44th week of 2013 patent applcation highlights part 76 |
Patent application number | Title | Published |
20130291002 | Systems and Methods for Delivery of Media Content - Systems and methods for receiving from a first server a client specific information, transmitting a manifest request to a second server, the manifest request incorporating the client specific information, and receiving from the second server a manifest file. The manifest file may be associated with programming content divided into a plurality of segments. At least one of the plurality of segments may be based in part on the client specific information. | 2013-10-31 |
20130291003 | METHOD FOR MANAGING CONTENTS AND IMAGE DISPLAY DEVICE THEREFOR - Disclosed are an image display device and content management method using the same. The content management method includes obtaining at least one trial application from an application list stored in an image display device, searching the application list for at least one trial application, extracting state information of the stored trial application, determining state display information for displaying the trial application on the image display device on the basis of the state information, and displaying a list of applications in which the at least one trial application is included. Accordingly, a user is induced to select, execute, or delete an application according to a state of the trial application. | 2013-10-31 |
20130291004 | METHOD AND DEVICE FOR APPLYING PARENTAL CONTROL IN ADAPTIVE HTTP STREAMING TRANSMISSION - The present invention discloses a method and device for applying parental control in media. Corresponding parental control rating information is set for media contents in different time periods in the single media presentation; the parental control rating information is sent to a client; and the client processes the media contents in the single media presentation according to the parental control rating information, so as to make the effect of the parental control accurate. | 2013-10-31 |
20130291005 | DEVICE FOR THE ALLOCATION AND MANAGEMENT OF SUBSCRIPTIONS FOR THE RECEPTION OF BROADCAST PRODUCTS - A device to reduce bandwidth necessary for renewal of subscriptions for reception of broadcast services including: defining a plurality of sets of subscriber identification numbers, each set being associated with a product; splitting a set of subscriber identification numbers into groups of subscribers; searching for an available subscriber identification number related to the desired product at the time of initialization of a new subscriber; confirming that an inhibit duration has elapsed between the end of the previous subscription and the start of the new subscription; sending an initialization message to the new subscriber addressed with his unique identification address and containing the subscriber identification number of, and rights to, his product; preparing a group rights renewal message for the product to the group containing the subscriber identification number, this message comprising the group header containing this subscriber and a compressed bitmap for individually addressing each of the group members. | 2013-10-31 |
20130291006 | STREAMING VIDEO SERVER WITH VIRTUAL FILE SYSTEM AND METHODS FOR USE THEREWITH - A streaming video server generates a virtual file system that includes virtual addresses of a plurality of encrypted segments of a plurality of video programs at each of a plurality of bitrates, without storing the plurality of encrypted segments in persistent storage. A request is received from a client device to access a selected one of the plurality of video programs via a request to access the virtual file system. The plurality of encrypted segments of the selected one of the plurality of video programs are generated at a selected bitrate, in response to the request. | 2013-10-31 |
20130291007 | SYSTEMS AND METHODS FOR INDICATING MEDIA ASSET ACCESS CONFLICTS USING A TIME BAR - Systems and methods for indicating media asset access conflicts using a time bar in accordance with various embodiments of the present invention are provided. A media guide display that includes at least some media asset listings and a time bar is generated. A first portion of the time bar representing a first time interval during which media assets, for which a respective media guidance function has been assigned, are scheduled for transmission is identified. A second portion, within the first portion of the time bar, which represents a second time interval during which the scheduled transmission times of the media assets overlap is identified. A first indicator is generated, for display in the first portion, to represent the first time interval. A second indicator is generated, for display in the second portion, to represent the second time interval during which the scheduled transmission times of the media assets overlap. | 2013-10-31 |
20130291008 | SYSTEMS AND METHODS FOR AUTOMATED EXTRACTION OF CLOSED CAPTIONS IN REAL TIME OR NEAR REAL-TIME AND TAGGING OF STREAMING DATA FOR ADVERTISEMENTS - System and methods for finding and accessing desired audio content from audio content sources, including means and methods for extracting captions from a broadcast; aggregating the captions in a database; indexing the database content; searching the captions for a mention of at least one target; analyzing the results for desired content; indexing into the database to extract the desired content; thereby providing a method for quickly finding and accessing desired audio and video content from a large number of sources | 2013-10-31 |
20130291009 | Metadata Brokering Server and Methods - Exemplary embodiments of the present invention provide methods and systems for supplying rich multimedia metadata usable to generate, e.g., sophisticated entertainment user interfaces in the home. These methods and systems can be implemented as a server-based software application that feeds multiple, diverse clients. The server functionality could be distributed, even co-located physically with one or more clients, or centralized. The server aggregates, filters, validates, augments and links metadata from disparate sources. The server transforms the metadata into a more manageable and extensible internal format. The server communicates with client devices using a schema-independent protocol, providing metadata in the appropriate format that suites the clients needs. | 2013-10-31 |
20130291010 | METHOD OF INSERTING VIDEO ADVERTISEMENT IN WEB PAGE - A method of inserting video advertisement in a web page is provided, including steps of: sending a web page browsing signal via a client to a web page server, thereby allowing the web page server to provide web page information to the client; sending an advertisement connection signal via the client to an advertisement server when the client receives the web page information; searching corresponding video advertisement information via the advertisement server according to a relation condition of the web page information; and sending an advertisement generating signal to the client via the advertisement server for inserting and displaying the video advertisement information in the web page information. | 2013-10-31 |
20130291011 | TRANSCODING SERVER AND METHOD FOR OVERLAYING IMAGE WITH ADDITIONAL INFORMATION THEREIN - A transcoding server is provided, and the transcoding server includes a receiving unit configured to receive image data and additional information via a communication network; an additional middleware configured to process the received additional information; a decoding unit configured to decode the received image data; an overlay-mixer configured to generate integrated image data by overlaying the decoded image data with the processed additional information; an encoding unit configured to encode the generated integrated data image; and a transmitting unit configured to transmit the encoded integrated image data to one or more terminals. | 2013-10-31 |
20130291012 | System and Method for Interaction Prompt Initiated Video Advertising - Systems and methods for interaction prompts initiated video advertising are disclosed. According to one embodiment, a computer implemented method comprises storing digital advertising content, the digital content including digital video, and digital slideshows. An XML file is served from an ad server to a player embedded in a web site. One or more advertisements are dynamically generated from the XML file and digital content. The one or more advertisements are displayed with video content requested through the web site. | 2013-10-31 |
20130291013 | OPTICAL INTEGRATION SYSTEM FOR DISASTER EMERGENCY PROADCASTING COMMUNIVATION - The present invention relates to an optical integration system for disaster emergency broadcasting communication, including: sensor units which detect surrounding temperatures and strains and are separately located from each other; a broadcasting communication integration unit for transmitting an integrated broadcasting communication optical signal by multiplexing a received broadcasting signal and a received communication signal as optical signals having different wavelengths; reception units which receive the optical signal transmitted from the broadcasting communication integration unit, demultiplex the received optical signal according to each wavelength, transmit the separated broadcasting signal and the separated communication signal to a corresponding peripheral terminal, and transmit the information detected through the sensor units to the broadcasting communication integration unit; and a management server for determining a disaster state from the information which is detected through the sensor units and is received through the reception units and the broadcasting communication integration unit, and transmitting a processing signal through the broadcasting communication integration unit to the reception units according to the disaster state when determining the disaster state, wherein the management server transmits a signal to each guiding indication lamp connected to the separately arranged reception units on the basis of a location information database in which the location information of the sensor units is stored according to the recognized disaster state, and transmits an emergency guide broadcasting signal to the peripheral terminal, and each reception unit includes a mobile remote management server which further connects wireless sensor nodes so as to perform communication through the restoration of retrievable wired/wireless networks in the disaster state, and transmits the information through the wireless sensor nodes to the reception units by enabling communication with the management server and enabling remote connection with the wireless sensor nodes. The system of the present invention can induce reconstruction of destroyed power and information communication networks as emergency networks, and active evasion from a disaster area using independent emergency power in the disaster state. | 2013-10-31 |
