponding to a communication destination in a second display region of the display unit; and a message processing unit that, in response to at least one first icon being designated in a state in which a plurality of first icons is being displayed in the first display region, sends the stylized (and fixed) phrase message corresponding to the first icon designated to the communication destination corresponding to the second icon displayed in the second display region, via a wireless communication unit. | 2015-09-10 |
20150256507 | METHOD AND SYSTEM FOR INCREASING SPEED OF DOMAIN NAME SYSTEM RESOLUTION WITHIN A COMPUTING DEVICE - A system for resolving domain name system (DNS) queries, contains a communication device for resolving DNS queries, wherein the communication device further contains a memory and a processor that is configured by the memory, a cache storage for use by the communication device, and a network of authoritative domain name servers, where in a process of the communication device looking up a DNS request within the cache storage, if the communication device views an expired DNS entry within the cache storage, the communication device continues the process of looking up the DNS request in the cache storage while, in parallel, sending out a concurrent DNS request to an authoritative domain name server that the expired DNS entry belongs to. | 2015-09-10 |
20150256508 | Transparent Proxy Authentication Via DNS Processing - A DNS nameserver processes requests for domain name information based on subscriber identifiers, and optionally subscriber information. Based on a subscriber identifier, requests for a target domain name may generate a DNS response with domain name information for a proxy service. Techniques are provided to seamlessly and transparently authenticate a subscriber at the proxy service. The proxy service generates a redirect with a unique domain name including a tracking identifier in response to requests for a target domain name. The nameserver receives a request associated with the unique domain name. The nameserver responds with domain name information of the proxy service and generates a message to the proxy service mapping the tracking identifier to the subscriber identifier. The client then generates a request to the proxy service that includes the tracking identifier. The proxy service uses the mapping from the nameserver to authenticate the corresponding subscriber identifier. | 2015-09-10 |
20150256509 | IDENTIFYING NATed DEVICES FOR DEVICE-SPECIFIC TRAFFIC FLOW STEERING - The present disclosure describes methods and apparatus for differentiating subscriber devices of a subscriber hidden by a network address translation device and enables traffic flow steering on a per device basis rather than a per subscriber basis. Identification of subscriber devices is achieved by assigning a reserved set of external ports to each subscriber device. Different service paths can be defined for different subscriber devices to provide a subscriber with a different experience for each subscriber device of the subscriber. | 2015-09-10 |
20150256510 | SYSTEM AND METHOD FOR NAME RESOLUTION OF REPLICATED COMPONENTS IN COMPUTING ENVIRONMENTS - A system and method for name resolution of replicated components in computing environments (CEs). The method includes inserting, an alternate name-resolving server (NRS) as a first queried entry in a list of NRSs into a memory of a first replicated component, wherein the alternative NRS is communicatively connected to a second CE, the second CE comprising the first replicated component and the second replicated component, wherein the second replicated component is replicated from the first CE and includes a first original component. | 2015-09-10 |
20150256511 | METHODS AND IMPROVEMENTS IN UICC POLLING MECHANISM FOR UICC MANAGEMENT - Systems and methods for handling an OPEN CHANNEL command from a universal integrated circuit card (UICC) of a mobile device are disclosed. In some implementations, a mobile device hosting a UICC receives, from the UICC, an initiation of an OPEN CHANNEL command with a uniform resource locator (URL) of a subscriber identity module over the air (SIMOTA) server. The mobile device signals for attempting to resolve the URL to an Internet Protocol (IP) address. Upon successfully resolving the URL to the IP address, the mobile device obtains the IP address associated with the SIMOTA server, connects to the SIMOTA server using the IP address, and returns a successful TERMINAL RESPONSE to the UICC. Upon failing to resolve the URL to the IP address, the mobile device returns an unsuccessful TERMINAL RESPONSE to the UICC. | 2015-09-10 |
20150256512 | HIGH ASSURANCE SECURITY GATEWAY INTERCONNECTING DIFFERENT DOMAINS - A gateway having an architecture authorizing a bidirectional communication between applications located in different domains and presenting a high assurance level of protection. The gateway uses a virtualization platform and comprises a set of functional blocs configured to authorize secure bidirectional flow of data along two different paths between first and second domains, said set of functional blocs being decomposed into a plurality of elementarily evaluable components each one of which having a specified function and being adapted to communicate with other predefined elementarily evaluable components. | 2015-09-10 |
20150256513 | FIREWALL INTERFACE CONFIGURATION TO ENABLE BI-DIRECTIONAL VOIP TRAVERSAL COMMUNICATIONS - Methods and systems for an intelligent network protection gateway (NPG) and network architecture are provided. According to one embodiment, a firewall provides network-layer protection to internal hosts against unauthorized access by hosts of an external network by performing network address translation (NAT) processing of Internet Protocol (IP) addresses. The firewall also provides application-layer protection on behalf of the internal hosts and supports Voice over IP (VoIP) services by actively processing signaling protocols associated with VoIP sessions. An external VoIP interface of the firewall receives incoming VoIP packets having associated therewith an indication regarding a VoIP port of external interface. The packets are directed to an appropriate internal host by the firewall performing port address forwarding based on a mapping of VoIP ports to private addresses of the internal hosts. | 2015-09-10 |
20150256514 | AUTOMATIC DETECTION OF AUTHENTICATION METHODS BY A GATEWAY - Disclosed herein is a system and method for allowing access to secure resources through a gateway without having to pre-configure the gateway with each specific URL that access is to be granted as well as maintaining the list of resources that are exposed. The gateway is configured to take incoming requests from client devices, such as the URL, and determine from the URL itself what type of authentication is required to gain access to the resource as opposed to comparing the URL with a managed list of URL's. Once the authentication process is identified by the gateway that process is implemented. The gateway analyzes the responses from the resources that may include denials or user authentication requests from the resource to determine the authentication process to use to gain access to the resource. Once the user is authenticated the communications traffic between the client/user and the resource is permitted through the gateway. | 2015-09-10 |
20150256515 | PROXIMITY COMMUNICATION METHOD AND APPARATUS - A method for relaying a message is provided. The method includes transmitting, by an electronic device, a first message including a first anonymous identifier of the electronic device to at least one external device, and receiving a second message including the first anonymous identifier and a second anonymous identifier of the at least one external device. | 2015-09-10 |
20150256516 | MANAGE ENCRYPTED NETWORK TRAFFIC USING SPOOFED ADDRESSES - Methods and systems for managing encrypted network traffic using spoofed addresses. One example method includes receiving a request to resolve a domain name; determining that the domain name is included in a predetermined set of domain names; associating a spoofed address with the domain name; sending a response to the request to resolve the domain name including the spoofed address; receiving a secure request for a resource, the secure request directed to the spoofed address; identifying a user identity associated with the secure request; determining that the secure request is directed to the domain name based on the association between the spoofed address and the domain name; and selectively decrypting and/or blocking the secure request based at least in part on determining that the secure request is directed to the domain name and based at least in part on the user identity associated with the secure request. | 2015-09-10 |
20150256517 | Method and Apparatus for Providing Secure Communications Based on Trust Evaluations in a Distributed Manner - An approach is provided for providing secure communications based on trust evaluation in a distributed manner. A method can comprises: sending data to a plurality of devices, the data being encrypted with a communication key; encrypting the communication key with public attribute keys associated with attributes, wherein the attributes comprising at least one trust level related attribute representing an access condition for the data based on a trust level; evaluating a trust level of each device of the plurality of devices, to identify eligible devices of the plurality of devices whose trust levels satisfy the access condition; sending the encrypted communication key to the plurality of devices; and sending secret attribute keys associated with the attributes to each device of the eligible devices for decrypting the encrypted communication key, the secret attribute keys being personalized for the each device of the eligible devices. | 2015-09-10 |
