42nd week of 2014 patent applcation highlights part 59 |
Patent application number | Title | Published |
20140310688 | USING STACK DATA AND SOURCE CODE TO RANK PROGRAM CHANGES - A computer accesses a stack data and a source code of a program. The computer searches for a first change made to the program, wherein the first change is one of a change to a method of the program, a change to a class of the program, a change to a method that is invoked by the program, or a change to a class containing a method that is invoked by the program. The computer identifies the first change that was made to the program and determines the probability that the identified first change caused one or both of an error and a regression. The computer generates a ranked list of identified changes based, at least in part, on the probability that the identified first change caused one or both of an error and a regression. | 2014-10-16 |
20140310689 | System And Method For Embedding Symbols Within A Visual Representation Of A Software Design To Indicate Completeness - A system and method for quickly discerning a process's completeness via graphical representation of processes by graphical objects with associated embedded symbols is disclosed. The present system and method decreases design time and increases personnel deployment efficiency. | 2014-10-16 |
20140310690 | System and Method for Generating Automated Test Cases for Command Line Based Applications - System and method embodiments are provided for creating automated test cases for an application or software command based on knowledge about the application command. An embodiment method includes reading general knowledge about a plurality of application commands from a global knowledge base for the application commands, reading local knowledge about the application command from a local knowledge base corresponding to the application command, identifying, in a syntax file of the application command, a plurality of command options and command variables, determining which of the command options to include in a test case, and replacing the command variables and any included command options in the test case with test values according to the local knowledge and the general knowledge. | 2014-10-16 |
20140310691 | METHOD AND DEVICE FOR TESTING MULTIPLE VERSIONS - Embodiments of the present application relate to a method for testing multiple versions, a device for testing multiple versions, and a computer program product for testing multiple versions. A method for testing multiple versions is provided. The method includes acquiring diversion tag values of users visiting a current product, the diversion tag values uniquely identifying the corresponding users, calculating diversion hashed values of the diversion tag values, and allocating an old version and a new version of the current product to the users according to a preset old version or new version allocation ratio for the current product and the diversion hashed values to test multiple versions of the current product. | 2014-10-16 |
20140310692 | SERVER THROTTLED CLIENT DEBUGGING - Systems and methods of debugging client applications may provide for detecting a runtime error in a first version of a client application, and obtaining a second version of the client application server in response to the runtime error. The second version of the client application may be used to conduct a diagnosis of the runtime error. | 2014-10-16 |
20140310693 | IMPLEMENTING EDIT AND UPDATE FUNCTIONALITY WITHIN A DEVELOPMENT ENVIRONMENT USED TO COMPILE TEST PLANS FOR AUTOMATED SEMICONDUCTOR DEVICE TESTING - A method for debugging test procedures for automated device testing is disclosed. The method comprises receiving a command to update at least one modified test procedure modified during a first debugging session and saving state information for a test plan, wherein the state information comprises information regarding a breakpoint entry location, and wherein the modified test procedure is invoked within the test plan. The method subsequently comprises suspending execution of the test plan and unloading the modified test procedure. It also comprises compiling the modified test procedure to produce a compiled file and then reloading the test procedure into the test plan using the compiled file. Finally, it comprises resuming execution of the modified test procedure in a second debugging session and breaking the execution during the second debugging session at a breakpoint corresponding to the breakpoint entry location. | 2014-10-16 |
20140310694 | USING APPLICATION STATE DATA AND ADDITIONAL CODE TO RESOLVE DEADLOCKS - A computer captures a thread state data of a first program. The computer generates a second program by applying a first program patch to the first program. The computer inserts additional code into a source code of the second program. The computer executes a first performance test using the second program and the inserted additional code. The computer monitors a first status of the second program and the inserted additional code that are under the first performance test. The computer determines a degree that a first deadlock state was prevented during the first performance test. The computer generates a first message based, at least in part, on the determined degree that the first deadlock state was prevented during the first performance test. | 2014-10-16 |
20140310695 | IDENTIFICATION AND TRANSLATION OF PROGRAM CODE EXECUTABLE BY A GRAPHICAL PROCESSING UNIT (GPU) - A device receives program code, and receives size/type information associated with inputs to the program code. The device determines, prior to execution of the program code and based on the input size/type information, a portion of the program code that is executable by a graphical processing unit (GPU), and determines, prior to execution of the program code and based on the input size/type information, a portion of the program code that is executable by a central processing unit (CPU). The device compiles the GPU-executable portion of the program code to create a compiled GPU-executable portion of the program code, and compiles the CPU-executable portion of the program code to create a compiled CPU-executable portion of the program code. The device provides, to the GPU for execution, the compiled GPU-executable portion of the program code, and provides, to the CPU for execution, the compiled CPU-executable portion of the program code. | 2014-10-16 |
20140310696 | TOOL-LEVEL AND HARDWARE-LEVEL CODE OPTIMIZATION AND RESPECTIVE HARDWARE MODIFICATION - The present invention relates to a method for compiling high-level software code into hardware, transforming each instruction into a respective hardware block and using an execution control signal representing the program pointer for triggering the execution within each respective hardware block. | 2014-10-16 |
20140310697 | COMPILATION OF TRANSFORMATION IN RECALCULATION USER INTERFACE - The compilation a transformation chain of a recalculation user interface that displays an electronic canvas that contains one or more displayed result of a transformation chain. The transformation chain includes transforms between a respective data source and data sink. User editing of the recalculation user interface could cause one or more of the transforms to be re-executed, thereby causing recalculation. The compilation involves analyzing the transformation chain of the recalculation user interface for dependencies to create a dependency graph of dependencies between entities. For instance, some dependencies might be between entities so as to indicate that if one entity is evaluated, then the other should be also. The dependency graph is then used to create a lower level of execution steps. The dependency graph is further provided to a runtime for the program, so that the dependency graph may be available during operation of the recalculation user interface. | 2014-10-16 |
20140310698 | APPARATUS AND METHOD FOR UPGRADING FIRMWARE OF MOBILE TERMINAL - A method for upgrading firmware of a mobile terminal includes dividing a first firmware into a plurality of first firmware sections, storing a copy of at least one of the first firmware sections in the mobile terminal, loading a second firmware divided into a plurality of second firmware sections, determining whether at least one of the second firmware sections has incurred an error, loading the stored copy of the first firmware section corresponding to the second firmware section if the second firmware section is determined to have incurred an error, and executing the first firmware section or the second firmware section for executing at least one of a kernel and an operating system of the mobile terminal. The method further includes replacing at least one of the second firmware sections having an error with a corresponding replacement second firmware section if an error is determined to have occurred. | 2014-10-16 |
20140310699 | Method And Apparatus For Upgrading A Plug-In Based On An Instant Messaging Application - A method and an apparatus for upgrading a plug-in based on an IM application. The method includes obtaining basic elements of an IM application with a version called by a plug-in to be upgraded to the IM application. A client is scanned to obtain basic elements of an IM application in the client. The method also includes comparing, according to a type of a basic element, the basic elements of the IM application with the version called by the plug-in to be upgraded with the basic elements of the IM application in the client. A client matching the basic elements of the IM application with the version called by the plug-in to be upgraded is determined. The plug-in to be upgraded is released to the matched client. | 2014-10-16 |