20130291014 | METHOD AND SYSTEM FOR UNIFORMLY MARKING AND IDENTIFYING PLACEMENT OPPORTUNITY LOCATIONS FOR FACILITATING ACCELERATED DECISION RESOLUTION - A computer implemented method and system of marking signal streams for advertisement placement is disclosed. A server receives at least one source signal stream having a channel identifier. The server identifies an advertisement signal point in the at least one source signal stream. The server determines a temporal starting location of the advertisement signal point. The server generates a unique signal ID based on the temporal starting location of the advertisement signal point and the channel identifier. The server inserts the unique signal ID into metadata of the at least one source signal stream. The unique signal ID may be a universal unique identifier (UUID). | 2013-10-31 |
20130291015 | SMART TV SYSTEM AND INPUT OPERATION METHOD - A smart TV is provided. The smart TV has a network interface, configured to connect the smart TV with a mobile device via a network; and a processing unit, configured to execute a first remote virtual keyboard application for activating a remote virtual keyboard mode of the smart TV; wherein the processing unit further generates an input interface comprising a first virtual keyboard when the smart TV generates an input column in response to an input demand; wherein when the remote virtual keyboard mode of the smart TV is activated and there is the input demand, the processing unit hides the first virtual keyboard without being displayed, and uses the mobile device to replace the hidden first virtual keyboard for accepting input from a user. | 2013-10-31 |
20130291016 | TELEVISION USER INTERFACE - It is disclosed a video system comprising a video unit ( | 2013-10-31 |
20130291017 | IMAGE DISPLAY APPARATUS AND METHOD FOR OPERATING THE SAME - An image display apparatus and a method for operating the same are disclosed. The method for operating an image display apparatus includes receiving broadcast channel information, classifying channels into a 2D channel, a 3D channel or a mixed channel based on the received channel information, and displaying a channel list obtained by classifying the channels on a display if a channel list display command is input. | 2013-10-31 |
20130291018 | CONNECTED MULTI-SCREEN DIGITAL PROGRAM GUIDE - Techniques and mechanisms are described herein for presenting a connected multi-screen digital program guide. According to various embodiments, a personalized content guide may be transmitted to a first client machine. The first client machine may be associated with a content management account. The personalized content guide may include a plurality of media content channels created based on media content viewing history information associated with the content management account. Each of the media content channels including a respective plurality of media content items available for presentation in association with the content management account. A message indicating a selection of one of the media content items may be received from the first client machine. An instruction for presenting the selected media content item may be transmitted to the second client machine. | 2013-10-31 |
20130291019 | Self-learning methods, entity relations, remote control, and other features for real-time processing, storage, indexing, and delivery of segmented video - Self-learning systems process data in real-time and output the processed data to client applications in an effective manner. They comprise a capture platform that captures data and generates a stream of text, a text decoding server that extracts individual words from the stream of text, an entity extractor that identifies entities, a trending engine that outputs trending results, and a live queue broker that filters the trending results. The self-learning systems provide more efficient realization of Boxfish technologies, and provide or work in conjunction with real-time processing, storage, indexing, and delivery of segmented video. Furthermore, the self-learning systems efficiently perform entity relationing by creating entity network graphs, and are operable to identify advertisements from the data. | 2013-10-31 |
20130291020 | DIFFERENTIATED PSIP TABLE UPDATE INTERVAL TECHNOLOGY - An apparatus, method and data structure for generating at least one table in a broadcast environment, are provided. The apparatus includes a generator to generate an event information table (EIT) and an extended text table (ETT). The ETT has program guide information for an n-hour span and has a transmission interval. The ETT has a transmission interval and program description information according to the EIT. The transmission interval of the EIT is shorter than the transmission interval of the ETT. | 2013-10-31 |
20130291021 | DIGITAL TELEVISION SIGNAL, DIGITAL TELEVISION RECEIVER, AND METHOD OF PROCESSING DIGITAL TELEVISION SIGNAL - A digital television (DTV) signal for use in a DTV receiver includes an extended text table (ETT) which includes a header and a message body. The header includes a table identification extension field which serves to establish uniqueness of the ETT, and the message includes an extended text message (ETM). If the ETT is an event ETT, the table ID extension field includes an event identification which specifies an identification number of an event associated with the ETT. On the other hand, if the ETT is a channel ETT, the table identification extension field includes a source identification which specifies a programming source of a virtual channel associated with the ETT. A section-filtering unit included in the DTV receiver is able to use table identification extension fields of a plurality of ETTs for section-filtering a pertinent event or channel ETT from the ETTs. | 2013-10-31 |
20130291022 | METHOD, COMPUTER PROGRAM, RECEPTION APPARATUS, AND INFORMATION PROVIDING APPARATUS FOR ACCESSING CONTENT FROM A PLURALITY OF CONTENT SOURCES - A method, computer program, reception apparatus, and information providing apparatus for providing one or more virtual channel tables corresponding to one or more content sources. The reception apparatus includes an input unit and a processor. The input unit receives a channel selection from a user. The processor determines a source of content associated with the channel selection based on at least one virtual channel table stored in a memory. Based on the determined source of content, the processor controls a first communication interface to receive first content or a second communication interface to receive second content. The processor controls the first communication interface to receive the first content when the selected channel is determined to be associated with a first source, and controls the second communication interface to receive the second content when the selected channel is determined to be associated with a second source. | 2013-10-31 |
20130291023 | METHOD AND APPARATUS FOR PROCESSING AUGMENTED BROADCAST CONTENT USING AUGMENTATION REGION INFORMATION - Provided is a method for processing augmented broadcast content, and the method includes receiving, from a broadcast content provider, broadcast content and augmentation region information required to composite augmented content to an augmentation region in the broadcast content; receiving, from a user input device, selection information necessary to select one out of a plurality of augmented content providers; generating an augmented content request message based on the augmentation region information, and transmitting the augmentation content request message to an augmented content provider selected based on the selection information; receiving the augmented content from the augmented content provider; and compositing the augmented content to the augmentation region in the broadcast content by using the augmentation region information. | 2013-10-31 |
20130291024 | APPARATUS AND METHOD FOR PERFORMING VIDEO SCREEN SCRAPE - A method and apparatus for capturing a video frame and scraping the captured frame for data contained therein is provided. The scraping of the frame extracts data from the frame. A user, while watching television, requests a screen capture function. The video frame is stored in a (e.g., advertisement for local store, or frame buffer and further processing is performed to scrape the screen of data contained therein. In one example, text information such as phone numbers, web addresses, etc. can be identified using OCR technology. Once extracted, the information can be provided to the user in many different formats for further use or further processing. | 2013-10-31 |