20150256518 | Scalable and Secure Key Management for Cryptographic Data Processing - A method and system for secure and scalable key management for cryptographic processing of data is described herein. A method of secure key handling and cryptographic processing of data, comprising receiving a request from an entity to cryptographically process a block of data, the request including a key handle, wherein the key handle includes an authentication tag and an index; authenticating the requesting entity using the authentication tag; and referencing a plaintext key from a plurality of plaintext keys using the index if the requesting entity is authenticated successfully. | 2015-09-10 |
20150256519 | SECURING EMAIL CONVERSATIONS - At least a portion of a transmission of an outgoing first email from a first email account to at least a second email account is encrypted. Second email address data is changed corresponding to the second email account to cause replies to the first email intended for the second email account to be sent to an intermediate device prior to being routed to the second email account. Replies to the first email are then sent to the intermediate device and sent over one or more encrypted channels. Replies to the first email including the changed email address data are decoded to identify the second email address data associated with the second email account. A reply to the first email is then sent to the second email account based on the identified second email address data. | 2015-09-10 |
20150256520 | PROCESSING OF RESTRICTED DATA - Embodiments relate to operating a data processing system. An aspect includes receiving a request for data storage by an application server, said request comprising restricted-access data. Another aspect includes processing the request in the first application server thereby extracting said restricted-access data from the request. Another aspect includes encrypting said restricted-access data with a cryptographic key associated with said privacy regime to a cipher representation. Another aspect includes defining a masking rule relative to the field designated for storage of the cipher representation, the masking rule defining a set of privacy regimes applicable to processing of the restricted-access data. Another aspect includes forwarding the cipher representation and the masking rule to the shared database by a database client. Another aspect includes maintaining information about the cryptographic key in said database client for allowing plaintext reconstruction of restricted-access data from the cipher representation when retrieved from the shared database. | 2015-09-10 |
20150256521 | SECURE COMMUNICATION SYSTEM FOR MOBILE DEVICES - A comprehensive solution for providing secure mobile communication is provided. The system includes techniques for authentication and control of communication end-points; chain of trust to ensure devices are certified as authentic; contact list management; peer-to-peer encrypted voice, email, and texting communication; and a technique for bypassing an IP PBX to ensure high levels of security. The system is able to support use of commodity mobile communication devices (e.g., smart phones, laptops) over public carrier networks. | 2015-09-10 |
20150256522 | SYSTEM AND METHOD FOR COMMUNICATION OVER COLOR ENCODED LIGHT PATTERNS - The present invention includes a light communication method and system wherein messages are transmitted via color code flashes. The light communication may include the distribution of public key for the dissemination of messages to a receiver with a private key. | 2015-09-10 |
20150256523 | DISTRIBUTED LEARNING AND AGING FOR MANAGEMENT OF INTERNET PROTOCOL (IP) ADDRESSES - A device includes a security process unit (SPU) associated with a logical ring of SPUs. The SPU receives a packet with an address associated with a malicious source, and creates, based on the packet, an entry in a data structure associated with the SPU. The entry includes information associated with the packet. The SPU provides an install message to a next SPU in the logical ring. The install message instructs the next SPU to create the entry in another data structure, and forward the install message to another SPU. The SPU receives the install message from a last SPU, and sets a state of the entry to active in the data structure based on receiving the install message from the last SPU. The SPU performs a particular action on another packet, associated with the malicious source, based on the setting the state of the entry to active. | 2015-09-10 |
20150256524 | INFORMATION PROCESSING APPARATUS, IC CHIP, AND INFORMATION PROCESSING METHOD - There is provided an information processing apparatus including an encrypted-ID generation section which encrypts a unique ID to generate an encrypted ID, the unique ID being set as an ID unique to the information processing apparatus, a communication section which sends the encrypted ID as ID information to be sent to another apparatus, an individualization code holding section which holds, in advance, an individualization code capable of being generated by decrypting the ID information in the other apparatus, and an access key generation section which generates an access key used for authentication with the other apparatus based on the individualization code held by the individualization code holding section. | 2015-09-10 |
20150256525 | NETWORK SYSTEM, NETWORK DEVICE AND CONNECTION CONTROL METHOD - A network system includes: a network device; and a portable connection device capable of connecting thereto a terminal device which accesses the network device, where the portable connection device holds authentication information related to the connection between the network device and the terminal device, the authentication information being previously set. Here, the network device includes a processor, and the processor acquires the authentication information held in the portable connection device according to the connection of the portable connection device to the network device, acquires identification information on the terminal device from the terminal device according to the connection of the terminal device to the portable connection device, and compares the acquired authentication information with the identification information on the terminal device and device information on the network device to determine whether or not the access from the terminal device is allowed. | 2015-09-10 |
20150256526 | MATRIX SECURITY MANAGEMENT SYSTEM FOR MANAGING USER ACCOUNTS AND SECURITY SETTINGS - A network accessible user interface system for managing computer security rights is provided. The user interface system may include a graphical user interface for displaying and managing access rights to computer resources on at least one computer system, network or environment, a collapsible navigation tool, and an administrator authentication module. The graphical user interface may connect to one or more computer systems, networks or environments using the administrator's credentials for each environment and may allow the administrator to administrate the computer systems, networks or environments simultaneously. The graphical user interface may contain security matrices, each with at least two axes that display the resource and resource container hierarchy of the computer system and/or network and/or environment, and also display the security principal hierarchy of the computer system and/or network and/or environment, as well as the access rights the principals have to the corresponding resources on the computer system and/or network and/or environment. | 2015-09-10 |
20150256527 | METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR MANAGING MEDIA CONTENT BY CAPTURING MEDIA CONTENT AT A CLIENT DEVICE AND STORING THE MEDIA CONTENT AT A NETWORK ACCESSIBLE MEDIA REPOSITORY - Media content is managed by defining a list of authorized recipients in a network accessible security information repository, recording media content at a client device, obtaining the list of authorized recipients at the client device, associating at least one of the authorized recipients with the media content, and transmitting the media content along with information identifying the at least one of the authorized recipients associated therewith from the client device to a network accessible media repository for storage therein. The media content includes audio, video, and/or image content. | 2015-09-10 |
20150256528 | METHOD, DEVICE, AND SYSTEM OF DIFFERENTIATING AMONG USERS BASED ON RESPONSES TO INTERFERENCES - Devices, systems, and methods of detecting user identity, differentiating between users of a computerized service, and detecting a cyber-attacker. An end-user device interacts and communicates with a server of a computerized service, or with a local application or Web-browser running on the end-user device. A usage interference is injected or introduced, or an input/output mismatch or abnormality is created, causing an output displayed on the screen of the end-user device, to be non-matching to the expected or intended output that is typically displayed in response to regular non-interfered user gestures or regular non-interfered user input. The reaction or corrective manual actions of the user are tracked and analyzed, to differentiate among users, or to differentiate between an authorized human user and a human cyber-attacker, or to differentiate between an authorized human user and a computer bot or an automated computerized script. | 2015-09-10 |