20140310700 | Selective Update of Core Mobile Device User Interface Through Application Marketplace - Systems and methods for selectively updating or extending built in functionality on a mobile device are disclosed. The updates may be provided to selective portions of software such that the entire software does not need to be replaced. The update may be provided through an application marketplace that provides third party software applications for mobile devices. The software that the mobile device is shipped with may include a number of “entry points,” which provide functionality that may be extended through the selective updates. When the entry point is triggered by user selection, a determination may be made whether code for the functionality is already available on the mobile device. If not, the mobile device may contact the application marketplace to determine if code is available to provide or extend the requested functionality. | 2014-10-16 |
20140310701 | CANCELLING DEVICE OVER THE AIR SOFTWARE UPDATE - A method and system are provided for providing a controlled software update to a group of computing devices. A server distributes a software update over the air to a first group of computing devices, through a wireless communication network. The first group of computing devices is monitored for successful installation of the software update. Upon determining that the software update is subject to a problem or potential problem, a second group of computing devices is identified based on the monitoring of the first group of computing devices. A software update cancellation message is sent through the wireless communication network to the second group of computing devices, instructing the second group of computing devices to cancel the software update in a way that is silent to the user of each respective computing device. | 2014-10-16 |
20140310702 | VEHICLE AND DEVICE SOFTWARE UPDATES PROPAGATED VIA A VIRAL COMMUNICATION CONTACT - A system for vehicle to another party communications that includes a vehicle personality module adapted to create a vehicle personality and a communications system that utilizes the created vehicle personality for one or more communications instead of a user's profile. The one or more communications are associated with one or more of an identifier and an icon representing the vehicle personality, with this identifier and/or icon sent with at least one communication and displayable to the recipient of the communication. | 2014-10-16 |
20140310703 | MULTI-MACHINE DEPLOYMENT AND CONFIGURATION OF MULTI-TIERED APPLICATIONS - Technologies are described herein for deploying and configuring a multi-tiered application to multiple computers. A selection of one or more application packages from multiple available application packages is received. Each of the selected application packages may correspond to one of multiple deployment configurations. The selected application packages may form the multi-tiered application. A union operation is performed on the multiple deployment configurations to generate a merged deployment configuration. A deployment workflow for deploying and configuring the selected application packages to the multiple computers is generated. The selected application packages are deployed to the multiple computers over a network according to the deployment workflow and the merged deployment configuration. | 2014-10-16 |
20140310704 | Network Interface Card Device Pass-Through with Multiple Nested Hypervisors - In a data center computing system, multiple nested hypervisors are run, including an outer hypervisor and at least one inner hypervisor running as a virtual machine on top of the outer hypervisor. A guest operating system is run as a virtual machine in the innermost hypervisor. An emulated network interface card device is executed in all hypervisors. An extender component is executed in the outer hypervisor and an extender component is executed in the inner hypervisors such that the extender components in the outer hypervisor and in the inner hypervisors are architecturally cascaded. An interface for the guest operating system is assigned to the emulated network interface card device in each of the outer hypervisor and the inner hypervisors to enable network communications to bypass the outer hypervisor and the inner hypervisors. | 2014-10-16 |
20140310705 | OPERATING SYSTEM IN A COMMODITY-BASED COMPUTING SYSTEM - Disclosed herein is a commodity infrastructure operating system that manages and implements the resources and services found in the heterogeneous components of the common infrastructure. The infrastructure operating system managing one or more services residing within an operating system image of a partition. The infrastructure operating system capable of providing a service of a first partition's operating system to a second partition's operating system when the second partition is in need of the service. | 2014-10-16 |
20140310706 | METHOD FOR MANAGING COMMODITY COMPUTING - Disclosed herein is a commodity infrastructure operating system that manages and implements the resources and services found in the heterogeneous components of the common infrastructure using a fabric manager. A fabric manager managing computing resources in one or more platforms and one or more partitions residing on the platform by monitoring each platform and partitions, and issuing instructions to a hypervisor or other management agent on a platform to execute one or more platform management commands, such as commission a new partition onto a platform. | 2014-10-16 |
20140310707 | CROSS-FUNCTION VIRTUALIZATION OF A TELECOM CORE NETWORK - In the present disclosure, functions associated with the central office of an evolved packet core network are co-located onto a computer platform or sub-components through virtualized function instances. This reduces and/or eliminates the physical interfaces between equipment and permits functional operation of the evolved packet core to occur at a network edge. | 2014-10-16 |
20140310708 | MECHANISM FOR PROVIDING VIRTUAL MACHINES FOR USE BY MULTIPLE USERS - According to one aspect of the invention, a request to generate a state checkpoint of a computer is initiated within a user-level software entity, such as a virtual machine. Upon sensing the request, a checkpointing mechanism generates and stores at least one checkpoint, each checkpoint comprising a representation of the total state of the computer system. Upon sensing a state restoration request corresponding to one of the checkpoints, the checkpointing mechanism restores the checkpointed state in the computer, which can then resume operation from the restored total state. According to another aspect of the invention, a total checkpointed state is exported to another computer, where the state can be modified, for example, debugged, and then loaded into either the originally checkpointed computer (which, again, may be a virtual machine), or some other computer. | 2014-10-16 |
20140310709 | TEMPORARY OR PARTIAL OFFLOADING OF MOBILE APPLICATION FUNCTIONS TO A CLOUD-BASED ENVIRONMENT - Techniques for temporarily and/or partially offloading mobile applications to one or more remote virtual machines in a server include establishing an application copy of a mobile application installed on a mobile device at a remote virtual machine, suspending the mobile application on the mobile device and offloading operations of the mobile application to the application copy at the remote virtual machine for a period of time. Suspending the mobile application and offloading its operations to the remote virtual machine for the period of time reduces consumption of resources on the mobile device. The virtual machine executes the application copy in the same manner the mobile device would execute the mobile application and transfers data from the execution to the mobile application at the end of the period of time to allow the mobile application to update itself and resume its operation without any loss of data or functionality. | 2014-10-16 |
20140310710 | SYSTEMS AND METHODS OF HOST-AWARE RESOURCE MANAGEMENT INVOLVING CLUSTER-BASED RESOURCE POOLS - Systems and methods are disclosed for managing resources associated with cluster-based resource pool(s). According to illustrative implementations, innovations herein may include or involve one or more of best fit algorithms, infrastructure based service provision, tolerance and/or ghost processing features, dynamic management service having monitoring and/or decision process features, as well as virtual machine and resource distribution features. | 2014-10-16 |
20140310711 | METHOD FOR DETERMINING PERFORMANCE OF PROCESS OF APPLICATION AND COMPUTER SYSTEM - A method and a computer system for determining performance of a process of an application are provided for application in the field of computer technology. When the process of the application is started, an apparatus for determining the performance of a startup procedure of the process acquires a process startup beginning time and determines a time of when the process is ready or able to respond to user input. The time of when the process of the application is ready or able to respond to user input may be used as the process startup ending time. A startup period for the process of the application is determined. Performance of the startup procedure of the process of the application is determined based on the process startup beginning time and the process startup ending time as the time the process of the application is ready or able to respond to user input. | 2014-10-16 |