20130291025 | CONTENT PLAYBACK DEVICE, METHOD FOR PLAYING BACK CONTENT AND CONTENT DELIVERY SYSTEM - A content playback device reduces user discomfort, relative to conventional devices, when playback is interrupted and resumed after switching viewing modes, pieces of content representing different viewing modes for a common product, and differing in video length or having other differences. The content playback device receives and plays back streaming content from a content server delivering two pieces of content having different viewing modes for the common product, and comprises: a selection unit selecting a viewing mode; a determination unit determining whether playback of a first piece of content not having the selected viewing mode was interrupted; a conversion unit converting, when the determination unit has determined affirmatively, a playback interrupt position into a corresponding position in a second piece of content having the selected viewing mode; and a request unit making a request to the content server for transmission of the second piece of content from the corresponding position. | 2013-10-31 |
20130291026 | ELECTRONIC DEVICE AND METHOD FOR TRANSFERRING DATA VIA DIGITAL TELEVISION NETWORK AND MOBILE COMMUNICATION NETWORK USING THE ELECTRONIC DEVICE - In a method for transferring data via a digital television (DTV) network and a mobile communication network using an electronic device, the method receives a DTV signal via the DTV network and detects a decode error rate (DER) of the DTV signal at a first frequency. The method further detects the DER of the DTV signal at a second frequency and detects an average signal strength of the mobile communication network when the DER is continuously greater than a first threshold value. The method builds an electronic connection between the electronic device and a multimedia server via the mobile communication network and receives multimedia data from the multimedia server when the DER is continuously greater than a second threshold value and when the average signal strength is continuously greater than a third threshold value. | 2013-10-31 |
20130291027 | APPARATUS AND METHOD FOR TRANSMITTING AND RECEIVING SIGNALING INFORMATION IN A DIGITAL BROADCASTING SYSTEM - A method for transmitting signaling information for reception of a broadcast service in a digital broadcasting system is provided. The method includes generating signaling information that includes a network information table indicating information about a transport network over which broadcast service data is transmitted, and a service information table indicating at least one broadcast service and information about at least one Physical Layer Pipe mapped to the at least one broadcast service, and transmitting the signaling information in a Generic Stream Encapsulation packet. | 2013-10-31 |
20130291028 | System And Method For Affinity Marketing To Mobile Devices - A method and system for providing selected content displays to users of mobile electronic devices and more specifically to a method and system for broadcasters to provide a marketing portal presented in the form of displayed customized broadcaster content. | 2013-10-31 |
20130291029 | CABLE TELEVISION CABLE TAP DEVICE - A cable television (CATV) cable tap device is disclosed. The cable tap device is part of a cable network which distributes upstream and downstream CATV signals between a cable television headend and one or more subscriber premises. The cable tap device includes a signal splitting device which taps off a portion of the CATV signals incident at the cable tap device entry port to a tap port of the cable tap device. The cable tap device includes a CATV signal conditioning circuit. The CATV signal conditioning circuit can include an in-home entertainment signal frequency rejection device, which prevents in-home entertainment signals from being conducted through the cable tap device to the headend. In some embodiments the cable tap device includes an ingress noise mitigation circuit, which mitigates ingress noise in the upstream CATV signals. | 2013-10-31 |
20130291030 | MULTIZONE AUDIO-VISUAL SYSTEM - A multi-zone audio-visual (AV) system that includes: (a) one or more AV devices (such as a TV) operable to provide audio and/or visual information; (b) a set-top box (STB) associated with each AV device; (c) a router; (d) an Ethernet connection between each STB and the router; and (e) a control server which operates to receive and record data from the router, the data including data indicative of the operating status (e.g., on or off) of the or each AV device, the operating configuration (e.g., TV channel) and the time of each change of status and/or configuration of the or each AV. The system comprises at least two remote AV control devices (Human Interface Devices, “HIDs”) for each AV device. The HIDs associated with each AV device operate to be automatically synchronised to the same status and configuration. The system may include a web server and a content server. | 2013-10-31 |
20130291031 | Systems and Methods for Adaptive Streaming with Augmented Video Stream Transitions Using a Media Server - Systems and methods for adaptive streaming with augmented video stream transitions using a media server in accordance with embodiments of the invention are disclosed. In one embodiment of the invention, a media server includes multimedia content including a set of alternative streams of video data and a processor, wherein the processor is configured to receive a request to stream multimedia content, stream a first stream of video data, where the first stream of video data is one of the set of alternative streams of video data contained in the multimedia content, receive a request for a second stream of video data, where the second stream of video data is one of the set of alternative streams of video data contained in the multimedia content, transmit an image in response to the request for the second stream of video data, and stream the second stream of video data. | 2013-10-31 |
20130291032 | METHOD FOR DELIVERING VIDEO CONTENT ENCODED AT ONE OR MORE QUALITY LEVELS OVER A DATA NETWORK - A client device receives streamed encoded content data, such as encoded video data, which has been encoded at a constant perceptual quality. Several different versions of the content are available to be streamed to the device, at different perceptual quality levels. In order to decide which quality level to request from a content server at intervals the device calculates the delivery rates that would be required for each level of quality. The calculation of the delivery levels is made in dependence on whether the actual delivery rate that has been received so far is greater than or less than a constant bit rate delivery schedule that decreases monotonically but which guarantees to deliver the encoded data in a timely manner such that no buffer underflow and interruption of reproduction takes place. The monotonically decreasing bit rate schedule is defined by one or more “critical points”, which are the points at which the bit rates are decreased, and correspond to the points where the delivery schedule is just equal to the decoding schedule of the encoded data. At such points there would be no encoded data in a buffer at the client. If the delivery rate has been greater than the constant bit rate schedule for a quality then the delivery rate required going forward for a particular quality level can be calculated from the critical point information, and no more complicated calculation is required. | 2013-10-31 |
20130291033 | PROGRAM IDENTIFICATION USING A PORTABLE COMMUNICATION DEVICE - According to one aspect, a portable communication device records a program being presented by a media presenting apparatus as media data, generates a query regarding a media channel and a program on that channel, which query includes said media data and sends said query to a system for determining a program on a media channel operated by a program determination service provider. The system receives the query, compares the query media data with data of a number of sets of reference media data related to at least one reception environment, where each set corresponds to a broadcast media channel, identifies the media channel, identifies a program in the media channel through using an electronic program guide, and sends data identifying the channel and the program to the portable communication device. | 2013-10-31 |
20130291034 | Network Monitoring with Estimation of Network Path to Network Element Location - A method of mapping a network path in which a geographic path of cables of a network between a geographic location of a network component and a geographic location of a terminal network element is estimated electronically using Keyhole Markup Language (KML) data. A geographically accurate street map is populated with the geographic location of the network component, the geographic location of the terminal network element, and the estimated geographic path. The map is capable of being displayed with the use of geospatial software implementing KML encoding. A signal processing electronic device for populating a display of an interactive graphical user interface with network path mapping information and a non-transitory computer readable storage medium having computer program instructions stored thereon that, when executed by a processor, cause the processor to perform the above referenced operations are also provided. | 2013-10-31 |
20130291035 | METHODS AND APPARATUS FOR STREAMING AUDIO CONTENT - An audio streaming device for providing live audio content to a plurality of personal recording devices is provided. The audio streaming device includes one or more processors programmed to establish a network connection with at least one of the plurality of personal recording devices, receive live audio from an audio capturing device, and stream the live audio to the at least one of the plurality of personal recording devices. | 2013-10-31 |
20130291036 | CONTENT TRANSFER DEVICE AND CONTENT TRANSFER METHOD, CONTENT REPRODUCTION DEVICE AND CONTENT REPRODUCTION METHOD, CONTENT DISTRIBUTION SYSTEM AND COMPUTER PROGRAM - An apparatus may include a control unit to control transmission of a transformed video stream over a network, in response to a reproduction control command for a video stream realized by an application executed by a browser at a client device. | 2013-10-31 |