20150256529 | NETWORK ELEMENT ACCESS METHOD, SYSTEM, AND DEVICE - A network element access method includes: sending, by a network element attempting to access a network, an access data request to a network element that has accessed the network, so that the network element that has accessed the network forwards the access data request to a network management element; receiving, by the network element attempting to access the network, an access data response sent by the network element that has accessed the network, where the access data response is generated by the network management element by performing authentication, and the access data response is sent, to the network element attempting to access the network, by the network management element via the network element that has accessed the network; and if the access data response indicates that the network element attempting to access the network is allowed to access the network, accessing the network. | 2015-09-10 |
20150256530 | COMMUNICATION TERMINAL AND SECURE LOG-IN METHOD - A communication terminal is provided with functions to redirect authentication data, make a substitute reply of a password to a biometric authentication part, and transfer the authentication data transmitted after the password to a browser's child process, in order to perform a substitute authentication using the biometric authentication or token, without requiring a user to input the password. | 2015-09-10 |
20150256531 | METHOD FOR READING ATTRIBUTES FROM AN ID TOKEN - The invention relates to a method for reading at least one attribute stored in an ID token, wherein the ID token is assigned to a user, comprising the following steps: authenticating the user with respect to the ID token, authenticating a first computer system with respect to the ID token, after successful authentication of the user and the first computer system with respect to the ID token, read-access by the first computer system to the at least one attribute stored in the ID token for transfer of the at least one attribute to a second computer system. | 2015-09-10 |
20150256532 | SERVER APPARATUS, INFORMATION PROCESSING METHOD, PROGRAM, AND STORAGE MEDIUM - An information processing method for a server apparatus controlling access based on a role of a user and a scope as authority held by an authorization token for realizing a unified license management structure that does not reduce an overall performance of a cloud service even if a plurality of services collaborate with the cloud service. | 2015-09-10 |
20150256533 | TOGGLE BETWEEN ACCOUNTS - Techniques are described for enabling administrators of teams that use a particular service to specify which sign-on options, of multiple possible sign-on options, are assigned to the members of the teams to which the administrators belong. For example, an administrator may assign a first sign-on option, which only allows users to use native authentication, to one set of members of the team. At the same time, the administrator may assign a second sign-on option, which only allows users to use third-party single-sign-on authentication, to another set of members of the same team. | 2015-09-10 |
20150256534 | ON-BOARD VEHICLE COMMUNICATION SYSTEM AND METHOD - An on-board vehicle communication system and method employ a storage device, a communication device and a controller. The storage device is configured to store a plurality of security certificates. The communication device is configured to receive external information that is external to a host vehicle equipped with the on-board vehicle communication system. The controller is configured to determine whether to begin a security certificate replenishment process to attempt to receive additional security certificates from at least one source that is external of the host vehicle based on the received external information, upon an amount of security certificates stored in the storage device decreasing below a first prescribed threshold. | 2015-09-10 |
20150256535 | METHODS AND SYSTEMS FOR TOKEN-BASED APPLICATION MANAGEMENT - Disclosed herein are methods and systems for token-based application management. In an embodiment, requests are received from applications for tokens that can be active or inactive. A token-interaction-directive pool is maintained in data storage, each directive having a triggering token, a target token, and one or both of triggering-token actions and target-token actions. Responsive to receiving a token request from an application, any directives having their triggering token equal the requested token and having their target token active are identified. A response plan that includes the actions in the identified directives is generated. Any triggering-token actions in the response plan are communicated to the requesting application, and any target-token actions in the response plan are communicated to each application that is authorized to access the corresponding target token. | 2015-09-10 |
20150256536 | Online Pseudonym Verification and Identity Validation - Methods, systems, and computer program products for authenticating an online user. Authentication involves sending a code from a server to a user device equipped with a source of illumination and a camera capable of capturing video imagery of the online user. The user device receives the code, modulates the source of illumination in accordance with the code, and captures video imagery of the user while the source of illumination is being modulated according to the code. The captured video imagery of the online user is sent to the server where it is analyzed to detect evidence of changes in illumination that correspond to the code. If good correspondence is found, the user may be authenticated. Similar methods may be applied to other biometric data. Applications of the authentication include identify validation, pseudonym verification, and distinguishing human from non human access attempts. | 2015-09-10 |
20150256537 | METHOD FOR PROVIDING A SECURE SERVICE - The present invention relates to a method for executing a command by a secure element from a non-secure device, the method including steps of: installing in the non-secure device a customized module for managing communications with the secure element, transmitting to the secure element first authentication data for authenticating the customized module, the customized module generating and transmitting to the secure element second authentication data for authenticating the customized module, if the secure element determines that the first and second authentication data are consistent with each other, establishing a secure communication link between the customized module and the secure element, by using the first or second authentication data, the non-secure device transmitting a command to the secure element, for an application installed in the secure element, and the secure element executing the command only if the command is sent via the secure communication link. | 2015-09-10 |
20150256538 | NETWORK SYSTEM AND COMMUNICATION DEVICE THEREIN - A network system includes first nodes and a second node. Each first node is directly communicatively connected to the second node, or each first node is indirectly communicatively connected to the second node through another first node. The second node includes a network layer and an application layer. When a new node desires is joining the first nodes, the network layer sends an update signal including first network address information of the new node. The application layer is configured to connect to a database and perform an authentication on the first network address information of the new node based on a node list in the database. When the new node passes the authentication, the application layer stores the update signal in the database. | 2015-09-10 |
20150256539 | USER AUTHENTICATION - Providing a user apparatus access to a computer system including services and authentication levels. A service request is determined for at least one of the services from a user apparatus. A distributed authentication provider is negotiated with to provide an authentication level based access control for the plurality of authentication levels associated with the plurality of services. The user apparatus to is redirected to access the distributed authentication provider such that the user apparatus authenticates itself at the distributed authentication provider for the authentication level associated with the at least one of the services within the service request. The user apparatus is provided access to the at least one of the services within the service request based on a successful authentication at the distributed authentication provider for the authentication level associated with the at least one of the services within the service request. | 2015-09-10 |
20150256540 | METHOD FOR PROVIDING USER INTERFACE FOR EACH USER, METHOD FOR PERFORMING SERVICE, AND DEVICE APPLYING THE SAME - A method and device for performing a service. The method includes detecting whether a user terminal device approaches an approach recognition area, receiving identifier information from the user terminal device, when it is detected that the user terminal device approaches the approach recognition area, obtaining user information based on the identifier information, and displaying a personalized area based on the user information. | 2015-09-10 |