20140310712 | SEQUENTIAL COOPERATION BETWEEN MAP AND REDUCE PHASES TO IMPROVE DATA LOCALITY - Methods and arrangements for task scheduling. A job is accepted, the job comprising a plurality of phases, each of the phases comprising at least one task. For each of a plurality of slots, a fetching cost associated with receipt of one or more of the tasks is determined. The slots are grouped into a plurality of sets. A pair of thresholds is determined for each of the sets, the thresholds being associated with the determined fetching costs and comprising upper and lower numerical bounds for guiding receipt of one or more of the tasks. Other variants and embodiments are broadly contemplated herein. | 2014-10-16 |
20140310713 | DISPLAY OBJECT PRE-GENERATION - In one embodiment, a computing device identifies a portion of a display object to pre-generate. The device may monitor a thread to identify the next upcoming window of idle time (i.e., the next opportunity when the thread will be idle for a minimum period of time). The device may add one or more selected pre-generation tasks to a message queue for execution by the thread during the window. The device may execute the one or more selected pre-generation tasks in the message queue by pre-generating at least one selected element of a display object with content for a portion of the content layout, and then return the display object. | 2014-10-16 |
20140310714 | PREDICTIVE DIAGNOSIS OF SLA VIOLATIONS IN CLOUD SERVICES BY SEASONAL TRENDING AND FORECASTING WITH THREAD INTENSITY ANALYTICS - Data can be categorized into facts, information, hypothesis, and directives. Activities that generate certain categories of data based on other categories of data through the application of knowledge which can be categorized into classifications, assessments, resolutions, and enactments. Activities can be driven by a Classification-Assessment-Resolution-Enactment (CARE) control engine. The CARE control and these categorizations can be used to enhance a multitude of systems, for example diagnostic system, such as through historical record keeping, machine learning, and automation. Such a diagnostic system can include a system that forecasts computing system failures based on the application of knowledge to system vital signs such as thread or stack segment intensity and memory heap usage. These vital signs are facts that can be classified to produce information such as memory leaks, convoy effects, or other problems. Classification can involve the automatic generation of classes, states, observations, predictions, norms, objectives, and the processing of sample intervals having irregular durations. | 2014-10-16 |
20140310715 | Modeling and Consuming Business Policy Rules - Concepts and technologies are described herein for modeling and consuming business policy rules. A policy server executes a policy application for modeling and storing the business policy rules. The business policy rules are modeled and stored in a data storage device according to an extensible policy framework architecture that can be tailored by administrators or other entities to support business-specific needs and/or operations. The modeled business policy rules can be used to support enforcement of business policy rules against various business operations, as well as allowing histories and/or other audits of business policy rules to be completed based upon information stored as the business policy rules. | 2014-10-16 |
20140310716 | COMMUNICATION CONTROL METHOD AND RECORDING - A non-transitory computer-readable recording medium stores a program, which when processed by a processor, causes a computer to serve as components of the computer. The components include a recording unit to record information indicating whether a communication requesting a first process is being performed in a transmitting source, the transmitting source performing the communication requesting the first process that takes a long time to complete and a communication requesting a second process that takes a time shorter than that of the first process, and a simultaneous connection control unit to control a number of communications requesting the first process by referring to the information stored in the recording unit such that at least one communication requesting the second process is performed in the transmitting source when a number of simultaneously occurring communications allowed to be performed is restricted in the transmitting source of the communications and a receiving destination. | 2014-10-16 |
20140310717 | Intelligent Data Storage and Processing Using FPGA Devices - A re-configurable logic device such as a field programmable gate array (FPGA) can be used to deploy a data processing pipeline, the pipeline comprising a plurality of pipelined data processing engines, the plurality of pipelined data processing engines being configured to perform processing operations, wherein the pipeline comprises a multi-functional pipeline, and wherein the re-configurable logic device is further configured to controllably activate or deactivate each of the pipelined data processing engines in the pipeline in response to control instructions and thereby define a function for the pipeline, each pipeline function being the combined functionality of each activated pipelined data processing engine in the pipeline. | 2014-10-16 |
20140310718 | METHOD, COMPUTER PROGRAM AND DEVICE FOR ALLOCATING COMPUTER RESOURCES OF A CLUSTER FOR EXECUTING A TASK SUBMITTED TO SAID CLUSTER - A method and device for allocating computer resources of a cluster for carrying out at least one job controlled by the cluster is disclosed. In one aspect, the method includes determining the placement of the job from physical features of the job and from physical features and availability of the computer resources of at least one processing area of the cluster. The method further includes receiving energy state features of the computer resources of at least the processing area; determining a recommended placement of the at least one job by correlating the physical features of the job, the physical features, availability and energy state of the computer resources on the basis of predetermined rules; and deducing, from the predetermined recommended placement, a recommended allocation list of the computer resources for carrying out the job in the cluster. | 2014-10-16 |
20140310719 | SYSTEM AND METHOD FOR CONTEXT-AWARE ADAPTIVE COMPUTING - The present disclosure relates to systems and methods for context-aware adaptive computing. In one embodiment, the present disclosure includes a method comprising receiving a request at a first information handling system (IHS) to perform an application computation. The method also includes determining a user's context, the user operating the first IHS, and ascertaining a battery state of the first IHS. The method further includes allocating the application computation between the first IHS and a second IHS based at least on the user's context and the battery state of the first IHS. The present disclosure also includes associated systems and apparatuses. | 2014-10-16 |
20140310720 | APPARATUS AND METHOD OF PARALLEL PROCESSING EXECUTION - An apparatus and method of parallel processing execution that executes a job through distributing the job to a plurality of calculators, based on a calculation property of the job. The apparatus for parallel processing execution may include a plurality of calculators to calculate a job configuring a plurality of tasks of a process, and a distributor to distribute the job to a plurality of calculators based on a calculation property of the job, wherein the plurality of calculators includes a first calculator to process a job through a controlled calculation, and a second calculator to process a job through a large volume calculation. | 2014-10-16 |
20140310721 | REDUCING THE NUMBER OF READ/WRITE OPERATIONS PERFORMED BY A CPU TO DUPLICATE SOURCE DATA TO ENABLE PARALLEL PROCESSING ON THE SOURCE DATA - Methods and apparatuses to reduce the number of read/write operations performed by a CPU may involve duplicating source data to enable parallel processing on the source data. A memory controller may be configured to duplicate data written to a first buffer to one or more duplicate buffers that are allocated to one or more processing threads, respectively. In some implementations, the one or more duplicate buffers are dedicated buffers, and the addresses of the first buffer and the one or more duplicate buffers are stored in a register of memory controller. | 2014-10-16 |
20140310722 | Dynamic Load Balancing in Circuit Simulation - Methods and systems are disclosed related to dynamic load balancing in circuit simulation. In one embodiment, a computer implemented method of performing dynamic load balancing in simulating a circuit includes identifying a plurality of simulation tasks to be performed, determining estimated processing durations corresponding to performance of the plurality of simulation tasks, distributing the plurality of simulation tasks to a plurality of processors according to the estimated processing duration of each simulation task, and performing the plurality of simulation tasks at the plurality of processors in parallel. | 2014-10-16 |