20130291037 | METHOD AND SERVER FOR THE SOCIAL NETWORK-BASED SHARING OF TV BROADCAST CONTENT, AND METHOD AND DEVICE FOR RECEIVING A SERVICE FOR THE SOCIAL NETWORK-BASED SHARING OF TV BROADCAST CONTENT - A method and apparatus for transceiving television (TV)-content-related information based on a social network. A TV content sharing method for providing TV-content-related information to a plurality of TV users based on a social network includes receiving from a TV user a request to check in a TV content sharing service; providing real-time user information regarding users who check in a content checked-in by the TV user, in real time; and providing related service information regarding accessible related services in the social network in relation to the checked-in content. | 2013-10-31 |
20130291038 | System and Method for Managing Services on an Internet Protocol Television System - A service management system for an IPTV network includes a comparison module that provides a list of differences between a channel map and a change manifest, an optimizer module that receives the list and provides another IPTV channel map based on the differences, and a storage module that provides the first IPTV channel map to the comparison module and stores the second list and the second IPTV channel map. A method includes comparing a channel map with a change manifest in a comparison module, providing a list of differences between the channel map and the change manifest, evaluating the list to provide another list of services and another channel map, and storing the second list and the second channel map. | 2013-10-31 |
20130291039 | Methods, Computer Program Products, And Apparatus For Providing Broadband Television Service - Methods, computer program products and apparatus for providing broadband television service (BTS) are provided. The method includes receiving a channel selection at a receiver located at a service location. The channel selection is correlated to an Internet address. Data is requested from the Internet address. The request is made to a digital subscriber line (DSL) network via a modem. Video data packets containing live streaming video content are received from the Internet address in response to the requesting. The video data packets are received from the DSL network via the modem. The video data packets are assembled into video signals for display on a television and the video signals are transmitted to the television. | 2013-10-31 |
20130291040 | TRANSMISSION METHOD AND TRANSMISSION APPARATUS FOR A COMBINED BROADCASTING AND COMMUNICATION SERVICE - A reception method for a combined broadcasting and communication service includes receiving first metadata including second metadata, displaying the feasibility of reception of multimedia data replacing a broadcast program based on the first metadata including the second metadata, and receiving the multimedia data replacing the broadcast program through an Internet Protocol (IP) network based on the second metadata when the multimedia data replacing the broadcast program is determined, wherein the first metadata includes position information about the broadcast program, and the second metadata includes position information of the multimedia data replacing the broadcast program. Accordingly, a high-quality broadcast may be received. | 2013-10-31 |
20130291041 | METHOD AND MODULE DEVICE FOR CONTROLLING NETWORK ACCESS OF A TELEVISION DEVICE - A method for controlling network access of a television device and a module device thereof are disclosed. The method includes the following steps: inserting a network link tag in a television video, the network link tag recording a network link corresponding to the television video; transmitting the television video to the television device for playing; capturing the network link tag on the television video currently playing on the television device when receiving a network access instruction for acquiring the television video; and analyzing the network link tag to obtain the network link corresponding to the television video. This is very simple and convenient in operation. The network accessing to obtain the content of television video can thus be controlled by one button. | 2013-10-31 |
20130291042 | METHOD AND SYSTEM FOR CONTENT DELIVERY - A method and system for providing video content on a data network connected device having a display and a device display controller including a player. The method comprises the steps of a data network connected device, accesses a reference file including a plurality of player control parameter values and linking data for one or more content sources. Play control commands are provided to the player based on the play control parameter values. Content data is acquired by the player from one or more content sources via the data network using the linking data, and the content acquired from each source played on the display in accordance with the player control commands. The reference file may be a pre-existing reference file or a reference file created in response to a request to play the video content data. A reference file compiler is provided for generating the reference file. | 2013-10-31 |
20130291043 | METHODS, APPARATUSES AND COMPUTER PROGRAMS FOR MEDIA STREAMING - It is presented a method, executed in a media receiver connected to a media server in parallel via an internet protocol, IP, network and a cable television network. The method comprises the steps of: sending a media setup message to a middleware server, the media setup message comprising a content identifier, IP routing data and cable television routing data; receiving a setup confirmation message from the middleware server, the setup confirmation message comprising a transport indicator indicating which one of the IP network and the cable television network is to be used for media streaming from the media server to the media receiver; and receiving a media stream from the media server using either the IP network or the cable television network, as indicated by the transport indicator. Corresponding media receiver, middleware server, computer programs and computer program products are also presented. | 2013-10-31 |
20130291044 | LOW-COST LEAKAGE DETECTOR FOR A DIGITAL HFC NETWORK - A handheld leakage detector for finding digital QAM signal leaks in a HFC network, comprises a radio receiver, a leakage receiver, leakage sampler, a correlator, and a display. The radio receiver receives samples of the QAM signal taken from the HFC network, called “reference samples.” The leakage receiver receives a QAM leakage signal, which is related to the QAM signal from the HFC network. The leakage sampler samples the leakage signal to form leakage samples. The correlator performs a coherent cross-correlation of the reference samples and the leakage samples, to produce a correlation peak. A value is determined from the correlation peak and displayed on the display. The value generally becomes more optimized as the detector approaches the leak. The leak is sought by iteratively changing the position of the detector until the displayed value becomes substantially optimized or the leak is found. | 2013-10-31 |
20130291045 | Method and Apparatus for Transmitting Data in a Data Stream - The invention provides a method and apparatus that addresses and resolves the issues currently affecting the ability to offer Enhanced TV, in particular, those issues concerning timing and synchronization, interaction with other modules in the STB, and distribution. | 2013-10-31 |
20130291046 | BROADCASTING SIGNAL TRANSMISSION DEVICE, BROADCASTING SIGNAL RECEPTION DEVICE, AND METHOD FOR TRANSMITTING/RECEIVING BROADCASTING SIGNAL USING SAME - Disclosed is a broadcasting signal transmission device, a broadcasting signal reception device, and a method for transmitting/receiving a broadcasting signal using same. The method for receiving the broadcasting signal comprises the following steps: receiving the broadcasting signal, which includes a transmission frame, wherein the transmission frame includes a plurality of PLPs, which transmit components that constitute a broadcasting service, first signaling information and second signaling information, which include the signaling information of the plurality of PLPs, a first preamble signal, which has been signaled with a preamble format, and a second preamble signal, which has been signaled with pilot pattern information, wherein one of the plurality of PLPs is a base PLP, which includes a program number that corresponds to the broadcasting service and program map table information, which has been signaled with identifying information for each of the PLPs; demodulating the broadcasting signal based on the first and the second preamble signals; FEC decoding the demodulated broadcasting signal; and identifying a PLP group that includes the plurality of PLP from the FEC decoded broadcasting signal based on the first and the second signaling information, decoding at least one PLP of the identified PLP group, and providing the broadcasting service. | 2013-10-31 |
20130291047 | DIGITAL TELEVISION SIGNAL, DIGITAL TELEVISION RECEIVER, AND METHOD OF PROCESSING DIGITAL TELEVISION SIGNAL - A digital television (DTV) signal for use in a DTV receiver includes an extended text table (ETT) which includes a header and a message body. The header includes a table identification extension field which serves to establish uniqueness of the ETT, and the message includes an extended text message (ETM). If the ETT is an event ETT, the table ID extension field includes an event identification which specifies an identification number of an event associated with the ETT. On the other hand, if the ETT is a channel ETT, the table identification extension field includes a source identification which specifies a programming source of a virtual channel associated with the ETT. A section-filtering unit included in the DTV receiver is able to use table identification extension fields of a plurality of ETTs for section-filtering a pertinent event or channel ETT from the ETTs. | 2013-10-31 |