20150256541 | USER AUTHENTICATION - Providing a user apparatus access to a computer system including services and authentication levels. A service request is determined for at least one of the services from a user apparatus. A distributed authentication provider is negotiated with to provide an authentication level based access control for the plurality of authentication levels associated with the plurality of services. The user apparatus to is redirected to access the distributed authentication provider such that the user apparatus authenticates itself at the distributed authentication provider for the authentication level associated with the at least one of the services within the service request. The user apparatus is provided access to the at least one of the services within the service request based on a successful authentication at the distributed authentication provider for the authentication level associated with the at least one of the services within the service request. | 2015-09-10 |
20150256542 | USER AUTHENTICATION - Method and system for user authentication are described. The method comprises receiving an authentication code from an application server seeking authentication of the user. Further, a private key of the user is computed in real time based on a user identity (ID) of the user and a master secret key of the PKG. The method further comprises, ascertaining a verification code based on the private key of the user and a verification timestamp, wherein the verification timestamp indicates a time at which the ascertaining of the verification code was initiated. Further, the authentication code is compared with the verification code. Further, the method comprises authenticating the user based on the comparison. | 2015-09-10 |
20150256543 | TEMPORARILY PROVIDING HIGHER PRIVILEGES FOR COMPUTING SYSTEM TO USER IDENTIFIER - A root user identifier of a computing system is disabled. Thereafter, and in response to determining that a problem with the computing system requires root privileges to the computing system to solve, a code patch for installation on the computing system is received from a third party. The code patch is installed on the computing system, resulting in a user identifier temporarily having the root privileges to the computing system. The user identifier is different than the root user identifier is. A password for the user identifier is provided to the third party to permit the third party to solve the problem with the computing system using the root privileges, via the user identifier temporarily having the root privileges to the computing system. The code patch is computer code installable on the computing system. | 2015-09-10 |
20150256544 | Method and Device for Gateway Managing Terminal - A method and a device for a gateway managing terminal are disclosed. The method comprises that: a Machine To Machine (M2M) gateway transmits an information request message to an M2M terminal requiring registration; and after the M2M gateway receives a message transmitted by the M2M terminal and responding to the information request message, the M2M gateway authenticates and verifies the M2M terminal. In the disclosure, by registering the M2M terminal on the M2M gateway, a problem in remote registration of the M2M terminal is solved, thereby providing a beneficial effect of simplifying a network connection. | 2015-09-10 |
20150256545 | CLOUD-BASED NETWORK SECURITY AND ACCESS CONTROL - Technologies are presented that provide cloud-based network security and access control in a networked computing system. A method may include: receiving a network traffic request from a user device, identifying the user device, applying rules specific to the network traffic request and the user device, obtaining data specific to the network traffic request in accordance with the applied rules, and providing the data to the user device for presentation to a user in accordance with the applied rules. Applying rules may include blocking, capturing, processing, redirecting, reporting on, and/or alerting to, network traffic related to the user device. The method may also include monitoring network traffic to and from the user device, and generating reports regarding the monitored network traffic. The method may further include detecting a rule violation, and providing a rule violation alert regarding the rule violation to one or more designated alert recipient devices. | 2015-09-10 |
20150256546 | Communications terminal and system and rights management method - The present invention provides a communications terminal and system and a rights management method, comprising: setting a rights list; listing unique identification information of user identity of each mobile terminal device that is allowed to access to the WiFi hot spot communications terminal; the communications terminal performing authentication on unique identification information in a mobile terminal authentication request; and establishing a connection. It is made convenient for the communications terminal to effectively manage access rights, and the management becomes simpler and easier to operate. Meanwhile, the communications terminal performs authentication on the unique identification information of the user identity, thereby making the authentication process more efficient and improving the security of the authentication process. Meanwhile, priorities of the access rights of users are set, so as to ensure that a user of a high priority has preferential access, thereby making the access rights management more user-friendly. | 2015-09-10 |
20150256547 | METHOD AND DEVICE FOR PROCESSING AND TRACKING TACACS+ SESSION - A method and device for processing and tracking a TACACS+ session, wherein, the method includes: registering an attribute value in a TACACS+ packet of a TACACS+ session to be tracked; when a TACACS+ client receives a TACACS+ request packet, analyzing the TACACS+ request packet to judge whether an attribute value in the TACACS+ request packet is the same as the registered attribute value or not; if the two are the same, saving the Session_id value in the TACACS+ request packet; when the TACACS+ client receives a TACACS+ response packet, comparing the Session_id value in the TACACS+ response packet with a saved Session_id value, and if the two Session_id values are the same, setting the status of the corresponding TACACS+ session as successful. The embodiments of the present document track the TACACS+ response packet, so as to implement the function of tracking the whole TACACS+ session that conforms to specific conditions. | 2015-09-10 |
20150256548 | FILE SYSTEM LEVEL DATA PROTECTION DURING POTENTIAL SECURITY BREACH - Immediately upon identifying a potential breach to a file system, a read-only snapshot of one or more file sets of data stored on a storage volume of the file system is created, and one or more file system protection commands are invoked that restrict access to the snapshot of the file set. Generating the snapshot and restricting access to the snapshot data may include immediately opening an administrative shell for the file-system in response to identifying a potential breach, and executing administrative shell commands that invoke creation of snapshot and limit access of the snapshot data to an administrator or super user. | 2015-09-10 |
20150256549 | SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR CONDITIONALLY PERFORMING AN ACTION BASED ON AN ATTRIBUTE - A system, method, and computer program product are provided for conditionally performing an action based on an attribute. In use, at least one attribute associated with an object is determined. Additionally, an event associated with the object is identified. Further, at least one action is conditionally performed in association with the event, based on the at least one attribute. | 2015-09-10 |
20150256550 | LOCATION AWARE SECURITY SYSTEM - Methods, computing devices, and systems that dynamically determine whether a request is authorized or fraudulent are described herein. A computing device may receive a request from a communication device, and a geographical location of the communication device may be determined. User information may be requested, and based on the information and the geographical location of the communication device, a risk value can be calculated. A determination of whether to honor the request may be based on the subscriber risk value. | 2015-09-10 |
20150256551 | LOG ANALYSIS SYSTEM AND LOG ANALYSIS METHOD FOR SECURITY SYSTEM - A log analysis system and method for a security system, which allow the security system monitoring communications between general systems to generate logs according to a predetermined rule and store the same in a log database are disclosed. A log analyzer determines whether log information containing attack content in the log database exists, and if log information containing attack content exists, sorts the log information by attack name. The log analyzer determines whether the attack content data of the log information sorted by attack name is based on a web request or not, and if the attack content data is based on a web request, performs HTTP-indicator-based text normalization. The log analyzer performs rule-pattern-based text normalization after the HTTP-indicator-based text normalization. According to an embodiment of the present invention, a quantitative basis for increasing an amount and accuracy of analysis and therefore improving accuracy of rules in the future can be established by making improvements to the conventional log analysis methods for security systems so that an operator or log analyst may discover a hacking attack in a timely manner. | 2015-09-10 |