20140310723 | DATA PROCESSING APPARATUS, TRANSMITTING APPARATUS, TRANSMISSION CONTROL METHOD, SCHEDULING METHOD, AND COMPUTER PRODUCT - A data processing apparatus includes a processor configured to receive an interrupt request that is a trigger for execution of an interrupt process executed by the processor; store the received interrupt request to a recording area; calculate based on a time when the interrupt request is received and particular time information read from the recording area, a predicted time when a subsequent interrupt request is to be received; detect a thread to be executed by the processor, among executable threads of the processor; judge based on the calculated predicted time and a current time, whether there is a possibility of the interrupt process being executed while the detected thread is under execution; decide based on a judgment result, whether to execute the detected thread on the processor; and execute the detected thread on the processor, based on a decision result. | 2014-10-16 |
20140310724 | TESTING SYSTEM WITH METHODOLOGY FOR BACKGROUND APPLICATION CONTROL - A testing system with methodology for background application control is described. In one embodiment, for example, a method for controlling a background application is provided that includes steps of : prior to or after a test application enters a background execution state, the test application sending a first message to a reflector application via an interprocess communication facility provided by an operating system executing the test application and the reflector application; in response to the reflector application receiving the first message, the reflector application sending a second message to the first application via the interprocess communication facility; wherein sending the second message causes the operating system to transition the test application from the background execution state to a foreground execution state. | 2014-10-16 |
20140310725 | PACKET ROUTING WITHIN SERVER DEVICE ENCLOSURE - An enclosure is associated with a network address. A management processor of a server device within the enclosure and an enclosure processor of a management mechanism within the enclosure share the network address. A networking switch processor of a networking switch within the enclosure is to route the packet to the enclosure processor, or directly to the management processor without the packet passing through the management mechanism. | 2014-10-16 |
20140310726 | Vibrator and Audio Resource Sharing for Mobile Communication Device - A communication device includes at least two output apparatuses, and an interface circuit configured as an interface between the at least two output apparatuses and software drivers supported by an operating system embedded within the communication device, so that the software drivers can access the output apparatuses. The interface circuit includes an access control circuit configured to temporarily allocate a first one of the at least two apparatuses with a first one of the software drivers, so that other ones of the software drivers cannot access the first output apparatus during its allocation to the first software driver. The interface circuit also includes shared resource circuits configured to dynamically direct communication from the first software driver to the temporarily allocated first output apparatus. | 2014-10-16 |
20140310727 | Spooling system call data to facilitate data transformation - The techniques herein provide for “time-shifting” of intercepted system calls to enable a one-to-many (1:n) or a many-to-one (n:1) mapping of intercepted-to-real system calls. Any action that needs to be applied on the logical boundaries of the data (instead of the physical boundaries) presented upon system call interception spools (buffers) the data before taking the action and then unspools the result when finished. The action may be quite varied, e.g., examining the data, redacting the data, changing the data, restricting the data, processing the data, and updating the data, among others. The technique may be implemented in a database access control system. | 2014-10-16 |
20140310728 | APPLICATION-TO-APPLICATION LAUNCH WINDOWING - A window management system manages the placement of a window of a target application within a user interface. A source application launches the target application. The window management system arbitrates placement of a window of a target application within the user interface based on a target application placement preference parameter and a source application placement preference parameter. The window management system displays the window of the target application within the user interface according to the arbitrated placement. The window management system can also display a window of the source application within the user interface according to the arbitrated placement. | 2014-10-16 |
20140310729 | Electronic book that can communicate directly with hardware devices via a keyboard API interface - An educational electronic book (e-Book) facility that may be suitable for use in public school classrooms and many other environments may be based on an encapsulated HTML technology to facilitate complete interactive operation without use or risks associated with an external network connection, such as the Internet. | 2014-10-16 |
20140310730 | MULTIPLE INTERFACE SUPPORT - Aspects describe multiple interface support that provides dynamic switching between new and old interface revisions. A first interface application is selected from a set of alternative interface applications for an industrial automation system. Support for each interface application included in the set of alternative interface applications is provided. A second interface application is downloaded and associated with the first interface application. The second interface application is enabled during runtime. If needed, the second interface application can be selectively disabled and an operation resumed with the first interface application. | 2014-10-16 |
20140310731 | DISK DRIVE APPARATUS - There is provided a disk drive apparatus including a first chassis unit that has a first pickup base at which a first optical pickup has been disposed, and a second chassis unit that has a second pickup base at which a pulley supporting part has been provided and at which a second optical pickup has been disposed. A disk table on which a disk-like recording medium is loaded is disposed at the first pickup base. A support hole is formed in the pulley supporting part. A chucking pulley that sandwiches and holds the disk-like recording medium together with the disk table is supported by the pulley supporting part in a state of being inserted in the support hole. At the chucking pulley, provided are an escape part, a flange part, and a clamp part. | 2014-10-16 |
20140310732 | DISK DRIVE APPARATUS - There is provided a disk drive apparatus including a first chassis unit that has a first pickup base supported by the first base chassis through an elastically deformable insulator, and a second chassis unit that has a second pickup base supported by the second base chassis through an elastically deformable insulator. At least one of the first chassis unit and the second chassis unit is moved in a thickness direction of the disk-like recording medium, and the first pickup base and the second pickup base are connected to or separated from each other. Positioning parts for performing positioning of the first pickup base and the second pickup base at a time of connection are provided at the first pickup base and the second pickup base, respectively. The first pickup base and the second pickup base are connected to each other by magnetic forces of magnets. | 2014-10-16 |
20140310733 | DISK DRIVE APPARATUS - There is provided a disk drive apparatus including a first chassis unit that has a pickup base at which an optical pickup and a disk table have been disposed, and a first base chassis to which the pickup base has been attached, and a second chassis unit that has a second base chassis and at which a chucking pulley has been disposed. A first rectifying plate part is provided at the first base chassis. A second rectifying plate part is provided at the second base chassis. | 2014-10-16 |
20140310734 | OPTICAL DISC DEVICE - An optical disc device includes: a loader body having a recess and slopes; a traverse chassis provided to the loader body and having a protrusion guided along the recess, the traverse chassis being vertically movable; a turntable provided to the traverse chassis, for mounting the optical disc; and a clamper which clamps the optical disc between the clamper and the turntable when the traverse chassis ascends relative to the loader body to a clamp position, in which when the traverse chassis is at a position lower than the clamp position, the protrusion is guided along the recess, and when the traverse chassis is at the clamp position, the protrusion is positioned inside the slopes. | 2014-10-16 |
20140310735 | FLAT RATE BILLING OF CONTENT DISTRIBUTION - The invention relates to flat rate billing schemes and ways of improving the cost-efficiency in the broadcasting of e.g. streaming media. | 2014-10-16 |
20140310736 | METHOD AND APPARATUS FOR PRESENTING MEDIA PROGRAMS - A system that incorporates teachings of the present disclosure may include, for example, a computing device, including a controller to: transmit a client program having a graphical user interface to a media device operating in an interactive television network, wherein the client program presents a symbolic overlay that superimposes onto media content received by the media device and enables the media device to associate commentary with the media content received at the media device; and conduct searches for one of consumer products or consumer services associated with the media content based on the commentary regarding the media content. Other embodiments are disclosed. | 2014-10-16 |