20130291048 | DIGITAL TELEVISION SIGNAL, DIGITAL TELEVISION RECEIVER, AND METHOD OF PROCESSING DIGITAL TELEVISION SIGNAL - A digital television (DTV) signal for use in a DTV receiver includes an extended text table (ETT) which includes a header and a message body. The header includes a table identification extension field which serves to establish uniqueness of the ETT, and the message includes an extended text message (ETM). If the ETT is an event ETT, the table ID extension field includes an event identification which specifies an identification number of an event associated with the ETT. On the other hand, if the ETT is a channel ETT, the table identification extension field includes a source identification which specifies a programming source of a virtual channel associated with the ETT. A section-filtering unit included in the DTV receiver is able to use table identification extension fields of a plurality of ETTs for section-filtering a pertinent event or channel ETT from the ETTs. | 2013-10-31 |
20130291049 | RECEIVING DEVICE, RECEIVING METHOD, PROVIDING DEVICE, PROVIDING METHOD, PROGRAMS, AND BROADCASTING SYSTEM - This technique relates to a receiving device, a receiving method, a providing device, a providing method, programs, and a broadcasting system that can control operations of external devices connected to the receiving device in synchronization with progress of a show being received. | 2013-10-31 |
20130291050 | METHOD FOR TRANSMITTING A BROADCAST SERVICE, AND METHOD AND APPARATUS FOR RECEIVING SAME - A broadcast receiver receives a packetized stream. The broadcast receiver extracts display time information from the header of the received packetized stream, and extracts preparation trigger information including a target service identifier from the payload of the received packetized stream. If a current time is a preparation time designated by the extracted display time information, the broadcast receiver starts to prepare an object corresponding to the target service identifier for activation at a later time. | 2013-10-31 |
20130291051 | SYSTEM CALL INTERCEPTION - System call interception is activated for an application process. It is recorded that system call interception is active for the application process. Ongoing checking is performed to determine whether system call interception remains active. | 2013-10-31 |
20130291052 | TRUSTED PUBLIC INFRASTRUCTURE GRID CLOUD - Systems and methods of implementing a secured cloud environment allow for design and instantiation of a security policy at the infrastructure level. An example system may comprise a first module to facilitate selecting at least two cloud computing component templates from a cloud computing component catalog. The system may comprise a second module to facilitate defining a connection between the at least two selected cloud computing component templates. The system may comprise a third module to facilitate assigning a security level and a policy to at least one of the at least two selected cloud computing component templates. The system may comprise a fourth module to facilitate building a cloud computing component blueprint. | 2013-10-31 |
20130291053 | Security Controlled Multi-Processor System - Embodiments of the present disclosure provide systems and methods for implementing a secure processing system having a first processor that is certified as a secure processor. The first processor only executes certified and/or secure code. An isolated second processor executes non-secure (e.g., non-certified) code within a sandbox. The boundaries of the sandbox are enforced (e.g., using a hardware boundary and/or encryption techniques) such that code executing within the sandbox cannot access secure elements of the secure processing system located outside the sandbox. The first processor manages the memory space and the applications that are permitted to run on the second processor. | 2013-10-31 |
20130291054 | METHOD AND APPARATUS FOR PROVIDING AUDIO OR VIDEO CAPTURE FUNCTIONALITY ACCORDING TO A SECURITY POLICY - Systems and methods for providing capture functionality according to a security policy are provided. A request to capture content is received from a requesting application at a capture controller. The request is evaluated based on the security policy of the capture controller. Based on the evaluation, a determination is made as to whether the request is to be granted completely, denied, or granted subject to a constraint. Capture of the requested content is initiated via capture hardware or software if the request is granted completely or granted subject to the constraint. | 2013-10-31 |
20130291055 | Policy-based dynamic information flow control on mobile devices - A method for securing data on a mobile device that supports both enterprise and personal applications. According to the method, information flows and data accesses are tracked on the device at run-time to enable access control decisions to be performed based on a policy, such as an enterprise privacy policy that has been distributed to the device from an enterprise server. The policy may be updated by events at the device as well as at the enterprise server. | 2013-10-31 |
20130291056 | QUORUM-BASED SECURE AUTHENTICATION - Representative embodiments of secure authentication to a resource in accordance with a predefined, electronically stored quorum-based authentication policy include causing electronic interaction among multiple devices that constitute a quorum in accordance with the policy, computationally determining whether the interaction satisfies the policy, and if so, electronically according access to the resource to one or more individuals associated with the interacting device(s). | 2013-10-31 |
20130291057 | SECURITY SYSTEM AND METHOD FOR CONTROLLING INTERACTIONS BETWEEN COMPONENTS OF A COMPUTER SYSTEM - The embodiments of the present invention relate to controlling interactions between one or more components of a computer system, where each component is assigned a fixed security level and all currently active and newly requested interactions between components of the system are monitored. | 2013-10-31 |
20130291058 | SYSTEMS AND METHODS FOR IMPLEMENTING CUSTOM PRIVACY SETTINGS - A social network aggregation platform collects user generated content from multiple disparate social network platforms. The platform includes methods and systems for maintaining and applying user-selected and/or platform-specific privacy settings to the content when distributed or published. User privacy settings are compiled across platforms and used as a filter list against user-generated content. As a content stream is ingested into a platform, the source(s) of the invention content items are checked and the appropriate privacy settings are applied. | 2013-10-31 |
20130291059 | SYSTEM AND METHOD FOR USING PARTIAL EVALUATION FOR EFFICIENT REMOTE ATTRIBUTE RETRIEVAL - An attribute-based policy defining subjects' access to resources is enforced by a computer system. A processing means (PDP) in the system communicates with a nearby attribute value source and at least one remote attribute value source and is adapted to evaluate the policy for an access request containing one or more explicit attribute values, which together with the policy define at least one implicit reference to a further attribute value, which is retrievable from one of said attribute value sources. The processing means reduces the policy by substituting attribute values for attributes in the policy if they are contained in the request or retrievable from the nearby source. References to further attributes retrievable from a remote source only are cached together with intermediate results. All attribute values from a given remote source are retrieved on one occasion, and the intermediate results are used to terminate the evaluation. | 2013-10-31 |
20130291060 | SECURITY FACILITY FOR MAINTAINING HEALTH CARE DATA POOLS - Disclosed herein are systems and methods for syndication and management of structured and unstructured data to assist institutional healthcare delivery, healthcare providers' practices, healthcare providers' group practices, collaborative academic research and decision making in healthcare, including through the utilization of medical devices and healthcare pools. | 2013-10-31 |
20130291061 | INFORMATION PROCESSING APPARATUS AND CONTROL METHOD THEREOF - An application to be installed is acquired. Security policy geographic information, which is geographic information of an application's target distribution area where a user permits installation, is acquired from security policy that defines processing regarding the application. Application geographic information, which is geographic information of an application's target distribution area, is acquired from the acquired application. Based on a comparison result of comparing the security policy geographic information with the application geographic information, whether or not to permit installation of the acquired application is determined. | 2013-10-31 |
20130291062 | Secure Administration of Virtual Machines - Methods and systems for performing secure administration of virtual domain resource allocation are provided herein. A cloud service provider (CSP) may provide instances of virtual machines to one or more contracting user entities. The cloud service provider may store an authorization database identifying one or more resources (e.g., storage, CPU, etc.) that each of the different contracting user entities is authorized to use on a virtual machine server device. The CSP may subsequently receive a request from an unverified entity to instantiate a virtual machine with access to one or more resources. The request may include security information. The CSP validates the request by verifying the unverified entity using the first security information (e.g., checking a PKI certificate, requiring a login/password, etc.) and, when the request is validated, provides access to the verified entity to a subset of the requested one or more resources based on the authorization database. | 2013-10-31 |