20150256552 | IMALICIOUS CODE DETECTION APPARATUS AND METHOD - Disclosed herein is a malicious code detection apparatus and method, which detect malicious code based on the states of a system before and after a malicious code sample is executed. A state of a sample execution system before a malicious code sample is executed. Static analysis and dynamic analysis of the malicious code sample are performed. After the malicious code sample has been executed, a state of the sample execution system is extracted, the results of extraction of the state are compared with results of extraction of the state of the sample execution system before the malicious code sample is executed, and change information of the system is acquired. It is detected whether malicious behavior of the malicious code sample has been conducted, using static analysis information and dynamic analysis information corresponding to results of performing static analysis and dynamic analysis and the system change information. | 2015-09-10 |
20150256553 | Measuring Robustness of Web Services to Denial of Service Attacks - A method for measuring robustness of web services includes selecting a web-service method for testing. The request pattern with the slowest response by the web-service method from a series of request patterns is selected as a request pattern for testing. The series of request patterns includes irregular requests, each having a payload aimed at destabilizing the web service. A test is applied to the web-service method, using the selected request pattern applied at an increasing frequency to the web-service method. The response time of the request pattern is monitored by the web-service method. The frequency of the applied request pattern when a threshold maximum time for response of the web-service method to the request pattern is reached, or when the method fails, is determined by a computer processor. A metric is determined for the web-service method based on the frequency of the applied request pattern required to reach the threshold. | 2015-09-10 |
20150256554 | ATTACK ANALYSIS SYSTEM, COOPERATION APPARATUS, ATTACK ANALYSIS COOPERATION METHOD, AND PROGRAM - In a log analysis cooperation system including a logger that collects a log of a communication device and stores the log in a storage device, a SIEM apparatus that detects an attack, and a log analysis apparatus that analyzes the log collected by the logger, a log analysis cooperation apparatus stores an attack scenario in a storage device, receives from the SIEM apparatus warning information including information on the detected attack, computes a predicted occurrence time of an attack predicted to occur subsequent to the detected attack based on the warning information and the attack scenario, and transmits to the log analysis apparatus a scheduled search to search the log at predicted occurrence time computed. The log analysis apparatus transmits a scheduled search to the logger to search the log at the predicted occurrence time. | 2015-09-10 |
20150256555 | METHOD AND SYSTEM FOR NETWORK CONNECTION CHAIN TRACEBACK USING NETWORK FLOW DATA - Disclosed are provided a method and a system for network connection chain traceback by using network flow data in order to trace an attack source site for cyber hacking attacks that goes by way of various sites without addition of new equipment of a network or modification a standard protocol when the cyber hacking attack occurs in the Internet and an internal network. | 2015-09-10 |
20150256556 | METHOD AND SYSTEM FOR WEB INTEGRITY VALIDATOR - A computer-implemented method and system for the validation of a true browsing user on a website is disclosed. The invention allows for the collection of data regarding the evolving threat landscape created by online attackers. The system and method fingerprint user behavior to detect differences between a local user, a remote/foreign user, and an automated script. The system then covertly transmits that information back to a financial institution client without giving online attackers the opportunity to notice such transmittal. Certain embodiments of the invention also correspond with the browsing user to validate their identity. The claimed system and method proactively reveal attackers and attack ploys, additionally enabling institutions and security consultants to adapt to attacks in an automated fashion. | 2015-09-10 |
20150256557 | GRANTING PERMISSION TO ACT ON BEHALF OF A USER IN A SOCIAL NETWORKING SYSTEM - A social networking system allows entities to delegate actions performed on behalf of the entity to social networking system users by assigning one or more roles to social networking system users. Roles may be assigned based on information associated with the entity by the social networking system. Different roles are associated with sets of permissions specifying actions a user associated with a role is authorized to perform on behalf of the entity via the social networking system. Certain permissions of a role associated with the user may be associated with additional users by the user. A persona including a subset of information associated with a user by the social networking system may be created for a user assigned a role, allowing the user to limit information accessible to additional users connected to the persona. | 2015-09-10 |
20150256558 | SAFETY DEVICE, SERVER AND SERVER INFORMATION SAFETY METHOD - A safety device, a server and a server safety realizing method. The safety device includes: a communication module used to be butted with an external communication interface provided by the server and realize information interaction with the server through the interface; a firmware module used to be pre-configured with at least one safety control policy; and a processing module used to perform at least one of the safety control strategies so as to realize the information safety protection of the server in real time when the server detects the safety device. A high speed safety device integrating the safety control policy, for example, a security chip card, is utilized to protect the safety of the server, realize the safe plug and play function of the server, and realize to process an external server as an independence network and also completely isolate the external server from an internal gateway. | 2015-09-10 |
20150256559 | METHOD AND SYSTEM FOR PROTECTING DATA FLOW AT A MOBILE DEVICE - A method and system for evaluating and enforcing a data flow policy at a mobile computing device includes a data flow policy engine to evaluate data access requests made by security-wrapped software applications running on the mobile device and prevent the security-wrapped software applications from violating the data flow policy. The data flow policy defines a number of security labels that are associated with data objects. A software application process may be associated with a security label if the process accesses data having the security label or the process is in communication with another process that has accessed data having the security label. | 2015-09-10 |
20150256560 | Gateway based and centric network management and coordination - Gateway based and centric network management and coordination. Coordination and management of delivery of a source sequence, that has possibly undergone adaptive bit rate (ABR) encoding upstream to generate a number of respective fragments that may have different respective bit rates associated therewith, to one or more downstream, user, or client devices is achieved via appropriate communication network management and coordination performed by one or more communication devices within the system. In one instance, a home gateway communication device operates to perform such coordination management of a convergent network or convergent digital home network (CDHN). Consideration of any one or more local and/or remote conditions, parameters, etc. may be employed by such an application to ensure effective delivery of a source sequence to one or more client devices. | 2015-09-10 |
20150256561 | Method, Apparatus and System for Establishing Session - Provided are a method, an apparatus and a system for establishing a session. In the method, a Visit Policy and Charging Rules Function (V-PCRF) receives an S9 session establishment triggering message from a Home Policy and Charging Rules Function (H-PCRF), wherein the S9 session establishment triggering message is used for triggering establishment of an S9 session and a first S9 sub-session, and the first S9 sub-session is used for policy control of Evolved Packet Core (EPC)-routed traffic; the V-PCRF determines whether the S9 session has been or is being established; and when it is determined that the S9 session has been or is being established, the V-PCRF indicates to the H-PCRF that the S9 session has been or is being established. Through the solution, conflict is avoided in the process of establishing the S9 sub-session in the related art and the stability of the system is improved. | 2015-09-10 |
20150256562 | METHOD, SYSTEM AND NETWORK NODES FOR PERFORMING A SIP TRANSACTION IN A SESSION INITIATION PROTOCOL BASED COMMUNICATIONS NETWORK - Methods, systems and network nodes for performing a SIP transaction are provided. In one exemplary embodiment, a method, performed by a second node of sending a Session Initiation Protocol (SIP) message in a SIP-based communications network from a first node to a third node using the second node, may include receiving, by the second node acting as a SIP proxy, from the first node, the SIP message. Further, the method may include determining routing information for forwarding the SIP message to the third node. Also, the method may include sending, by the second node, to the first node, a pivot request to request that the first node forward the SIP message directly to the third node without traversing the second node. The pivot request may include the routing information | 2015-09-10 |