20140310737 | METHOD AND SYSTEM FOR AUTHORIZING PLAYBACK FROM MULTIPLE DEVICES - A system and method for using content on multiple devices includes a head end associating a first user device and a second user device with a user account and authorizing the first user device and the second user device to receive content. The first user device forms a selection signal corresponding to a first content. The head end communicates the first content to the first user device corresponding to the selection signal. The first user device displays the first content on a first display associated therewith. The second user device receives the first content and displays the first content on a second display associated with the second user device. | 2014-10-16 |
20140310738 | CUSTOMER ASSOCIATED PROFILE FOR ACCESSING AUDIO AND VIDEO MEDIA OBJECTS - A method is disclosed for transferring a received media object to remote devices in accordance to attributes in a user profile. The profile information additionally determinates the versions of the media object that are available to such remote devices and whether the media object may be stored in such remote devices. | 2014-10-16 |
20140310739 | SIMULTANEOUS VIDEO STREAMING ACROSS MULTIPLE CHANNELS - Methods and systems for a media controller subsystem that can provide video streaming using a distributed network control server, media server, and virtual network console on a common processing or circuit board and filter and apply restrictions to media content based on one or more of the identity of the vehicle occupant requesting media content, the identity of a portable computational device associated with the vehicle occupant, and the spatial location of the vehicle occupant and/or remote computational device. | 2014-10-16 |
20140310740 | TRANSPORT STREAM PROVIDER, DAB SIGNAL PROVIDER, TRANSPORT STREAM ANALYZER, DAB RECEIVER, METHOD, COMPUTER PROGRAM, AND TRANSPORT STREAM SIGNAL - A transport stream provider for providing a plurality of transport stream packets describing digital media information is configured to provide a transport stream packet of a first packet type including a program association table and key information for decrypting encrypted media information. The program association table contains an association between a program No. and a packet type identifier of a further transport stream packet of a second packet type. The transport stream provider is configured to provide a transport stream packet of the second packet type in such a manner that the transport stream packet of the second packet type contains a reference to packet type identifiers of transport stream payload data packets which describe contents of different content types of the digital media information. | 2014-10-16 |
20140310741 | SYSTEM FOR SHARING DATA VIA CLOUD SERVER AND METHOD THEREOF - A method for sharing data to a television device via cloud, includes: obtaining identification information of the television device when receiving a register request including the identification information of the television device from the television device. Sending a verification code to the television device according to a network address of the television device. Providing a verification code input interface for inputting the verification code, in response to a predetermined user operation on the electronic device. Determining whether the verification code input via the verification code input interface matches with the verification code sent to the television device. Associating identification information of the electronic device with the television device if yes. In addition, determining the television device associated with the electronic device in response to an operation to share data on the electronic device, and then transmits the data to be shared to the television device. | 2014-10-16 |
20140310742 | DISPLAY APPARATUS, AND METHOD AND APPARATUS FOR SETTING UP AND CONTROLLING THE SAME - Disclosed are a display apparatus, and a method and an apparatus for setting up and controlling the display apparatus. The display apparatus includes a communicator configured to receive setting profile data of the display apparatus from an external device, and a controller configured to parse the received setting profile data and perform setting of the display apparatus based on the parsed setting profile data. | 2014-10-16 |
20140310743 | INSERTING AD ELEMENTS - Systems and methods are provided for presenting ad content with electronic content. In one implementation a method is provided that includes receiving, from a user device, a request that identifies a segment of electronic content, and selecting a set of ad metadata for the identified segment of electronic content, the selected set of ad metadata including information defining how ad content is to be presented. The method also includes selecting a set of content metadata for the identified segment of electronic content, the selected set of content metadata including information related to presenting the segment of electronic content, and instructing the user device to generate a presentation based on the selected set of ad metadata and the selected set of content metadata, the presentation including the segment of electronic content and at least one ad content element. | 2014-10-16 |
20140310744 | POWER MONITORING SYSTEM - A set top box is configured to detect that a television (or other electrical device) connected to the set top box is not in use, and places the television (or other device) into a lower energy usage state. The set top box includes a controlled power outlet adapted to provide power for the electrical device, a switch adapted to control power to the controlled power outlet, and a sensor adapted to sense at least one characteristic of the power drawn through the controlled power outlet, wherein the switch is operated in response to the sensed characteristic. For example, if the set top box has a television drawing power from the controlled power outlet, and the sensor senses that the television is in a decreased-power “standby” state, the switch may cut power to the controlled power outlet to avoid the parasitic power loss incurred by the standby state. | 2014-10-16 |
20140310745 | CAMPAIGN GENERATION FOR CONTENT ON DEMAND ASSET INSERTION - Systems and methods presented herein provide for Content On Demand (COD) asset insertion and to recommend changes to asset campaigns. One system includes a COD asset insertion decision system operable to process information from a remote COD content distributer about COD content selections by Customer Premises Equipment (CPEs) and to identify assets for insertion in the COD content selections. The system also includes a campaign manager communicatively coupled to COD asset insertion decision system and operable to provide asset campaigns to the COD asset insertion decision system. The campaign manager is also operable to collect information about the assets identified for insertion, to modify the asset campaigns based on the collected information, and to present the modified asset campaigns to asset managers through a communication portal. | 2014-10-16 |
20140310746 | DIGITAL ASSET MANAGEMENT, AUTHORING, AND PRESENTATION TECHNIQUES - Various techniques are disclosed for authoring and/or presenting packages of multimedia content. In at least one embodiment, the digital multimedia package may include video content, audio content, and text transcription content representing a transcription of the audio content. The video content, audio content, and text transcription content are each maintained in continuous synchronization with each other during video playback, and also as a user selectively navigates to different scenes of the video content. The text transcription content is presented via an interactive Resources Display GUI. Interacting with the Resources Display GUI, a user may cause the displayed text to dynamically scroll to a different portion of the text transcription corresponding to a different scene of the video. In response, the concurrent presentation of video content may automatically and dynamically change to display video content corresponding to the scene associated with the text transcription currently displayed in the Resources Display GUI. | 2014-10-16 |
20140310747 | EXPANDED PLAYLIST FOR TV VIDEO PLAYER - An Internet TV video guide shows thumbnails of video assets available from one or more providers, and one or more of the assets may represent a playlist with two or more associated video clips. When a viewer selects a playlist asset, the thumbnail is expanded to show the individual clips so that a viewer can select a desired clip for play on the TV. | 2014-10-16 |
20140310748 | CREATING COVER ART FOR MEDIA BROWSERS - Displaying art work or thumbnail images representative of movies, television (TV) programs/episodes and other media content is an appealing and often intuitive way of displaying available media content in a media content browser. However, computer displayable cover art is not necessarily available for all titles. For example, an older movie may not have computer displayable cover art because at the time the movie title was made available it was not anticipated that the movie title might be selectable through a media browser. After considering this description one will understand how the features of various implementations are configured to enable various systems, methods and devices to create computer displayable cover art or thumbnail images for media titles to be displayed by a media browser. | 2014-10-16 |