20130291063 | Identification of Unauthorized or Misconfigured Wireless Access Point Using Distributed Endpoints - A system for identifying unauthorized and/or misconfigured wireless access points (WAPs) in a communication network includes multiple network endpoints and multiple agents running on endpoints. The agents are adapted to periodically locate WAPs and to report located WAPs to a central entity. The system further includes a central entity operative to receive information from the agents regarding located WAPs, to determine whether at least a given one of the located WAPs needs to be probed, and to initiate active probing of located WAPs when it is determined that the given one of the located WAPs needs to be probed. | 2013-10-31 |
20130291064 | AUTHENTICATION USING LIGHTS-OUT MANAGEMENT CREDENTIALS - A method includes upon receiving a request from a user to perform an operation on a device that is running under an operating system, authenticating the user on the basis of credential data that is retrieved from a data storage unit that is associated with a lights-out management (LOM) capability of the device. If authentication of the user is successful, the user is enabled to perform the operation. | 2013-10-31 |
20130291065 | GATHERING GAMIFICATION DATA FROM BUSINESS APPLICATIONS - Methods, computer-readable media, and systems for gathering gamification data from business applications. Common gamification data that describes a user that accesses a business software environment, and specific gamification data that describes the user and is specific to a particular computer system in the business environment are identified at a user interface of a client device in response to a request from a gamification engine. By executing gamification logic in the user interface, the common gamification data and the specific gamification data are collected at the user interface and provided to the gamification engine. For example, the gamification data can be gathered by monitoring interactions between the user and the client device that is connected to the gamification engine at the user interface, and provided to the gamification engine independent of the business computer system to which the client device is connected. | 2013-10-31 |
20130291066 | METHOD AND APPARATUS TO KEEP CONSISTENCY OF ACLS AMONG A META DATA SERVER AND DATA SERVERS - Exemplary embodiments may involve a meta-data server that manages data-server access control list (DS ACL) information. Each entry of this DS ACL information may include an address of a data server, an identification or a range address of chunk data on the data server, a file path of the chunk data in the file tree provided by the meta-data server, and addresses of the permitted clients. The meta-data server may determine the addresses of the permitted clients for the chunk data by retrieving the original file path of chunk data from layout information of the meta-data server, and by retrieving the entry containing the directory path that partially matches with the original file path from an access control list of the meta-data server. | 2013-10-31 |
20130291067 | Identification of Unauthorized or Misconfigured Wireless Access Point Using Distributed Endpoints - A method for identifying unauthorized and/or misconfigured wireless access points (WAPs) in a communication network includes the steps of: an agent running on an endpoint in the communication network locating one or more WAPs in the communication network; the agent reporting at least one located WAP to a central entity; and the central entity performing steps of applying prescribed criteria to determine whether the located WAP needs to be probed, and initiating active probing of the located WAP when it is determined that the located WAP needs to be probed to thereby determine whether the located WAP is unauthorized and/or misconfigured. | 2013-10-31 |
20130291068 | Managing Cloud Zones - Methods and systems for managing cloud zones are described herein. A management server for a cloud of computing resources may add private zones to the cloud. The private zones may contain computers owned and operated by a user of the cloud, such as a cloud customer, rather than the cloud operator. The management server may manage the computing resources in the private zone by sending commands to an agent, which in turn relays the management server's commands to the individual computing resources. The agent may be authenticated using a token. | 2013-10-31 |
20130291069 | SYSTEM AND METHOD OF ACCESSING A NETWORK BY WAY OF DIFFERENT SERVICE PROVIDERS - The present invention comprises a method and apparatus for simplifying the process of access to a network for a roaming computer user, divides the responsibility of servicing a given user wanting to access the network between multiple parties wanting to access the network between multiple parties and minimizes the possibility of improper dissemination of email header data as well as improper use of network resources (including server systems) by non-clients. | 2013-10-31 |
20130291070 | ACTIVATION AND MONETIZATION OF FEATURES BUILT INTO STORAGE SUBSYSTEMS USING A TRUSTED CONNECT SERVICE BACK END INFRASTRUCTURE - Embodiments of systems, apparatuses, and methods to enable a value-added storage service of a storage system coupled to a client are described. In some embodiments, a system establishes a secure root of trust for the client. In addition, the system establishes a secure tunnel between an application of the client and a storage system of the client. Furthermore, the system securely downloads a license for the value-added storage service to the storage system and provides the license from the storage system to an application via the secure tunnel. | 2013-10-31 |
20130291071 | Method and Apparatus for Authenticating a Communication Device - According to an aspect of the present invention there is provided a method of operating a communication device, the communication device being part of a group comprising two or more communication devices that share a subscription to a communication network. The method comprises receiving a group authentication challenge from the network, at least part of the group authentication challenge having been generated using group authentication information that is associated with the shared subscription. The device then generates a device specific response to the group authentication challenge using the group authentication information and device specific authentication information and sends the device specific response to the network. The device is for example a member of a machine-type communication device group. | 2013-10-31 |
20130291072 | SYSTEM, METHOD, NETWORK ENTITY AND DEVICE FOR CONNECTING A DEVICE TO A COMMUNICATIONS NETWORK - The system includes a device of a plurality of devices and a network entity for connecting the device to a communications network. The device is arranged for attempting to access the network while providing an identification of the device to the network entity. The network entity is arranged for receiving the access attempt from the device, and determining the identification of the device. The network entity determines an identification of a subscription associated with the device from a first database of the system. The network determines whether the identified subscription has the device associated therewith in a second database. The network entity allows the device to connect to the network entity or prevents the device from connecting to the communications network depending on the above determinations. | 2013-10-31 |
20130291073 | MULTI-STACK SUBSCRIBER SIGN ON - A system includes a multi-stack subscriber, a gateway, and a web portal. The web portal determines whether the subscriber is authenticated to access the Internet using a first Internet Protocol by receiving logon information from the subscriber. The subscriber requests to access the Internet using a second Internet Protocol. The gateway and/or the web portal determine whether the subscriber is authenticated to access the Internet using the second Internet Protocol without sending a second logon to the subscriber. | 2013-10-31 |
20130291074 | WIRELESS SECURITY CONFIGURATION - An apparatus, method and computer-readable storage medium to efficiently connect to wireless access point(s). An electronic device may capture coded information. The coded information may include a security key to connect to a wireless access point, and the coded information may be an image, an audio clip, or a video. The coded information may be a Quick Response Code. The coded information may be captured from a display of a second electronic device. The second electronic device may include the wireless access point. | 2013-10-31 |
20130291075 | METHOD AND SYSTEM FOR NETWORK ACCESS CONTROL - An apparatus may include a transceiver and a processor circuit coupled to the transceiver. The apparatus may also include a local packet data network access module operable on the processor circuit to schedule for transmission from the transceiver to a mobility management entity (MME) a request from a user equipment (UE) for access to a local network, to generate a request for authentication to be sent to the UE, and to receive authentication information sent in response to the request for authentication. Other embodiments are disclosed and claimed. | 2013-10-31 |
20130291076 | DYNAMIC REPLACEMENT OF SECURITY CREDENTIALS FOR SECURE PROXYING - A subscription proxy receives, from an end user system, a request for a resource provided by a content delivery network, the request comprising a local credential associated with the end user system. The subscription proxy identifies a remote credential associated with the content delivery network and corresponding to the local credential. The subscription proxy replaces the local credential in the request with the corresponding remote credential and sends the request for the resource with the remote credential to the content delivery network. | 2013-10-31 |