20150256563 | HAZARD DETECTION UNIT FACILITATING USER-FRIENDLY SETUP EXPERIENCE - A method for establishing a pairing between a smart-home device and an online account may include instantiating an application on a computing device and receiving a first code from a central server. The application may receive a second code from printed material associated with the smart-home device. The smart-home device may broadcast a first communication protocol, and the application may join the first mutation protocol. The application can be authenticated by the smart-home device using the second code, and the application can receive an identity of a second communication protocol from a user. The application can then transmit the identity of the second communication protocol to the smart-home device. The smart-home device can use the second mutation protocol to access the Internet and transmit the first code to the central server, where the central server can use the first code in completing the pairing process. | 2015-09-10 |
20150256564 | 4D Video & Media Effects Control System - This invention is a media controlled effects system, media controlled power supply, and software system that facilitates control of media presentations and external devices to produce effects corresponding with segments of media. The effects control signal, timing signals, and other media processing commands can be generated prior to media viewing or via real-time processing of visual, audio, and textual elements of the media presentation. Effect and command signals are processed by the hardware or software control system to provide power to, or otherwise control a media presentation or attached device. This invention accommodates control of ordinary devices to produce effects that make a media experience that is more enjoyable and can be comprised of both hardware and/or software achieve the desired result. The invention can be incorporated into other devices, function independently, or work in conjunction with other devices to provide or process either automated or manual control signals. | 2015-09-10 |
20150256565 | METHOD, SYSTEM AND PROGRAM PRODUCT FOR COLLABORATION OF VIDEO FILES - A method, system and program product comprise communicating to a server system. The server system is at least configured to receive video/audio uploads from users, to maintain the uploads in a database of collaborations comprising video files where each of the video files comprises a same video file format, and to send to a user a collaboration. A collaboration from the server system is received for presentation to a user. A contribution to the received collaboration is recorded. The contribution is uploaded to the server system. The server system is further configured to process the contribution into the received collaboration to have the same video file format and to at least layer audio. | 2015-09-10 |
20150256566 | Project Collaboration - Methods, systems, and apparatus, including computer programs encoded on computer storage media, for collaborating on projects. One of the methods includes receiving, at a user device, an indication of an update to a project, the project being identified by a project identifier. A camera device associated with the user device is activated in response to receiving the indication of the update to the project. Subject content is provided to a serving system, and the serving system provides a presentation thread of a project identified by the project identifier, the presentation thread comprising the subject content of the subject. The presentation thread of the project is presented on the user device. | 2015-09-10 |
20150256567 | SELECTIVE DATA CONTENT SHARING - Presented herein are selective data content sharing techniques that enable multiple data content windows displayed at a computing device to be separately displayed within a teleconferencing system. In one example, a content analyzer server of a teleconferencing system receives a request from a computing device connected to a local teleconference endpoint to initiate selective data content sharing. The content analyzer server is configured to identify a plurality of data content windows displayed at the computing device for selective sharing at separate displays of the local teleconference endpoint and at separate displays of one or more remote teleconferencing endpoints. The content analyzer server is further configured to split a data content stream originating at the computing device into a plurality of separate data content streams, wherein each data content window identified for selective sharing has an associated separate data content stream. | 2015-09-10 |
20150256568 | PHOTO-REVIEW CREATION - Photo-reviews provide an aesthetically pleasing and rich review experience resulting in greater comprehension and understanding of a reviewable item. In addition to providing a richer review format that is aesthetically pleasing, photo-reviews can also increase the number of inquiring users that find and ultimately view the photo-review. For example, many search engines utilize a search algorithm that prioritizes results including images over results that do not include an image. As a result, photo-reviews can receive a higher search ranking leading to more overall views by inquiring users. To promote including a photo in a review, pre-associated images relating to a reviewable item can also be provided to the user. Pre-associated images can be images known to be of or relating to a reviewable item. A reviewing user can select to include one or more of the pre-associated images in their photo-review, thereby simplifying creation of the photo-review for the user. | 2015-09-10 |
20150256569 | METHOD AND APPARATUS FOR CONSTRUCTING LATENT SOCIAL NETWORK MODELS - An approach is provided for constructing dynamic latent models that determine consumer/social network intrinsic properties and automatically recommend user interactions with different social networks. A modeling platform determines one or more social networks associated with one or more users, one or more devices associated with the one or more users, or a combination thereof. A modeling platform processes and/or facilitates a processing of data associated with the one or more social networks to generate one or more latent models describing the one or more social networks. A modeling platform causes, at least in part, a presentation of a recommendation to interact with the one or more social networks, one or more other social networks, or a combination thereof based, at least in part, on the one or more latent models. | 2015-09-10 |
20150256570 | Method for Operating Application Providing Group Call Service Using Mobile Voice over Internet Protocol - Disclosed is a method for operating an application providing a group call service using mobile voice over internet protocol (mVoIP). According to one embodiment, a request signal for a group call is received, and regardless of participation in the corresponding the group call, meta information for the group chat room corresponding to the group call can be received from a server. The meta information can comprise at least the group call connection status for each member of the group chat room. | 2015-09-10 |
20150256571 | CONTENT ACQUISITION DEVICE AND METHOD - A content acquisition device includes a processor that executes a procedure. The procedure includes: acquiring group data to identify a group that a user belongs to; and based on a period of time needed to acquire content from each of a first data processing device that holds content shared by the group indicated by the group data, and a second data processing device that is in the process of acquiring the content from the first data processing device, selecting a data processing device from which to acquire the content. | 2015-09-10 |
20150256572 | MULTIPLE USER INTERACTIVE INTERFACE - A plurality of participants in a conversation may be scored based on ability to correctly answer questions and based on entertainment value as determined by viewers of the conversation. The conversation may be in the form of a game, or may include a number of different substantially simultaneous conversations. Audio data and video data of the conversation may be transmitted over a network, and viewer scores of the participants in the conversation may be received over the network. Participants in future conversation may be selected based on their skill in answering questions and their entertainment value, with different future conversations using different weightings of skill scores and entertainment scores in determining who may participate in the conversation. | 2015-09-10 |
20150256573 | MOBILE DEVICE AND METHOD OF OPERATING SAME TO INTERFACE CONTENT PROVIDER WEBSITE - In a mobile device, a method of interacting with a first social networking website by way of a network includes communicating indirectly with the first social networking website by interacting with an intermediate web server by way of the network, the intermediate web server in turn being in communication with the first social networking website. The method further includes determining, based at least in part upon a user input received at the mobile device, that the mobile device should communicate directly with the first social networking website in a manner not involving the intermediate web server. The method also includes communicating with the first social networking website directly in the manner not involving the intermediate web server. In another embodiment, the method relates to interacting with a plurality of social networking sites including a first social networking website and a second social networking site. | 2015-09-10 |