20140310749 | SYSTEMS AND METHODS FOR PROVIDING CHANNEL GROUPS IN AN INTERACTIVE MEDIA GUIDANCE APPLICATION - The present invention relates an interactive media guidance application that provides channel groups. Channel groups may include media channels, such as television channels, radio stations, Internet web sites, etc. Channel groups may be organized around a common characteristic, by utilizing user profile information, and by human editorial selection (e.g., by a service provider or by a user). The guidance application provides information on the channel groups, including media listings, reminders, pending and completed recordings, purchased programs, and previously accessed programs for the channel group. The guidance application enables the user to focus a guidance application function on the channel group. In response to a user initiation to execute the function on the channel group, the function may be executed on all the media channels belonging to the channel group. Information on the channel group and access to functions that are executable on the channel group may be concentrated in a channel group portal screen of the guidance application. | 2014-10-16 |
20140310750 | INTERACTIVE TELEVISION SYSTEMS WITH DIGITAL VIDEO RECORDING AND ADJUSTABLE REMINDERS - An interactive television system is provided in which an interactive television application is used to support network-based or local personal video recorder capabilities. A user may use this application to view lists of program listings. The user may select a program listing of interest. The interactive television application may allow the user to set a reminder for the selected program at the scheduled broadcast time. This application may also allow the user to set a reminder for the selected program at a later time at which the program is not scheduled to be broadcast. The user may be provided with a reminder at this later time. In response, the user may direct the network-based or local personal video recorder to play back the program or may defer the reminder again. The interactive television application may collect information on program usage and popularity to determine how long to retain certain programming. | 2014-10-16 |
20140310751 | SYSTEM AND METHOD FOR USING TELEVISION INFORMATION CODES - A system and method for using information codes for recording television programs. Information codes may be published in magazines, newspapers, and the like, much like VCR Plus+™ codes. When a user desires to record one or more television programs based on information codes, the user selects an appropriate command button on his or her input device, and enters the information code that identifies a desired filter category (e.g. an actor filter represented as “01”) followed by a desired filter identifier (e.g. Richard Gere represented as “1234”). A processor receiving the user input searches an electronic program guide database for programs matching the filter information. The identified programs are then stored in a record memory for recording at an appropriate time. The identified programs may be further displayed for verification prior to storage in the record memory. Programs recommended to the viewers may also be identified via information codes. | 2014-10-16 |
20140310752 | SHOPPING IN A MEDIA BROADCAST CONTEXT - A method of allowing a user to shop for items in a media broadcast context is disclosed. It is detected that a user is consuming a media broadcast. Items related to the media broadcast are identified. Correspondences between the identified items and listings of the items on a network-based publication system (e.g., eBay, Amazon.com, or Craigslist) are determined. The user is presented with options to perform actions with respect to the items or listings of the items. | 2014-10-16 |
20140310753 | TV APPARATUS AND METHOD FOR RECORDING AND PLAYING MULTIMEDIA AUDIOVISUAL PROGRAM - In a method for recording and playing multimedia audiovisual programs using a first television, the first television being is connected to a second television. The first television records a current multimedia audiovisual program being played on the first television in response to a recording command generated according to a user's operation, and sends the recorded multimedia audiovisual program to the second television according to an invoking command received from the second television. | 2014-10-16 |
20140310754 | METHOD AND SYSTEM FOR USE IN COORDINATING MULTIMEDIA DEVICES - Some embodiments of the present invention provide methods for use in playing back content. Some of these methods access a content package comprising media content to be locally played back; detect, as defined by the content package, whether a remote secondary device is available with which a connection can be established; determine whether an authorization to establish the connection has been confirmed; establish, when the authorization is confirmed, a communication connection; determine, as instructed by the content package and when the communication with the secondary device is established, whether one or more commands are received from the secondary device; and implement, as instructed by the content package and when it is determined that the one or more commands are received from the secondary device, the one or more commands in controlling playback experience of the media content. | 2014-10-16 |
20140310755 | CONFIGURATION DATA TRANSMISSION SYSTEM USING COAXIAL AND/OR FIBRE OPTIC DISTRIBUTION NETWORK - A rate adaptation mechanism to allow optimisation of the transmission of video and/or data streams and, in particular, multiple high definition video streams. The invention allows for the efficient transmission of the data through a system using coaxial and/or fibre optic communication means. | 2014-10-16 |
20140310756 | CAMPAIGN MODIFICATION FOR CONTENT ON DEMAND ASSET INSERTION - One embodiment herein includes a Content On Demand (COD) asset insertion system that is operable to process a plurality of asset campaigns from a plurality of asset managers, to process information from a remote COD content distributer about COD content selections by a plurality of Customer Premises Equipment (CPEs), to identify and qualify assets of the asset campaigns for insertion in the COD content selections, and to direct the remote COD content distributor to insert the qualified assets into the COD content selections. The embodiment also includes an analytics processor that is operable to collect information about the assets inserted in the COD content selections, to modify the asset campaigns based on the collected information, and to present the modified asset campaigns to the COD asset insertion decision system. The COD asset insertion decision system is further operable to re-qualify the assets based on the modified asset campaigns. | 2014-10-16 |
20140310757 | METHOD AND APPARATUS FOR TRACKING USER LOCATION WITHIN VIDEO OR AUDIO CONTENT STREAMED TO A MOBILE HANDSET - A method and apparatus for providing audio or video content to a mobile handset is provided. | 2014-10-16 |
20140310758 | VIDEO ON DEMAND SERVICE METHOD USING SOLID STATE DRIVE - Disclosed is a VOD service method using an SSD which can greatly reduce an occupancy rate of a CPU by loading packets to be transmitted on a plurality of packet arrays and allocating CPU sessions in the unit of loaded packet groups, and accordingly enable a VOD service to be performed at a high speed. According to the VOD service method using the SSD, it is possible to greatly reduce the occupancy rate of the CPU by loading packets to be transmitted on the plurality of packet arrays and allocating CPU sessions in the unit of loaded packet groups, and thus to provide the VOD service at a high speed. | 2014-10-16 |
20140310759 | TERMINAL DEVICE, SERVER DEVICE, INFORMATION PROCESSING METHOD, PROGRAM, AND COLLABORATIVE APPLICATION SUPPLY SYSTEM - The present disclosure relates to a terminal device, a server device, an information processing method, a program, and a linked application supplying system, which are capable of executing an application in conjunction with progress of content being viewed at a user's home. | 2014-10-16 |
20140310760 | APPARATUS AND METHODS FOR MULTI-STAGE MULTIPLEXING IN A NETWORK - Methods and apparatus for performing multiplexing of video or other content (e.g., programs) within a network using feed-back from a subsequent digital program insertion stage, and/or feed-forward information from a prior multiplexing stage. In one embodiment, the network comprises a hybrid fiber coax (HFC) cable network having headend and hub-based statistical multiplexing stages, and communication between the two stages is used to improve the visual quality performance and bandwidth utilization of the output multi-program stream during conditions where downstream content is inserted into the transport stream. Business methods associated with the various multiplexing features described above are also disclosed. | 2014-10-16 |
20140310761 | GENERATION, DISTRIBUTION AND USE OF CONTENT METADATA IN A NETWORK - Methods and apparatus for utilizing information (e.g., metadata) relating to content in a multimedia distribution network. In one embodiment, the network comprises a hybrid fiber coax (HFC) cable network, and the information comprises metadata relating to the bitrate profile of deterministic content such as stored video. Content sources, or the network operator themselves, generate the metadata which may then be used by the operator to adjust or optimize the operation of the network; e.g., more efficiently allocate the program to a multiplex. Network apparatus adapted to implement the metadata functionality and related business methods are also disclosed. | 2014-10-16 |