20130291077 | IMAGE PROCESSING DEVICE AND IMAGE PROCESSING METHOD - An image processing device controls a local resource, retrieves data files from a network, generates partial images from data included in the data files, and displays an image by combining the plurality of partial images. The partial images include first partial images that require access to the local resource and second partial images that do not require such access. Access to the local resource takes place by request and is controlled so that generation of the first partial images requires authentication of the retrieved data files. While authentication is in progress, the image processing device disallows access to the local resource and displays an image by combining the second partial images with a notification image indicating that authentication is being performed. | 2013-10-31 |
20130291078 | Secure Distribution of Non-Privileged Authentication Credentials - An authentication credentials push service (ACPS) that securely pushes non-privileged authentication credentials to registered client entities. The ACPS comprises a classification server and a push server to provide access to non-privileged authentication credentials absent a pull transaction. The classification server in the ACPS classifies authentication credentials as either privileged (i.e. private, forgeable) or non-privileged (i.e. non-forgeable, non-sensitive). Credentials identified as being of a privileged nature are treated with restricted access. Alternatively, credentials classified as being of a non-privileged nature are made available for the push service. Authentication servers register with the ACPS to become consumers of the push service. A push server within the ACPS pushes non-privileged authentication credentials to registered authentication servers at predetermined intervals. Individual authentication credentials push services (ACPS) have access to different authentication credentials. An authentication server can use a dynamic name service (DNS) lookup to find a specific authentication credentials push service (ACPS). | 2013-10-31 |
20130291079 | SYSTEM AND METHOD FOR POSTING CONTENT TO NETWORK SITES - A system and method for posting content to network sites are disclosed. A particular embodiment includes providing, by use of a data processor, a user interface at a location-specific kiosk, the user interface enabling a user to capture an image at the location-specific kiosk; applying an overlay to the captured image to produce posting content; receiving a community site selection and community site credentials at the location-specific kiosk; using the community site credentials to authenticate with the selected community site via a data network; and posting the posting content at the authenticated community site via the data network. | 2013-10-31 |
20130291080 | SYSTEMS AND METHODS FOR DATA ACCESS PROTECTION - Systems and methods are provided for data access protection. The disclosed computing system can determine a passphrase for controlling access to a file, operate a hash function on the passphrase by a predetermined number of iterations to provide an intermediate passphrase, and send a request for an enhanced passphrase to a server in communication with the apparatus, where the request can include the intermediate passphrase. Subsequently, the disclosed computing system can receive, from the server, the enhanced passphrase based on the intermediate passphrase in response to the request. | 2013-10-31 |
20130291081 | SYSTEM AND METHOD FOR COMPUTER AUTHENTICATION USING IMAGE ANALYSIS OF A SHARED SECRET - Client and server computers on a network can be authenticated using a shared secret. During a log-on and authentication process, the server transmits an image to the client. A mobile communication device captures and analyzes the image. If the image contains the shared secret, the mobile device can authenticate the server. The secret in the image can be a geometric relationship between elements of the picture, a mathematical relationship between elements, a particular number or types of elements in the picture, colors of elements, or combinations of the above. A single image may contain multiple shared secrets. The mobile device can readily analyze the image to determine if it contains the shared secret and thereby authenticate the server. | 2013-10-31 |
20130291082 | Systems and Methods for Segment Integrity and Authenticity for Adaptive Streaming - System and method embodiments are provided for segment integrity and authenticity for adaptive streaming. In an embodiment, the method includes receiving at a data processing system a segment of a media stream, determining, with the data processing system, a digest or a digital signature for the segment, and comparing, with the data processing system, the digest/digital signature to a correct digest or a correct digital signature to determine whether the segment has been modified. | 2013-10-31 |
20130291083 | WIRELESS SMART KEY DEVICE AND SIGNING METHOD THEREOF - The disclosure discloses a wireless smart key device and signing method thereof. The wireless smart key device includes an online device and an offline device; the online device includes a serial communication interface, a first module and a first wireless receiving and sending module; the offline device includes a second module, a power module, a second wireless receiving and sending module, an information inputting module and an information outputting module. The signing method includes that the online device is powered up, receives transaction information message sent by a host computer and communicates with the offline device; the offline device obtains transaction information, outputs the transaction information, waits for receiving user operation information and receives the user operation information; the offline device communicates with the online device; the online device obtains operation result of processing the user operation; the online device sends corresponding operation result to the host computer. | 2013-10-31 |
20130291084 | METHOD FOR ACCESSING A SECURE ELEMENT AND CORRESPONDING SECURE ELEMENT AND SYSTEM - The invention relates to a method for communicating information. A first device is coupled to a secure element. The secure element sends, at an initiative of the secure element, to the first device a secure element identifier. The first device sends to a second device at least one first message comprising the secure element identifier. The second device sends to a third device at least one second message comprising the secure element identifier and two communication network subscription identifiers, as associated data, the second device adding the two communication network subscription identifiers. The third device stores the associated data. The invention also relates to a corresponding system. | 2013-10-31 |
20130291085 | SYSTEMS AND METHODS FOR SECURE OPERATION OF AN INDUSTRIAL CONTROLLER - A system includes an industrial controller having a memory and a processor configured to operate the industrial controller in an open mode, wherein the open mode is configured to enable the industrial controller to receive instructions via unauthenticated network connection or a local connection. The processor of the industrial controller is further configured to operate the industrial controller in a secure mode, wherein the secure mode is configured to enable the industrial controller to receive instructions only via an authenticated network connection. | 2013-10-31 |
20130291086 | ENSURING NETWORK CONNECTION SECURITY BETWEEN A WRAPPED APP AND A REMOTE SERVER - A network connection between an app on a mobile device and a remote server is either enabled or denied based on whether a security wrapped app can verify that the connection is with a known and trusted server. The wrapped app uses a socket interception layer injected into the app code along with a trust store, also part of the wrapped app to determine whether a network connection attempted by the app should be allowed. The layer buffers relevant function calls from the app by intercepting them before they reach the device operating system. If the layer determines that a network connection is attempted, then it snoops the negotiation phase data stream to discern when the server sends a certificate to the app. It obtains this certificate and compares it to data in the trust store and makes a determination of whether the server is known and trusted. | 2013-10-31 |
20130291087 | SYSTEMS AND METHODS FOR INTEGRATING CLOUD SERVICES WITH INFORMATION MANAGEMENT SYSTEMS - A system includes an enterprise network including an internal management system communicatively coupled thereon, the enterprise network includes security and the internal management system is disposed behind the security; a cloud system external to the enterprise network and communicatively coupled to the enterprise network, at least one user associated with the enterprise network is configured to communicate through the cloud system for cloud-based services, and the cloud system is configured to log data associated with the at least one user for the cloud-based services; and an external service bridge located in the enterprise network behind the security, the external service bridge is configured to securely communicate with the cloud system to receive the log data and to communicate with the internal management system to provide the log data thereto. | 2013-10-31 |
20130291088 | COOPERATIVE NETWORK SECURITY INSPECTION - A network system includes a security device and a network access device. The network access device is to receive a packet from a source node destined to a destination node, and to examine a data structure maintained by the network access device to determine whether the data structure stores a data member having a predetermined value, the data member indicating whether the packet should undergo security processing. If the data member matches the predetermined value, the packet is transmitted to a security device associated with the network access device to allow the security device to perform content inspection, and in response to a response received from the security device, the packet is routed to the destination node dependent upon the response. The packet is routed to the destination node without forwarding the packet to the security device. | 2013-10-31 |