20150256574 | SHARED SPACE FOR COMMUNICATING INFORMATION - Embodiments provide a shared space for communicating information. In an embodiment a number of users associated with a computing environment can use a shared space to communicate information with one another. Each computing device of the computing environment can include a shared space application. The shared space application includes a number of interactive tools that can be used to persist various communications between associated computing devices of a computing environment. | 2015-09-10 |
20150256575 | STREAMING CONTENT USING AD HOC NETWORKS OF USER DEVICES - Content, such as video content, may be shared by a user device that is participating in an ad hoc network via a short range local wireless connections. In one implementation, a method may include joining, by a user device and via direct wireless communication with other user devices, an ad hoc network including the other user devices; receiving, by the user device, a content stream from a cellular wireless network; transmitting, by the user device, an indication of the received content stream to the other user devices in the ad hoc network; receiving, by the user device and from one or more of the other user devices in the ad hoc network, a request for the content stream; forwarding, by the user device and based on the received request, the content stream to the one or more of the other user devices in the ad hoc network; and presenting, by the user device, the content stream to a user of the user device. | 2015-09-10 |
20150256576 | Multicast Packet Forwarding Method and Device - A multicast packet forwarding method, to implement multicast forwarding of an IPv6 multicast data packet on an IPv4 network, thereby saving bandwidth of the IPv4 network. The method includes: receiving an MLD multicast group join packet that is sent by an ISATAP host, encapsulated in an IPv4 unicast packet, and used for joining an IPv6 multicast group; maintaining an IPv6 multicast forwarding table according to the MLD multicast group join packet; receiving an IPv6 multicast data packet that is sent by an IPv6 network device and corresponds to the IPv6 multicast group; encapsulating, according to an IPv6-IPv4 multicast group mapping relationship, the IPv6 multicast data packet in an IPv4 multicast data packet, and sending the IPv4 multicast data packet to an IPv4 device, so that the IPv4 device forwards the IPv4 multicast data packet to the ISATAP host. | 2015-09-10 |
20150256577 | Directing Fragmented Content - Devices and methods of directing fragmented content, such as video or audio, to content players are disclosed. Requests are sent from content players to fragment directors to download fragmented content. The fragment directors identify, either internally or externally, content servers hosting said fragmented content. URLs corresponding to fragments of the fragmented content and pointing to different content servers are identified and selected by the fragment directors based on directing criteria. The URLs are provided to the content players. Therefore the fragmented content is balanced or switched on a fragment level among different content servers or groups of content servers. | 2015-09-10 |
20150256578 | Media Content Streaming Using Stream Message Fragments - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for media content streaming can include transacting access information associated with a media stream and transacting one or more fragments associated with the media stream to facilitate a delivery of media content associated with the media stream. Access information can include fragment sequencing information to facilitate individual retrieval of fragments associated with the media stream using a uniform resource identifier via a processing device configured to cache content. A fragment can include one or more stream messages. A stream message can include a message header and a corresponding media data sample. The message header can include a message stream identifier, a message type identifier, a timestamp, and a message length value. | 2015-09-10 |
20150256579 | REALTIME COMMUNICATIONS AND NETWORK BROWSING CLIENT - A graphical user interface is displayed. The graphical user interface includes at least one communication control for managing communications with other network nodes and at least one browser control for navigating to different network resource addresses. Human perceptible realtime output is generated from realtime communication data relating to a realtime communication session with at least one other client network node. In the process of generating of at least some of the human perceptible realtime output, operation of the client network node is managed based on at least one performance target. In the graphical user interface, a graphical representation of a network resource identified in connection with the browser control is displayed. | 2015-09-10 |
20150256580 | VIDEO STREAMING SYSTEM AND METHOD - A system and method implementing simultaneous video streaming to multiple end-user mobile user devices (MUD) is disclosed. The system/method utilizes an Ethernet/SATA bridge (ESB) to permit a host computer system (HCS) the ability to load video media content (VMC) on a local storage media (LSM) via a SATA multiplexer (MUX) using a hardware MAC-to-LBA transmission decoder (LTD). The HCS is configured to load a hardware service queue register (SQR) with end-user IP target address and VMC addressing information. A streaming FIFO controller (SFC) scans the SQR and retrieves data from the LSM via the SATA MUX and packetizes the IP target address and VMC data with an hardware Ethernet transport encoder (ETE) to transfer the VMC data stream directly from the LSM to the end-user MUD without HCS TCP/IP protocol intervention. | 2015-09-10 |
20150256581 | ABR VIDEO WHITE SPOT COVERAGE SYSTEM AND METHOD - A scheme for managing ABR streaming of content in a wireless radio network environment that may have radio white spot areas. Upon determining that the wireless UE device executing an ABR client application is in a radio white spot area, the current ABR streaming session may be suspended at a particular segment. Thereafter, playback of other content locally cached at the wireless UE device may be commenced in lieu of the ABR media segments. When the wireless UE device exits the radio white spot area, the ABR streaming session may be resumed from a point adjacent to the particular segment where the ABR streaming session was suspended. | 2015-09-10 |
20150256582 | METHOD AND APPARATUS FOR TRANSMITTING MESSAGES TO A DASH CLIENT - A client device communicates with a server to receive media streaming. The server detect a current media streaming session with the client device and determines a need to convey information regarding the ongoing media streaming session to the client device The server inserts a trigger in a hypertext transfer protocol (HTTP) response to a client device. The trigger is configured to indicate that a connection with the server is requested. The client device detects the trigger and verifies whether the server is a trusted server. After verifying that the server is trusted and the request is legitimate. The client device establishes a connection with the server and requests a message including information about the ongoing media streaming session. In response, the server sends a dynamic adaptive streaming over HTTP (DASH) message to the client device. | 2015-09-10 |
20150256583 | CONTENT DELIVERY NETWORK VIDEO CONTENT INVALIDATION THROUGH ADAPTIVE BITRATE MANIFEST MANIPULATION - A method for invalidating content segments of a bitstream. The method comprises a step of delivering a manifest file from an origin server to a content delivery network. The manifest file may have a time-to-live value and may be redelivered based on the time-to-live value. The method comprises a step of delivering one or more content segments from the origin server to the content delivery network. The manifest file may contain pointers to the content segments. The method comprises a step of modifying the manifest file at the origin server to include invalidation information based on an input signal. The method comprises a step of invalidating the content segments throughout the content delivery network based on the invalidation information. | 2015-09-10 |
20150256584 | SYNCHRONOUS TRANSMISSION SERVER - A content list manager is configured to manage a list of contents to be transmitted to the DLNA client as a content list. A stream transmission controller is configured to transmit a content stream in response to a request from the DLNA client for the content stream. Under the transmission status managed by a transmission status manager, when the requested content stream is not being transmitted to another DLNA client, the content list manager registers into the content list as a content for synchronization. | 2015-09-10 |