20140310762 | RECEIVING DEVICE AND METHOD OF CONTROLLING THE SAME, DISTRIBUTION DEVICE AND DISTRIBUTION METHOD, PROGRAM, AND DISTRIBUTION SYSTEM - There is provided a receiving device including a receiving unit configured to receive a stream of a content to be distributed live, an analysis unit configured to analyze fragmented text information corresponding to subtitle data included in the received stream, and a control unit configured to control display of first text information so as to allow the display to be continued when second text information out of the text information is displayed based on a result of the analysis, the second text information being started to be displayed temporally after the first text information is displayed. | 2014-10-16 |
20140310763 | DETERMINING SECURITY FACTORS ASSOCIATED WITH AN OPERATING ENVIRONMENT - Embodiments of the present invention disclose a method, computer program product, and system for determining security factors associated with an operating environment for a computer through a wireless network. The computer identifies one or more local computers operating within range of wireless communications to the computer through a wireless network. The computer determines a current operating environment corresponding to the one or more identified local computers. The computer determines a current security value for the current operating environment corresponding to identities and security of the identified local computers. The computer identifies data corresponding to the current operating environment, the data corresponding to a current time period of the current operating environment. The computer determines security information corresponding to the current operating environment, wherein the security information includes a familiarity of the computer to the current operating environment, and a historical security of the computer in the current operating environment. | 2014-10-16 |
20140310764 | METHOD AND APPARATUS FOR PROVIDING USER AUTHENTICATION AND IDENTIFICATION BASED ON GESTURES - An approach is provided for authenticating and/or identifying a user through gestures. A plurality of media data sets of a user performing a sequence of gestures are captured. The media data sets are analyzed to determine the sequence of gestures. Authentication of the user is performed based on the sequence of gestures. | 2014-10-16 |
20140310765 | On-Demand Security Policy Activation - On-demand activation of a security policy may be provided. Upon receiving a selection of a link, a profile identified by a security policy associated with the link may be activated and the link may be opened according to the security policy. In some embodiments, opening the link according to the security policy may comprise redirecting the opening of the link from a first application to a second application. | 2014-10-16 |
20140310766 | System, Method and Computer Program Product For An Authentication Management Infrastructure - A system and method for allowing a user to access enterprise resources comprising authentication devices and an authentication server. The authentication devices allow a user to enter authentication data. The authentication server is in communication with the authentication devices. The authentication server comprises a policy database storing a policy. The policy comprises guidelines including a first guideline establishes a qualification necessary for the user to access enterprise resources and a second guideline establishes a qualification necessary for the user to activate a silent signal. The authentication server is adapted to request assistance for the user if the silent signal is activated. | 2014-10-16 |
20140310767 | SECURITY MANAGEMENT SYSTEM, INPUT APPARATUS, SECURITY MANAGEMENT METHOD, AND RECORDING MEDIUM - A security management system managing security of plural types of client apparatuses which are mutually connected to each other via a network, includes an acquisition unit acquiring or receiving information which is used to change a security level of any of the client apparatuses; a determination unit determining a specific client apparatus whose security setting value is to be changed and a security setting value to be applied to the specific client apparatus, in response to the acquired or received information to change the security level of any of the client apparatuses, based on a definition table defining the security levels of the plural types of client apparatuses; and a notification unit notifying the specific client apparatus of the security setting value to be applied to the specific client apparatus. | 2014-10-16 |
20140310768 | SYSTEM AND METHOD FOR ENFORCING ROLE MEMBERSHIP REMOVAL REQUIREMENTS - System and method for enforcing role membership removal requirements are described. In one embodiment, the method includes, responsive to receipt of a removal request, performing a role evaluation of the removal request to generate a policy request; performing a policy evaluation of the policy request; generating a policy response in accordance with the policy evaluation; and enforcing the policy response. | 2014-10-16 |
20140310769 | TECHNIQUES FOR DELEGATION OF ACCESS PRIVILEGES - Systems and methods for controlling access to one or more computing resources relate to generating session credentials that can be used to access the one or more computing resources. Access to the computing resources may be governed by a set of policies and requests for access made using the session credentials may be fulfilled depending on whether they are allowed by the set of policies. The session credentials themselves may include metadata that may be used in determining whether to fulfill requests to access the one or more computing resources. The metadata may include permissions for a user of the session credential, claims related to one or more users, and other information. | 2014-10-16 |
20140310770 | SYSTEM AND METHOD FOR CREATING AND APPLYING CATEGORIZATION-BASED POLICY TO SECURE A MOBILE COMMUNICATIONS DEVICE FROM ACCESS TO CERTAIN DATA OBJECTS - A server creates categorization-based application policies and selects a specific policy to send to a mobile communications device. In one embodiment, the mobile communication device applies the categorization-based application policy received from the server to information about a data object (e.g., application) that the device wants to access (or has accessed). Based on the application of the categorization-based policy, the device may be permitted to access the data object or the device may not be permitted to access the data object. | 2014-10-16 |
20140310771 | Time-based Functionality Restrictions - Time-based functionality restrictions may be provided. Periodic scans may be performed to identify requests to perform functions on user devices, to determine whether the functions are compliant with compliance rules associated with the user devices that specify time periods during which the user devices are authorized to perform the functions, and to perform remedial actions if the functions are not compliant with the compliance rules. | 2014-10-16 |
20140310772 | Location-based Functionality Restrictions - Location-based functionality restrictions may be provided. Periodic scans may be performed to identify requests to perform functions on user devices, to determine whether the functions are compliant with compliance rules associated with the user devices that specify location where the user devices are authorized to perform the functions, and to perform remedial actions if the functions are not compliant with the compliance rules. | 2014-10-16 |
20140310773 | BROWSER ACCESS TO NATIVE CODE DEVICE IDENTIFICATION - A thick client installed on a client device includes a network protocol server that serves thin client requests for digital fingerprints of the client device. A thin client requests a digital fingerprint of the client device in which the thin client is executing by forming a URL according to a protocol served by the server of the thick client and addressing the URL to the local client device. The thick client returns the digital fingerprint as a response to the request from the thin client. | 2014-10-16 |
20140310774 | DEVICE AUTHENTICATION USING INTER-PERSON MESSAGE METADATA - A device authentication server authenticates a remotely located device using unique data associated with the user of the device stored on a remotely located server that has an established relationship with the device, such as client logic installed on the device and authentication data of the user stored on the device. The unique data can be unique metadata associated with inter-person messages. Since each user receives and sends a unique collection of messages, the unique message meta-data associated with a user's account is, in aggregate, unique. | 2014-10-16 |
20140310775 | DISPERSED STORAGE NETWORK WITH CUSTOMIZED SECURITY AND METHODS FOR USE THEREWITH - A method begins with a processing module selecting one of a plurality of dispersed storage (DS) processing modules for facilitating access to a dispersed storage network (DSN) memory. The method continues with the processing module sending a DSN memory access request to the one of the plurality of DS processing modules. The method continues with the processing module selecting another one of the plurality of DS processing modules when no response is received within a given time frame or when the response to the access request does not include an access indication. The method continues with the processing module sending the DSN memory access request to the another one of the plurality of DS processing modules. | 2014-10-16 |