20130291089 | DATA COMMUNICATION METHOD AND DEVICE AND DATA INTERACTION SYSTEM BASED ON BROWSER - The present invention, relating to the field of network technologies, discloses a data communication method and device and data interaction system based on browser. The method includes: receiving request data input by a user by using a browser; generating a request data packet using the request data according to a preset private protocol; and sending the request data packet to a server. The client includes: a receiving unit, a generating unit, and a sending unit. The data interaction system includes a client and a server. According to the present invention, a request data packet is generated for request data according to a preset private protocol, and then sent to a server. In addition, during the data communication process, other protocol-specific fields in HTTP are not carried, thereby reducing data transmission amount, saving bandwidths, and improving data transmission efficiency. | 2013-10-31 |
20130291090 | IDENTIFYING USER BY MEASURING PRESSURE OF BUTTON PRESSES ON USER INPUT DEVICE - In one embodiment, a method comprises receiving, by a user identifier circuit, a button pressure signature specifying a sequence of button pressure values sampled while a corresponding identified button of a user input device is pressed by a user; the user identifier circuit identifying the user of the user input device based on the button pressure signature; and the user identifier circuit outputting a message identifying the identified button and the identified user. | 2013-10-31 |
20130291091 | Location Bound Secure Domains - A telecommunications apparatus has secure operation based on geographic location. A positioning mechanism determines a geographic location for the telecommunications apparatus. A processor identifies a secure domain and determines an availability of an application programming interface for the based on the geographic location, wherein at certain geographic locations access to the application programming interface is restricted, and at other geographic locations access to the application programming interface is unrestricted. | 2013-10-31 |
20130291092 | Security Method and Apparatus Having Digital and Analog Components - A method and apparatus for creating and implementing a security protocol. The security protocol preferably includes a dichotomous, or two-part, code. The first part includes a digital component such as an alphanumeric sequence while the second part includes an analog component such as that encountered in any physical attribute. The analog component may also be modeled as a number of different information prototypes, such as a span of time or a musical tone. The resultant combination may be embodied, for example, by a dichotomous password that is used to gain clearance to secure assets and features the ability to “profile” the user requesting secure access in real-time. The password may include a string of characters in which part of the password constitutes entry of each character over varied intervals of time. | 2013-10-31 |
20130291093 | AUTOMATIC USER SWAP - A computer-implemented method for providing secure access to a computer is disclosed according to one aspect of the subject technology. The method comprises capturing an image with a camera at the computer, extracting facial features from the image, and comparing the extracted facial features with facial features of a user stored on the computer, wherein the computer is currently logged into a user account belonging to the user. The method also comprises, if the extracted facial features match the stored facial features of the user, then staying logged into the user account, and, if the extracted facial features do not match the stored facial features of the user, then automatically logging out of the user account. | 2013-10-31 |
20130291094 | SYSTEMS AND METHODS FOR SECURING CONTROLLERS - A system includes a control system having a plurality of controllers configured to control a process. Each controller of the plurality of controllers further includes a secure repository configured to store a login credential. The control system is configured to authorize a user action by comparing a user credential against the login credential of each of the plurality of controllers. | 2013-10-31 |
20130291095 | SECURITY DEVICE AND DISPLAY METHOD THEREOF - A display method that is used for a security device installed with a camera module and a display module includes A. when the security device captured a preset image by the camera module, the security device displaying an interface for entering a password by the display module, and B. when the password is successfully matched, the security device displaying a predetermined object by the display module. By hiding the interface for entering a password, the invention improves the security capability of the device and meets the requirement of information security at present. | 2013-10-31 |
20130291096 | FRAUD RESISTANT PASSCODE ENTRY SYSTEM - A method for user passcode authentication. The method includes accessing a user information database with predefined user input option parameters and generating a random arrangement of input options from the predefined user input option parameters. The method includes manifesting the random arrangement of input options on an interactive display interface and receiving a selection of the interactive display interface input options. The method also includes comparing the received selection of interactive display interface options to the predefined user input option parameters. | 2013-10-31 |
20130291097 | MOBILE INFORMATION TERMINAL, GRIPPING-FEATURE LEARNING METHOD, AND GRIPPING-FEATURE AUTHENTICATION METHOD - A mobile information terminal includes: a mode acquisition part that acquires a mode of the mobile information terminal; a trigger monitoring part that, when a sampling trigger determined on the mode is generated, outputs a gripping-feature acquisition signal; a gripping-feature sample acquisition part that acquires a gripping-feature acquisition signal and a gripping-feature sample; a switch that switches the mobile information terminal between a learning state and an authentication state; a template learning part that, with the mobile information terminal in the learning state, learns a user authentication template for each mode using the gripping-feature samples; a user authentication part that, with the mobile information terminal in the authentication state, compares the learned user authentication template and the gripping-feature sample for each mode for user authentication; a locking part that locks some or all functions of the mobile information terminal when the user authentication fails. | 2013-10-31 |
20130291098 | DETERMINING TRUST BETWEEN PARTIES FOR CONDUCTING BUSINESS TRANSACTIONS - Trust is calculated between persons for purposes of a business transaction. A measure of relative trust is determined for a target user with respect to a source user based on common entities that are related to both the users, for example, common relations, common background, or common preferences. A measure of absolute trust is determined for the target user using factors including financial information, work history, and so on. The absolute trust for the target user is improved using trusts of other users connected to the target user. The absolute trust and relative trusts are combined to obtain an overall measure of trust for the target user. The measure of trust for the user may be used for a business transaction, for example, lead generation, angel investment, equity crowd funding, and sharing of a product or service with another person. | 2013-10-31 |
20130291099 | NOTIFICATION SERVICES WITH ANOMALY DETECTION - A system is configure to monitor financial and/or identification inquiries for anomalous behavior; identify anomalous behavior by comparing the financial and/or identification inquiries to historical financial transactions and/or identification information; send a notification to a mobile device when anomalous behavior is identified for a user of the mobile device; and receive a signal from the mobile device approving, denying, or requesting more information about the anomalous behavior. | 2013-10-31 |
20130291100 | Detection And Prevention Of Machine-To-Machine Hijacking Attacks - An example method includes receiving at a network node a packet destined for an intended destination. The network node determines whether the packet is associated with a machine-to-machine communication. The network node determines whether forwarding of the packet to the intended destination is prohibited, wherein forwarding of the packet is prohibited when the packet is originated from a first machine-to-machine device and is destined to a first host other than a machine-to-machine server associated with machine-to-machine communications. The network node forwards the packet to the intended destination when forwarding the packet is not prohibited. | 2013-10-31 |
20130291101 | DETECTING AND BLOCKING DOMAIN NAME SYSTEM CACHE POISONING ATTACKS - Concepts and technologies for detecting and blocking Domain Name System (“DNS”) cache poisoning attacks are provided. An inline detector and blocker apparatus implements a detection algorithm to monitor DNS response packets and detects a DNS cache poisoning attack utilizing the detection algorithm. The inline detector and blocker apparatus detects the DNS cache poisoning attack by receiving a DNS response packet and determining that the response packet includes poison data. The poison data may be included within an additional section of the response packet and/or an answer section of the response packet. As appropriate, the inline detector and blocker apparatus removes the additional section and/or the answer section of the response packet to effectively block the poison data from being cached by a DNS caching resolver. | 2013-10-31 |