20150256585 | APPARATUS, SYSTEM, AND METHOD FOR MULTI-BITRATE CONTENT STREAMING - An apparatus for multi-bitrate content streaming includes a receiving module configured to capture media content, a streamlet module configured to segment the media content and generate a plurality of streamlets, and an encoding module configured to generate a set of streamlets. The system includes the apparatus, wherein the set of streamlets comprises a plurality of streamlets having identical time indices and durations, and each streamlet of the set of streamlets having a unique bitrate, and wherein the encoding module comprises a master module configured to assign an encoding job to one of a plurality of host computing modules in response to an encoding job completion bid. A method includes receiving media content, segmenting the media content and generating a plurality of streamlets, and generating a set of streamlets. | 2015-09-10 |
20150256586 | DEPLOYING OPERATORS OF A STREAMING APPLICATION BASED ON PHYSICAL LOCATION ATTRIBUTES OF A VIRTUAL MACHINE - A streams manager monitors operator performance of a streaming application to determine when the performance of an operator needs to be improved or optimized. The streams manager in conjunction with a cloud manager automatically determines one or more preferred virtual machines in a cloud with a specified streams infrastructure that best meet the needs of the underperforming operator or application component based on physical location attributes of the preferred virtual machines. The cloud manager determines the physical location attributes of the candidate virtual machines. The streams manager or the cloud manager can then determine a preferred virtual machine of the candidates to deploy the operator based on the physical location attributes. The streams manager then modifies the flow graph so one or more operators of the streaming application are deployed to a preferred virtual machine determined according to the physical location attributes of the preferred virtual machine. | 2015-09-10 |
20150256587 | Network Connection Servers And Related Methods For Interactive Music Systems - Network connection server systems and related methods are disclosed for interactive music systems. In certain embodiments, a network connection server system communicates network packets with interactive music client systems associated with music sessions and communicates directly with one or more ISPs to facilitate network packet communications for the music sessions. A plurality of network interfaces can also be provided, and latency determinations can be used to select communication paths. A plurality of server devices and related interfaces can also be used. Peer-to-peer connections can also be used and selected based upon latency determinations. The network connection server system can also be used to aggregate audio frames, to mix audio data, to download mixed audio data, to store recordings of mixed audio data, to broadcast mixed audio data, and/or for other purposes to facilitate communication of network packets associated with the interactive music sessions. Other variations can also be implemented. | 2015-09-10 |
20150256588 | ARCHITECTURE, SYSTEM AND METHOD FOR DYNAMICALLY PROVIDING DIGITAL CONTENT VIA A REFERENCE IMAGE - Embodiments of associating a reference image with a URL/URI assigned or related to digital media content are disclosed and enabling a first user to view the associated content via a web browser and reference image reader software and a second user to modify the associated content via a web browser. Other embodiments may be described and claimed. | 2015-09-10 |
20150256589 | DATA PROCESSING SYSTEMS AND METHODS - Embodiments of the present invention relate to data processing systems and methods for supporting data source integration, such as, for example, real-time web-site modification within a preserved security context by using a substitute an IP address of a desired resource to redirect a request for that resource to a proxy that can provide any such integration. | 2015-09-10 |
20150256590 | METHOD, SERVER AND SYSTEM FOR CONVERGING DESKTOP APPLICATION AND WEB APPLICATION - A method, Web server and computer system for converging a desktop application and a Web application. The method includes: in response to a request from a client user for using a target desktop application, starting a desktop application initialization process on the Web server and determining an appropriate corresponding hosting server for the user; preparing and provisioning desktop application environment on the corresponding hosting server and starting the target desktop application; transmitting the corresponding hosting server's address to the client to make desktop application interaction between the client and the corresponding hosting server; and in response to the completion of the desktop application interaction, stopping and exiting the target desktop application on the corresponding hosting server. The client user is provided with a unified Web console for accessing desktop applications and Web applications and Web files can be shared between the desktop applications and the Web applications. | 2015-09-10 |
20150256591 | SYSTEM AND METHOD FOR TRANSMITTING SUBMISSIONS ASSOCIATED WITH WEB CONTENT - Among other things, embodiments of the present disclosure enable real-time communication between a first user and a second user regarding web content, and enable the second user to receive a submission of at least some of the web content from the first user. | 2015-09-10 |
20150256592 | CONTROL OF LARGE SCREEN DISPLAY USING WIRELESS PORTABLE COMPUTER TO PAN AND ZOOM ON LARGE SCREEN DISPLAY - A multi-window user interface (UI) on a control device such as a tablet computer communicates commands to a display controller, which may be implemented by a game console. The controller controls presentation on a large screen display according to the commands. The control device may always present a multi-window UI which the control device can command to have mimicked on the display, with the UI also being configured to cause a single video to be presented whole screen on the display while the multi-window UI remains presented on the control device. The video feeds that populate the multi-window UI are of the same content but of lower resolution than those which are presented on the display. A movable window on the control device can be dragged and dropped to cause a corresponding magnifying focus on the display over the corresponding portion of video in focus on the control device. | 2015-09-10 |
20150256593 | SYSTEMS AND METHODS FOR CONTROLLING A DEVICE VIA GESTURES RECEIVED BY A REMOTE DEVICE - A method and system for sharing a user interface of a first device with a second device and enabling a user of the second device to interact with the user interface via gestures received by the second device. The first device (e.g., a smartphone) can host an application and generate a graphical user interface, which it transmits to the second device (e.g., a tablet computer) for display by the second device. The second device can receive input from a user, such as a touch input via a touchscreen of the second device, and transmit a representation of the input to the first device for providing input to the application hosted by the first device. | 2015-09-10 |
20150256594 | SYSTEM AND METHOD FOR ENABLING A COLLABORATIVE DESKTOP ENVIRONMENT - Described herein are systems and methods for enabling a collaborative remote desktop environment. The system includes a computing device and a first application instance that has an application state associated therewith. The first application instance includes, or is associated with, a current state component and application data/data files. The system further includes an application launcher that is used to instantiate a second application instance operating either on the same or on a different computing device. The second application instance similarly has an application state associated therewith and is associated with the application launcher. Upon receiving a request from the second user to interact with the first application instance, the application state and the application data/data files are communicated to the application launcher, and the application launcher instantiates the second application instance so that its state is substantially identical to that of the first application instance. | 2015-09-10 |
20150256595 | Method for sharing application - For sharing an application between mobile devices, an application share program is installed on mobile devices. The application share program is able to establish a link between at least one host mobile device and at least one client mobile device. A host mobile device shares a share session. An application of the share session is shared and installed on to the at least one client mobile device. And the application is uninstalled from the at least one client mobile device when the share session is terminated. | 2015-09-10 |
20150256596 | SERVER, CONTROL METHOD THEREFOR, AND CONTROL PROGRAM THEREFOR - A server including a first storage module for storing possessed objects of a first user and a second user, a communication module for receiving from a device of the first user a request for transfer of an object from the first user to the second user, a second storage module for storing an object transfer relationship between the first user and the second user in response to the request for transfer, and a benefit granting module for granting a predetermined benefit to the second user if a condition for granting a benefit in relation to an object transfer relationship of the second user with other users is satisfied when an object is transferred in response to the request for transfer. | 2015-09-10 |