20140310776 | Control Access Based on Network Status - Embodiments herein relate to controlling access to a device based on status information of a network. The device is connected to and detects status information from the network. Further, the device controls access to a feature of the device based on the detected status information. The device detects the status information and controls access regardless of at least one of a power state of the device and an operating state of an operating system (OS) of the device. | 2014-10-16 |
20140310777 | METHODS AND SYSTEMS FOR SERVER-INITIATED ACTIVATION OF DEVICE FOR OPERATION WITH SERVER - Methods and systems for enabling activation of a wireless communication device to operate with a server on a wireless communication network. An activation request is pushed from the server to the device, the activation request being authenticated with a signature signed with a server certificate. After the device verifies the activation request using server certificate and signature, a mutually authenticated communication session is established between the device and the server for activation of the device on the server. | 2014-10-16 |
20140310778 | METHOD AND SYSTEM FOR THIRD-PARTY SERVICE PLATFORM LOGIN - A third-party service platform login method is provided for a public platform containing information of a plurality of third-party service platforms. The method includes accepting a user logging onto the public platform from a client terminal, obtaining a third-party service platform selected by the user on the public platform, and obtaining a user identification number (UIN) of the user and a UIN of the selected third-party service platform. The user's UIN corresponds to a user account of the user on the public platform and the selected third-party service platform's UIN corresponds to a public account of the third-party service platform on the public platform. Further, the method includes combining the UIN of the user and the UIN of the selected third-party service platform to generate a new combined user account for the user to log onto the selected third-party service platform, and logging onto the selected third-party service platform. | 2014-10-16 |
20140310779 | SYSTEMS AND METHODS FOR EFFICIENT AND SECURE TEMPORARY ANONYMOUS ACCESS TO MEDIA CONTENT - A method for providing access to media content is performed at a device with a processor and memory storing instructions for execution by the processor. The method includes receiving, from a client device, a request for access to a media item. The method further includes obtaining user information associated with a user identifier corresponding to the request. Obtaining the user information includes, if the user identifier corresponds to a first type of user identifier, retrieving the user information from a database; and if the user identifier corresponds to a second type of user identifier different from the first type of user identifier, extracting the user information from the user identifier. The method further includes performing a media access operation based on the request and the user information associated with the user identifier. | 2014-10-16 |
20140310780 | COMMUNICATION SYSTEM - A system may include a computing device configured to receive a selection of an electronic item and receive a selection of a recipient. The computing device may associate at least one security option with the electronic item. The computing device may transmit the electronic item and the associated security option to a recipient device associated with the recipient. | 2014-10-16 |
20140310781 | METHODS FOR MANAGING AUTHORITY DESIGNATION OF GRAPHICAL USER INTERFACES - According to one aspect, a graphics management system receives a first message from a first process for granting one or more rights to a second process for accessing a GUI element owned by the first process. In response, the graphics management system transmits a second message to the second process, the second message offering the one or more rights to the second process. The graphics management system receives a third message from the second process indicating an acceptance of the offer. Thereafter, the graphics management system restricts access of the GUI element by the second process based on the one or more rights accepted by the second process. | 2014-10-16 |
20140310782 | TICKET-BASED SPECTRUM AUTHORIZATION AND ACCESS CONTROL - Aspects describe spectrum authorization, access control, and configuration parameters validation. Devices in an ad-hoc or peer-to-peer configuration can utilize a licensed spectrum if the devices are authorized to use the spectrum, which can be determined automatically. Aspects relate to distribution of authorization tickets by an authorization server as a result of validating a device's credentials and services to which the device is entitled. An exchange and verification of authorization tickets can be performed by devices as a condition for enabling a validated wireless link using the spectrum. | 2014-10-16 |
20140310783 | MESSAGING GATEWAY FOR DIRECTORY AND ANONYMOUS SERVICES - A subscriber who seeks to block access to contact information may receive identifying information for people attempting to access the subscriber's contact information. The subscriber also may be provided interfaces to enable the attempting person to contact the subscriber, in a variety of escalating forms, without revealing the subscriber's contact information. In a particular implementation, a request is received from an information seeker for contact information for a subscriber. A data structure is accessed that includes an indication that the subscriber should be provided with information relating to requests received for the subscriber's contact information. A message address for the subscriber is accessed, and a message is sent to the subscriber indicating the request for the subscriber's contact information. The requested contact information for the subscriber is withheld from the information seeker absent an indication from the subscriber that the requested contact information may be provided to the information seeker. | 2014-10-16 |
20140310784 | METHOD AND DEVICE FOR AUTHORIZING USER EQUIPMENT IN A WIRELESS COMMUNICATION SYSTEM - The present invention relates to a method and device for authorizing user equipment (UE) in a wireless communication system. The present invention also relates to a method and device for authorizing authorized true user equipment if an abnormal power down report is transmitted from a fake user equipment. The real user equipment checks the abnormal power down from a base station, receives an assignment A-MAP 1E, and transmits an authorized message to the base station if power is not abnormally down. Alternatively, user equipment transmits, to the base station, an abnormal power down signaling header that includes authorization parameters, such as COUNTER_TEK or a cipher-based message authentication code (CMAC). | 2014-10-16 |
20140310785 | IDENTITY MODULE WITH INTERCHANGEABLE UNIQUE IDENTIFIERS - A telecommunications system is provided, comprising a plurality of different cellular telecommunications networks, an identity module registrable on the plurality of different networks and containing multiple unique identifiers, each unique identifier being associated with a respective network; and, a device, operative in accordance with the identity module, to communicate with the networks when the identity module is registered on that network. The identity module comprises a common security key associated with at least two of the unique identifiers such that the identity module is registrable on each one of the plurality of networks when a unique identifier of the identity module and its associated security key are authenticated for that network. | 2014-10-16 |
20140310786 | INTEGRATED INTERACTIVE MESSAGING AND BIOMETRIC ENROLLMENT, VERIFICATION, AND IDENTIFICATION SYSTEM - The present invention provides an integrated interactive messaging system having a biometric engine in order to enhance security of interactive transactions or communications, while also expanding interactive capabilities. The biometric engine is operatively coupled to an interactive messaging system through a suitable network connection. The integrated system includes one or more biometric clients, as well as one or more client application servers. A rules engine is in communication or incorporated within the interactive messaging system. | 2014-10-16 |
20140310787 | Method and Apparatus for Remote Connection - A system and method for establishing a virtual network connection between an initiating computing device operated by an initiator and a target computing device operated by a target so that one of said computing devices is able to control the other of said computing devices. The system comprises a third party proxy to which the computing devices are connected. The third party proxy receives a request for a virtual network connection to said target computing device from said initiating computing device and requests initiator credentials for said initiating computing device and target credentials for said target computing device. Said credentials are delivered to the respective computing device. The system also comprises a core node configured to receive the credentials from the respective computing device, authenticate the received credentials, and if said credentials are authentic, establish the virtual network connection between said initiating computing device and said target computing device. | 2014-10-16 |